1<?xml version="1.0" encoding="utf-8"?> 2<!-- 3/* //device/apps/common/AndroidManifest.xml 4** 5** Copyright 2006, The Android Open Source Project 6** 7** Licensed under the Apache License, Version 2.0 (the "License"); 8** you may not use this file except in compliance with the License. 9** You may obtain a copy of the License at 10** 11** http://www.apache.org/licenses/LICENSE-2.0 12** 13** Unless required by applicable law or agreed to in writing, software 14** distributed under the License is distributed on an "AS IS" BASIS, 15** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 16** See the License for the specific language governing permissions and 17** limitations under the License. 18*/ 19--> 20<manifest xmlns:android="http://schemas.android.com/apk/res/android" 21 package="android" coreApp="true" android:sharedUserId="android.uid.system" 22 android:sharedUserLabel="@string/android_system_label"> 23 24 <!-- ================================================ --> 25 <!-- Special broadcasts that only the system can send --> 26 <!-- ================================================ --> 27 <eat-comment /> 28 29 <protected-broadcast android:name="android.intent.action.SCREEN_OFF" /> 30 <protected-broadcast android:name="android.intent.action.SCREEN_ON" /> 31 <protected-broadcast android:name="android.intent.action.USER_PRESENT" /> 32 <protected-broadcast android:name="android.intent.action.TIME_SET" /> 33 <protected-broadcast android:name="android.intent.action.TIME_TICK" /> 34 <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" /> 35 <protected-broadcast android:name="android.intent.action.DATE_CHANGED" /> 36 <protected-broadcast android:name="android.intent.action.PRE_BOOT_COMPLETED" /> 37 <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" /> 38 <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" /> 39 <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" /> 40 <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" /> 41 <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" /> 42 <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" /> 43 <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" /> 44 <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" /> 45 <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" /> 46 <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" /> 47 <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" /> 48 <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" /> 49 <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" /> 50 <protected-broadcast android:name="android.intent.action.PACKAGES_SUSPENDED" /> 51 <protected-broadcast android:name="android.intent.action.PACKAGES_UNSUSPENDED" /> 52 <protected-broadcast android:name="android.intent.action.ACTION_PREFERRED_ACTIVITY_CHANGED" /> 53 <protected-broadcast android:name="android.intent.action.UID_REMOVED" /> 54 <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" /> 55 <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" /> 56 <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" /> 57 <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" /> 58 <protected-broadcast android:name="android.intent.action.BATTERY_LOW" /> 59 <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" /> 60 <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" /> 61 <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" /> 62 <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" /> 63 <protected-broadcast android:name="android.intent.action.CHARGING" /> 64 <protected-broadcast android:name="android.intent.action.DISCHARGING" /> 65 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" /> 66 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" /> 67 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" /> 68 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" /> 69 <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" /> 70 <protected-broadcast android:name="android.intent.action.REBOOT" /> 71 <protected-broadcast android:name="android.intent.action.DOCK_EVENT" /> 72 <protected-broadcast android:name="android.intent.action.THERMAL_EVENT" /> 73 <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" /> 74 <protected-broadcast android:name="android.intent.action.USER_ADDED" /> 75 <protected-broadcast android:name="android.intent.action.USER_REMOVED" /> 76 <protected-broadcast android:name="android.intent.action.USER_STARTING" /> 77 <protected-broadcast android:name="android.intent.action.USER_STARTED" /> 78 <protected-broadcast android:name="android.intent.action.USER_STOPPING" /> 79 <protected-broadcast android:name="android.intent.action.USER_STOPPED" /> 80 <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" /> 81 <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" /> 82 <protected-broadcast android:name="android.intent.action.USER_SWITCHED" /> 83 <protected-broadcast android:name="android.intent.action.USER_INITIALIZE" /> 84 <protected-broadcast android:name="android.intent.action.INTENT_FILTER_NEEDS_VERIFICATION" /> 85 <protected-broadcast android:name="android.intent.action.OVERLAY_ADDED" /> 86 <protected-broadcast android:name="android.intent.action.OVERLAY_CHANGED" /> 87 <protected-broadcast android:name="android.intent.action.OVERLAY_REMOVED" /> 88 <protected-broadcast android:name="android.intent.action.OVERLAY_PRIORITY_CHANGED" /> 89 90 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED" /> 91 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGING" /> 92 <protected-broadcast android:name="android.os.action.DEVICE_IDLE_MODE_CHANGED" /> 93 <protected-broadcast android:name="android.os.action.POWER_SAVE_WHITELIST_CHANGED" /> 94 <protected-broadcast android:name="android.os.action.POWER_SAVE_TEMP_WHITELIST_CHANGED" /> 95 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED_INTERNAL" /> 96 97 <!-- @deprecated This is rarely used and will be phased out soon. --> 98 <protected-broadcast android:name="android.os.action.SCREEN_BRIGHTNESS_BOOST_CHANGED" /> 99 100 <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" /> 101 <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" /> 102 <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" /> 103 <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" /> 104 <protected-broadcast android:name="android.app.action.NEXT_ALARM_CLOCK_CHANGED" /> 105 106 <protected-broadcast android:name="android.app.action.BUGREPORT_SHARING_DECLINED" /> 107 <protected-broadcast android:name="android.app.action.BUGREPORT_FAILED" /> 108 <protected-broadcast android:name="android.app.action.BUGREPORT_SHARE" /> 109 <protected-broadcast android:name="android.app.action.SHOW_DEVICE_MONITORING_DIALOG" /> 110 111 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" /> 112 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" /> 113 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" /> 114 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" /> 115 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_HOST_RESTORED" /> 116 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_RESTORED" /> 117 118 <protected-broadcast android:name="android.os.action.SETTING_RESTORED" /> 119 120 <protected-broadcast android:name="android.app.backup.intent.RUN" /> 121 <protected-broadcast android:name="android.app.backup.intent.CLEAR" /> 122 <protected-broadcast android:name="android.app.backup.intent.INIT" /> 123 124 <protected-broadcast android:name="android.bluetooth.intent.DISCOVERABLE_TIMEOUT" /> 125 <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" /> 126 <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" /> 127 <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" /> 128 <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" /> 129 <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" /> 130 <protected-broadcast android:name="android.bluetooth.adapter.action.BLUETOOTH_ADDRESS_CHANGED" /> 131 <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" /> 132 <protected-broadcast android:name="android.bluetooth.device.action.UUID" /> 133 <protected-broadcast android:name="android.bluetooth.device.action.MAS_INSTANCE" /> 134 <protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" /> 135 <protected-broadcast android:name="android.bluetooth.device.action.FOUND" /> 136 <protected-broadcast android:name="android.bluetooth.device.action.DISAPPEARED" /> 137 <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" /> 138 <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" /> 139 <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" /> 140 <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" /> 141 <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" /> 142 <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" /> 143 <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" /> 144 <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" /> 145 <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" /> 146 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" /> 147 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" /> 148 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" /> 149 <protected-broadcast android:name="android.bluetooth.device.action.SDP_RECORD" /> 150 <protected-broadcast android:name="android.bluetooth.device.action.BATTERY_LEVEL_CHANGED" /> 151 <protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" /> 152 <protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" /> 153 <protected-broadcast 154 android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" /> 155 <protected-broadcast 156 android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" /> 157 <protected-broadcast 158 android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" /> 159 <protected-broadcast 160 android:name="android.bluetooth.headset.action.HF_INDICATORS_VALUE_CHANGED" /> 161 <protected-broadcast 162 android:name="android.bluetooth.headsetclient.profile.action.CONNECTION_STATE_CHANGED" /> 163 <protected-broadcast 164 android:name="android.bluetooth.headsetclient.profile.action.AUDIO_STATE_CHANGED" /> 165 <protected-broadcast 166 android:name="android.bluetooth.headsetclient.profile.action.AG_EVENT" /> 167 <protected-broadcast 168 android:name="android.bluetooth.headsetclient.profile.action.AG_CALL_CHANGED" /> 169 <protected-broadcast 170 android:name="android.bluetooth.headsetclient.profile.action.RESULT" /> 171 <protected-broadcast 172 android:name="android.bluetooth.headsetclient.profile.action.LAST_VTAG" /> 173 <protected-broadcast 174 android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" /> 175 <protected-broadcast 176 android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" /> 177 <protected-broadcast 178 android:name="android.bluetooth.a2dp.profile.action.CODEC_CONFIG_CHANGED" /> 179 <protected-broadcast 180 android:name="android.bluetooth.a2dp-sink.profile.action.CONNECTION_STATE_CHANGED" /> 181 <protected-broadcast 182 android:name="android.bluetooth.a2dp-sink.profile.action.PLAYING_STATE_CHANGED" /> 183 <protected-broadcast 184 android:name="android.bluetooth.a2dp-sink.profile.action.AUDIO_CONFIG_CHANGED" /> 185 <protected-broadcast 186 android:name="android.bluetooth.avrcp-controller.profile.action.CONNECTION_STATE_CHANGED" /> 187 <protected-broadcast 188 android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" /> 189 <protected-broadcast 190 android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" /> 191 <protected-broadcast 192 android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" /> 193 <protected-broadcast 194 android:name="android.bluetooth.inputhost.profile.action.CONNECTION_STATE_CHANGED" /> 195 <protected-broadcast 196 android:name="android.bluetooth.map.profile.action.CONNECTION_STATE_CHANGED" /> 197 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.CONNECTION_STATE_CHANGED" /> 198 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_RECEIVED" /> 199 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_SENT_SUCCESSFULLY" /> 200 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_DELIVERED_SUCCESSFULLY" /> 201 <protected-broadcast 202 android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_SENT" /> 203 <protected-broadcast 204 android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_DELIVERY" /> 205 <protected-broadcast 206 android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" /> 207 <protected-broadcast android:name="android.bluetooth.pbap.intent.action.PBAP_STATE_CHANGED" /> 208 <protected-broadcast android:name="android.bluetooth.pbap.profile.action.CONNECTION_STATE_CHANGED" /> 209 <protected-broadcast android:name="android.bluetooth.sap.profile.action.CONNECTION_STATE_CHANGED" /> 210 <protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" /> 211 <protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" /> 212 <protected-broadcast android:name="android.btopp.intent.action.LIST" /> 213 <protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" /> 214 <protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" /> 215 <protected-broadcast android:name="android.btopp.intent.action.CONFIRM" /> 216 <protected-broadcast android:name="android.btopp.intent.action.HIDE" /> 217 <protected-broadcast android:name="android.btopp.intent.action.RETRY" /> 218 <protected-broadcast android:name="android.btopp.intent.action.OPEN" /> 219 <protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" /> 220 <protected-broadcast android:name="android.btopp.intent.action.TRANSFER_COMPLETE" /> 221 <protected-broadcast android:name="android.btopp.intent.action.ACCEPT" /> 222 <protected-broadcast android:name="android.btopp.intent.action.DECLINE" /> 223 <protected-broadcast android:name="com.android.bluetooth.gatt.REFRESH_BATCHED_SCAN" /> 224 <protected-broadcast android:name="com.android.bluetooth.pbap.authchall" /> 225 <protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" /> 226 <protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" /> 227 <protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" /> 228 <protected-broadcast android:name="com.android.bluetooth.sap.USER_CONFIRM_TIMEOUT" /> 229 <protected-broadcast android:name="com.android.bluetooth.sap.action.DISCONNECT_ACTION" /> 230 231 <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" /> 232 233 <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" /> 234 <protected-broadcast android:name="android.hardware.usb.action.USB_PORT_CHANGED" /> 235 <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" /> 236 <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_DETACHED" /> 237 <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" /> 238 <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" /> 239 240 <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" /> 241 <protected-broadcast android:name="android.media.action.HDMI_AUDIO_PLUG" /> 242 243 <protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" /> 244 <protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" /> 245 <protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" /> 246 <protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" /> 247 <protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" /> 248 <protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" /> 249 <protected-broadcast android:name="android.media.MASTER_MONO_CHANGED_ACTION" /> 250 <protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" /> 251 <protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" /> 252 253 <protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" /> 254 <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" /> 255 <protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" /> 256 <protected-broadcast android:name="android.intent.action.MEDIA_NOFS" /> 257 <protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" /> 258 <protected-broadcast android:name="android.intent.action.MEDIA_SHARED" /> 259 <protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" /> 260 <protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" /> 261 <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" /> 262 <protected-broadcast android:name="android.intent.action.MEDIA_EJECT" /> 263 264 <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL" /> 265 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" /> 266 <!-- @deprecated. Only {@link android.net.ConnectivityManager.CONNECTIVITY_ACTION} is sent. --> 267 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" /> 268 <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" /> 269 <protected-broadcast android:name="android.net.conn.RESTRICT_BACKGROUND_CHANGED" /> 270 <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" /> 271 <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" /> 272 273 <protected-broadcast android:name="android.net.nsd.STATE_CHANGED" /> 274 275 <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" /> 276 <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" /> 277 <protected-broadcast android:name="com.android.nfc.action.LLCP_UP" /> 278 <protected-broadcast android:name="com.android.nfc.action.LLCP_DOWN" /> 279 <protected-broadcast android:name="com.android.nfc.cardemulation.action.CLOSE_TAP_DIALOG" /> 280 <protected-broadcast android:name="com.android.nfc.handover.action.ALLOW_CONNECT" /> 281 <protected-broadcast android:name="com.android.nfc.handover.action.DENY_CONNECT" /> 282 <protected-broadcast android:name="com.android.nfc.handover.action.TIMEOUT_CONNECT" /> 283 <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" /> 284 <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" /> 285 <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" /> 286 <!-- For NFC to BT handover --> 287 <protected-broadcast android:name="android.btopp.intent.action.WHITELIST_DEVICE" /> 288 <protected-broadcast android:name="android.btopp.intent.action.STOP_HANDOVER_TRANSFER" /> 289 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND" /> 290 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND_MULTIPLE" /> 291 <protected-broadcast android:name="com.android.nfc.handover.action.CANCEL_HANDOVER_TRANSFER" /> 292 293 <protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" /> 294 <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" /> 295 296 <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" /> 297 298 <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" /> 299 <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" /> 300 <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" /> 301 302 <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" /> 303 <protected-broadcast android:name="com.android.server.WifiManager.action.START_PNO" /> 304 <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" /> 305 <protected-broadcast android:name="com.android.server.WifiManager.action.DEVICE_IDLE" /> 306 <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_ACCEPTED" /> 307 <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_DECLINED" /> 308 <protected-broadcast android:name="com.android.internal.action.EUICC_FACTORY_RESET" /> 309 <protected-broadcast android:name="com.android.server.usb.ACTION_OPEN_IN_APPS" /> 310 <protected-broadcast android:name="com.android.server.am.DELETE_DUMPHEAP" /> 311 <protected-broadcast android:name="com.android.server.net.action.SNOOZE_WARNING" /> 312 <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.USER_DISMISSED_NOTIFICATION" /> 313 <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.CONNECT_TO_NETWORK" /> 314 <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.PICK_WIFI_NETWORK" /> 315 <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.PICK_NETWORK_AFTER_FAILURE" /> 316 <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" /> 317 <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" /> 318 <protected-broadcast android:name="android.net.wifi.WIFI_CREDENTIAL_CHANGED" /> 319 <protected-broadcast android:name="android.net.wifi.WIFI_SCAN_AVAILABLE" /> 320 <protected-broadcast android:name="android.net.wifi.aware.action.WIFI_AWARE_STATE_CHANGED" /> 321 <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" /> 322 <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" /> 323 <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" /> 324 <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" /> 325 <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" /> 326 <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_DEAUTH_IMMINENT" /> 327 <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_ICON" /> 328 <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_OSU_PROVIDERS_LIST" /> 329 <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_SUBSCRIPTION_REMEDIATION" /> 330 <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" /> 331 <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" /> 332 <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" /> 333 <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" /> 334 <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" /> 335 <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" /> 336 <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" /> 337 <protected-broadcast android:name="android.net.wifi.p2p.PERSISTENT_GROUPS_CHANGED" /> 338 <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" /> 339 <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" /> 340 <protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" /> 341 <protected-broadcast 342 android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" /> 343 <protected-broadcast android:name="android.net.scoring.SCORE_NETWORKS" /> 344 <protected-broadcast android:name="android.net.scoring.SCORER_CHANGED" /> 345 <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" /> 346 <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" /> 347 <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" /> 348 <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" /> 349 <protected-broadcast android:name="android.intent.action.APPLICATION_RESTRICTIONS_CHANGED" /> 350 351 <!-- Legacy --> 352 <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" /> 353 <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" /> 354 355 <protected-broadcast android:name="com.android.server.ACTION_TRIGGER_IDLE" /> 356 357 <protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" /> 358 359 <protected-broadcast android:name="android.intent.action.PHONE_STATE" /> 360 361 <protected-broadcast android:name="android.intent.action.SUB_DEFAULT_CHANGED" /> 362 363 <protected-broadcast android:name="android.location.GPS_ENABLED_CHANGE" /> 364 <protected-broadcast android:name="android.location.PROVIDERS_CHANGED" /> 365 <protected-broadcast android:name="android.location.MODE_CHANGED" /> 366 <protected-broadcast android:name="android.location.GPS_FIX_CHANGE" /> 367 <protected-broadcast android:name="android.net.proxy.PAC_REFRESH" /> 368 369 <protected-broadcast android:name="android.telecom.action.DEFAULT_DIALER_CHANGED" /> 370 <protected-broadcast android:name="android.provider.action.DEFAULT_SMS_PACKAGE_CHANGED" /> 371 <protected-broadcast android:name="android.intent.action.CONTENT_CHANGED" /> 372 <protected-broadcast android:name="android.provider.Telephony.MMS_DOWNLOADED" /> 373 374 <protected-broadcast 375 android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" /> 376 377 <!-- Defined in RestrictionsManager --> 378 <protected-broadcast 379 android:name="android.intent.action.PERMISSION_RESPONSE_RECEIVED" /> 380 <!-- Defined in RestrictionsManager --> 381 382 <protected-broadcast android:name="android.intent.action.REQUEST_PERMISSION" /> 383 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_STARTED" /> 384 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" /> 385 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_PROGRESS" /> 386 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" /> 387 388 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_DATA_SUBSCRIPTION_CHANGED" /> 389 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_VOICE_SUBSCRIPTION_CHANGED" /> 390 <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_CONTENT_CHANGE" /> 391 <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_RECORD_UPDATED" /> 392 393 <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_DONE" /> 394 <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_FAILED" /> 395 396 <protected-broadcast android:name="android.internal.policy.action.BURN_IN_PROTECTION" /> 397 <protected-broadcast android:name="android.app.action.SYSTEM_UPDATE_POLICY_CHANGED" /> 398 <protected-broadcast android:name="android.app.action.DEVICE_OWNER_CHANGED" /> 399 400 <!-- Added in N --> 401 <protected-broadcast android:name="android.intent.action.ANR" /> 402 <protected-broadcast android:name="android.intent.action.CALL" /> 403 <protected-broadcast android:name="android.intent.action.CALL_PRIVILEGED" /> 404 <protected-broadcast android:name="android.intent.action.DROPBOX_ENTRY_ADDED" /> 405 <protected-broadcast android:name="android.intent.action.INPUT_METHOD_CHANGED" /> 406 <protected-broadcast android:name="android.intent.action.internal_sim_state_changed" /> 407 <protected-broadcast android:name="android.intent.action.LOCKED_BOOT_COMPLETED" /> 408 <protected-broadcast android:name="android.intent.action.PRECISE_CALL_STATE" /> 409 <protected-broadcast android:name="android.intent.action.PRECISE_DATA_CONNECTION_STATE_CHANGED" /> 410 <protected-broadcast android:name="android.intent.action.SUBSCRIPTION_PHONE_STATE" /> 411 <protected-broadcast android:name="android.intent.action.USER_INFO_CHANGED" /> 412 <protected-broadcast android:name="android.intent.action.USER_UNLOCKED" /> 413 <protected-broadcast android:name="android.intent.action.WALLPAPER_CHANGED" /> 414 415 <protected-broadcast android:name="android.app.action.DEVICE_POLICY_MANAGER_STATE_CHANGED" /> 416 <protected-broadcast android:name="android.app.action.CHOOSE_PRIVATE_KEY_ALIAS" /> 417 <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLED" /> 418 <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLE_REQUESTED" /> 419 <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_ENABLED" /> 420 <protected-broadcast android:name="android.app.action.LOCK_TASK_ENTERING" /> 421 <protected-broadcast android:name="android.app.action.LOCK_TASK_EXITING" /> 422 <protected-broadcast android:name="android.app.action.NOTIFY_PENDING_SYSTEM_UPDATE" /> 423 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_CHANGED" /> 424 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_EXPIRING" /> 425 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_FAILED" /> 426 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_SUCCEEDED" /> 427 <protected-broadcast android:name="com.android.server.ACTION_EXPIRED_PASSWORD_NOTIFICATION" /> 428 429 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_ADDED" /> 430 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNLOCKED" /> 431 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_REMOVED" /> 432 433 <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_STATE_CHANGED" /> 434 <protected-broadcast android:name="com.android.bluetooth.map.USER_CONFIRM_TIMEOUT" /> 435 <protected-broadcast android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_SENT" /> 436 <protected-broadcast android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_DELIVERY" /> 437 <protected-broadcast android:name="android.content.jobscheduler.JOB_DELAY_EXPIRED" /> 438 <protected-broadcast android:name="android.content.syncmanager.SYNC_ALARM" /> 439 <protected-broadcast android:name="android.media.INTERNAL_RINGER_MODE_CHANGED_ACTION" /> 440 <protected-broadcast android:name="android.media.STREAM_DEVICES_CHANGED_ACTION" /> 441 <protected-broadcast android:name="android.media.STREAM_MUTE_CHANGED_ACTION" /> 442 <protected-broadcast android:name="android.net.sip.SIP_SERVICE_UP" /> 443 <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" /> 444 <protected-broadcast android:name="android.os.action.CHARGING" /> 445 <protected-broadcast android:name="android.os.action.DISCHARGING" /> 446 <protected-broadcast android:name="android.search.action.SEARCHABLES_CHANGED" /> 447 <protected-broadcast android:name="android.security.STORAGE_CHANGED" /> 448 <protected-broadcast android:name="android.security.action.TRUST_STORE_CHANGED" /> 449 <protected-broadcast android:name="android.security.action.KEYCHAIN_CHANGED" /> 450 <protected-broadcast android:name="android.security.action.KEY_ACCESS_CHANGED" /> 451 <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_REGISTERED" /> 452 <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_UNREGISTERED" /> 453 <protected-broadcast android:name="android.telecom.action.SHOW_MISSED_CALLS_NOTIFICATION" /> 454 <protected-broadcast android:name="android.telephony.action.CARRIER_CONFIG_CHANGED" /> 455 <protected-broadcast android:name="android.telephony.action.DEFAULT_SUBSCRIPTION_CHANGED" /> 456 <protected-broadcast android:name="android.telephony.action.DEFAULT_SMS_SUBSCRIPTION_CHANGED" /> 457 <protected-broadcast android:name="android.telephony.action.SHOW_VOICEMAIL_NOTIFICATION" /> 458 459 <protected-broadcast android:name="com.android.bluetooth.btservice.action.ALARM_WAKEUP" /> 460 <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_POLL" /> 461 <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_UPDATED" /> 462 <protected-broadcast android:name="com.android.server.NetworkTimeUpdateService.action.POLL" /> 463 <protected-broadcast android:name="com.android.server.telecom.intent.action.CALLS_ADD_ENTRY" /> 464 <protected-broadcast android:name="com.android.settings.location.MODE_CHANGING" /> 465 <protected-broadcast android:name="com.android.settings.bluetooth.ACTION_DISMISS_PAIRING" /> 466 467 <protected-broadcast android:name="NotificationManagerService.TIMEOUT" /> 468 <protected-broadcast android:name="ScheduleConditionProvider.EVALUATE" /> 469 <protected-broadcast android:name="EventConditionProvider.EVALUATE" /> 470 <protected-broadcast android:name="SnoozeHelper.EVALUATE" /> 471 <protected-broadcast android:name="wifi_scan_available" /> 472 473 <protected-broadcast android:name="action.cne.started" /> 474 <protected-broadcast android:name="android.content.jobscheduler.JOB_DEADLINE_EXPIRED" /> 475 <protected-broadcast android:name="android.intent.action.ACTION_UNSOL_RESPONSE_OEM_HOOK_RAW" /> 476 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_SUPL" /> 477 <protected-broadcast android:name="android.os.action.ACTION_EFFECTS_SUPPRESSOR_CHANGED" /> 478 <protected-broadcast android:name="android.os.action.LIGHT_DEVICE_IDLE_MODE_CHANGED" /> 479 <protected-broadcast android:name="android.os.storage.action.VOLUME_STATE_CHANGED" /> 480 <protected-broadcast android:name="android.os.storage.action.DISK_SCANNED" /> 481 <protected-broadcast android:name="com.android.server.action.UPDATE_TWILIGHT_STATE" /> 482 <protected-broadcast android:name="com.android.server.action.RESET_TWILIGHT_AUTO" /> 483 <protected-broadcast android:name="com.android.server.device_idle.STEP_IDLE_STATE" /> 484 <protected-broadcast android:name="com.android.server.device_idle.STEP_LIGHT_IDLE_STATE" /> 485 <protected-broadcast android:name="com.android.server.Wifi.action.TOGGLE_PNO" /> 486 <protected-broadcast android:name="intent.action.ACTION_RF_BAND_INFO" /> 487 <protected-broadcast android:name="android.intent.action.MEDIA_RESOURCE_GRANTED" /> 488 <protected-broadcast android:name="android.app.action.NETWORK_LOGS_AVAILABLE" /> 489 <protected-broadcast android:name="android.app.action.SECURITY_LOGS_AVAILABLE" /> 490 491 <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED" /> 492 <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED_INTERNAL" /> 493 <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_CHANGED" /> 494 <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_ACCESS_GRANTED_CHANGED" /> 495 <protected-broadcast android:name="android.os.action.ACTION_EFFECTS_SUPPRESSOR_CHANGED" /> 496 497 <protected-broadcast android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS" /> 498 <protected-broadcast android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS" /> 499 500 <protected-broadcast android:name="android.intent.action.DYNAMIC_SENSOR_CHANGED" /> 501 502 <protected-broadcast android:name="android.intent.action.ACTION_RADIO_OFF" /> 503 504 <protected-broadcast android:name="android.accounts.LOGIN_ACCOUNTS_CHANGED" /> 505 <protected-broadcast android:name="android.accounts.action.ACCOUNT_REMOVED" /> 506 <protected-broadcast android:name="android.accounts.action.VISIBLE_ACCOUNTS_CHANGED" /> 507 508 <protected-broadcast android:name="com.android.sync.SYNC_CONN_STATUS_CHANGED" /> 509 510 <protected-broadcast android:name="com.android.phone.SIP_INCOMING_CALL" /> 511 <protected-broadcast android:name="com.android.phone.SIP_ADD_PHONE" /> 512 <protected-broadcast android:name="com.android.phone.SIP_REMOVE_PHONE" /> 513 <protected-broadcast android:name="com.android.phone.SIP_CALL_OPTION_CHANGED" /> 514 515 <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_CONNECTED" /> 516 <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_DISCONNECTED" /> 517 518 <protected-broadcast android:name="android.bluetooth.input.profile.action.HANDSHAKE" /> 519 <protected-broadcast android:name="android.bluetooth.input.profile.action.REPORT" /> 520 521 <protected-broadcast android:name="android.intent.action.TWILIGHT_CHANGED" /> 522 523 <protected-broadcast android:name="com.android.server.fingerprint.ACTION_LOCKOUT_RESET" /> 524 <protected-broadcast android:name="android.net.wifi.PASSPOINT_ICON_RECEIVED" /> 525 <protected-broadcast android:name="com.android.server.notification.CountdownConditionProvider" /> 526 527 <protected-broadcast android:name="com.android.internal.location.ALARM_WAKEUP" /> 528 <protected-broadcast android:name="com.android.internal.location.ALARM_TIMEOUT" /> 529 <protected-broadcast android:name="android.intent.action.GLOBAL_BUTTON" /> 530 531 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_AVAILABLE" /> 532 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNAVAILABLE" /> 533 <protected-broadcast android:name="com.android.server.pm.DISABLE_QUIET_MODE_AFTER_UNLOCK" /> 534 535 <protected-broadcast android:name="com.android.server.retaildemo.ACTION_RESET_DEMO" /> 536 537 <protected-broadcast android:name="android.intent.action.DEVICE_LOCKED_CHANGED" /> 538 539 <!-- Added in O --> 540 <!-- TODO: temporary broadcast used by AutoFillManagerServiceImpl; will be removed --> 541 <protected-broadcast android:name="com.android.internal.autofill.action.REQUEST_AUTOFILL" /> 542 <protected-broadcast android:name="android.app.action.APPLICATION_DELEGATION_SCOPES_CHANGED" /> 543 <protected-broadcast android:name="com.android.server.wm.ACTION_REVOKE_SYSTEM_ALERT_WINDOW_PERMISSION" /> 544 <protected-broadcast android:name="android.media.tv.action.PARENTAL_CONTROLS_ENABLED_CHANGED" /> 545 546 <protected-broadcast android:name="android.content.pm.action.SESSION_COMMITTED" /> 547 <protected-broadcast android:name="android.os.action.USER_RESTRICTIONS_CHANGED" /> 548 <protected-broadcast android:name="android.media.tv.action.PREVIEW_PROGRAM_ADDED_TO_WATCH_NEXT" /> 549 <protected-broadcast android:name="android.media.tv.action.PREVIEW_PROGRAM_BROWSABLE_DISABLED" /> 550 <protected-broadcast android:name="android.media.tv.action.WATCH_NEXT_PROGRAM_BROWSABLE_DISABLED" /> 551 <protected-broadcast android:name="android.media.tv.action.CHANNEL_BROWSABLE_REQUESTED" /> 552 <protected-broadcast android:name="com.android.server.InputMethodManagerService.SHOW_INPUT_METHOD_PICKER" /> 553 554 <!-- ====================================================================== --> 555 <!-- RUNTIME PERMISSIONS --> 556 <!-- ====================================================================== --> 557 <eat-comment /> 558 559 <!-- ====================================================================== --> 560 <!-- Permissions for accessing user's contacts including personal profile --> 561 <!-- ====================================================================== --> 562 <eat-comment /> 563 564 <!-- Used for runtime permissions related to contacts and profiles on this 565 device. --> 566 <permission-group android:name="android.permission-group.CONTACTS" 567 android:icon="@drawable/perm_group_contacts" 568 android:label="@string/permgrouplab_contacts" 569 android:description="@string/permgroupdesc_contacts" 570 android:priority="100" /> 571 572 <!-- Allows an application to read the user's contacts data. 573 <p>Protection level: dangerous 574 --> 575 <permission android:name="android.permission.READ_CONTACTS" 576 android:permissionGroup="android.permission-group.CONTACTS" 577 android:label="@string/permlab_readContacts" 578 android:description="@string/permdesc_readContacts" 579 android:protectionLevel="dangerous" /> 580 581 <!-- Allows an application to write the user's contacts data. 582 <p>Protection level: dangerous 583 --> 584 <permission android:name="android.permission.WRITE_CONTACTS" 585 android:permissionGroup="android.permission-group.CONTACTS" 586 android:label="@string/permlab_writeContacts" 587 android:description="@string/permdesc_writeContacts" 588 android:protectionLevel="dangerous" /> 589 590 <!-- ====================================================================== --> 591 <!-- Permissions for accessing user's calendar --> 592 <!-- ====================================================================== --> 593 <eat-comment /> 594 595 <!-- Used for runtime permissions related to user's calendar. --> 596 <permission-group android:name="android.permission-group.CALENDAR" 597 android:icon="@drawable/perm_group_calendar" 598 android:label="@string/permgrouplab_calendar" 599 android:description="@string/permgroupdesc_calendar" 600 android:priority="200" /> 601 602 <!-- Allows an application to read the user's calendar data. 603 <p>Protection level: dangerous 604 --> 605 <permission android:name="android.permission.READ_CALENDAR" 606 android:permissionGroup="android.permission-group.CALENDAR" 607 android:label="@string/permlab_readCalendar" 608 android:description="@string/permdesc_readCalendar" 609 android:protectionLevel="dangerous" /> 610 611 <!-- Allows an application to write the user's calendar data. 612 <p>Protection level: dangerous 613 --> 614 <permission android:name="android.permission.WRITE_CALENDAR" 615 android:permissionGroup="android.permission-group.CALENDAR" 616 android:label="@string/permlab_writeCalendar" 617 android:description="@string/permdesc_writeCalendar" 618 android:protectionLevel="dangerous" /> 619 620 <!-- ====================================================================== --> 621 <!-- Permissions for accessing and modifying user's SMS messages --> 622 <!-- ====================================================================== --> 623 <eat-comment /> 624 625 <!-- Used for runtime permissions related to user's SMS messages. --> 626 <permission-group android:name="android.permission-group.SMS" 627 android:icon="@drawable/perm_group_sms" 628 android:label="@string/permgrouplab_sms" 629 android:description="@string/permgroupdesc_sms" 630 android:priority="300" /> 631 632 <!-- Allows an application to send SMS messages. 633 <p>Protection level: dangerous 634 --> 635 <permission android:name="android.permission.SEND_SMS" 636 android:permissionGroup="android.permission-group.SMS" 637 android:label="@string/permlab_sendSms" 638 android:description="@string/permdesc_sendSms" 639 android:permissionFlags="costsMoney" 640 android:protectionLevel="dangerous" /> 641 642 <!-- Allows an application to receive SMS messages. 643 <p>Protection level: dangerous 644 --> 645 <permission android:name="android.permission.RECEIVE_SMS" 646 android:permissionGroup="android.permission-group.SMS" 647 android:label="@string/permlab_receiveSms" 648 android:description="@string/permdesc_receiveSms" 649 android:protectionLevel="dangerous"/> 650 651 <!-- Allows an application to read SMS messages. 652 <p>Protection level: dangerous 653 --> 654 <permission android:name="android.permission.READ_SMS" 655 android:permissionGroup="android.permission-group.SMS" 656 android:label="@string/permlab_readSms" 657 android:description="@string/permdesc_readSms" 658 android:protectionLevel="dangerous" /> 659 660 <!-- Allows an application to receive WAP push messages. 661 <p>Protection level: dangerous 662 --> 663 <permission android:name="android.permission.RECEIVE_WAP_PUSH" 664 android:permissionGroup="android.permission-group.SMS" 665 android:label="@string/permlab_receiveWapPush" 666 android:description="@string/permdesc_receiveWapPush" 667 android:protectionLevel="dangerous" /> 668 669 <!-- Allows an application to monitor incoming MMS messages. 670 <p>Protection level: dangerous 671 --> 672 <permission android:name="android.permission.RECEIVE_MMS" 673 android:permissionGroup="android.permission-group.SMS" 674 android:label="@string/permlab_receiveMms" 675 android:description="@string/permdesc_receiveMms" 676 android:protectionLevel="dangerous" /> 677 678 <!-- Allows an application to read previously received cell broadcast 679 messages and to register a content observer to get notifications when 680 a cell broadcast has been received and added to the database. For 681 emergency alerts, the database is updated immediately after the 682 alert dialog and notification sound/vibration/speech are presented. 683 The "read" column is then updated after the user dismisses the alert. 684 This enables supplementary emergency assistance apps to start loading 685 additional emergency information (if Internet access is available) 686 when the alert is first received, and to delay presenting the info 687 to the user until after the initial alert dialog is dismissed. 688 <p>Protection level: dangerous 689 @hide Pending API council approval --> 690 <permission android:name="android.permission.READ_CELL_BROADCASTS" 691 android:permissionGroup="android.permission-group.SMS" 692 android:label="@string/permlab_readCellBroadcasts" 693 android:description="@string/permdesc_readCellBroadcasts" 694 android:protectionLevel="dangerous" /> 695 696 <!-- ====================================================================== --> 697 <!-- Permissions for accessing external storage --> 698 <!-- ====================================================================== --> 699 <eat-comment /> 700 701 <!-- Used for runtime permissions related to the shared external storage. --> 702 <permission-group android:name="android.permission-group.STORAGE" 703 android:icon="@drawable/perm_group_storage" 704 android:label="@string/permgrouplab_storage" 705 android:description="@string/permgroupdesc_storage" 706 android:priority="900" /> 707 708 <!-- Allows an application to read from external storage. 709 <p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly 710 granted this permission.</p> 711 <p>This permission is enforced starting in API level 19. Before API level 19, this 712 permission is not enforced and all apps still have access to read from external storage. 713 You can test your app with the permission enforced by enabling <em>Protect USB 714 storage</em> under Developer options in the Settings app on a device running Android 4.1 or 715 higher.</p> 716 <p>Also starting in API level 19, this permission is <em>not</em> required to 717 read/write files in your application-specific directories returned by 718 {@link android.content.Context#getExternalFilesDir} and 719 {@link android.content.Context#getExternalCacheDir}. 720 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 721 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 722 minSdkVersion}</a> and <a 723 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 724 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 725 grants your app this permission. If you don't need this permission, be sure your <a 726 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 727 targetSdkVersion}</a> is 4 or higher. 728 <p>Protection level: dangerous 729 --> 730 <permission android:name="android.permission.READ_EXTERNAL_STORAGE" 731 android:permissionGroup="android.permission-group.STORAGE" 732 android:label="@string/permlab_sdcardRead" 733 android:description="@string/permdesc_sdcardRead" 734 android:protectionLevel="dangerous" /> 735 736 <!-- Allows an application to write to external storage. 737 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 738 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 739 minSdkVersion}</a> and <a 740 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 741 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 742 grants your app this permission. If you don't need this permission, be sure your <a 743 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 744 targetSdkVersion}</a> is 4 or higher. 745 <p>Starting in API level 19, this permission is <em>not</em> required to 746 read/write files in your application-specific directories returned by 747 {@link android.content.Context#getExternalFilesDir} and 748 {@link android.content.Context#getExternalCacheDir}. 749 <p>Protection level: dangerous 750 --> 751 <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE" 752 android:permissionGroup="android.permission-group.STORAGE" 753 android:label="@string/permlab_sdcardWrite" 754 android:description="@string/permdesc_sdcardWrite" 755 android:protectionLevel="dangerous" /> 756 757 <!-- ====================================================================== --> 758 <!-- Permissions for accessing the device location --> 759 <!-- ====================================================================== --> 760 <eat-comment /> 761 762 <!-- Used for permissions that allow accessing the device location. --> 763 <permission-group android:name="android.permission-group.LOCATION" 764 android:icon="@drawable/perm_group_location" 765 android:label="@string/permgrouplab_location" 766 android:description="@string/permgroupdesc_location" 767 android:priority="400" /> 768 769 <!-- Allows an app to access precise location. 770 Alternatively, you might want {@link #ACCESS_COARSE_LOCATION}. 771 <p>Protection level: dangerous 772 --> 773 <permission android:name="android.permission.ACCESS_FINE_LOCATION" 774 android:permissionGroup="android.permission-group.LOCATION" 775 android:label="@string/permlab_accessFineLocation" 776 android:description="@string/permdesc_accessFineLocation" 777 android:protectionLevel="dangerous|instant" /> 778 779 <!-- Allows an app to access approximate location. 780 Alternatively, you might want {@link #ACCESS_FINE_LOCATION}. 781 <p>Protection level: dangerous 782 --> 783 <permission android:name="android.permission.ACCESS_COARSE_LOCATION" 784 android:permissionGroup="android.permission-group.LOCATION" 785 android:label="@string/permlab_accessCoarseLocation" 786 android:description="@string/permdesc_accessCoarseLocation" 787 android:protectionLevel="dangerous|instant" /> 788 789 <!-- ====================================================================== --> 790 <!-- Permissions for accessing the device telephony --> 791 <!-- ====================================================================== --> 792 <eat-comment /> 793 794 <!-- Used for permissions that are associated telephony features. --> 795 <permission-group android:name="android.permission-group.PHONE" 796 android:icon="@drawable/perm_group_phone_calls" 797 android:label="@string/permgrouplab_phone" 798 android:description="@string/permgroupdesc_phone" 799 android:priority="500" /> 800 801 <!-- Allows read only access to phone state, including the phone number of the device, 802 current cellular network information, the status of any ongoing calls, and a list of any 803 {@link android.telecom.PhoneAccount}s registered on the device. 804 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 805 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 806 minSdkVersion}</a> and <a 807 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 808 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 809 grants your app this permission. If you don't need this permission, be sure your <a 810 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 811 targetSdkVersion}</a> is 4 or higher. 812 <p>Protection level: dangerous 813 --> 814 <permission android:name="android.permission.READ_PHONE_STATE" 815 android:permissionGroup="android.permission-group.PHONE" 816 android:label="@string/permlab_readPhoneState" 817 android:description="@string/permdesc_readPhoneState" 818 android:protectionLevel="dangerous" /> 819 820 <!-- Allows read access to the device's phone number(s). This is a subset of the capabilities 821 granted by {@link #READ_PHONE_STATE} but is exposed to instant applications. 822 <p>Protection level: dangerous--> 823 <permission android:name="android.permission.READ_PHONE_NUMBERS" 824 android:permissionGroup="android.permission-group.PHONE" 825 android:label="@string/permlab_readPhoneNumbers" 826 android:description="@string/permdesc_readPhoneNumbers" 827 android:protectionLevel="dangerous|instant" /> 828 829 <!-- Allows an application to initiate a phone call without going through 830 the Dialer user interface for the user to confirm the call. 831 <p>Protection level: dangerous 832 --> 833 <permission android:name="android.permission.CALL_PHONE" 834 android:permissionGroup="android.permission-group.PHONE" 835 android:permissionFlags="costsMoney" 836 android:label="@string/permlab_callPhone" 837 android:description="@string/permdesc_callPhone" 838 android:protectionLevel="dangerous" /> 839 840 <!-- Allows an application to access the IMS call service: making and 841 modifying a call 842 <p>Protection level: signature|privileged 843 @hide 844 --> 845 <permission android:name="android.permission.ACCESS_IMS_CALL_SERVICE" 846 android:permissionGroup="android.permission-group.PHONE" 847 android:label="@string/permlab_accessImsCallService" 848 android:description="@string/permdesc_accessImsCallService" 849 android:protectionLevel="signature|privileged" /> 850 851 <!-- Allows an application to read the user's call log. 852 <p class="note"><strong>Note:</strong> If your app uses the 853 {@link #READ_CONTACTS} permission and <em>both</em> your <a 854 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 855 minSdkVersion}</a> and <a 856 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 857 targetSdkVersion}</a> values are set to 15 or lower, the system implicitly 858 grants your app this permission. If you don't need this permission, be sure your <a 859 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 860 targetSdkVersion}</a> is 16 or higher.</p> 861 <p>Protection level: dangerous 862 --> 863 <permission android:name="android.permission.READ_CALL_LOG" 864 android:permissionGroup="android.permission-group.PHONE" 865 android:label="@string/permlab_readCallLog" 866 android:description="@string/permdesc_readCallLog" 867 android:protectionLevel="dangerous" /> 868 869 <!-- Allows an application to write (but not read) the user's 870 call log data. 871 <p class="note"><strong>Note:</strong> If your app uses the 872 {@link #WRITE_CONTACTS} permission and <em>both</em> your <a 873 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 874 minSdkVersion}</a> and <a 875 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 876 targetSdkVersion}</a> values are set to 15 or lower, the system implicitly 877 grants your app this permission. If you don't need this permission, be sure your <a 878 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 879 targetSdkVersion}</a> is 16 or higher.</p> 880 <p>Protection level: dangerous 881 --> 882 <permission android:name="android.permission.WRITE_CALL_LOG" 883 android:permissionGroup="android.permission-group.PHONE" 884 android:label="@string/permlab_writeCallLog" 885 android:description="@string/permdesc_writeCallLog" 886 android:protectionLevel="dangerous" /> 887 888 <!-- Allows an application to add voicemails into the system. 889 <p>Protection level: dangerous 890 --> 891 <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL" 892 android:permissionGroup="android.permission-group.PHONE" 893 android:label="@string/permlab_addVoicemail" 894 android:description="@string/permdesc_addVoicemail" 895 android:protectionLevel="dangerous" /> 896 897 <!-- Allows an application to use SIP service. 898 <p>Protection level: dangerous 899 --> 900 <permission android:name="android.permission.USE_SIP" 901 android:permissionGroup="android.permission-group.PHONE" 902 android:description="@string/permdesc_use_sip" 903 android:label="@string/permlab_use_sip" 904 android:protectionLevel="dangerous"/> 905 906 <!-- Allows an application to see the number being dialed during an outgoing 907 call with the option to redirect the call to a different number or 908 abort the call altogether. 909 <p>Protection level: dangerous 910 --> 911 <permission android:name="android.permission.PROCESS_OUTGOING_CALLS" 912 android:permissionGroup="android.permission-group.PHONE" 913 android:label="@string/permlab_processOutgoingCalls" 914 android:description="@string/permdesc_processOutgoingCalls" 915 android:protectionLevel="dangerous" /> 916 917 918 <!-- Allows the app to answer an incoming phone call. 919 <p>Protection level: dangerous 920 --> 921 <permission android:name="android.permission.ANSWER_PHONE_CALLS" 922 android:permissionGroup="android.permission-group.PHONE" 923 android:label="@string/permlab_answerPhoneCalls" 924 android:description="@string/permdesc_answerPhoneCalls" 925 android:protectionLevel="dangerous|runtime" /> 926 927 <!-- Allows a calling application which manages it own calls through the self-managed 928 {@link android.telecom.ConnectionService} APIs. See 929 {@link android.telecom.PhoneAccount#CAPABILITY_SELF_MANAGED for more information on the 930 self-managed ConnectionService APIs. 931 <p>Protection level: normal 932 --> 933 <permission android:name="android.permission.MANAGE_OWN_CALLS" 934 android:label="@string/permlab_manageOwnCalls" 935 android:description="@string/permdesc_manageOwnCalls" 936 android:protectionLevel="normal" /> 937 938 <!-- ====================================================================== --> 939 <!-- Permissions for accessing the device microphone --> 940 <!-- ====================================================================== --> 941 <eat-comment /> 942 943 <!-- Used for permissions that are associated with accessing 944 microphone audio from the device. Note that phone calls also capture audio 945 but are in a separate (more visible) permission group. --> 946 <permission-group android:name="android.permission-group.MICROPHONE" 947 android:icon="@drawable/perm_group_microphone" 948 android:label="@string/permgrouplab_microphone" 949 android:description="@string/permgroupdesc_microphone" 950 android:priority="600" /> 951 952 <!-- Allows an application to record audio. 953 <p>Protection level: dangerous 954 --> 955 <permission android:name="android.permission.RECORD_AUDIO" 956 android:permissionGroup="android.permission-group.MICROPHONE" 957 android:label="@string/permlab_recordAudio" 958 android:description="@string/permdesc_recordAudio" 959 android:protectionLevel="dangerous|instant"/> 960 961 <!-- ====================================================================== --> 962 <!-- Permissions for accessing the UCE Service --> 963 <!-- ====================================================================== --> 964 965 <!-- @hide Allows an application to Access UCE-Presence. 966 <p>Protection level: signature|privileged 967 --> 968 <permission android:name="android.permission.ACCESS_UCE_PRESENCE_SERVICE" 969 android:permissionGroup="android.permission-group.PHONE" 970 android:protectionLevel="signature|privileged"/> 971 972 <!-- @hide Allows an application to Access UCE-OPTIONS. 973 <p>Protection level: signature|privileged 974 --> 975 <permission android:name="android.permission.ACCESS_UCE_OPTIONS_SERVICE" 976 android:permissionGroup="android.permission-group.PHONE" 977 android:protectionLevel="signature|privileged"/> 978 979 980 981 <!-- ====================================================================== --> 982 <!-- Permissions for accessing the device camera --> 983 <!-- ====================================================================== --> 984 <eat-comment /> 985 986 <!-- Used for permissions that are associated with accessing 987 camera or capturing images/video from the device. --> 988 <permission-group android:name="android.permission-group.CAMERA" 989 android:icon="@drawable/perm_group_camera" 990 android:label="@string/permgrouplab_camera" 991 android:description="@string/permgroupdesc_camera" 992 android:priority="700" /> 993 994 <!-- Required to be able to access the camera device. 995 <p>This will automatically enforce the <a 996 href="{@docRoot}guide/topics/manifest/uses-feature-element.html"> 997 <uses-feature>}</a> manifest element for <em>all</em> camera features. 998 If you do not require all camera features or can properly operate if a camera 999 is not available, then you must modify your manifest as appropriate in order to 1000 install on devices that don't support all camera features.</p> 1001 <p>Protection level: dangerous 1002 --> 1003 <permission android:name="android.permission.CAMERA" 1004 android:permissionGroup="android.permission-group.CAMERA" 1005 android:label="@string/permlab_camera" 1006 android:description="@string/permdesc_camera" 1007 android:protectionLevel="dangerous|instant" /> 1008 1009 1010 <!-- ====================================================================== --> 1011 <!-- Permissions for accessing the device sensors --> 1012 <!-- ====================================================================== --> 1013 <eat-comment /> 1014 1015 <!-- Used for permissions that are associated with accessing 1016 camera or capturing images/video from the device. --> 1017 <permission-group android:name="android.permission-group.SENSORS" 1018 android:icon="@drawable/perm_group_sensors" 1019 android:label="@string/permgrouplab_sensors" 1020 android:description="@string/permgroupdesc_sensors" 1021 android:priority="800" /> 1022 1023 <!-- Allows an application to access data from sensors that the user uses to 1024 measure what is happening inside his/her body, such as heart rate. 1025 <p>Protection level: dangerous --> 1026 <permission android:name="android.permission.BODY_SENSORS" 1027 android:permissionGroup="android.permission-group.SENSORS" 1028 android:label="@string/permlab_bodySensors" 1029 android:description="@string/permdesc_bodySensors" 1030 android:protectionLevel="dangerous" /> 1031 1032 <!-- Allows an app to use fingerprint hardware. 1033 <p>Protection level: normal 1034 --> 1035 <permission android:name="android.permission.USE_FINGERPRINT" 1036 android:permissionGroup="android.permission-group.SENSORS" 1037 android:label="@string/permlab_useFingerprint" 1038 android:description="@string/permdesc_useFingerprint" 1039 android:protectionLevel="normal" /> 1040 1041 <!-- ====================================================================== --> 1042 <!-- REMOVED PERMISSIONS --> 1043 <!-- ====================================================================== --> 1044 1045 <!-- @hide We need to keep this around for backwards compatibility --> 1046 <permission android:name="android.permission.READ_PROFILE" 1047 android:protectionLevel="normal" 1048 android:permissionFlags="removed"/> 1049 1050 <!-- @hide We need to keep this around for backwards compatibility --> 1051 <permission android:name="android.permission.WRITE_PROFILE" 1052 android:protectionLevel="normal" 1053 android:permissionFlags="removed"/> 1054 1055 <!-- @hide We need to keep this around for backwards compatibility --> 1056 <permission android:name="android.permission.READ_SOCIAL_STREAM" 1057 android:protectionLevel="normal" 1058 android:permissionFlags="removed"/> 1059 1060 <!-- @hide We need to keep this around for backwards compatibility --> 1061 <permission android:name="android.permission.WRITE_SOCIAL_STREAM" 1062 android:protectionLevel="normal" 1063 android:permissionFlags="removed"/> 1064 1065 <!-- @hide We need to keep this around for backwards compatibility --> 1066 <permission android:name="android.permission.READ_USER_DICTIONARY" 1067 android:protectionLevel="normal" 1068 android:permissionFlags="removed"/> 1069 1070 <!-- @hide We need to keep this around for backwards compatibility --> 1071 <permission android:name="android.permission.WRITE_USER_DICTIONARY" 1072 android:protectionLevel="normal" 1073 android:permissionFlags="removed"/> 1074 1075 <!-- @hide We need to keep this around for backwards compatibility --> 1076 <permission android:name="android.permission.WRITE_SMS" 1077 android:protectionLevel="normal" 1078 android:permissionFlags="removed"/> 1079 1080 <!-- @hide We need to keep this around for backwards compatibility --> 1081 <permission android:name="com.android.browser.permission.READ_HISTORY_BOOKMARKS" 1082 android:protectionLevel="normal" 1083 android:permissionFlags="removed"/> 1084 1085 <!-- @hide We need to keep this around for backwards compatibility --> 1086 <permission android:name="com.android.browser.permission.WRITE_HISTORY_BOOKMARKS" 1087 android:protectionLevel="normal" 1088 android:permissionFlags="removed"/> 1089 1090 <!-- @hide We need to keep this around for backwards compatibility --> 1091 <permission android:name="android.permission.AUTHENTICATE_ACCOUNTS" 1092 android:protectionLevel="normal" 1093 android:permissionFlags="removed"/> 1094 1095 <!-- @hide We need to keep this around for backwards compatibility --> 1096 <permission android:name="android.permission.MANAGE_ACCOUNTS" 1097 android:protectionLevel="normal" 1098 android:permissionFlags="removed"/> 1099 1100 <!-- @hide We need to keep this around for backwards compatibility --> 1101 <permission android:name="android.permission.USE_CREDENTIALS" 1102 android:protectionLevel="normal" 1103 android:permissionFlags="removed"/> 1104 1105 <!-- @hide We need to keep this around for backwards compatibility --> 1106 <permission android:name="android.permission.SUBSCRIBED_FEEDS_READ" 1107 android:protectionLevel="normal" 1108 android:permissionFlags="removed"/> 1109 1110 <!-- @hide We need to keep this around for backwards compatibility --> 1111 <permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE" 1112 android:protectionLevel="normal" 1113 android:permissionFlags="removed"/> 1114 1115 <!-- @hide We need to keep this around for backwards compatibility --> 1116 <permission android:name="android.permission.FLASHLIGHT" 1117 android:protectionLevel="normal" 1118 android:permissionFlags="removed"/> 1119 1120 <!-- ====================================================================== --> 1121 <!-- INSTALL PERMISSIONS --> 1122 <!-- ====================================================================== --> 1123 1124 <!-- ================================== --> 1125 <!-- Permissions for accessing messages --> 1126 <!-- ================================== --> 1127 <eat-comment /> 1128 1129 <!-- @SystemApi Allows an application (Phone) to send a request to other applications 1130 to handle the respond-via-message action during incoming calls. 1131 <p>Not for use by third-party applications. --> 1132 <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE" 1133 android:protectionLevel="signature|privileged" /> 1134 1135 <!-- @SystemApi Allows an application to send SMS to premium shortcodes without user permission. 1136 <p>Not for use by third-party applications. 1137 @hide --> 1138 <permission android:name="android.permission.SEND_SMS_NO_CONFIRMATION" 1139 android:protectionLevel="signature|privileged" /> 1140 1141 <!-- Allows an application to filter carrier specific sms. 1142 @hide --> 1143 <permission android:name="android.permission.CARRIER_FILTER_SMS" 1144 android:protectionLevel="signature|privileged" /> 1145 1146 <!-- @SystemApi Allows an application to receive emergency cell broadcast messages, 1147 to record or display them to the user. 1148 <p>Not for use by third-party applications. 1149 @hide --> 1150 <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST" 1151 android:protectionLevel="signature|privileged" /> 1152 1153 <!-- Allows an application to monitor incoming Bluetooth MAP messages, to record 1154 or perform processing on them. --> 1155 <!-- @hide --> 1156 <permission android:name="android.permission.RECEIVE_BLUETOOTH_MAP" 1157 android:protectionLevel="signature|privileged" /> 1158 1159 <!-- @SystemApi @hide Allows an application to execute contacts directory search. 1160 This should only be used by ContactsProvider. 1161 <p>Not for use by third-party applications. --> 1162 <permission android:name="android.permission.BIND_DIRECTORY_SEARCH" 1163 android:protectionLevel="signature|privileged" /> 1164 1165 <!-- @SystemApi @hide Allows an application to modify cell broadcasts through the content provider. 1166 <p>Not for use by third-party applications. --> 1167 <permission android:name="android.permission.MODIFY_CELL_BROADCASTS" 1168 android:protectionLevel="signature|privileged" /> 1169 1170 <!-- =============================================================== --> 1171 <!-- Permissions for setting the device alarm --> 1172 <!-- =============================================================== --> 1173 <eat-comment /> 1174 1175 <!-- Allows an application to broadcast an Intent to set an alarm for the user. 1176 <p>Protection level: normal 1177 --> 1178 <permission android:name="com.android.alarm.permission.SET_ALARM" 1179 android:label="@string/permlab_setAlarm" 1180 android:description="@string/permdesc_setAlarm" 1181 android:protectionLevel="normal" /> 1182 1183 <!-- =============================================================== --> 1184 <!-- Permissions for accessing the user voicemail --> 1185 <!-- =============================================================== --> 1186 <eat-comment /> 1187 1188 <!-- Allows an application to modify and remove existing voicemails in the system. 1189 <p>Protection level: signature|privileged 1190 --> 1191 <permission android:name="com.android.voicemail.permission.WRITE_VOICEMAIL" 1192 android:protectionLevel="signature|privileged" /> 1193 1194 <!-- Allows an application to read voicemails in the system. 1195 <p>Protection level: signature|privileged 1196 --> 1197 <permission android:name="com.android.voicemail.permission.READ_VOICEMAIL" 1198 android:protectionLevel="signature|privileged" /> 1199 1200 <!-- ======================================= --> 1201 <!-- Permissions for accessing location info --> 1202 <!-- ======================================= --> 1203 <eat-comment /> 1204 1205 <!-- Allows an application to access extra location provider commands. 1206 <p>Protection level: normal 1207 --> 1208 <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS" 1209 android:label="@string/permlab_accessLocationExtraCommands" 1210 android:description="@string/permdesc_accessLocationExtraCommands" 1211 android:protectionLevel="normal" /> 1212 1213 <!-- @SystemApi Allows an application to install a location provider into the Location Manager. 1214 <p>Not for use by third-party applications. --> 1215 <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER" 1216 android:protectionLevel="signature|privileged" /> 1217 1218 <!-- @SystemApi @hide Allows HDMI-CEC service to access device and configuration files. 1219 This should only be used by HDMI-CEC service. 1220 --> 1221 <permission android:name="android.permission.HDMI_CEC" 1222 android:protectionLevel="signature|privileged" /> 1223 1224 <!-- @SystemApi Allows an application to use location features in hardware, 1225 such as the geofencing api. 1226 <p>Not for use by third-party applications. --> 1227 <permission android:name="android.permission.LOCATION_HARDWARE" 1228 android:protectionLevel="signature|privileged" /> 1229 <uses-permission android:name="android.permission.LOCATION_HARDWARE"/> 1230 1231 <!-- @SystemApi Allows an application to create mock location providers for testing. 1232 <p>Protection level: signature 1233 @hide 1234 --> 1235 <permission android:name="android.permission.ACCESS_MOCK_LOCATION" 1236 android:protectionLevel="signature" /> 1237 1238 <!-- ======================================= --> 1239 <!-- Permissions for accessing networks --> 1240 <!-- ======================================= --> 1241 <eat-comment /> 1242 1243 <!-- Allows applications to open network sockets. 1244 <p>Protection level: normal 1245 --> 1246 <permission android:name="android.permission.INTERNET" 1247 android:description="@string/permdesc_createNetworkSockets" 1248 android:label="@string/permlab_createNetworkSockets" 1249 android:protectionLevel="normal|instant" /> 1250 1251 <!-- Allows applications to access information about networks. 1252 <p>Protection level: normal 1253 --> 1254 <permission android:name="android.permission.ACCESS_NETWORK_STATE" 1255 android:description="@string/permdesc_accessNetworkState" 1256 android:label="@string/permlab_accessNetworkState" 1257 android:protectionLevel="normal|instant" /> 1258 1259 <!-- Allows applications to access information about Wi-Fi networks. 1260 <p>Protection level: normal 1261 --> 1262 <permission android:name="android.permission.ACCESS_WIFI_STATE" 1263 android:description="@string/permdesc_accessWifiState" 1264 android:label="@string/permlab_accessWifiState" 1265 android:protectionLevel="normal" /> 1266 1267 <!-- Allows applications to change Wi-Fi connectivity state. 1268 <p>Protection level: normal 1269 --> 1270 <permission android:name="android.permission.CHANGE_WIFI_STATE" 1271 android:description="@string/permdesc_changeWifiState" 1272 android:label="@string/permlab_changeWifiState" 1273 android:protectionLevel="normal" /> 1274 1275 <!-- @SystemApi @hide Allows applications to read Wi-Fi credential. 1276 <p>Not for use by third-party applications. --> 1277 <permission android:name="android.permission.READ_WIFI_CREDENTIAL" 1278 android:protectionLevel="signature|privileged" /> 1279 1280 <!-- @SystemApi @hide Allows applications to change tether state and run 1281 tether carrier provisioning. 1282 <p>Not for use by third-party applications. --> 1283 <permission android:name="android.permission.TETHER_PRIVILEGED" 1284 android:protectionLevel="signature|privileged" /> 1285 1286 <!-- @SystemApi @hide Allow system apps to receive broadcast 1287 when a wifi network credential is changed. 1288 <p>Not for use by third-party applications. --> 1289 <permission android:name="android.permission.RECEIVE_WIFI_CREDENTIAL_CHANGE" 1290 android:protectionLevel="signature|privileged" /> 1291 1292 <!-- @SystemApi @hide Allows an application to modify any wifi configuration, even if created 1293 by another application. Once reconfigured the original creator cannot make any further 1294 modifications. 1295 <p>Not for use by third-party applications. --> 1296 <permission android:name="android.permission.OVERRIDE_WIFI_CONFIG" 1297 android:protectionLevel="signature|privileged" /> 1298 1299 <!-- @hide --> 1300 <permission android:name="android.permission.ACCESS_WIMAX_STATE" 1301 android:description="@string/permdesc_accessWimaxState" 1302 android:label="@string/permlab_accessWimaxState" 1303 android:protectionLevel="normal" /> 1304 1305 <!-- @hide --> 1306 <permission android:name="android.permission.CHANGE_WIMAX_STATE" 1307 android:description="@string/permdesc_changeWimaxState" 1308 android:label="@string/permlab_changeWimaxState" 1309 android:protectionLevel="normal" /> 1310 1311 <!-- Allows applications to act as network scorers. @hide @SystemApi--> 1312 <permission android:name="android.permission.SCORE_NETWORKS" 1313 android:protectionLevel="signature|privileged" /> 1314 1315 <!-- Allows applications to request network 1316 recommendations and scores from the NetworkScoreService. 1317 <p>Not for use by third-party applications. @hide --> 1318 <permission android:name="android.permission.REQUEST_NETWORK_SCORES" 1319 android:protectionLevel="signature|setup" /> 1320 1321 <!-- Allows network stack services (Connectivity and Wifi) to coordinate 1322 <p>Not for use by third-party or privileged applications. 1323 @hide This should only be used by Connectivity and Wifi Services. 1324 --> 1325 <permission android:name="android.permission.NETWORK_STACK" 1326 android:protectionLevel="signature" /> 1327 1328 <!-- Allows Settings and SystemUI to call methods in Networking services 1329 <p>Not for use by third-party or privileged applications. 1330 @hide This should only be used by Settings and SystemUI. 1331 --> 1332 <permission android:name="android.permission.NETWORK_SETTINGS" 1333 android:protectionLevel="signature" /> 1334 1335 <!-- #SystemApi @hide Allows applications to access information about LoWPAN interfaces. 1336 <p>Not for use by third-party applications. --> 1337 <permission android:name="android.permission.ACCESS_LOWPAN_STATE" 1338 android:protectionLevel="signature|privileged" /> 1339 1340 <!-- #SystemApi @hide Allows applications to change LoWPAN connectivity state. 1341 <p>Not for use by third-party applications. --> 1342 <permission android:name="android.permission.CHANGE_LOWPAN_STATE" 1343 android:protectionLevel="signature|privileged" /> 1344 1345 <!-- #SystemApi @hide Allows applications to read LoWPAN credential. 1346 <p>Not for use by third-party applications. --> 1347 <permission android:name="android.permission.READ_LOWPAN_CREDENTIAL" 1348 android:protectionLevel="signature|privileged" /> 1349 1350 <!-- #SystemApi @hide Allows a service to register or unregister 1351 new LoWPAN interfaces. 1352 <p>Not for use by third-party applications. --> 1353 <permission android:name="android.permission.MANAGE_LOWPAN_INTERFACES" 1354 android:protectionLevel="signature|privileged" /> 1355 1356 <!-- ======================================= --> 1357 <!-- Permissions for short range, peripheral networks --> 1358 <!-- ======================================= --> 1359 <eat-comment /> 1360 1361 <!-- Allows applications to connect to paired bluetooth devices. 1362 <p>Protection level: normal 1363 --> 1364 <permission android:name="android.permission.BLUETOOTH" 1365 android:description="@string/permdesc_bluetooth" 1366 android:label="@string/permlab_bluetooth" 1367 android:protectionLevel="normal" /> 1368 1369 <!-- Allows applications to discover and pair bluetooth devices. 1370 <p>Protection level: normal 1371 --> 1372 <permission android:name="android.permission.BLUETOOTH_ADMIN" 1373 android:description="@string/permdesc_bluetoothAdmin" 1374 android:label="@string/permlab_bluetoothAdmin" 1375 android:protectionLevel="normal" /> 1376 1377 <!-- @SystemApi Allows applications to pair bluetooth devices without user interaction, and to 1378 allow or disallow phonebook access or message access. 1379 This is not available to third party applications. --> 1380 <permission android:name="android.permission.BLUETOOTH_PRIVILEGED" 1381 android:protectionLevel="signature|privileged" /> 1382 1383 <!-- Control access to email providers exclusively for Bluetooth 1384 @hide 1385 --> 1386 <permission android:name="android.permission.BLUETOOTH_MAP" 1387 android:protectionLevel="signature" /> 1388 1389 <!-- Allows bluetooth stack to access files 1390 @hide This should only be used by Bluetooth apk. 1391 --> 1392 <permission android:name="android.permission.BLUETOOTH_STACK" 1393 android:protectionLevel="signature" /> 1394 1395 <!-- Allows applications to perform I/O operations over NFC. 1396 <p>Protection level: normal 1397 --> 1398 <permission android:name="android.permission.NFC" 1399 android:description="@string/permdesc_nfc" 1400 android:label="@string/permlab_nfc" 1401 android:protectionLevel="normal" /> 1402 1403 <!-- @SystemApi Allows an internal user to use privileged ConnectivityManager APIs. 1404 @hide --> 1405 <permission android:name="android.permission.CONNECTIVITY_INTERNAL" 1406 android:protectionLevel="signature|privileged" /> 1407 1408 <!-- @SystemApi Allows an internal user to use restricted Networks. 1409 @hide --> 1410 <permission android:name="android.permission.CONNECTIVITY_USE_RESTRICTED_NETWORKS" 1411 android:protectionLevel="signature|privileged" /> 1412 1413 <!-- Allows a system application to access hardware packet offload capabilities. 1414 @hide --> 1415 <permission android:name="android.permission.PACKET_KEEPALIVE_OFFLOAD" 1416 android:protectionLevel="signature|privileged" /> 1417 1418 <!-- @SystemApi 1419 @hide --> 1420 <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE" 1421 android:protectionLevel="signature|privileged" /> 1422 1423 <!-- @SystemApi Allows access to the loop radio (Android@Home mesh network) device. 1424 @hide --> 1425 <permission android:name="android.permission.LOOP_RADIO" 1426 android:protectionLevel="signature|privileged" /> 1427 1428 <!-- Allows sending and receiving handover transfer status from Wifi and Bluetooth 1429 @hide --> 1430 <permission android:name="android.permission.NFC_HANDOVER_STATUS" 1431 android:protectionLevel="signature|privileged" /> 1432 1433 <!-- ================================== --> 1434 <!-- Permissions for accessing accounts --> 1435 <!-- ================================== --> 1436 <eat-comment /> 1437 1438 <!-- Allows access to the list of accounts in the Accounts Service. 1439 1440 <p class="note"><strong>Note:</strong> Beginning with Android 6.0 (API level 1441 23), if an app shares the signature of the authenticator that manages an 1442 account, it does not need <code>"GET_ACCOUNTS"</code> permission to read 1443 information about that account. On Android 5.1 and lower, all apps need 1444 <code>"GET_ACCOUNTS"</code> permission to read information about any 1445 account.</p> 1446 1447 <p>Protection level: dangerous 1448 --> 1449 <permission android:name="android.permission.GET_ACCOUNTS" 1450 android:permissionGroup="android.permission-group.CONTACTS" 1451 android:protectionLevel="dangerous" 1452 android:description="@string/permdesc_getAccounts" 1453 android:label="@string/permlab_getAccounts" /> 1454 <uses-permission android:name="android.permission.GET_ACCOUNTS"/> 1455 1456 <!-- @SystemApi Allows applications to call into AccountAuthenticators. 1457 <p>Not for use by third-party applications. --> 1458 <permission android:name="android.permission.ACCOUNT_MANAGER" 1459 android:protectionLevel="signature" /> 1460 1461 <!-- ================================== --> 1462 <!-- Permissions for accessing hardware that may effect battery life--> 1463 <!-- ================================== --> 1464 <eat-comment /> 1465 1466 <!-- Allows applications to enter Wi-Fi Multicast mode. 1467 <p>Protection level: normal 1468 --> 1469 <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE" 1470 android:description="@string/permdesc_changeWifiMulticastState" 1471 android:label="@string/permlab_changeWifiMulticastState" 1472 android:protectionLevel="normal" /> 1473 1474 <!-- Allows access to the vibrator. 1475 <p>Protection level: normal 1476 --> 1477 <permission android:name="android.permission.VIBRATE" 1478 android:label="@string/permlab_vibrate" 1479 android:description="@string/permdesc_vibrate" 1480 android:protectionLevel="normal|instant" /> 1481 1482 <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen 1483 from dimming. 1484 <p>Protection level: normal 1485 --> 1486 <permission android:name="android.permission.WAKE_LOCK" 1487 android:label="@string/permlab_wakeLock" 1488 android:description="@string/permdesc_wakeLock" 1489 android:protectionLevel="normal|instant" /> 1490 1491 <!-- Allows using the device's IR transmitter, if available. 1492 <p>Protection level: normal 1493 --> 1494 <permission android:name="android.permission.TRANSMIT_IR" 1495 android:label="@string/permlab_transmitIr" 1496 android:description="@string/permdesc_transmitIr" 1497 android:protectionLevel="normal" /> 1498 1499 <!-- ==================================================== --> 1500 <!-- Permissions related to changing audio settings --> 1501 <!-- ==================================================== --> 1502 <eat-comment /> 1503 1504 <!-- Allows an application to modify global audio settings. 1505 <p>Protection level: normal 1506 --> 1507 <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS" 1508 android:label="@string/permlab_modifyAudioSettings" 1509 android:description="@string/permdesc_modifyAudioSettings" 1510 android:protectionLevel="normal" /> 1511 1512 <!-- ================================== --> 1513 <!-- Permissions for accessing hardware --> 1514 <!-- ================================== --> 1515 <eat-comment /> 1516 1517 <!-- @SystemApi Allows an application to manage preferences and permissions for USB devices 1518 @hide --> 1519 <permission android:name="android.permission.MANAGE_USB" 1520 android:protectionLevel="signature|privileged" /> 1521 1522 <!-- @SystemApi Allows an application to access the MTP USB kernel driver. 1523 For use only by the device side MTP implementation. 1524 @hide --> 1525 <permission android:name="android.permission.ACCESS_MTP" 1526 android:protectionLevel="signature|privileged" /> 1527 1528 <!-- @SystemApi Allows access to hardware peripherals. Intended only for hardware testing. 1529 <p>Not for use by third-party applications. 1530 @hide 1531 --> 1532 <permission android:name="android.permission.HARDWARE_TEST" 1533 android:protectionLevel="signature" /> 1534 1535 <!-- @SystemApi Allows access to Broadcast Radio 1536 @hide This is not a third-party API (intended for system apps).--> 1537 <permission android:name="android.permission.ACCESS_BROADCAST_RADIO" 1538 android:protectionLevel="signature|privileged" /> 1539 1540 <!-- @deprecated @SystemApi Allows access to FM 1541 @hide This is not a third-party API (intended for system apps).--> 1542 <permission android:name="android.permission.ACCESS_FM_RADIO" 1543 android:protectionLevel="signature|privileged" /> 1544 1545 <!-- Allows access to configure network interfaces, configure/use IPSec, etc. 1546 @hide --> 1547 <permission android:name="android.permission.NET_ADMIN" 1548 android:protectionLevel="signature" /> 1549 1550 <!-- Allows registration for remote audio playback. @hide --> 1551 <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK" 1552 android:protectionLevel="signature" /> 1553 1554 <!-- @SystemApi Allows TvInputService to access underlying TV input hardware such as 1555 built-in tuners and HDMI-in's. 1556 @hide This should only be used by OEM's TvInputService's. 1557 --> 1558 <permission android:name="android.permission.TV_INPUT_HARDWARE" 1559 android:protectionLevel="signature|privileged" /> 1560 1561 <!-- @SystemApi Allows to capture a frame of TV input hardware such as 1562 built-in tuners and HDMI-in's. 1563 @hide <p>Not for use by third-party applications. 1564 --> 1565 <permission android:name="android.permission.CAPTURE_TV_INPUT" 1566 android:protectionLevel="signature|privileged" /> 1567 1568 <!-- @hide Allows TvInputService to access DVB device. 1569 <p>Not for use by third-party applications. --> 1570 <permission android:name="android.permission.DVB_DEVICE" 1571 android:protectionLevel="signature|privileged" /> 1572 1573 <!-- @SystemApi Allows reading and enabling/disabling the OEM unlock allowed by carrier state 1574 @hide <p>Not for use by third-party applications. --> 1575 <permission android:name="android.permission.MANAGE_CARRIER_OEM_UNLOCK_STATE" 1576 android:protectionLevel="signature|privileged" /> 1577 1578 <!-- @SystemApi Allows reading and enabling/disabling the OEM unlock allowed by user state 1579 @hide <p>Not for use by third-party applications. --> 1580 <permission android:name="android.permission.MANAGE_USER_OEM_UNLOCK_STATE" 1581 android:protectionLevel="signature|privileged" /> 1582 1583 <!-- @SystemApi Allows reading the OEM unlock state 1584 @hide <p>Not for use by third-party applications. --> 1585 <permission android:name="android.permission.READ_OEM_UNLOCK_STATE" 1586 android:protectionLevel="signature|privileged" /> 1587 1588 <!-- @hide Allows enabling/disabling OEM unlock 1589 <p>Not for use by third-party applications. --> 1590 <permission android:name="android.permission.OEM_UNLOCK_STATE" 1591 android:protectionLevel="signature" /> 1592 1593 <!-- @hide Allows querying state of PersistentDataBlock 1594 <p>Not for use by third-party applications. --> 1595 <permission android:name="android.permission.ACCESS_PDB_STATE" 1596 android:protectionLevel="signature" /> 1597 1598 <!-- @hide Allows system update service to notify device owner about pending updates. 1599 <p>Not for use by third-party applications. --> 1600 <permission android:name="android.permission.NOTIFY_PENDING_SYSTEM_UPDATE" 1601 android:protectionLevel="signature|privileged" /> 1602 1603 <!-- =========================================== --> 1604 <!-- Permissions associated with camera and image capture --> 1605 <!-- =========================================== --> 1606 <eat-comment /> 1607 1608 <!-- @SystemApi Allows disabling the transmit-indicator LED that is normally on when 1609 a camera is in use by an application. 1610 @hide --> 1611 <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED" 1612 android:protectionLevel="signature|privileged" /> 1613 1614 <!-- Allows sending the camera service notifications about system-wide events. 1615 @hide --> 1616 <permission android:name="android.permission.CAMERA_SEND_SYSTEM_EVENTS" 1617 android:protectionLevel="signature|privileged" /> 1618 1619 <!-- =========================================== --> 1620 <!-- Permissions associated with telephony state --> 1621 <!-- =========================================== --> 1622 <eat-comment /> 1623 1624 <!-- @SystemApi Allows modification of the telephony state - power on, mmi, etc. 1625 Does not include placing calls. 1626 <p>Not for use by third-party applications. --> 1627 <permission android:name="android.permission.MODIFY_PHONE_STATE" 1628 android:protectionLevel="signature|privileged" /> 1629 1630 <!-- Allows read only access to precise phone state. 1631 @hide Pending API council approval --> 1632 <permission android:name="android.permission.READ_PRECISE_PHONE_STATE" 1633 android:protectionLevel="signature|privileged" /> 1634 1635 <!-- @SystemApi Allows read access to privileged phone state. 1636 @hide Used internally. --> 1637 <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE" 1638 android:protectionLevel="signature|privileged" /> 1639 1640 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1641 PhoneAccount#CAPABILITY_SIM_SUBSCRIPTION. This capability indicates that the PhoneAccount 1642 corresponds to a device SIM. 1643 @hide --> 1644 <permission android:name="android.permission.REGISTER_SIM_SUBSCRIPTION" 1645 android:protectionLevel="signature|privileged" /> 1646 1647 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1648 PhoneAccount#CAPABILITY_CALL_PROVIDER. 1649 @hide --> 1650 <permission android:name="android.permission.REGISTER_CALL_PROVIDER" 1651 android:protectionLevel="signature|privileged" /> 1652 1653 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1654 PhoneAccount#CAPABILITY_CONNECTION_MANAGER 1655 @hide --> 1656 <permission android:name="android.permission.REGISTER_CONNECTION_MANAGER" 1657 android:protectionLevel="signature|privileged" /> 1658 1659 <!-- Must be required by a {@link android.telecom.InCallService}, 1660 to ensure that only the system can bind to it. 1661 <p>Protection level: signature|privileged 1662 --> 1663 <permission android:name="android.permission.BIND_INCALL_SERVICE" 1664 android:protectionLevel="signature|privileged" /> 1665 1666 <!-- Must be required by a link {@link android.telephony.VisualVoicemailService} to ensure that 1667 only the system can bind to it. 1668 <p>Protection level: signature|privileged 1669 --> 1670 <permission 1671 android:name="android.permission.BIND_VISUAL_VOICEMAIL_SERVICE" 1672 android:protectionLevel="signature|privileged"/> 1673 1674 <!-- Must be required by a {@link android.telecom.CallScreeningService}, 1675 to ensure that only the system can bind to it. 1676 <p>Protection level: signature|privileged 1677 --> 1678 <permission android:name="android.permission.BIND_SCREENING_SERVICE" 1679 android:protectionLevel="signature|privileged" /> 1680 1681 <!-- Must be required by a {@link android.telecom.ConnectionService}, 1682 to ensure that only the system can bind to it. 1683 @deprecated {@link android.telecom.ConnectionService}s should require 1684 android.permission.BIND_TELECOM_CONNECTION_SERVICE instead. 1685 @SystemApi 1686 @hide --> 1687 <permission android:name="android.permission.BIND_CONNECTION_SERVICE" 1688 android:protectionLevel="signature|privileged" /> 1689 1690 <!-- Must be required by a {@link android.telecom.ConnectionService}, 1691 to ensure that only the system can bind to it. 1692 <p>Protection level: signature|privileged 1693 --> 1694 <permission android:name="android.permission.BIND_TELECOM_CONNECTION_SERVICE" 1695 android:protectionLevel="signature|privileged" /> 1696 1697 <!-- @SystemApi Allows an application to control the in-call experience. 1698 @hide --> 1699 <permission android:name="android.permission.CONTROL_INCALL_EXPERIENCE" 1700 android:protectionLevel="signature|privileged" /> 1701 1702 <!-- Allows an application to receive STK related commands. 1703 @hide --> 1704 <permission android:name="android.permission.RECEIVE_STK_COMMANDS" 1705 android:protectionLevel="signature|privileged" /> 1706 1707 <!-- Allows an application to send EMBMS download intents to apps 1708 @hide --> 1709 <permission android:name="android.permission.SEND_EMBMS_INTENTS" 1710 android:protectionLevel="signature|privileged" /> 1711 1712 <!-- Must be required by an ImsService to ensure that only the 1713 system can bind to it. 1714 <p>Protection level: signature|privileged 1715 @SystemApi 1716 @hide 1717 --> 1718 <permission android:name="android.permission.BIND_IMS_SERVICE" 1719 android:protectionLevel="signature|privileged" /> 1720 1721 <!-- Allows an application to manage embedded subscriptions (those on a eUICC) through 1722 EuiccManager APIs. 1723 <p>Protection level: signature|privileged|development 1724 TODO(b/35851809): Mark this as a SystemApi and remove com. prefix. 1725 @hide --> 1726 <permission android:name="com.android.permission.WRITE_EMBEDDED_SUBSCRIPTIONS" 1727 android:protectionLevel="signature|privileged|development" /> 1728 1729 <!-- Must be required by an EuiccService to ensure that only the system can bind to it. 1730 <p>Protection level: signature 1731 TODO(b/35851809): Mark this as a SystemApi and remove com. prefix. 1732 @hide --> 1733 <permission android:name="com.android.permission.BIND_EUICC_SERVICE" 1734 android:protectionLevel="signature" /> 1735 1736 <!-- ================================== --> 1737 <!-- Permissions for sdcard interaction --> 1738 <!-- ================================== --> 1739 <eat-comment /> 1740 1741 <!-- @SystemApi Allows an application to write to internal media storage 1742 @hide --> 1743 <permission android:name="android.permission.WRITE_MEDIA_STORAGE" 1744 android:protectionLevel="signature|privileged" /> 1745 1746 <!-- Allows an application to manage access to documents, usually as part 1747 of a document picker. 1748 <p>This permission should <em>only</em> be requested by the platform 1749 document management app. This permission cannot be granted to 1750 third-party apps. 1751 <p>Protection level: signature 1752 --> 1753 <permission android:name="android.permission.MANAGE_DOCUMENTS" 1754 android:protectionLevel="signature" /> 1755 1756 <!-- @hide Allows an application to cache content. 1757 <p>Not for use by third-party applications. 1758 <p>Protection level: signature 1759 --> 1760 <permission android:name="android.permission.CACHE_CONTENT" 1761 android:protectionLevel="signature" /> 1762 1763 <!-- @SystemApi @hide 1764 Allows an application to aggressively allocate disk space. 1765 <p>Not for use by third-party applications. 1766 --> 1767 <permission android:name="android.permission.ALLOCATE_AGGRESSIVE" 1768 android:protectionLevel="signature|privileged" /> 1769 1770 <!-- ================================== --> 1771 <!-- Permissions for screenlock --> 1772 <!-- ================================== --> 1773 <eat-comment /> 1774 1775 <!-- Allows applications to disable the keyguard if it is not secure. 1776 <p>Protection level: normal 1777 --> 1778 <permission android:name="android.permission.DISABLE_KEYGUARD" 1779 android:description="@string/permdesc_disableKeyguard" 1780 android:label="@string/permlab_disableKeyguard" 1781 android:protectionLevel="normal" /> 1782 1783 <!-- ================================== --> 1784 <!-- Permissions to access other installed applications --> 1785 <!-- ================================== --> 1786 <eat-comment /> 1787 1788 <!-- @deprecated No longer enforced. --> 1789 <permission android:name="android.permission.GET_TASKS" 1790 android:label="@string/permlab_getTasks" 1791 android:description="@string/permdesc_getTasks" 1792 android:protectionLevel="normal" /> 1793 1794 <!-- New version of GET_TASKS that apps can request, since GET_TASKS doesn't really 1795 give access to task information. We need this new one because there are 1796 many existing apps that use add libraries and such that have validation 1797 code to ensure the app has requested the GET_TASKS permission by seeing 1798 if it has been granted the permission... if it hasn't, it kills the app 1799 with a message about being upset. So we need to have it continue to look 1800 like the app is getting that permission, even though it will never be 1801 checked, and new privileged apps can now request this one for real access. 1802 @hide 1803 @SystemApi --> 1804 <permission android:name="android.permission.REAL_GET_TASKS" 1805 android:protectionLevel="signature|privileged" /> 1806 1807 <!-- Allows an application to start a task from a ActivityManager#RecentTaskInfo. 1808 @hide --> 1809 <permission android:name="android.permission.START_TASKS_FROM_RECENTS" 1810 android:protectionLevel="signature|privileged" /> 1811 1812 <!-- @SystemApi @hide Allows an application to call APIs that allow it to do interactions 1813 across the users on the device, using singleton services and 1814 user-targeted broadcasts. This permission is not available to 1815 third party applications. --> 1816 <permission android:name="android.permission.INTERACT_ACROSS_USERS" 1817 android:protectionLevel="signature|privileged|development" /> 1818 1819 <!-- @SystemApi Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS} 1820 that removes restrictions on where broadcasts can be sent and allows other 1821 types of interactions 1822 @hide --> 1823 <permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL" 1824 android:protectionLevel="signature|installer" /> 1825 1826 <!-- @SystemApi @hide Allows an application to call APIs that allow it to query and manage 1827 users on the device. This permission is not available to 1828 third party applications. --> 1829 <permission android:name="android.permission.MANAGE_USERS" 1830 android:protectionLevel="signature|privileged" /> 1831 1832 <!-- @hide Allows an application to create, remove users and get the list of 1833 users on the device. Applications holding this permission can only create restricted, 1834 guest, managed, demo, and ephemeral users. For creating other kind of users, 1835 {@link android.Manifest.permission#MANAGE_USERS} is needed. 1836 This permission is not available to third party applications. --> 1837 <permission android:name="android.permission.CREATE_USERS" 1838 android:protectionLevel="signature" /> 1839 1840 <!-- @hide Allows an application to set the profile owners and the device owner. 1841 This permission is not available to third party applications.--> 1842 <permission android:name="android.permission.MANAGE_PROFILE_AND_DEVICE_OWNERS" 1843 android:protectionLevel="signature" 1844 android:label="@string/permlab_manageProfileAndDeviceOwners" 1845 android:description="@string/permdesc_manageProfileAndDeviceOwners" /> 1846 1847 <!-- Allows an application to get full detailed information about 1848 recently running tasks, with full fidelity to the real state. 1849 @hide --> 1850 <permission android:name="android.permission.GET_DETAILED_TASKS" 1851 android:protectionLevel="signature" /> 1852 1853 <!-- Allows an application to change the Z-order of tasks. 1854 <p>Protection level: normal 1855 --> 1856 <permission android:name="android.permission.REORDER_TASKS" 1857 android:label="@string/permlab_reorderTasks" 1858 android:description="@string/permdesc_reorderTasks" 1859 android:protectionLevel="normal" /> 1860 1861 <!-- @hide Allows an application to change to remove/kill tasks --> 1862 <permission android:name="android.permission.REMOVE_TASKS" 1863 android:protectionLevel="signature" /> 1864 1865 <!-- @SystemApi @hide Allows an application to create/manage/remove stacks --> 1866 <permission android:name="android.permission.MANAGE_ACTIVITY_STACKS" 1867 android:protectionLevel="signature|privileged" /> 1868 1869 <!-- @SystemApi @hide Allows an application to embed other activities --> 1870 <permission android:name="android.permission.ACTIVITY_EMBEDDING" 1871 android:protectionLevel="signature|privileged" /> 1872 1873 <!-- Allows an application to start any activity, regardless of permission 1874 protection or exported state. 1875 @hide --> 1876 <permission android:name="android.permission.START_ANY_ACTIVITY" 1877 android:protectionLevel="signature" /> 1878 1879 <!-- @deprecated The {@link android.app.ActivityManager#restartPackage} 1880 API is no longer supported. --> 1881 <permission android:name="android.permission.RESTART_PACKAGES" 1882 android:label="@string/permlab_killBackgroundProcesses" 1883 android:description="@string/permdesc_killBackgroundProcesses" 1884 android:protectionLevel="normal" /> 1885 1886 <!-- Allows an application to call 1887 {@link android.app.ActivityManager#killBackgroundProcesses}. 1888 <p>Protection level: normal 1889 --> 1890 <permission android:name="android.permission.KILL_BACKGROUND_PROCESSES" 1891 android:label="@string/permlab_killBackgroundProcesses" 1892 android:description="@string/permdesc_killBackgroundProcesses" 1893 android:protectionLevel="normal" /> 1894 1895 <!-- @SystemApi @hide Allows an application to query process states and current 1896 OOM adjustment scores. 1897 <p>Not for use by third-party applications. --> 1898 <permission android:name="android.permission.GET_PROCESS_STATE_AND_OOM_SCORE" 1899 android:protectionLevel="signature|privileged|development" /> 1900 1901 <!-- Allows use of PendingIntent.getIntent(). 1902 @hide --> 1903 <permission android:name="android.permission.GET_INTENT_SENDER_INTENT" 1904 android:protectionLevel="signature" /> 1905 1906 <!-- ================================== --> 1907 <!-- Permissions affecting the display of other applications --> 1908 <!-- ================================== --> 1909 <eat-comment /> 1910 1911 <!-- Allows an app to create windows using the type 1912 {@link android.view.WindowManager.LayoutParams#TYPE_APPLICATION_OVERLAY}, 1913 shown on top of all other apps. Very few apps 1914 should use this permission; these windows are intended for 1915 system-level interaction with the user. 1916 1917 <p class="note"><strong>Note:</strong> If the app 1918 targets API level 23 or higher, the app user must explicitly grant 1919 this permission to the app through a permission management screen. The app requests 1920 the user's approval by sending an intent with action 1921 {@link android.provider.Settings#ACTION_MANAGE_OVERLAY_PERMISSION}. 1922 The app can check whether it has this authorization by calling 1923 {@link android.provider.Settings#canDrawOverlays 1924 Settings.canDrawOverlays()}. 1925 <p>Protection level: signature --> 1926 <permission android:name="android.permission.SYSTEM_ALERT_WINDOW" 1927 android:label="@string/permlab_systemAlertWindow" 1928 android:description="@string/permdesc_systemAlertWindow" 1929 android:protectionLevel="signature|preinstalled|appop|pre23|development" /> 1930 1931 <!-- @deprecated Use {@link android.Manifest.permission#REQUEST_COMPANION_RUN_IN_BACKGROUND} 1932 @hide 1933 --> 1934 <permission android:name="android.permission.RUN_IN_BACKGROUND" 1935 android:label="@string/permlab_runInBackground" 1936 android:description="@string/permdesc_runInBackground" 1937 android:protectionLevel="signature" /> 1938 1939 <!-- @deprecated Use 1940 {@link android.Manifest.permission#REQUEST_COMPANION_USE_DATA_IN_BACKGROUND} 1941 @hide 1942 --> 1943 <permission android:name="android.permission.USE_DATA_IN_BACKGROUND" 1944 android:label="@string/permlab_useDataInBackground" 1945 android:description="@string/permdesc_useDataInBackground" 1946 android:protectionLevel="signature" /> 1947 1948 <!-- @hide Allows an application to set display offsets for the screen. 1949 This permission is not available to third party applications. --> 1950 <permission android:name="android.permission.SET_DISPLAY_OFFSET" 1951 android:protectionLevel="signature|privileged" /> 1952 1953 <!-- Allows a companion app to run in the background. 1954 <p>Protection level: normal 1955 --> 1956 <permission android:name="android.permission.REQUEST_COMPANION_RUN_IN_BACKGROUND" 1957 android:label="@string/permlab_runInBackground" 1958 android:description="@string/permdesc_runInBackground" 1959 android:protectionLevel="normal" /> 1960 1961 <!-- Allows a companion app to use data in the background. 1962 <p>Protection level: normal 1963 --> 1964 <permission android:name="android.permission.REQUEST_COMPANION_USE_DATA_IN_BACKGROUND" 1965 android:label="@string/permlab_useDataInBackground" 1966 android:description="@string/permdesc_useDataInBackground" 1967 android:protectionLevel="normal" /> 1968 1969 1970 <!-- ================================== --> 1971 <!-- Permissions affecting the system wallpaper --> 1972 <!-- ================================== --> 1973 <eat-comment /> 1974 1975 <!-- Allows applications to set the wallpaper. 1976 <p>Protection level: normal 1977 --> 1978 <permission android:name="android.permission.SET_WALLPAPER" 1979 android:label="@string/permlab_setWallpaper" 1980 android:description="@string/permdesc_setWallpaper" 1981 android:protectionLevel="normal" /> 1982 1983 <!-- Allows applications to set the wallpaper hints. 1984 <p>Protection level: normal 1985 --> 1986 <permission android:name="android.permission.SET_WALLPAPER_HINTS" 1987 android:label="@string/permlab_setWallpaperHints" 1988 android:description="@string/permdesc_setWallpaperHints" 1989 android:protectionLevel="normal" /> 1990 1991 <!-- Allow the app to read the system wallpaper image without 1992 holding the READ_EXTERNAL_STORAGE permission. 1993 <p>Not for use by third-party applications. 1994 @hide 1995 @SystemApi 1996 --> 1997 <permission android:name="android.permission.READ_WALLPAPER_INTERNAL" 1998 android:protectionLevel="signature|privileged" /> 1999 2000 <!-- ============================================ --> 2001 <!-- Permissions for changing the system clock --> 2002 <!-- ============================================ --> 2003 <eat-comment /> 2004 2005 <!-- @SystemApi Allows applications to set the system time. 2006 <p>Not for use by third-party applications. --> 2007 <permission android:name="android.permission.SET_TIME" 2008 android:protectionLevel="signature|privileged" /> 2009 2010 <!-- Allows applications to set the system time zone. 2011 <p>Not for use by third-party applications. 2012 --> 2013 <permission android:name="android.permission.SET_TIME_ZONE" 2014 android:label="@string/permlab_setTimeZone" 2015 android:description="@string/permdesc_setTimeZone" 2016 android:protectionLevel="signature|privileged" /> 2017 2018 <!-- ==================================================== --> 2019 <!-- Permissions related to changing status bar --> 2020 <!-- ==================================================== --> 2021 <eat-comment /> 2022 2023 <!-- Allows an application to expand or collapse the status bar. 2024 <p>Protection level: normal 2025 --> 2026 <permission android:name="android.permission.EXPAND_STATUS_BAR" 2027 android:label="@string/permlab_expandStatusBar" 2028 android:description="@string/permdesc_expandStatusBar" 2029 android:protectionLevel="normal" /> 2030 2031 <!-- ============================================================== --> 2032 <!-- Permissions related to adding/removing shortcuts from Launcher --> 2033 <!-- ============================================================== --> 2034 <eat-comment /> 2035 2036 <!-- Allows an application to install a shortcut in Launcher. 2037 <p>Protection level: normal 2038 --> 2039 <permission android:name="com.android.launcher.permission.INSTALL_SHORTCUT" 2040 android:label="@string/permlab_install_shortcut" 2041 android:description="@string/permdesc_install_shortcut" 2042 android:protectionLevel="normal"/> 2043 2044 <!--This permission is no longer supported. 2045 --> 2046 <permission android:name="com.android.launcher.permission.UNINSTALL_SHORTCUT" 2047 android:label="@string/permlab_uninstall_shortcut" 2048 android:description="@string/permdesc_uninstall_shortcut" 2049 android:protectionLevel="normal"/> 2050 2051 <!-- ==================================================== --> 2052 <!-- Permissions related to accessing sync settings --> 2053 <!-- ==================================================== --> 2054 <eat-comment /> 2055 2056 <!-- Allows applications to read the sync settings. 2057 <p>Protection level: normal 2058 --> 2059 <permission android:name="android.permission.READ_SYNC_SETTINGS" 2060 android:description="@string/permdesc_readSyncSettings" 2061 android:label="@string/permlab_readSyncSettings" 2062 android:protectionLevel="normal" /> 2063 2064 <!-- Allows applications to write the sync settings. 2065 <p>Protection level: normal 2066 --> 2067 <permission android:name="android.permission.WRITE_SYNC_SETTINGS" 2068 android:description="@string/permdesc_writeSyncSettings" 2069 android:label="@string/permlab_writeSyncSettings" 2070 android:protectionLevel="normal" /> 2071 2072 <!-- Allows applications to read the sync stats. 2073 <p>Protection level: normal 2074 --> 2075 <permission android:name="android.permission.READ_SYNC_STATS" 2076 android:description="@string/permdesc_readSyncStats" 2077 android:label="@string/permlab_readSyncStats" 2078 android:protectionLevel="normal" /> 2079 2080 <!-- ============================================ --> 2081 <!-- Permissions for low-level system interaction --> 2082 <!-- ============================================ --> 2083 <eat-comment /> 2084 2085 <!-- @SystemApi @hide Change the screen compatibility mode of applications --> 2086 <permission android:name="android.permission.SET_SCREEN_COMPATIBILITY" 2087 android:protectionLevel="signature" /> 2088 2089 <!-- @SystemApi Allows an application to modify the current configuration, such 2090 as locale. --> 2091 <permission android:name="android.permission.CHANGE_CONFIGURATION" 2092 android:protectionLevel="signature|privileged|development" /> 2093 2094 <!-- Allows an application to read or write the system settings. 2095 2096 <p class="note"><strong>Note:</strong> If the app targets API level 23 2097 or higher, the app user 2098 must explicitly grant this permission to the app through a permission management screen. 2099 The app requests the user's approval by sending an intent with action 2100 {@link android.provider.Settings#ACTION_MANAGE_WRITE_SETTINGS}. The app 2101 can check whether it has this authorization by calling {@link 2102 android.provider.Settings.System#canWrite Settings.System.canWrite()}. 2103 2104 <p>Protection level: signature 2105 --> 2106 <permission android:name="android.permission.WRITE_SETTINGS" 2107 android:label="@string/permlab_writeSettings" 2108 android:description="@string/permdesc_writeSettings" 2109 android:protectionLevel="signature|preinstalled|appop|pre23" /> 2110 2111 <!-- @SystemApi Allows an application to modify the Google service map. 2112 <p>Not for use by third-party applications. --> 2113 <permission android:name="android.permission.WRITE_GSERVICES" 2114 android:protectionLevel="signature|privileged" /> 2115 2116 <!-- @SystemApi Allows an application to call 2117 {@link android.app.ActivityManager#forceStopPackage}. 2118 @hide --> 2119 <permission android:name="android.permission.FORCE_STOP_PACKAGES" 2120 android:protectionLevel="signature|privileged" /> 2121 2122 <!-- @SystemApi @hide Allows an application to retrieve the content of the active window 2123 An active window is the window that has fired an accessibility event. --> 2124 <permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT" 2125 android:protectionLevel="signature|privileged" /> 2126 2127 <!-- @SystemApi Modify the global animation scaling factor. 2128 <p>Not for use by third-party applications. --> 2129 <permission android:name="android.permission.SET_ANIMATION_SCALE" 2130 android:protectionLevel="signature|privileged|development" /> 2131 2132 <!-- @deprecated This functionality will be removed in the future; please do 2133 not use. Allow an application to make its activities persistent. --> 2134 <permission android:name="android.permission.PERSISTENT_ACTIVITY" 2135 android:label="@string/permlab_persistentActivity" 2136 android:description="@string/permdesc_persistentActivity" 2137 android:protectionLevel="normal" /> 2138 2139 <!-- Allows an application to find out the space used by any package. 2140 <p>Protection level: normal 2141 --> 2142 <permission android:name="android.permission.GET_PACKAGE_SIZE" 2143 android:label="@string/permlab_getPackageSize" 2144 android:description="@string/permdesc_getPackageSize" 2145 android:protectionLevel="normal" /> 2146 2147 <!-- @deprecated No longer useful, see 2148 {@link android.content.pm.PackageManager#addPackageToPreferred} 2149 for details. --> 2150 <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS" 2151 android:protectionLevel="signature|verifier" /> 2152 2153 <!-- Allows an application to receive the 2154 {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is 2155 broadcast after the system finishes booting. If you don't 2156 request this permission, you will not receive the broadcast at 2157 that time. Though holding this permission does not have any 2158 security implications, it can have a negative impact on the 2159 user experience by increasing the amount of time it takes the 2160 system to start and allowing applications to have themselves 2161 running without the user being aware of them. As such, you must 2162 explicitly declare your use of this facility to make that visible 2163 to the user. 2164 <p>Protection level: normal 2165 --> 2166 <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED" 2167 android:label="@string/permlab_receiveBootCompleted" 2168 android:description="@string/permdesc_receiveBootCompleted" 2169 android:protectionLevel="normal" /> 2170 2171 <!-- Allows an application to broadcast sticky intents. These are 2172 broadcasts whose data is held by the system after being finished, 2173 so that clients can quickly retrieve that data without having 2174 to wait for the next broadcast. 2175 <p>Protection level: normal 2176 --> 2177 <permission android:name="android.permission.BROADCAST_STICKY" 2178 android:label="@string/permlab_broadcastSticky" 2179 android:description="@string/permdesc_broadcastSticky" 2180 android:protectionLevel="normal" /> 2181 2182 <!-- @SystemApi Allows mounting and unmounting file systems for removable storage. 2183 <p>Not for use by third-party applications.--> 2184 <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS" 2185 android:protectionLevel="signature|privileged" /> 2186 2187 <!-- @SystemApi Allows formatting file systems for removable storage. 2188 <p>Not for use by third-party applications. --> 2189 <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS" 2190 android:protectionLevel="signature|privileged" /> 2191 2192 <!-- @hide --> 2193 <permission android:name="android.permission.STORAGE_INTERNAL" 2194 android:protectionLevel="signature" /> 2195 2196 <!-- Allows access to ASEC non-destructive API calls 2197 @hide --> 2198 <permission android:name="android.permission.ASEC_ACCESS" 2199 android:protectionLevel="signature" /> 2200 2201 <!-- Allows creation of ASEC volumes 2202 @hide --> 2203 <permission android:name="android.permission.ASEC_CREATE" 2204 android:protectionLevel="signature" /> 2205 2206 <!-- Allows destruction of ASEC volumes 2207 @hide --> 2208 <permission android:name="android.permission.ASEC_DESTROY" 2209 android:protectionLevel="signature" /> 2210 2211 <!-- Allows mount / unmount of ASEC volumes 2212 @hide --> 2213 <permission android:name="android.permission.ASEC_MOUNT_UNMOUNT" 2214 android:protectionLevel="signature" /> 2215 2216 <!-- Allows rename of ASEC volumes 2217 @hide --> 2218 <permission android:name="android.permission.ASEC_RENAME" 2219 android:protectionLevel="signature" /> 2220 2221 <!-- @SystemApi Allows applications to write the apn settings. 2222 <p>Not for use by third-party applications. --> 2223 <permission android:name="android.permission.WRITE_APN_SETTINGS" 2224 android:protectionLevel="signature|privileged" /> 2225 2226 <!-- Allows applications to change network connectivity state. 2227 <p>Protection level: normal 2228 --> 2229 <permission android:name="android.permission.CHANGE_NETWORK_STATE" 2230 android:description="@string/permdesc_changeNetworkState" 2231 android:label="@string/permlab_changeNetworkState" 2232 android:protectionLevel="normal" /> 2233 2234 <!-- Allows an application to clear the caches of all installed 2235 applications on the device. 2236 <p>Protection level: signature|privileged 2237 --> 2238 <permission android:name="android.permission.CLEAR_APP_CACHE" 2239 android:protectionLevel="signature|privileged" /> 2240 2241 <!-- @SystemApi Allows an application to use any media decoder when decoding for playback 2242 @hide --> 2243 <permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK" 2244 android:protectionLevel="signature|privileged" /> 2245 2246 <!-- @SystemApi Allows an application to install and/or uninstall CA certificates on 2247 behalf of the user. 2248 @hide --> 2249 <permission android:name="android.permission.MANAGE_CA_CERTIFICATES" 2250 android:protectionLevel="signature|privileged" /> 2251 2252 <!-- @SystemApi Allows an application to do certain operations needed for 2253 interacting with the recovery (system update) system. 2254 @hide --> 2255 <permission android:name="android.permission.RECOVERY" 2256 android:protectionLevel="signature|privileged" /> 2257 2258 <!-- Allows the system to bind to an application's task services 2259 @hide --> 2260 <permission android:name="android.permission.BIND_JOB_SERVICE" 2261 android:protectionLevel="signature" /> 2262 <uses-permission android:name="android.permission.BIND_JOB_SERVICE"/> 2263 2264 <!-- Allows an application to initiate configuration updates 2265 <p>An application requesting this permission is responsible for 2266 verifying the source and integrity of any update before passing 2267 it off to the various individual installer components 2268 @hide --> 2269 <permission android:name="android.permission.UPDATE_CONFIG" 2270 android:protectionLevel="signature|privileged" /> 2271 2272 <!-- Allows a time zone rule updater application to request 2273 the system installs / uninstalls timezone rules. 2274 <p>An application requesting this permission is responsible for 2275 verifying the source and integrity of the update before passing 2276 it off to the installer components. 2277 @SystemApi @hide --> 2278 <permission android:name="android.permission.UPDATE_TIME_ZONE_RULES" 2279 android:protectionLevel="signature|privileged" /> 2280 2281 <!-- Must be required by a time zone rule updater application, 2282 to ensure that only the system can trigger it. 2283 @hide --> 2284 <permission android:name="android.permission.TRIGGER_TIME_ZONE_RULES_CHECK" 2285 android:protectionLevel="signature" /> 2286 <uses-permission android:name="android.permission.TRIGGER_TIME_ZONE_RULES_CHECK"/> 2287 2288 <!-- Allows the system to reset throttling in shortcut manager. 2289 @hide --> 2290 <permission android:name="android.permission.RESET_SHORTCUT_MANAGER_THROTTLING" 2291 android:protectionLevel="signature" /> 2292 2293 <!-- Allows the system to bind to the discovered Network Recommendation Service. 2294 @SystemApi @hide --> 2295 <permission android:name="android.permission.BIND_NETWORK_RECOMMENDATION_SERVICE" 2296 android:protectionLevel="signature" /> 2297 <uses-permission android:name="android.permission.BIND_NETWORK_RECOMMENDATION_SERVICE"/> 2298 2299 <!-- Allows an application to enable, disable and change priority of 2300 runtime resource overlays. 2301 @hide --> 2302 <permission android:name="android.permission.CHANGE_OVERLAY_PACKAGES" 2303 android:protectionLevel="signature|privileged" /> 2304 2305 <!-- ========================================= --> 2306 <!-- Permissions for special development tools --> 2307 <!-- ========================================= --> 2308 <eat-comment /> 2309 2310 <!-- @SystemApi Allows an application to read or write the secure system settings. 2311 <p>Not for use by third-party applications. --> 2312 <permission android:name="android.permission.WRITE_SECURE_SETTINGS" 2313 android:protectionLevel="signature|privileged|development" /> 2314 2315 <!-- @SystemApi Allows an application to retrieve state dump information from system services. 2316 <p>Not for use by third-party applications. --> 2317 <permission android:name="android.permission.DUMP" 2318 android:protectionLevel="signature|privileged|development" /> 2319 2320 <!-- @SystemApi Allows an application to read the low-level system log files. 2321 <p>Not for use by third-party applications, because 2322 Log entries can contain the user's private information. --> 2323 <permission android:name="android.permission.READ_LOGS" 2324 android:protectionLevel="signature|privileged|development" /> 2325 2326 <!-- @SystemApi Configure an application for debugging. 2327 <p>Not for use by third-party applications. --> 2328 <permission android:name="android.permission.SET_DEBUG_APP" 2329 android:protectionLevel="signature|privileged|development" /> 2330 2331 <!-- @SystemApi Allows an application to set the maximum number of (not needed) 2332 application processes that can be running. 2333 <p>Not for use by third-party applications. --> 2334 <permission android:name="android.permission.SET_PROCESS_LIMIT" 2335 android:protectionLevel="signature|privileged|development" /> 2336 2337 <!-- @SystemApi Allows an application to control whether activities are immediately 2338 finished when put in the background. 2339 <p>Not for use by third-party applications. --> 2340 <permission android:name="android.permission.SET_ALWAYS_FINISH" 2341 android:protectionLevel="signature|privileged|development" /> 2342 2343 <!-- @SystemApi Allow an application to request that a signal be sent to all persistent processes. 2344 <p>Not for use by third-party applications. --> 2345 <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES" 2346 android:protectionLevel="signature|privileged|development" /> 2347 2348 <!-- ==================================== --> 2349 <!-- Private permissions --> 2350 <!-- ==================================== --> 2351 <eat-comment /> 2352 2353 <!-- @SystemApi Allows access to the list of accounts in the Accounts Service. --> 2354 <permission android:name="android.permission.GET_ACCOUNTS_PRIVILEGED" 2355 android:protectionLevel="signature|privileged" /> 2356 2357 <!-- Allows but does not guarantee access to user passwords at the conclusion of add account 2358 @hide --> 2359 <permission android:name="android.permission.GET_PASSWORD" 2360 android:protectionLevel="signature" /> 2361 2362 <!-- @SystemApi Allows applications to RW to diagnostic resources. 2363 <p>Not for use by third-party applications. --> 2364 <permission android:name="android.permission.DIAGNOSTIC" 2365 android:protectionLevel="signature" /> 2366 2367 <!-- @SystemApi Allows an application to open, close, or disable the status bar 2368 and its icons. 2369 <p>Not for use by third-party applications. --> 2370 <permission android:name="android.permission.STATUS_BAR" 2371 android:protectionLevel="signature|privileged" /> 2372 2373 <!-- Allows an application to be the status bar. Currently used only by SystemUI.apk 2374 @hide --> 2375 <permission android:name="android.permission.STATUS_BAR_SERVICE" 2376 android:protectionLevel="signature" /> 2377 2378 <!-- Allows an application to bind to third party quick settings tiles. 2379 <p>Should only be requested by the System, should be required by 2380 TileService declarations.--> 2381 <permission android:name="android.permission.BIND_QUICK_SETTINGS_TILE" 2382 android:protectionLevel="signature" /> 2383 2384 <!-- @SystemApi Allows an application to force a BACK operation on whatever is the 2385 top activity. 2386 <p>Not for use by third-party applications. 2387 @hide 2388 --> 2389 <permission android:name="android.permission.FORCE_BACK" 2390 android:protectionLevel="signature" /> 2391 2392 <!-- @SystemApi Allows an application to update device statistics. 2393 <p>Not for use by third-party applications. --> 2394 <permission android:name="android.permission.UPDATE_DEVICE_STATS" 2395 android:protectionLevel="signature|privileged" /> 2396 2397 <!-- @SystemApi @hide Allows an application to collect battery statistics --> 2398 <permission android:name="android.permission.GET_APP_OPS_STATS" 2399 android:protectionLevel="signature|privileged|development" /> 2400 2401 <!-- @SystemApi Allows an application to update application operation statistics. Not for 2402 use by third party apps. 2403 @hide --> 2404 <permission android:name="android.permission.UPDATE_APP_OPS_STATS" 2405 android:protectionLevel="signature|privileged|installer" /> 2406 2407 <!-- @SystemApi Allows an application to update the user app op restrictions. 2408 Not for use by third party apps. 2409 @hide --> 2410 <permission android:name="android.permission.MANAGE_APP_OPS_RESTRICTIONS" 2411 android:protectionLevel="signature|installer" /> 2412 2413 <!-- @SystemApi Allows an application to open windows that are for use by parts 2414 of the system user interface. 2415 <p>Not for use by third-party applications. 2416 @hide 2417 --> 2418 <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW" 2419 android:protectionLevel="signature" /> 2420 2421 <!-- @SystemApi Allows an application to use 2422 {@link android.view.WindowManager.LayoutsParams#PRIVATE_FLAG_HIDE_NON_SYSTEM_OVERLAY_WINDOWS} 2423 to hide non-system-overlay windows. 2424 <p>Not for use by third-party applications. 2425 @hide 2426 --> 2427 <permission android:name="android.permission.HIDE_NON_SYSTEM_OVERLAY_WINDOWS" 2428 android:protectionLevel="signature|installer" /> 2429 2430 <!-- @SystemApi Allows an application to manage (create, destroy, 2431 Z-order) application tokens in the window manager. 2432 <p>Not for use by third-party applications. 2433 @hide 2434 --> 2435 <permission android:name="android.permission.MANAGE_APP_TOKENS" 2436 android:protectionLevel="signature" /> 2437 2438 <!-- Allows System UI to register listeners for events from Window Manager. 2439 @hide --> 2440 <permission android:name="android.permission.REGISTER_WINDOW_MANAGER_LISTENERS" 2441 android:protectionLevel="signature" /> 2442 2443 <!-- @hide Allows the application to temporarily freeze the screen for a 2444 full-screen transition. --> 2445 <permission android:name="android.permission.FREEZE_SCREEN" 2446 android:protectionLevel="signature" /> 2447 2448 <!-- @SystemApi Allows an application to inject user events (keys, touch, trackball) 2449 into the event stream and deliver them to ANY window. Without this 2450 permission, you can only deliver events to windows in your own process. 2451 <p>Not for use by third-party applications. 2452 @hide 2453 --> 2454 <permission android:name="android.permission.INJECT_EVENTS" 2455 android:protectionLevel="signature" /> 2456 2457 <!-- @hide Allows an application to register an input filter which filters the stream 2458 of user events (keys, touch, trackball) before they are dispatched to any window. --> 2459 <permission android:name="android.permission.FILTER_EVENTS" 2460 android:protectionLevel="signature" /> 2461 2462 <!-- @hide Allows an application to retrieve the window token from the accessibility manager. --> 2463 <permission android:name="android.permission.RETRIEVE_WINDOW_TOKEN" 2464 android:protectionLevel="signature" /> 2465 2466 <!-- @hide Allows an application to modify accessibility information from another app. --> 2467 <permission android:name="android.permission.MODIFY_ACCESSIBILITY_DATA" 2468 android:protectionLevel="signature" /> 2469 2470 <!-- @hide Allows an application to change the accessibility volume. --> 2471 <permission android:name="android.permission.CHANGE_ACCESSIBILITY_VOLUME" 2472 android:protectionLevel="signature" /> 2473 2474 <!-- @hide Allows an application to collect frame statistics --> 2475 <permission android:name="android.permission.FRAME_STATS" 2476 android:protectionLevel="signature" /> 2477 2478 <!-- @hide Allows an application to temporary enable accessibility on the device. --> 2479 <permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY" 2480 android:protectionLevel="signature" /> 2481 2482 <!-- @SystemApi Allows an application to watch and control how activities are 2483 started globally in the system. Only for is in debugging 2484 (usually the monkey command). 2485 <p>Not for use by third-party applications. 2486 @hide 2487 --> 2488 <permission android:name="android.permission.SET_ACTIVITY_WATCHER" 2489 android:protectionLevel="signature" /> 2490 2491 <!-- @SystemApi Allows an application to call the activity manager shutdown() API 2492 to put the higher-level system there into a shutdown state. 2493 @hide --> 2494 <permission android:name="android.permission.SHUTDOWN" 2495 android:protectionLevel="signature|privileged" /> 2496 2497 <!-- @SystemApi Allows an application to tell the activity manager to temporarily 2498 stop application switches, putting it into a special mode that 2499 prevents applications from immediately switching away from some 2500 critical UI such as the home screen. 2501 @hide --> 2502 <permission android:name="android.permission.STOP_APP_SWITCHES" 2503 android:protectionLevel="signature|privileged" /> 2504 2505 <!-- @SystemApi Allows an application to retrieve private information about 2506 the current top activity, such as any assist context it can provide. 2507 <p>Not for use by third-party applications. 2508 @hide 2509 --> 2510 <permission android:name="android.permission.GET_TOP_ACTIVITY_INFO" 2511 android:protectionLevel="signature" /> 2512 2513 <!-- Allows an application to retrieve the current state of keys and 2514 switches. 2515 <p>Not for use by third-party applications. 2516 @deprecated The API that used this permission has been removed. --> 2517 <permission android:name="android.permission.READ_INPUT_STATE" 2518 android:protectionLevel="signature" /> 2519 2520 <!-- Must be required by an {@link android.inputmethodservice.InputMethodService}, 2521 to ensure that only the system can bind to it. 2522 <p>Protection level: signature 2523 --> 2524 <permission android:name="android.permission.BIND_INPUT_METHOD" 2525 android:protectionLevel="signature" /> 2526 2527 <!-- Must be required by an {@link android.media.midi.MidiDeviceService}, 2528 to ensure that only the system can bind to it. 2529 <p>Protection level: signature 2530 --> 2531 <permission android:name="android.permission.BIND_MIDI_DEVICE_SERVICE" 2532 android:protectionLevel="signature" /> 2533 2534 <!-- Must be required by an {@link android.accessibilityservice.AccessibilityService}, 2535 to ensure that only the system can bind to it. 2536 <p>Protection level: signature 2537 --> 2538 <permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE" 2539 android:protectionLevel="signature" /> 2540 2541 <!-- Must be required by a {@link android.printservice.PrintService}, 2542 to ensure that only the system can bind to it. 2543 <p>Protection level: signature 2544 --> 2545 <permission android:name="android.permission.BIND_PRINT_SERVICE" 2546 android:protectionLevel="signature" /> 2547 2548 <!-- Must be required by a {@link android.printservice.recommendation.RecommendationService}, 2549 to ensure that only the system can bind to it. 2550 @hide 2551 @SystemApi 2552 <p>Protection level: signature 2553 --> 2554 <permission android:name="android.permission.BIND_PRINT_RECOMMENDATION_SERVICE" 2555 android:protectionLevel="signature" /> 2556 2557 <!-- Allows applications to get the installed and enabled print services. 2558 @hide 2559 @SystemApi 2560 <p>Protection level: signature|preinstalled 2561 --> 2562 <permission android:name="android.permission.READ_PRINT_SERVICES" 2563 android:protectionLevel="signature|preinstalled" /> 2564 2565 <!-- Allows applications to get the currently recommended print services for printers. 2566 @hide 2567 @SystemApi 2568 <p>Protection level: signature|preinstalled 2569 --> 2570 <permission android:name="android.permission.READ_PRINT_SERVICE_RECOMMENDATIONS" 2571 android:protectionLevel="signature|preinstalled" /> 2572 2573 <!-- Must be required by a {@link android.nfc.cardemulation.HostApduService} 2574 or {@link android.nfc.cardemulation.OffHostApduService} to ensure that only 2575 the system can bind to it. 2576 <p>Protection level: signature 2577 --> 2578 <permission android:name="android.permission.BIND_NFC_SERVICE" 2579 android:protectionLevel="signature" /> 2580 2581 <!-- Must be required by the PrintSpooler to ensure that only the system can bind to it. 2582 @hide --> 2583 <permission android:name="android.permission.BIND_PRINT_SPOOLER_SERVICE" 2584 android:protectionLevel="signature" /> 2585 2586 <!-- Must be required by the CompanionDeviceManager to ensure that only the system can bind to it. 2587 @hide --> 2588 <permission android:name="android.permission.BIND_COMPANION_DEVICE_MANAGER_SERVICE" 2589 android:protectionLevel="signature" /> 2590 2591 <!-- @SystemApi Must be required by the RuntimePermissionPresenterService to ensure 2592 that only the system can bind to it. 2593 @hide --> 2594 <permission android:name="android.permission.BIND_RUNTIME_PERMISSION_PRESENTER_SERVICE" 2595 android:protectionLevel="signature" /> 2596 2597 <!-- Must be required by a TextService (e.g. SpellCheckerService) 2598 to ensure that only the system can bind to it. 2599 <p>Protection level: signature 2600 --> 2601 <permission android:name="android.permission.BIND_TEXT_SERVICE" 2602 android:protectionLevel="signature" /> 2603 2604 <!-- Must be required by a {@link android.net.VpnService}, 2605 to ensure that only the system can bind to it. 2606 <p>Protection level: signature 2607 --> 2608 <permission android:name="android.permission.BIND_VPN_SERVICE" 2609 android:protectionLevel="signature" /> 2610 2611 <!-- Must be required by a {@link android.service.wallpaper.WallpaperService}, 2612 to ensure that only the system can bind to it. 2613 <p>Protection level: signature|privileged 2614 --> 2615 <permission android:name="android.permission.BIND_WALLPAPER" 2616 android:protectionLevel="signature|privileged" /> 2617 2618 <!-- Must be required by a {@link android.service.voice.VoiceInteractionService}, 2619 to ensure that only the system can bind to it. 2620 <p>Protection level: signature 2621 --> 2622 <permission android:name="android.permission.BIND_VOICE_INTERACTION" 2623 android:protectionLevel="signature" /> 2624 2625 <!-- Must be required by a {@link android.service.autofill.AutofillService}, 2626 to ensure that only the system can bind to it. 2627 <p>Protection level: signature 2628 --> 2629 <permission android:name="android.permission.BIND_AUTOFILL_SERVICE" 2630 android:protectionLevel="signature" /> 2631 2632 <!-- @hide TODO(b/37563972): remove once clients use BIND_AUTOFILL_SERVICE --> 2633 <permission android:name="android.permission.BIND_AUTOFILL" 2634 android:protectionLevel="signature" /> 2635 2636 <!-- Must be required by hotword enrollment application, 2637 to ensure that only the system can interact with it. 2638 @hide <p>Not for use by third-party applications.</p> --> 2639 <permission android:name="android.permission.MANAGE_VOICE_KEYPHRASES" 2640 android:protectionLevel="signature|privileged" /> 2641 2642 <!-- Must be required by a {@link com.android.media.remotedisplay.RemoteDisplayProvider}, 2643 to ensure that only the system can bind to it. 2644 @hide --> 2645 <permission android:name="android.permission.BIND_REMOTE_DISPLAY" 2646 android:protectionLevel="signature" /> 2647 2648 <!-- Must be required by a {@link android.media.tv.TvInputService} 2649 to ensure that only the system can bind to it. 2650 <p>Protection level: signature|privileged 2651 --> 2652 <permission android:name="android.permission.BIND_TV_INPUT" 2653 android:protectionLevel="signature|privileged" /> 2654 2655 <!-- @SystemApi 2656 Must be required by a {@link com.android.media.tv.remoteprovider.TvRemoteProvider} 2657 to ensure that only the system can bind to it. 2658 <p>Protection level: signature|privileged 2659 <p>Not for use by third-party applications. </p> 2660 @hide --> 2661 <permission android:name="android.permission.BIND_TV_REMOTE_SERVICE" 2662 android:protectionLevel="signature|privileged" /> 2663 2664 <!-- @SystemApi 2665 Must be required for a virtual remote controller for TV. 2666 <p>Protection level: signature|privileged 2667 <p>Not for use by third-party applications. </p> 2668 @hide --> 2669 <permission android:name="android.permission.TV_VIRTUAL_REMOTE_CONTROLLER" 2670 android:protectionLevel="signature|privileged" /> 2671 2672 <!-- Allows an application to change HDMI CEC active source. 2673 <p>Not for use by third-party applications. 2674 @hide --> 2675 <permission android:name="android.permission.CHANGE_HDMI_CEC_ACTIVE_SOURCE" 2676 android:protectionLevel="signature|privileged" /> 2677 2678 <!-- @SystemApi Allows an application to modify parental controls 2679 <p>Not for use by third-party applications. 2680 @hide --> 2681 <permission android:name="android.permission.MODIFY_PARENTAL_CONTROLS" 2682 android:protectionLevel="signature|privileged" /> 2683 2684 <!-- @SystemApi Allows an application to read TvContentRatingSystemInfo 2685 <p>Not for use by third-party applications. 2686 @hide --> 2687 <permission android:name="android.permission.READ_CONTENT_RATING_SYSTEMS" 2688 android:protectionLevel="signature|privileged" /> 2689 2690 <!-- @SystemApi Allows an application to notify TV inputs by sending broadcasts. 2691 <p>Protection level: signature|privileged 2692 <p>Not for use by third-party applications. 2693 @hide --> 2694 <permission android:name="android.permission.NOTIFY_TV_INPUTS" 2695 android:protectionLevel="signature|privileged" /> 2696 2697 <!-- Must be required by a {@link android.media.routing.MediaRouteService} 2698 to ensure that only the system can interact with it. 2699 @hide --> 2700 <permission android:name="android.permission.BIND_ROUTE_PROVIDER" 2701 android:protectionLevel="signature" /> 2702 2703 <!-- Must be required by device administration receiver, to ensure that only the 2704 system can interact with it. 2705 <p>Protection level: signature 2706 --> 2707 <permission android:name="android.permission.BIND_DEVICE_ADMIN" 2708 android:protectionLevel="signature" /> 2709 2710 <!-- @SystemApi Required to add or remove another application as a device admin. 2711 <p>Not for use by third-party applications. 2712 @hide --> 2713 <permission android:name="android.permission.MANAGE_DEVICE_ADMINS" 2714 android:protectionLevel="signature|privileged" /> 2715 2716 <!-- @SystemApi Allows low-level access to setting the orientation (actually 2717 rotation) of the screen. 2718 <p>Not for use by third-party applications. 2719 @hide 2720 --> 2721 <permission android:name="android.permission.SET_ORIENTATION" 2722 android:protectionLevel="signature" /> 2723 2724 <!-- @SystemApi Allows low-level access to setting the pointer speed. 2725 <p>Not for use by third-party applications. 2726 @hide 2727 --> 2728 <permission android:name="android.permission.SET_POINTER_SPEED" 2729 android:protectionLevel="signature" /> 2730 2731 <!-- Allows low-level access to setting input device calibration. 2732 <p>Not for use by normal applications. 2733 @hide --> 2734 <permission android:name="android.permission.SET_INPUT_CALIBRATION" 2735 android:protectionLevel="signature" /> 2736 2737 <!-- Allows low-level access to setting the keyboard layout. 2738 <p>Not for use by third-party applications. 2739 @hide --> 2740 <permission android:name="android.permission.SET_KEYBOARD_LAYOUT" 2741 android:protectionLevel="signature" /> 2742 2743 <!-- Allows an application to query tablet mode state and monitor changes 2744 in it. 2745 <p>Not for use by third-party applications. 2746 @hide --> 2747 <permission android:name="android.permission.TABLET_MODE" 2748 android:protectionLevel="signature" /> 2749 2750 <!-- Allows an application to request installing packages. Apps 2751 targeting APIs greater than 25 must hold this permission in 2752 order to use {@link android.content.Intent#ACTION_INSTALL_PACKAGE}. 2753 <p>Protection level: signature 2754 --> 2755 <permission android:name="android.permission.REQUEST_INSTALL_PACKAGES" 2756 android:label="@string/permlab_requestInstallPackages" 2757 android:description="@string/permdesc_requestInstallPackages" 2758 android:protectionLevel="signature|appop" /> 2759 2760 <!-- Allows an application to request deleting packages. Apps 2761 targeting APIs greater than 25 must hold this permission in 2762 order to use {@link android.content.Intent#ACTION_UNINSTALL_PACKAGE}. 2763 <p>Protection level: normal 2764 --> 2765 <permission android:name="android.permission.REQUEST_DELETE_PACKAGES" 2766 android:label="@string/permlab_requestDeletePackages" 2767 android:description="@string/permdesc_requestDeletePackages" 2768 android:protectionLevel="normal" /> 2769 2770 <!-- @SystemApi Allows an application to install packages. 2771 <p>Not for use by third-party applications. --> 2772 <permission android:name="android.permission.INSTALL_PACKAGES" 2773 android:protectionLevel="signature|privileged" /> 2774 2775 <!-- @SystemApi Allows an application to clear user data. 2776 <p>Not for use by third-party applications 2777 @hide 2778 --> 2779 <permission android:name="android.permission.CLEAR_APP_USER_DATA" 2780 android:protectionLevel="signature|installer" /> 2781 2782 <!-- @hide Allows an application to get the URI permissions 2783 granted to another application. 2784 <p>Not for use by third-party applications 2785 --> 2786 <permission android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS" 2787 android:protectionLevel="signature" /> 2788 2789 <!-- @hide Allows an application to clear the URI permissions 2790 granted to another application. 2791 <p>Not for use by third-party applications 2792 --> 2793 <permission 2794 android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS" 2795 android:protectionLevel="signature" /> 2796 2797 <!-- @SystemApi Allows an application to delete cache files. 2798 <p>Not for use by third-party applications. --> 2799 <permission android:name="android.permission.DELETE_CACHE_FILES" 2800 android:protectionLevel="signature|privileged" /> 2801 2802 <!-- @SystemApi Allows an application to delete packages. 2803 <p>Not for use by third-party applications. 2804 <p>Starting in {@link android.os.Build.VERSION_CODES#N}, user confirmation is requested 2805 when the application deleting the package is not the same application that installed the 2806 package. --> 2807 <permission android:name="android.permission.DELETE_PACKAGES" 2808 android:protectionLevel="signature|privileged" /> 2809 2810 <!-- @SystemApi Allows an application to move location of installed package. 2811 @hide --> 2812 <permission android:name="android.permission.MOVE_PACKAGE" 2813 android:protectionLevel="signature|privileged" /> 2814 2815 <!-- @SystemApi Allows an application to change whether an application component (other than its own) is 2816 enabled or not. 2817 <p>Not for use by third-party applications. --> 2818 <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE" 2819 android:protectionLevel="signature|privileged" /> 2820 2821 <!-- @SystemApi Allows an application to grant specific permissions. 2822 @hide --> 2823 <permission android:name="android.permission.GRANT_RUNTIME_PERMISSIONS" 2824 android:protectionLevel="signature|installer|verifier" /> 2825 2826 <!-- @SystemApi Allows an app that has this permission and the permissions to install packages 2827 to request certain runtime permissions to be granted at installation. 2828 @hide --> 2829 <permission android:name="android.permission.INSTALL_GRANT_RUNTIME_PERMISSIONS" 2830 android:protectionLevel="signature|installer|verifier" /> 2831 2832 <!-- @SystemApi Allows an application to revoke specific permissions. 2833 @hide --> 2834 <permission android:name="android.permission.REVOKE_RUNTIME_PERMISSIONS" 2835 android:protectionLevel="signature|installer|verifier" /> 2836 2837 <!-- @hide Allows an application to observe permission changes. --> 2838 <permission android:name="android.permission.OBSERVE_GRANT_REVOKE_PERMISSIONS" 2839 android:protectionLevel="signature|privileged" /> 2840 2841 <!-- @SystemApi Allows an application to use SurfaceFlinger's low level features. 2842 <p>Not for use by third-party applications. 2843 @hide 2844 --> 2845 <permission android:name="android.permission.ACCESS_SURFACE_FLINGER" 2846 android:protectionLevel="signature" /> 2847 2848 <!-- @SystemApi Allows an application to take screen shots and more generally 2849 get access to the frame buffer data. 2850 <p>Not for use by third-party applications. --> 2851 <permission android:name="android.permission.READ_FRAME_BUFFER" 2852 android:protectionLevel="signature|privileged" /> 2853 2854 <!-- Allows an application to use InputFlinger's low level features. 2855 @hide --> 2856 <permission android:name="android.permission.ACCESS_INPUT_FLINGER" 2857 android:protectionLevel="signature" /> 2858 2859 <!-- Allows an application to disable/enable input devices. 2860 Could be used to prevent unwanted touch events 2861 on a touchscreen, for example during swimming or rain. 2862 @hide --> 2863 <permission android:name="android.permission.DISABLE_INPUT_DEVICE" 2864 android:protectionLevel="signature" /> 2865 2866 <!-- Allows an application to configure and connect to Wifi displays 2867 @hide --> 2868 <permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY" 2869 android:protectionLevel="signature" /> 2870 2871 <!-- Allows an application to control low-level features of Wifi displays 2872 such as opening an RTSP socket. This permission should only be used 2873 by the display manager. 2874 @hide --> 2875 <permission android:name="android.permission.CONTROL_WIFI_DISPLAY" 2876 android:protectionLevel="signature" /> 2877 2878 <!-- Allows an application to control the color modes set for displays system-wide. 2879 <p>Not for use by third-party applications.</p> 2880 @hide --> 2881 <permission android:name="android.permission.CONFIGURE_DISPLAY_COLOR_MODE" 2882 android:protectionLevel="signature" /> 2883 2884 <!-- @SystemApi Allows an application to control VPN. 2885 <p>Not for use by third-party applications.</p> 2886 @hide --> 2887 <permission android:name="android.permission.CONTROL_VPN" 2888 android:protectionLevel="signature|privileged" /> 2889 <uses-permission android:name="android.permission.CONTROL_VPN" /> 2890 2891 <!-- @SystemApi Allows an application to capture audio output. 2892 <p>Not for use by third-party applications.</p> --> 2893 <permission android:name="android.permission.CAPTURE_AUDIO_OUTPUT" 2894 android:protectionLevel="signature|privileged" /> 2895 2896 <!-- @SystemApi Allows an application to capture audio for hotword detection. 2897 <p>Not for use by third-party applications.</p> 2898 @hide --> 2899 <permission android:name="android.permission.CAPTURE_AUDIO_HOTWORD" 2900 android:protectionLevel="signature|privileged" /> 2901 2902 <!-- @SystemApi Allows an application to modify audio routing and override policy decisions. 2903 <p>Not for use by third-party applications.</p> 2904 @hide --> 2905 <permission android:name="android.permission.MODIFY_AUDIO_ROUTING" 2906 android:protectionLevel="signature|privileged" /> 2907 2908 <!-- @SystemApi Allows an application to capture video output. 2909 <p>Not for use by third-party applications.</p> --> 2910 <permission android:name="android.permission.CAPTURE_VIDEO_OUTPUT" 2911 android:protectionLevel="signature|privileged" /> 2912 2913 <!-- @SystemApi Allows an application to capture secure video output. 2914 <p>Not for use by third-party applications.</p> --> 2915 <permission android:name="android.permission.CAPTURE_SECURE_VIDEO_OUTPUT" 2916 android:protectionLevel="signature|privileged" /> 2917 2918 <!-- @SystemApi Allows an application to know what content is playing and control its playback. 2919 <p>Not for use by third-party applications due to privacy of media consumption</p> --> 2920 <permission android:name="android.permission.MEDIA_CONTENT_CONTROL" 2921 android:protectionLevel="signature|privileged" /> 2922 2923 <!-- @SystemApi @hide Allows an application to set the volume key long-press listener. 2924 <p>When it's set, the application will receive the volume key long-press event 2925 instead of changing volume.</p> 2926 <p>Not for use by third-party applications</p> --> 2927 <permission android:name="android.permission.SET_VOLUME_KEY_LONG_PRESS_LISTENER" 2928 android:protectionLevel="signature|privileged|development" /> 2929 2930 <!-- @SystemApi @hide Allows an application to set media key event listener. 2931 <p>When it's set, the application will receive the media key event before 2932 any other media sessions. If the event is handled by the listener, other sessions 2933 cannot get the event.</p> 2934 <p>Not for use by third-party applications</p> --> 2935 <permission android:name="android.permission.SET_MEDIA_KEY_LISTENER" 2936 android:protectionLevel="signature|privileged|development" /> 2937 2938 <!-- @SystemApi Required to be able to disable the device (very dangerous!). 2939 <p>Not for use by third-party applications. 2940 @hide 2941 --> 2942 <permission android:name="android.permission.BRICK" 2943 android:protectionLevel="signature" /> 2944 2945 <!-- @SystemApi Required to be able to reboot the device. 2946 <p>Not for use by third-party applications. --> 2947 <permission android:name="android.permission.REBOOT" 2948 android:protectionLevel="signature|privileged" /> 2949 2950 <!-- @SystemApi Allows low-level access to power management. 2951 <p>Not for use by third-party applications. 2952 @hide 2953 --> 2954 <permission android:name="android.permission.DEVICE_POWER" 2955 android:protectionLevel="signature" /> 2956 2957 <!-- Allows access to the PowerManager.userActivity function. 2958 <p>Not for use by third-party applications. @hide @SystemApi --> 2959 <permission android:name="android.permission.USER_ACTIVITY" 2960 android:protectionLevel="signature|privileged" /> 2961 2962 <!-- @hide Allows low-level access to tun tap driver --> 2963 <permission android:name="android.permission.NET_TUNNELING" 2964 android:protectionLevel="signature" /> 2965 2966 <!-- Run as a manufacturer test application, running as the root user. 2967 Only available when the device is running in manufacturer test mode. 2968 <p>Not for use by third-party applications. 2969 --> 2970 <permission android:name="android.permission.FACTORY_TEST" 2971 android:protectionLevel="signature" /> 2972 2973 <!-- Allows an application to broadcast a notification that an application 2974 package has been removed. 2975 <p>Not for use by third-party applications. 2976 --> 2977 <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED" 2978 android:protectionLevel="signature" /> 2979 2980 <!-- Allows an application to broadcast an SMS receipt notification. 2981 <p>Not for use by third-party applications. 2982 --> 2983 <permission android:name="android.permission.BROADCAST_SMS" 2984 android:protectionLevel="signature" /> 2985 2986 <!-- Allows an application to broadcast a WAP PUSH receipt notification. 2987 <p>Not for use by third-party applications. 2988 --> 2989 <permission android:name="android.permission.BROADCAST_WAP_PUSH" 2990 android:protectionLevel="signature" /> 2991 2992 <!-- @SystemApi Allows an application to broadcast privileged networking requests. 2993 <p>Not for use by third-party applications. 2994 @hide 2995 @deprecated Use {@link android.Manifest.permission#REQUEST_NETWORK_SCORES} instead 2996 --> 2997 <permission android:name="android.permission.BROADCAST_NETWORK_PRIVILEGED" 2998 android:protectionLevel="signature|privileged" /> 2999 3000 <!-- @SystemApi Not for use by third-party applications. --> 3001 <permission android:name="android.permission.MASTER_CLEAR" 3002 android:protectionLevel="signature|privileged" /> 3003 3004 <!-- @SystemApi Allows an application to call any phone number, including emergency 3005 numbers, without going through the Dialer user interface for the user 3006 to confirm the call being placed. 3007 <p>Not for use by third-party applications. --> 3008 <permission android:name="android.permission.CALL_PRIVILEGED" 3009 android:protectionLevel="signature|privileged" /> 3010 3011 <!-- @SystemApi Allows an application to perform CDMA OTA provisioning @hide --> 3012 <permission android:name="android.permission.PERFORM_CDMA_PROVISIONING" 3013 android:protectionLevel="signature|privileged" /> 3014 3015 <!-- @SystemApi Allows an application to perform SIM Activation @hide --> 3016 <permission android:name="android.permission.PERFORM_SIM_ACTIVATION" 3017 android:protectionLevel="signature|privileged" /> 3018 3019 <!-- @SystemApi Allows enabling/disabling location update notifications from 3020 the radio. 3021 <p>Not for use by third-party applications. --> 3022 <permission android:name="android.permission.CONTROL_LOCATION_UPDATES" 3023 android:protectionLevel="signature|privileged" /> 3024 3025 <!-- @SystemApi Allows read/write access to the "properties" table in the checkin 3026 database, to change values that get uploaded. 3027 <p>Not for use by third-party applications. --> 3028 <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES" 3029 android:protectionLevel="signature|privileged" /> 3030 3031 <!-- @SystemApi Allows an application to collect component usage 3032 statistics 3033 <p>Declaring the permission implies intention to use the API and the user of the 3034 device can grant permission through the Settings application. --> 3035 <permission android:name="android.permission.PACKAGE_USAGE_STATS" 3036 android:protectionLevel="signature|privileged|development|appop" /> 3037 <uses-permission android:name="android.permission.PACKAGE_USAGE_STATS" /> 3038 3039 <!-- @hide Allows an application to change the app idle state of an app. 3040 <p>Not for use by third-party applications. --> 3041 <permission android:name="android.permission.CHANGE_APP_IDLE_STATE" 3042 android:protectionLevel="signature" /> 3043 3044 <!-- @hide @SystemApi Allows an application to temporarily whitelist an inactive app to 3045 access the network and acquire wakelocks. 3046 <p>Not for use by third-party applications. --> 3047 <permission android:name="android.permission.CHANGE_DEVICE_IDLE_TEMP_WHITELIST" 3048 android:protectionLevel="signature|privileged" /> 3049 3050 <!-- Permission an application must hold in order to use 3051 {@link android.provider.Settings#ACTION_REQUEST_IGNORE_BATTERY_OPTIMIZATIONS}. 3052 This is a normal permission: an app requesting it will always be granted the 3053 permission, without the user needing to approve or see it. --> 3054 <permission android:name="android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS" 3055 android:label="@string/permlab_requestIgnoreBatteryOptimizations" 3056 android:description="@string/permdesc_requestIgnoreBatteryOptimizations" 3057 android:protectionLevel="normal" /> 3058 3059 <!-- @SystemApi Allows an application to collect battery statistics --> 3060 <permission android:name="android.permission.BATTERY_STATS" 3061 android:protectionLevel="signature|privileged|development" /> 3062 3063 <!-- @SystemApi Allows an application to control the backup and restore process. 3064 <p>Not for use by third-party applications. 3065 @hide pending API council --> 3066 <permission android:name="android.permission.BACKUP" 3067 android:protectionLevel="signature|privileged" /> 3068 3069 <!-- Allows a package to launch the secure full-backup confirmation UI. 3070 ONLY the system process may hold this permission. 3071 @hide --> 3072 <permission android:name="android.permission.CONFIRM_FULL_BACKUP" 3073 android:protectionLevel="signature" /> 3074 3075 <!-- @SystemApi Must be required by a {@link android.widget.RemoteViewsService}, 3076 to ensure that only the system can bind to it. --> 3077 <permission android:name="android.permission.BIND_REMOTEVIEWS" 3078 android:protectionLevel="signature|privileged" /> 3079 3080 <!-- @SystemApi Allows an application to tell the AppWidget service which application 3081 can access AppWidget's data. The normal user flow is that a user 3082 picks an AppWidget to go into a particular host, thereby giving that 3083 host application access to the private data from the AppWidget app. 3084 An application that has this permission should honor that contract. 3085 <p>Not for use by third-party applications. --> 3086 <permission android:name="android.permission.BIND_APPWIDGET" 3087 android:protectionLevel="signature|privileged" /> 3088 3089 <!-- @SystemApi Private permission, to restrict who can bring up a dialog to add a new 3090 keyguard widget 3091 @hide --> 3092 <permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET" 3093 android:protectionLevel="signature|privileged" /> 3094 3095 <!-- @SystemApi Internal permission allowing an application to query/set which 3096 applications can bind AppWidgets. 3097 @hide --> 3098 <permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS" 3099 android:protectionLevel="signature|privileged" /> 3100 3101 <!-- Allows applications to change the background data setting. 3102 <p>Not for use by third-party applications. 3103 @hide pending API council --> 3104 <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING" 3105 android:protectionLevel="signature" /> 3106 3107 <!-- @SystemApi This permission can be used on content providers to allow the global 3108 search system to access their data. Typically it used when the 3109 provider has some permissions protecting it (which global search 3110 would not be expected to hold), and added as a read-only permission 3111 to the path in the provider where global search queries are 3112 performed. This permission can not be held by regular applications; 3113 it is used by applications to protect themselves from everyone else 3114 besides global search. --> 3115 <permission android:name="android.permission.GLOBAL_SEARCH" 3116 android:protectionLevel="signature|privileged" /> 3117 3118 <!-- Internal permission protecting access to the global search 3119 system: ensures that only the system can access the provider 3120 to perform queries (since this otherwise provides unrestricted 3121 access to a variety of content providers), and to write the 3122 search statistics (to keep applications from gaming the source 3123 ranking). 3124 @hide --> 3125 <permission android:name="android.permission.GLOBAL_SEARCH_CONTROL" 3126 android:protectionLevel="signature" /> 3127 3128 <!-- @SystemApi Internal permission to allows an application to read indexable data. 3129 @hide --> 3130 <permission android:name="android.permission.READ_SEARCH_INDEXABLES" 3131 android:protectionLevel="signature|privileged" /> 3132 3133 <!-- @SystemApi Allows applications to set a live wallpaper. 3134 @hide XXX Change to signature once the picker is moved to its 3135 own apk as Ghod Intended. --> 3136 <permission android:name="android.permission.SET_WALLPAPER_COMPONENT" 3137 android:protectionLevel="signature|privileged" /> 3138 3139 <!-- @SystemApi Allows applications to read dream settings and dream state. 3140 @hide --> 3141 <permission android:name="android.permission.READ_DREAM_STATE" 3142 android:protectionLevel="signature|privileged" /> 3143 3144 <!-- @SystemApi Allows applications to write dream settings, and start or stop dreaming. 3145 @hide --> 3146 <permission android:name="android.permission.WRITE_DREAM_STATE" 3147 android:protectionLevel="signature|privileged" /> 3148 3149 <!-- @SystemApi Allow an application to read and write the cache partition. 3150 @hide --> 3151 <permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM" 3152 android:protectionLevel="signature|privileged" /> 3153 3154 <!-- Must be required by default container service so that only 3155 the system can bind to it and use it to copy 3156 protected data to secure containers or files 3157 accessible to the system. 3158 @hide --> 3159 <permission android:name="android.permission.COPY_PROTECTED_DATA" 3160 android:protectionLevel="signature" /> 3161 3162 <!-- @SystemApi Internal permission protecting access to the encryption methods 3163 @hide 3164 --> 3165 <permission android:name="android.permission.CRYPT_KEEPER" 3166 android:protectionLevel="signature|privileged" /> 3167 3168 <!-- @SystemApi Allows an application to read historical network usage for 3169 specific networks and applications. @hide --> 3170 <permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY" 3171 android:protectionLevel="signature|privileged" /> 3172 3173 <!-- Allows an application to manage network policies (such as warning and disable 3174 limits) and to define application-specific rules. @hide --> 3175 <permission android:name="android.permission.MANAGE_NETWORK_POLICY" 3176 android:protectionLevel="signature" /> 3177 3178 <!-- @SystemApi @hide @deprecated use UPDATE_DEVICE_STATS instead --> 3179 <permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING" 3180 android:protectionLevel="signature|privileged" /> 3181 3182 <!-- @SystemApi @hide Allows an application to manage carrier subscription plans. --> 3183 <permission android:name="android.permission.MANAGE_SUBSCRIPTION_PLANS" 3184 android:protectionLevel="signature|privileged" /> 3185 3186 <!-- C2DM permission. 3187 @hide Used internally. 3188 --> 3189 <permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE" 3190 android:protectionLevel="signature" /> 3191 <uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/> 3192 3193 <!-- @SystemApi @hide Package verifier needs to have this permission before the PackageManager will 3194 trust it to verify packages. 3195 --> 3196 <permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT" 3197 android:protectionLevel="signature|privileged" /> 3198 3199 <!-- Must be required by package verifier receiver, to ensure that only the 3200 system can interact with it. 3201 @hide 3202 --> 3203 <permission android:name="android.permission.BIND_PACKAGE_VERIFIER" 3204 android:protectionLevel="signature" /> 3205 3206 <!-- @SystemApi @hide Intent filter verifier needs to have this permission before the 3207 PackageManager will trust it to verify intent filters. 3208 --> 3209 <permission android:name="android.permission.INTENT_FILTER_VERIFICATION_AGENT" 3210 android:protectionLevel="signature|privileged" /> 3211 3212 <!-- Must be required by intent filter verifier receiver, to ensure that only the 3213 system can interact with it. 3214 @hide 3215 --> 3216 <permission android:name="android.permission.BIND_INTENT_FILTER_VERIFIER" 3217 android:protectionLevel="signature" /> 3218 3219 <!-- @SystemApi Allows applications to access serial ports via the SerialManager. 3220 @hide --> 3221 <permission android:name="android.permission.SERIAL_PORT" 3222 android:protectionLevel="signature|privileged" /> 3223 3224 <!-- Allows the holder to access content providers from outside an ApplicationThread. 3225 This permission is enforced by the ActivityManagerService on the corresponding APIs, 3226 in particular ActivityManagerService#getContentProviderExternal(String) and 3227 ActivityManagerService#removeContentProviderExternal(String). 3228 @hide 3229 --> 3230 <permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY" 3231 android:protectionLevel="signature" /> 3232 3233 <!-- @SystemApi Allows an application to hold an UpdateLock, recommending that a headless 3234 OTA reboot *not* occur while the lock is held. 3235 @hide --> 3236 <permission android:name="android.permission.UPDATE_LOCK" 3237 android:protectionLevel="signature|privileged" /> 3238 3239 <!-- @SystemApi Allows an application to read the current set of notifications, including 3240 any metadata and intents attached. 3241 @hide --> 3242 <permission android:name="android.permission.ACCESS_NOTIFICATIONS" 3243 android:protectionLevel="signature|privileged|appop" /> 3244 3245 <!-- Marker permission for applications that wish to access notification policy. 3246 <p>Protection level: normal 3247 --> 3248 <permission android:name="android.permission.ACCESS_NOTIFICATION_POLICY" 3249 android:description="@string/permdesc_access_notification_policy" 3250 android:label="@string/permlab_access_notification_policy" 3251 android:protectionLevel="normal" /> 3252 3253 <!-- Allows modification of do not disturb rules and policies. Only allowed for system 3254 processes. 3255 @hide --> 3256 <permission android:name="android.permission.MANAGE_NOTIFICATIONS" 3257 android:protectionLevel="signature" /> 3258 3259 <!-- Allows notifications to be colorized 3260 <p>Not for use by third-party applications. @hide --> 3261 <permission android:name="android.permission.USE_COLORIZED_NOTIFICATIONS" 3262 android:protectionLevel="signature|setup" /> 3263 3264 <!-- Allows access to keyguard secure storage. Only allowed for system processes. 3265 @hide --> 3266 <permission android:name="android.permission.ACCESS_KEYGUARD_SECURE_STORAGE" 3267 android:protectionLevel="signature" /> 3268 3269 <!-- Allows managing (adding, removing) fingerprint templates. Reserved for the system. @hide --> 3270 <permission android:name="android.permission.MANAGE_FINGERPRINT" 3271 android:protectionLevel="signature|privileged" /> 3272 3273 <!-- Allows an app to reset fingerprint attempt counter. Reserved for the system. @hide --> 3274 <permission android:name="android.permission.RESET_FINGERPRINT_LOCKOUT" 3275 android:protectionLevel="signature" /> 3276 3277 <!-- Allows an application to control keyguard. Only allowed for system processes. 3278 @hide --> 3279 <permission android:name="android.permission.CONTROL_KEYGUARD" 3280 android:protectionLevel="signature" /> 3281 3282 <!-- Allows an application to listen to trust changes. Only allowed for system processes. 3283 @hide --> 3284 <permission android:name="android.permission.TRUST_LISTENER" 3285 android:protectionLevel="signature" /> 3286 3287 <!-- @SystemApi Allows an application to provide a trust agent. 3288 @hide For security reasons, this is a platform-only permission. --> 3289 <permission android:name="android.permission.PROVIDE_TRUST_AGENT" 3290 android:protectionLevel="signature|privileged" /> 3291 3292 <!-- Allows an application to launch the trust agent settings activity. 3293 @hide --> 3294 <permission android:name="android.permission.LAUNCH_TRUST_AGENT_SETTINGS" 3295 android:protectionLevel="signature|privileged" /> 3296 3297 <!-- @SystemApi Must be required by an {@link 3298 android.service.trust.TrustAgentService}, 3299 to ensure that only the system can bind to it. 3300 @hide --> 3301 <permission android:name="android.permission.BIND_TRUST_AGENT" 3302 android:protectionLevel="signature" /> 3303 3304 <!-- Must be required by an {@link 3305 android.service.notification.NotificationListenerService}, 3306 to ensure that only the system can bind to it. 3307 <p>Protection level: signature 3308 --> 3309 <permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE" 3310 android:protectionLevel="signature" /> 3311 3312 <!-- @SystemApi Must be required by an {@link 3313 android.service.notification.NotificationAssistantService} to ensure that only the system 3314 can bind to it. 3315 <p>Protection level: signature 3316 @hide 3317 --> 3318 <permission android:name="android.permission.BIND_NOTIFICATION_ASSISTANT_SERVICE" 3319 android:protectionLevel="signature" /> 3320 3321 <!-- Must be required by a {@link 3322 android.service.chooser.ChooserTargetService}, to ensure that 3323 only the system can bind to it. 3324 <p>Protection level: signature 3325 --> 3326 <permission android:name="android.permission.BIND_CHOOSER_TARGET_SERVICE" 3327 android:protectionLevel="signature" /> 3328 3329 <!-- @SystemApi Must be held by services that extend 3330 {@link android.service.resolver.ResolverRankerService}. 3331 <p>Protection level: signature|privileged 3332 @hide 3333 --> 3334 <permission android:name="android.permission.PROVIDE_RESOLVER_RANKER_SERVICE" 3335 android:protectionLevel="signature|privileged" /> 3336 3337 <!-- @SystemApi Must be required by services that extend 3338 {@link android.service.resolver.ResolverRankerService}, to ensure that only the system can 3339 bind to them. 3340 <p>Protection level: signature 3341 @hide 3342 --> 3343 <permission android:name="android.permission.BIND_RESOLVER_RANKER_SERVICE" 3344 android:protectionLevel="signature" /> 3345 3346 <!-- Must be required by a {@link 3347 android.service.notification.ConditionProviderService}, 3348 to ensure that only the system can bind to it. 3349 <p>Protection level: signature 3350 --> 3351 <permission android:name="android.permission.BIND_CONDITION_PROVIDER_SERVICE" 3352 android:protectionLevel="signature" /> 3353 3354 <!-- Must be required by an {@link android.service.dreams.DreamService}, 3355 to ensure that only the system can bind to it. 3356 <p>Protection level: signature 3357 --> 3358 <permission android:name="android.permission.BIND_DREAM_SERVICE" 3359 android:protectionLevel="signature" /> 3360 3361 <!-- Must be required by an {@link android.app.usage.CacheQuotaService} to ensure that only the 3362 system can bind to it. 3363 @hide This is not a third-party API (intended for OEMs and system apps). 3364 --> 3365 <permission android:name="android.permission.BIND_CACHE_QUOTA_SERVICE" 3366 android:protectionLevel="signature" /> 3367 3368 <!-- @SystemApi Allows an application to call into a carrier setup flow. It is up to the 3369 carrier setup application to enforce that this permission is required 3370 @hide This is not a third-party API (intended for OEMs and system apps). --> 3371 <permission android:name="android.permission.INVOKE_CARRIER_SETUP" 3372 android:protectionLevel="signature|privileged" /> 3373 3374 <!-- @SystemApi Allows an application to listen for network condition observations. 3375 @hide This is not a third-party API (intended for system apps). --> 3376 <permission android:name="android.permission.ACCESS_NETWORK_CONDITIONS" 3377 android:protectionLevel="signature|privileged" /> 3378 3379 <!-- @SystemApi Allows an application to provision and access DRM certificates 3380 @hide This is not a third-party API (intended for system apps). --> 3381 <permission android:name="android.permission.ACCESS_DRM_CERTIFICATES" 3382 android:protectionLevel="signature|privileged" /> 3383 3384 <!-- Api Allows an application to manage media projection sessions. 3385 @hide This is not a third-party API (intended for system apps). --> 3386 <permission android:name="android.permission.MANAGE_MEDIA_PROJECTION" 3387 android:protectionLevel="signature" /> 3388 3389 <!-- @SystemApi Allows an application to read install sessions 3390 @hide This is not a third-party API (intended for system apps). --> 3391 <permission android:name="android.permission.READ_INSTALL_SESSIONS" 3392 android:label="@string/permlab_readInstallSessions" 3393 android:description="@string/permdesc_readInstallSessions" 3394 android:protectionLevel="normal"/> 3395 3396 <!-- @SystemApi Allows an application to remove DRM certificates 3397 @hide This is not a third-party API (intended for system apps). --> 3398 <permission android:name="android.permission.REMOVE_DRM_CERTIFICATES" 3399 android:protectionLevel="signature|privileged" /> 3400 3401 <!-- @deprecated Use {@link android.Manifest.permission#BIND_CARRIER_SERVICES} instead --> 3402 <permission android:name="android.permission.BIND_CARRIER_MESSAGING_SERVICE" 3403 android:protectionLevel="signature|privileged" /> 3404 3405 <!-- Allows an application to interact with the currently active 3406 {@link android.service.voice.VoiceInteractionService}. 3407 @hide --> 3408 <permission android:name="android.permission.ACCESS_VOICE_INTERACTION_SERVICE" 3409 android:protectionLevel="signature" /> 3410 3411 <!-- The system process that is allowed to bind to services in carrier apps will 3412 have this permission. Carrier apps should use this permission to protect 3413 their services that only the system is allowed to bind to. 3414 <p>Protection level: signature|privileged 3415 --> 3416 <permission android:name="android.permission.BIND_CARRIER_SERVICES" 3417 android:label="@string/permlab_bindCarrierServices" 3418 android:description="@string/permdesc_bindCarrierServices" 3419 android:protectionLevel="signature|privileged" /> 3420 3421 <!-- Allows an application to query whether DO_NOT_ASK_CREDENTIALS_ON_BOOT 3422 flag is set. 3423 @hide --> 3424 <permission android:name="android.permission.QUERY_DO_NOT_ASK_CREDENTIALS_ON_BOOT" 3425 android:protectionLevel="signature" /> 3426 3427 <!-- @SystemApi Allows applications to kill UIDs. 3428 <p>Not for use by third-party applications. 3429 @hide --> 3430 <permission android:name="android.permission.KILL_UID" 3431 android:protectionLevel="signature|installer" /> 3432 3433 <!-- @SystemApi Allows applications to read the local WiFi and Bluetooth MAC address. 3434 @hide --> 3435 <permission android:name="android.permission.LOCAL_MAC_ADDRESS" 3436 android:protectionLevel="signature|privileged" /> 3437 3438 <!-- @SystemApi Allows access to MAC addresses of WiFi and Bluetooth peer devices. 3439 @hide --> 3440 <permission android:name="android.permission.PEERS_MAC_ADDRESS" 3441 android:protectionLevel="signature|setup" /> 3442 3443 <!-- Allows the Nfc stack to dispatch Nfc messages to applications. Applications 3444 can use this permission to ensure incoming Nfc messages are from the Nfc stack 3445 and not simulated by another application. 3446 @hide --> 3447 <permission android:name="android.permission.DISPATCH_NFC_MESSAGE" 3448 android:protectionLevel="signature|privileged" /> 3449 3450 <!-- @SystemApi Allows changing day / night mode when system is configured with 3451 config_lockDayNightMode set to true. If requesting app does not have permission, 3452 it will be ignored. 3453 @hide --> 3454 <permission android:name="android.permission.MODIFY_DAY_NIGHT_MODE" 3455 android:protectionLevel="signature|privileged" /> 3456 3457 <!-- The system process is explicitly the only one allowed to launch the 3458 confirmation UI for full backup/restore --> 3459 <uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/> 3460 3461 <!-- Allows the holder to access and manage instant applications on the device. 3462 @hide --> 3463 <permission android:name="android.permission.ACCESS_INSTANT_APPS" 3464 android:protectionLevel="signature|installer|verifier" /> 3465 3466 <!-- Allows the holder to view the instant applications on the device. 3467 @hide --> 3468 <permission android:name="android.permission.VIEW_INSTANT_APPS" 3469 android:protectionLevel="signature|preinstalled" /> 3470 3471 <!-- Allows receiving the usage of media resource e.g. video/audio codec and 3472 graphic memory. 3473 @hide --> 3474 <permission android:name="android.permission.RECEIVE_MEDIA_RESOURCE_USAGE" 3475 android:protectionLevel="signature|privileged" /> 3476 3477 <!-- Must be required by system/priv apps when accessing the sound trigger 3478 APIs given by {@link SoundTriggerManager}. 3479 @hide <p>Not for use by third-party applications.</p> --> 3480 <permission android:name="android.permission.MANAGE_SOUND_TRIGGER" 3481 android:protectionLevel="signature|privileged" /> 3482 3483 <!-- @SystemApi Allows trusted applications to dispatch managed provisioning message to Managed 3484 Provisioning app. If requesting app does not have permission, it will be ignored. 3485 @hide --> 3486 <permission android:name="android.permission.DISPATCH_PROVISIONING_MESSAGE" 3487 android:protectionLevel="signature|privileged" /> 3488 3489 <!-- Allows the holder to read blocked numbers. See 3490 {@link android.provider.BlockedNumberContract}. 3491 @hide --> 3492 <permission android:name="android.permission.READ_BLOCKED_NUMBERS" 3493 android:protectionLevel="signature" /> 3494 3495 <!-- Allows the holder to write blocked numbers. See 3496 {@link android.provider.BlockedNumberContract}. 3497 @hide --> 3498 <permission android:name="android.permission.WRITE_BLOCKED_NUMBERS" 3499 android:protectionLevel="signature" /> 3500 3501 <!-- Must be required by an {@link android.service.vr.VrListenerService}, to ensure that only 3502 the system can bind to it. 3503 <p>Protection level: signature --> 3504 <permission android:name="android.permission.BIND_VR_LISTENER_SERVICE" 3505 android:protectionLevel="signature" /> 3506 3507 <!-- Must be required by system apps when accessing restricted VR APIs. 3508 @hide 3509 @SystemApi 3510 <p>Protection level: signature --> 3511 <permission android:name="android.permission.RESTRICTED_VR_ACCESS" 3512 android:protectionLevel="signature|preinstalled" /> 3513 3514 <!-- Required to make calls to {@link android.service.vr.IVrManager}. 3515 @hide --> 3516 <permission android:name="android.permission.ACCESS_VR_MANAGER" 3517 android:protectionLevel="signature" /> 3518 3519 <!-- Required to access VR-Mode state and state change events via {android.app.VrStateCallback} 3520 @hide --> 3521 <permission android:name="android.permission.ACCESS_VR_STATE" 3522 android:protectionLevel="signature|preinstalled" /> 3523 3524 <!-- Allows an application to whitelist tasks during lock task mode 3525 @hide <p>Not for use by third-party applications.</p> --> 3526 <permission android:name="android.permission.UPDATE_LOCK_TASK_PACKAGES" 3527 android:protectionLevel="signature|setup" /> 3528 3529 <!-- @SystemApi Allows an application to replace the app name displayed alongside notifications 3530 in the N-release and later. 3531 @hide <p>Not for use by third-party applications.</p> --> 3532 <permission android:name="android.permission.SUBSTITUTE_NOTIFICATION_APP_NAME" 3533 android:protectionLevel="signature|privileged" /> 3534 3535 <!-- @SystemApi Allows an application to show notifications before the device is provisioned. 3536 @hide <p>Not for use by third-party applications.</p> --> 3537 <permission android:name="android.permission.NOTIFICATION_DURING_SETUP" 3538 android:protectionLevel="signature|privileged" /> 3539 3540 <!-- @SystemApi Allows an application to manage auto-fill sessions. 3541 @hide <p>Not for use by third-party applications.</p> --> 3542 <permission android:name="android.permission.MANAGE_AUTO_FILL" 3543 android:protectionLevel="signature" /> 3544 3545 <!-- Allows an app to set the theme overlay in /vendor/overlay 3546 being used. 3547 @hide <p>Not for use by third-party applications.</p> --> 3548 <permission android:name="android.permission.MODIFY_THEME_OVERLAY" 3549 android:protectionLevel="signature" /> 3550 3551 <!-- Allows an instant app to create foreground services. --> 3552 <permission android:name="android.permission.INSTANT_APP_FOREGROUND_SERVICE" 3553 android:protectionLevel="signature|development|instant|appop" /> 3554 3555 <application android:process="system" 3556 android:persistent="true" 3557 android:hasCode="false" 3558 android:label="@string/android_system_label" 3559 android:allowClearUserData="false" 3560 android:backupAgent="com.android.server.backup.SystemBackupAgent" 3561 android:killAfterRestore="false" 3562 android:icon="@drawable/ic_launcher_android" 3563 android:supportsRtl="true" 3564 android:theme="@style/Theme.DeviceDefault.Light.DarkActionBar" 3565 android:defaultToDeviceProtectedStorage="true" 3566 android:directBootAware="true"> 3567 <activity android:name="com.android.internal.app.ChooserActivity" 3568 android:theme="@style/Theme.DeviceDefault.Resolver" 3569 android:finishOnCloseSystemDialogs="true" 3570 android:excludeFromRecents="true" 3571 android:documentLaunchMode="never" 3572 android:relinquishTaskIdentity="true" 3573 android:configChanges="screenSize|smallestScreenSize|screenLayout|orientation|keyboard|keyboardHidden" 3574 android:process=":ui" 3575 android:visibleToInstantApps="true"> 3576 <intent-filter> 3577 <action android:name="android.intent.action.CHOOSER" /> 3578 <category android:name="android.intent.category.DEFAULT" /> 3579 <category android:name="android.intent.category.VOICE" /> 3580 </intent-filter> 3581 </activity> 3582 <activity android:name="com.android.internal.app.AccessibilityButtonChooserActivity" 3583 android:exported="false" 3584 android:theme="@style/Theme.DeviceDefault.Resolver" 3585 android:finishOnCloseSystemDialogs="true" 3586 android:excludeFromRecents="true" 3587 android:documentLaunchMode="never" 3588 android:relinquishTaskIdentity="true" 3589 android:configChanges="screenSize|smallestScreenSize|screenLayout|orientation|keyboard|keyboardHidden" 3590 android:process=":ui" 3591 android:visibleToInstantApps="true"> 3592 <intent-filter> 3593 <action android:name="com.android.internal.intent.action.CHOOSE_ACCESSIBILITY_BUTTON" /> 3594 <category android:name="android.intent.category.DEFAULT" /> 3595 </intent-filter> 3596 </activity> 3597 <activity android:name="com.android.internal.app.IntentForwarderActivity" 3598 android:finishOnCloseSystemDialogs="true" 3599 android:theme="@style/Theme.NoDisplay" 3600 android:excludeFromRecents="true" 3601 android:label="@string/user_owner_label" 3602 android:exported="true" 3603 > 3604 </activity> 3605 <activity-alias android:name="com.android.internal.app.ForwardIntentToParent" 3606 android:targetActivity="com.android.internal.app.IntentForwarderActivity" 3607 android:exported="true" 3608 android:label="@string/user_owner_label"> 3609 </activity-alias> 3610 <activity-alias android:name="com.android.internal.app.ForwardIntentToManagedProfile" 3611 android:targetActivity="com.android.internal.app.IntentForwarderActivity" 3612 android:icon="@drawable/ic_corp_icon" 3613 android:exported="true" 3614 android:label="@string/managed_profile_label"> 3615 </activity-alias> 3616 <activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity" 3617 android:theme="@style/Theme.DeviceDefault.Light.Dialog" 3618 android:label="@string/heavy_weight_switcher_title" 3619 android:finishOnCloseSystemDialogs="true" 3620 android:excludeFromRecents="true" 3621 android:process=":ui"> 3622 </activity> 3623 <activity android:name="com.android.internal.app.PlatLogoActivity" 3624 android:theme="@style/Theme.Wallpaper.NoTitleBar.Fullscreen" 3625 android:configChanges="orientation|keyboardHidden" 3626 android:process=":ui"> 3627 </activity> 3628 <activity android:name="com.android.internal.app.DisableCarModeActivity" 3629 android:theme="@style/Theme.NoDisplay" 3630 android:excludeFromRecents="true" 3631 android:process=":ui"> 3632 </activity> 3633 <activity android:name="com.android.internal.app.DumpHeapActivity" 3634 android:theme="@style/Theme.Translucent.NoTitleBar" 3635 android:label="@string/dump_heap_title" 3636 android:finishOnCloseSystemDialogs="true" 3637 android:noHistory="true" 3638 android:excludeFromRecents="true" 3639 android:process=":ui"> 3640 </activity> 3641 <provider android:name="com.android.server.am.DumpHeapProvider" 3642 android:authorities="com.android.server.heapdump" 3643 android:grantUriPermissions="true" 3644 android:multiprocess="false" 3645 android:singleUser="true" /> 3646 3647 <activity android:name="android.accounts.ChooseAccountActivity" 3648 android:excludeFromRecents="true" 3649 android:exported="true" 3650 android:theme="@style/Theme.DeviceDefault.Light.Dialog" 3651 android:label="@string/choose_account_label" 3652 android:process=":ui" 3653 android:visibleToInstantApps="true"> 3654 </activity> 3655 3656 <activity android:name="android.accounts.ChooseTypeAndAccountActivity" 3657 android:excludeFromRecents="true" 3658 android:exported="true" 3659 android:theme="@style/Theme.DeviceDefault.Light.Dialog" 3660 android:label="@string/choose_account_label" 3661 android:process=":ui" 3662 android:visibleToInstantApps="true"> 3663 </activity> 3664 3665 <activity android:name="android.accounts.ChooseAccountTypeActivity" 3666 android:excludeFromRecents="true" 3667 android:theme="@style/Theme.DeviceDefault.Light.Dialog" 3668 android:label="@string/choose_account_label" 3669 android:process=":ui" 3670 android:visibleToInstantApps="true"> 3671 </activity> 3672 3673 <activity android:name="android.accounts.CantAddAccountActivity" 3674 android:excludeFromRecents="true" 3675 android:exported="true" 3676 android:theme="@style/Theme.DeviceDefault.Light.Dialog.NoActionBar" 3677 android:process=":ui"> 3678 </activity> 3679 3680 <activity android:name="android.accounts.GrantCredentialsPermissionActivity" 3681 android:excludeFromRecents="true" 3682 android:exported="true" 3683 android:theme="@style/Theme.DeviceDefault.Light.DialogWhenLarge" 3684 android:process=":ui" 3685 android:visibleToInstantApps="true"> 3686 </activity> 3687 3688 <activity android:name="android.content.SyncActivityTooManyDeletes" 3689 android:theme="@style/Theme.DeviceDefault.Light.Dialog" 3690 android:label="@string/sync_too_many_deletes" 3691 android:process=":ui"> 3692 </activity> 3693 3694 <activity android:name="com.android.internal.app.ShutdownActivity" 3695 android:permission="android.permission.SHUTDOWN" 3696 android:theme="@style/Theme.NoDisplay" 3697 android:excludeFromRecents="true"> 3698 <intent-filter> 3699 <action android:name="com.android.internal.intent.action.REQUEST_SHUTDOWN" /> 3700 <category android:name="android.intent.category.DEFAULT" /> 3701 </intent-filter> 3702 <intent-filter> 3703 <action android:name="android.intent.action.REBOOT" /> 3704 <category android:name="android.intent.category.DEFAULT" /> 3705 </intent-filter> 3706 </activity> 3707 3708 <activity android:name="com.android.internal.app.NetInitiatedActivity" 3709 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert" 3710 android:excludeFromRecents="true" 3711 android:process=":ui"> 3712 </activity> 3713 3714 <activity android:name="com.android.internal.app.SystemUserHomeActivity" 3715 android:enabled="false" 3716 android:process=":ui" 3717 android:systemUserOnly="true" 3718 android:theme="@style/Theme.Translucent.NoTitleBar"> 3719 <intent-filter android:priority="-100"> 3720 <action android:name="android.intent.action.MAIN" /> 3721 <category android:name="android.intent.category.HOME" /> 3722 </intent-filter> 3723 </activity> 3724 3725 <!-- Activity to prompt user if it's ok to create a new user sandbox for a 3726 specified account. --> 3727 <activity android:name="com.android.internal.app.ConfirmUserCreationActivity" 3728 android:excludeFromRecents="true" 3729 android:process=":ui" 3730 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert"> 3731 <intent-filter android:priority="1000"> 3732 <action android:name="android.os.action.CREATE_USER" /> 3733 <category android:name="android.intent.category.DEFAULT" /> 3734 </intent-filter> 3735 </activity> 3736 3737 <activity android:name="com.android.internal.app.UnlaunchableAppActivity" 3738 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert" 3739 android:excludeFromRecents="true" 3740 android:process=":ui"> 3741 </activity> 3742 3743 <activity android:name="com.android.settings.notification.NotificationAccessConfirmationActivity" 3744 android:theme="@android:style/Theme.DeviceDefault.Light.Dialog.Alert" 3745 android:excludeFromRecents="true"> 3746 </activity> 3747 3748 <receiver android:name="com.android.server.BootReceiver" 3749 android:systemUserOnly="true"> 3750 <intent-filter android:priority="1000"> 3751 <action android:name="android.intent.action.BOOT_COMPLETED" /> 3752 </intent-filter> 3753 </receiver> 3754 3755 <receiver android:name="com.android.server.updates.CertPinInstallReceiver" 3756 android:permission="android.permission.UPDATE_CONFIG"> 3757 <intent-filter> 3758 <action android:name="android.intent.action.UPDATE_PINS" /> 3759 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3760 </intent-filter> 3761 </receiver> 3762 3763 <receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver" 3764 android:permission="android.permission.UPDATE_CONFIG"> 3765 <intent-filter> 3766 <action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" /> 3767 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3768 </intent-filter> 3769 </receiver> 3770 3771 <receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver" 3772 android:permission="android.permission.UPDATE_CONFIG"> 3773 <intent-filter> 3774 <action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" /> 3775 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3776 </intent-filter> 3777 </receiver> 3778 3779 <receiver android:name="com.android.server.updates.ApnDbInstallReceiver" 3780 android:permission="android.permission.UPDATE_CONFIG"> 3781 <intent-filter> 3782 <action android:name="com.android.internal.intent.action.UPDATE_APN_DB" /> 3783 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3784 </intent-filter> 3785 </receiver> 3786 3787 <receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver" 3788 android:permission="android.permission.UPDATE_CONFIG"> 3789 <intent-filter> 3790 <action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" /> 3791 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3792 </intent-filter> 3793 </receiver> 3794 3795 <receiver android:name="com.android.server.updates.TzDataInstallReceiver" 3796 android:permission="android.permission.UPDATE_CONFIG"> 3797 <intent-filter> 3798 <action android:name="android.intent.action.UPDATE_TZDATA" /> 3799 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3800 </intent-filter> 3801 </receiver> 3802 3803 <receiver android:name="com.android.server.updates.CertificateTransparencyLogInstallReceiver" 3804 android:permission="android.permission.UPDATE_CONFIG"> 3805 <intent-filter> 3806 <action android:name="android.intent.action.UPDATE_CT_LOGS" /> 3807 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3808 </intent-filter> 3809 </receiver> 3810 3811 <receiver android:name="com.android.server.updates.LangIdInstallReceiver" 3812 android:permission="android.permission.UPDATE_CONFIG"> 3813 <intent-filter> 3814 <action android:name="android.intent.action.UPDATE_LANG_ID" /> 3815 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3816 </intent-filter> 3817 </receiver> 3818 3819 <receiver android:name="com.android.server.updates.SmartSelectionInstallReceiver" 3820 android:permission="android.permission.UPDATE_CONFIG"> 3821 <intent-filter> 3822 <action android:name="android.intent.action.UPDATE_SMART_SELECTION" /> 3823 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3824 </intent-filter> 3825 </receiver> 3826 3827 <receiver android:name="com.android.server.MasterClearReceiver" 3828 android:permission="android.permission.MASTER_CLEAR"> 3829 <intent-filter 3830 android:priority="100" > 3831 <!-- For Checkin, Settings, etc.: action=FACTORY_RESET --> 3832 <action android:name="android.intent.action.FACTORY_RESET" /> 3833 <!-- As above until all the references to the deprecated MASTER_CLEAR get updated to 3834 FACTORY_RESET. --> 3835 <action android:name="android.intent.action.MASTER_CLEAR" /> 3836 3837 <!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR --> 3838 <action android:name="com.google.android.c2dm.intent.RECEIVE" /> 3839 <category android:name="android.intent.category.MASTER_CLEAR" /> 3840 </intent-filter> 3841 </receiver> 3842 3843 <service android:name="android.hardware.location.GeofenceHardwareService" 3844 android:permission="android.permission.LOCATION_HARDWARE" 3845 android:exported="false" /> 3846 3847 <service android:name="com.android.internal.backup.LocalTransportService" 3848 android:permission="android.permission.CONFIRM_FULL_BACKUP" 3849 android:exported="false"> 3850 <intent-filter> 3851 <action android:name="android.backup.TRANSPORT_HOST" /> 3852 </intent-filter> 3853 </service> 3854 3855 <service android:name="com.android.server.MountServiceIdler" 3856 android:exported="true" 3857 android:permission="android.permission.BIND_JOB_SERVICE" > 3858 </service> 3859 3860 <service android:name="com.android.server.backup.FullBackupJob" 3861 android:exported="true" 3862 android:permission="android.permission.BIND_JOB_SERVICE" > 3863 </service> 3864 3865 <service android:name="com.android.server.backup.KeyValueBackupJob" 3866 android:permission="android.permission.BIND_JOB_SERVICE" > 3867 </service> 3868 3869 <service android:name="com.android.server.content.SyncJobService" 3870 android:permission="android.permission.BIND_JOB_SERVICE" > 3871 </service> 3872 3873 <service android:name="com.android.server.pm.BackgroundDexOptService" 3874 android:exported="true" 3875 android:permission="android.permission.BIND_JOB_SERVICE"> 3876 </service> 3877 3878 <service android:name="com.android.server.PruneInstantAppsJobService" 3879 android:permission="android.permission.BIND_JOB_SERVICE" > 3880 </service> 3881 3882 <service android:name="com.android.server.storage.DiskStatsLoggingService" 3883 android:permission="android.permission.BIND_JOB_SERVICE" > 3884 </service> 3885 3886 <service android:name="com.android.server.PreloadsFileCacheExpirationJobService" 3887 android:permission="android.permission.BIND_JOB_SERVICE" > 3888 </service> 3889 3890 <service android:name="com.android.server.camera.CameraStatsJobService" 3891 android:permission="android.permission.BIND_JOB_SERVICE" > 3892 </service> 3893 3894 <service android:name="com.android.server.timezone.TimeZoneUpdateIdler" 3895 android:permission="android.permission.BIND_JOB_SERVICE" > 3896 </service> 3897 </application> 3898 3899</manifest> 3900