AndroidManifest.xml revision 1213487aa7dc32d392cb5f2489f0c76321f02430
1<?xml version="1.0" encoding="utf-8"?> 2<!-- 3/* //device/apps/common/AndroidManifest.xml 4** 5** Copyright 2006, The Android Open Source Project 6** 7** Licensed under the Apache License, Version 2.0 (the "License"); 8** you may not use this file except in compliance with the License. 9** You may obtain a copy of the License at 10** 11** http://www.apache.org/licenses/LICENSE-2.0 12** 13** Unless required by applicable law or agreed to in writing, software 14** distributed under the License is distributed on an "AS IS" BASIS, 15** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 16** See the License for the specific language governing permissions and 17** limitations under the License. 18*/ 19--> 20<manifest xmlns:android="http://schemas.android.com/apk/res/android" 21 package="android" coreApp="true" android:sharedUserId="android.uid.system" 22 android:sharedUserLabel="@string/android_system_label"> 23 24 <!-- ================================================ --> 25 <!-- Special broadcasts that only the system can send --> 26 <!-- ================================================ --> 27 <eat-comment /> 28 29 <protected-broadcast android:name="android.intent.action.SCREEN_OFF" /> 30 <protected-broadcast android:name="android.intent.action.SCREEN_ON" /> 31 <protected-broadcast android:name="android.intent.action.USER_PRESENT" /> 32 <protected-broadcast android:name="android.intent.action.TIME_SET" /> 33 <protected-broadcast android:name="android.intent.action.TIME_TICK" /> 34 <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" /> 35 <protected-broadcast android:name="android.intent.action.DATE_CHANGED" /> 36 <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" /> 37 <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" /> 38 <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" /> 39 <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" /> 40 <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" /> 41 <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" /> 42 <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" /> 43 <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" /> 44 <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" /> 45 <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" /> 46 <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" /> 47 <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" /> 48 <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" /> 49 <protected-broadcast android:name="android.intent.action.UID_REMOVED" /> 50 <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" /> 51 <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" /> 52 <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" /> 53 <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" /> 54 <protected-broadcast android:name="android.intent.action.BATTERY_LOW" /> 55 <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" /> 56 <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" /> 57 <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" /> 58 <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" /> 59 <protected-broadcast android:name="android.intent.action.CHARGING" /> 60 <protected-broadcast android:name="android.intent.action.DISCHARGING" /> 61 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" /> 62 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" /> 63 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" /> 64 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" /> 65 <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" /> 66 <protected-broadcast android:name="android.intent.action.REBOOT" /> 67 <protected-broadcast android:name="android.intent.action.DOCK_EVENT" /> 68 <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" /> 69 <protected-broadcast android:name="android.intent.action.USER_ADDED" /> 70 <protected-broadcast android:name="android.intent.action.USER_REMOVED" /> 71 <protected-broadcast android:name="android.intent.action.USER_STARTING" /> 72 <protected-broadcast android:name="android.intent.action.USER_STARTED" /> 73 <protected-broadcast android:name="android.intent.action.USER_STOPPING" /> 74 <protected-broadcast android:name="android.intent.action.USER_STOPPED" /> 75 <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" /> 76 <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" /> 77 <protected-broadcast android:name="android.intent.action.USER_SWITCHED" /> 78 <protected-broadcast android:name="android.intent.action.INTENT_FILTER_NEEDS_VERIFICATION" /> 79 80 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED" /> 81 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGING" /> 82 <protected-broadcast android:name="android.os.action.DEVICE_IDLE_MODE_CHANGED" /> 83 <protected-broadcast android:name="android.os.action.POWER_SAVE_WHITELIST_CHANGED" /> 84 <protected-broadcast android:name="android.os.action.POWER_SAVE_TEMP_WHITELIST_CHANGED" /> 85 86 <protected-broadcast android:name="android.os.action.SCREEN_BRIGHTNESS_BOOST_CHANGED" /> 87 88 <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" /> 89 <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" /> 90 <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" /> 91 <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" /> 92 <protected-broadcast android:name="android.app.action.NEXT_ALARM_CLOCK_CHANGED" /> 93 94 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" /> 95 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" /> 96 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" /> 97 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" /> 98 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_HOST_RESTORED" /> 99 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_RESTORED" /> 100 101 <protected-broadcast android:name="android.os.action.SETTING_RESTORED" /> 102 103 <protected-broadcast android:name="android.backup.intent.RUN" /> 104 <protected-broadcast android:name="android.backup.intent.CLEAR" /> 105 <protected-broadcast android:name="android.backup.intent.INIT" /> 106 107 <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" /> 108 <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" /> 109 <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" /> 110 <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" /> 111 <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" /> 112 <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" /> 113 <protected-broadcast android:name="android.bluetooth.device.action.UUID" /> 114 <protected-broadcast android:name="android.bluetooth.device.action.MAS_INSTANCE" /> 115 <protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" /> 116 <protected-broadcast android:name="android.bluetooth.device.action.FOUND" /> 117 <protected-broadcast android:name="android.bluetooth.device.action.DISAPPEARED" /> 118 <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" /> 119 <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" /> 120 <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" /> 121 <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" /> 122 <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" /> 123 <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" /> 124 <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" /> 125 <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" /> 126 <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" /> 127 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" /> 128 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" /> 129 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" /> 130 <protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" /> 131 <protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" /> 132 <protected-broadcast 133 android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" /> 134 <protected-broadcast 135 android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" /> 136 <protected-broadcast 137 android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" /> 138 <protected-broadcast 139 android:name="android.bluetooth.headsetclient.profile.action.CONNECTION_STATE_CHANGED" /> 140 <protected-broadcast 141 android:name="android.bluetooth.headsetclient.profile.action.AUDIO_STATE_CHANGED" /> 142 <protected-broadcast 143 android:name="android.bluetooth.headsetclient.profile.action.AG_EVENT" /> 144 <protected-broadcast 145 android:name="android.bluetooth.headsetclient.profile.action.AG_CALL_CHANGED" /> 146 <protected-broadcast 147 android:name="android.bluetooth.headsetclient.profile.action.RESULT" /> 148 <protected-broadcast 149 android:name="android.bluetooth.headsetclient.profile.action.LAST_VTAG" /> 150 <protected-broadcast 151 android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" /> 152 <protected-broadcast 153 android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" /> 154 <protected-broadcast 155 android:name="android.bluetooth.a2dp-sink.profile.action.CONNECTION_STATE_CHANGED" /> 156 <protected-broadcast 157 android:name="android.bluetooth.a2dp-sink.profile.action.PLAYING_STATE_CHANGED" /> 158 <protected-broadcast 159 android:name="android.bluetooth.a2dp-sink.profile.action.AUDIO_CONFIG_CHANGED" /> 160 <protected-broadcast 161 android:name="android.bluetooth.avrcp-controller.profile.action.CONNECTION_STATE_CHANGED" /> 162 <protected-broadcast 163 android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" /> 164 <protected-broadcast 165 android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" /> 166 <protected-broadcast 167 android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" /> 168 <protected-broadcast 169 android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" /> 170 <protected-broadcast android:name="android.bluetooth.pbap.intent.action.PBAP_STATE_CHANGED" /> 171 <protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" /> 172 <protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" /> 173 <protected-broadcast android:name="android.btopp.intent.action.LIST" /> 174 <protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" /> 175 <protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" /> 176 <protected-broadcast android:name="android.btopp.intent.action.CONFIRM" /> 177 <protected-broadcast android:name="android.btopp.intent.action.HIDE" /> 178 <protected-broadcast android:name="android.btopp.intent.action.RETRY" /> 179 <protected-broadcast android:name="android.btopp.intent.action.OPEN" /> 180 <protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" /> 181 <protected-broadcast android:name="com.android.bluetooth.pbap.authchall" /> 182 <protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" /> 183 <protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" /> 184 <protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" /> 185 186 <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" /> 187 188 <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" /> 189 <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" /> 190 <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" /> 191 <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" /> 192 <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" /> 193 194 <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" /> 195 <protected-broadcast android:name="android.media.action.HDMI_AUDIO_PLUG" /> 196 197 <protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" /> 198 <protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" /> 199 <protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" /> 200 <protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" /> 201 <protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" /> 202 <protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" /> 203 <protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" /> 204 <protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" /> 205 206 <protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" /> 207 <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" /> 208 <protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" /> 209 <protected-broadcast android:name="android.intent.action.MEDIA_NOFS" /> 210 <protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" /> 211 <protected-broadcast android:name="android.intent.action.MEDIA_SHARED" /> 212 <protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" /> 213 <protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" /> 214 <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" /> 215 <protected-broadcast android:name="android.intent.action.MEDIA_EJECT" /> 216 217 <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL" /> 218 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" /> 219 <!-- @deprecated. Only {@link android.net.ConnectivityManager.CONNECTIVITY_ACTION} is sent. --> 220 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" /> 221 <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" /> 222 <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" /> 223 <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" /> 224 225 <protected-broadcast android:name="android.net.nsd.STATE_CHANGED" /> 226 227 <protected-broadcast android:name="android.nfc.action.LLCP_LINK_STATE_CHANGED" /> 228 <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" /> 229 <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" /> 230 <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" /> 231 232 <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" /> 233 234 <protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" /> 235 <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" /> 236 237 <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" /> 238 239 <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" /> 240 <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" /> 241 <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" /> 242 <protected-broadcast android:name="android.intent.action.DATA_CONNECTION_CONNECTED_TO_PROVISIONING_APN" /> 243 244 <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" /> 245 <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" /> 246 <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" /> 247 <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" /> 248 <protected-broadcast android:name="android.net.wifi.WIFI_CREDENTIAL_CHANGED" /> 249 <protected-broadcast android:name="android.net.wifi.WIFI_SCAN_AVAILABLE" /> 250 <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" /> 251 <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" /> 252 <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" /> 253 <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" /> 254 <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" /> 255 <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" /> 256 <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" /> 257 <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" /> 258 <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" /> 259 <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" /> 260 <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" /> 261 <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" /> 262 <protected-broadcast android:name="android.net.wifi.p2p.PERSISTENT_GROUPS_CHANGED" /> 263 <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" /> 264 <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" /> 265 <protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" /> 266 <protected-broadcast 267 android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" /> 268 <protected-broadcast android:name="android.net.scoring.SCORE_NETWORKS" /> 269 <protected-broadcast android:name="android.net.scoring.SCORER_CHANGED" /> 270 <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" /> 271 <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" /> 272 <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" /> 273 <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" /> 274 <protected-broadcast android:name="android.intent.action.APPLICATION_RESTRICTIONS_CHANGED" /> 275 <protected-broadcast android:name="android.intent.action.BUGREPORT_FINISHED" /> 276 277 <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" /> 278 <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" /> 279 280 <protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" /> 281 282 <protected-broadcast android:name="android.intent.action.PHONE_STATE" /> 283 284 <protected-broadcast android:name="android.intent.action.SUB_DEFAULT_CHANGED" /> 285 286 <protected-broadcast android:name="android.location.GPS_ENABLED_CHANGE" /> 287 <protected-broadcast android:name="android.location.PROVIDERS_CHANGED" /> 288 <protected-broadcast android:name="android.location.MODE_CHANGED" /> 289 <protected-broadcast android:name="android.location.GPS_FIX_CHANGE" /> 290 <protected-broadcast android:name="android.net.proxy.PAC_REFRESH" /> 291 292 <protected-broadcast android:name="android.telecom.action.DEFAULT_DIALER_CHANGED" /> 293 294 <protected-broadcast 295 android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" /> 296 297 <!-- Defined in RestrictionsManager --> 298 <protected-broadcast 299 android:name="android.intent.action.PERMISSION_RESPONSE_RECEIVED" /> 300 <!-- Defined in RestrictionsManager --> 301 302 <protected-broadcast android:name="android.intent.action.REQUEST_PERMISSION" /> 303 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_STARTED" /> 304 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" /> 305 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_PROGRESS" /> 306 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" /> 307 308 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_SUBSCRIPTION_CHANGED" /> 309 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_SMS_SUBSCRIPTION_CHANGED" /> 310 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_DATA_SUBSCRIPTION_CHANGED" /> 311 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_VOICE_SUBSCRIPTION_CHANGED" /> 312 <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_CONTENT_CHANGE" /> 313 <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_RECORD_UPDATED" /> 314 315 <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_DONE" /> 316 <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_FAILED" /> 317 318 <protected-broadcast android:name="android.internal.policy.action.BURN_IN_PROTECTION" /> 319 <protected-broadcast android:name="android.app.action.SYSTEM_UPDATE_POLICY_CHANGED" /> 320 <!-- ====================================================================== --> 321 <!-- RUNTIME PERMISSIONS --> 322 <!-- ====================================================================== --> 323 <eat-comment /> 324 325 <!-- ====================================================================== --> 326 <!-- Permissions for accessing user's contacts including personal profile --> 327 <!-- ====================================================================== --> 328 <eat-comment /> 329 330 <!-- Used for runtime permissions related to user's contacts and profile. --> 331 <permission-group android:name="android.permission-group.CONTACTS" 332 android:icon="@drawable/perm_group_social_info" 333 android:label="@string/permgrouplab_contacts" 334 android:description="@string/permgroupdesc_contacts" 335 android:priority="100" /> 336 337 <!-- Allows an application to read the user's contacts data. --> 338 <permission android:name="android.permission.READ_CONTACTS" 339 android:permissionGroup="android.permission-group.CONTACTS" 340 android:label="@string/permlab_readContacts" 341 android:description="@string/permdesc_readContacts" 342 android:protectionLevel="dangerous" /> 343 344 <!-- Allows an application to write the user's contacts data. --> 345 <permission android:name="android.permission.WRITE_CONTACTS" 346 android:permissionGroup="android.permission-group.CONTACTS" 347 android:label="@string/permlab_writeContacts" 348 android:description="@string/permdesc_writeContacts" 349 android:protectionLevel="dangerous" /> 350 351 <!-- @deprecated No longer enforced. This was last enforced in API version 22. --> 352 <permission android:name="android.permission.READ_PROFILE" 353 android:permissionGroup="android.permission-group.CONTACTS" 354 android:label="@string/permlab_readProfile" 355 android:description="@string/permdesc_readProfile" 356 android:protectionLevel="dangerous" /> 357 358 <!-- @deprecated No longer enforced. This was last enforced in API version 22. --> 359 <permission android:name="android.permission.WRITE_PROFILE" 360 android:permissionGroup="android.permission-group.CONTACTS" 361 android:label="@string/permlab_writeProfile" 362 android:description="@string/permdesc_writeProfile" 363 android:protectionLevel="dangerous" /> 364 365 <!-- ====================================================================== --> 366 <!-- Permissions for accessing user's calendar --> 367 <!-- ====================================================================== --> 368 <eat-comment /> 369 370 <!-- Used for runtime permissions related to user's calendar. --> 371 <permission-group android:name="android.permission-group.CALENDAR" 372 android:icon="@drawable/perm_group_calendar" 373 android:label="@string/permgrouplab_calendar" 374 android:description="@string/permgroupdesc_calendar" 375 android:priority="200" /> 376 377 <!-- Allows an application to read the user's calendar data. --> 378 <permission android:name="android.permission.READ_CALENDAR" 379 android:permissionGroup="android.permission-group.CALENDAR" 380 android:label="@string/permlab_readCalendar" 381 android:description="@string/permdesc_readCalendar" 382 android:protectionLevel="dangerous" /> 383 384 <!-- Allows an application to write the user's calendar data. --> 385 <permission android:name="android.permission.WRITE_CALENDAR" 386 android:permissionGroup="android.permission-group.CALENDAR" 387 android:label="@string/permlab_writeCalendar" 388 android:description="@string/permdesc_writeCalendar" 389 android:protectionLevel="dangerous" /> 390 391 <!-- ====================================================================== --> 392 <!-- Permissions for accessing and modifying user's SMS messages --> 393 <!-- ====================================================================== --> 394 <eat-comment /> 395 396 <!-- Used for runtime permissions related to user's SMS messages. --> 397 <permission-group android:name="android.permission-group.SMS" 398 android:icon="@drawable/perm_group_messages" 399 android:label="@string/permgrouplab_sms" 400 android:description="@string/permgroupdesc_sms" 401 android:priority="300" /> 402 403 <!-- Allows an application to send SMS messages. --> 404 <permission android:name="android.permission.SEND_SMS" 405 android:permissionGroup="android.permission-group.SMS" 406 android:label="@string/permlab_sendSms" 407 android:description="@string/permdesc_sendSms" 408 android:permissionFlags="costsMoney" 409 android:protectionLevel="dangerous" /> 410 411 <!-- Allows an application to receive SMS messages. --> 412 <permission android:name="android.permission.RECEIVE_SMS" 413 android:permissionGroup="android.permission-group.SMS" 414 android:label="@string/permlab_receiveSms" 415 android:description="@string/permdesc_receiveSms" 416 android:protectionLevel="dangerous"/> 417 418 <!-- Allows an application to read SMS messages. --> 419 <permission android:name="android.permission.READ_SMS" 420 android:permissionGroup="android.permission-group.SMS" 421 android:label="@string/permlab_readSms" 422 android:description="@string/permdesc_readSms" 423 android:protectionLevel="dangerous" /> 424 425 <!-- Allows an application to receive WAP push messages. --> 426 <permission android:name="android.permission.RECEIVE_WAP_PUSH" 427 android:permissionGroup="android.permission-group.SMS" 428 android:label="@string/permlab_receiveWapPush" 429 android:description="@string/permdesc_receiveWapPush" 430 android:protectionLevel="dangerous" /> 431 432 <!-- Allows an application to monitor incoming MMS messages. --> 433 <permission android:name="android.permission.RECEIVE_MMS" 434 android:permissionGroup="android.permission-group.SMS" 435 android:label="@string/permlab_receiveMms" 436 android:description="@string/permdesc_receiveMms" 437 android:protectionLevel="dangerous" /> 438 439 <!-- Allows an application to read previously received cell broadcast 440 messages and to register a content observer to get notifications when 441 a cell broadcast has been received and added to the database. For 442 emergency alerts, the database is updated immediately after the 443 alert dialog and notification sound/vibration/speech are presented. 444 The "read" column is then updated after the user dismisses the alert. 445 This enables supplementary emergency assistance apps to start loading 446 additional emergency information (if Internet access is available) 447 when the alert is first received, and to delay presenting the info 448 to the user until after the initial alert dialog is dismissed. 449 @hide Pending API council approval --> 450 <permission android:name="android.permission.READ_CELL_BROADCASTS" 451 android:permissionGroup="android.permission-group.SMS" 452 android:label="@string/permlab_readCellBroadcasts" 453 android:description="@string/permdesc_readCellBroadcasts" 454 android:protectionLevel="dangerous" /> 455 456 <!-- ====================================================================== --> 457 <!-- Permissions for accessing external storage --> 458 <!-- ====================================================================== --> 459 <eat-comment /> 460 461 <!-- Used for runtime permissions related to the shared external storage. --> 462 <permission-group android:name="android.permission-group.STORAGE" 463 android:icon="@drawable/perm_group_storage" 464 android:label="@string/permgrouplab_storage" 465 android:description="@string/permgroupdesc_storage" 466 android:priority="900" /> 467 468 <!-- Allows an application to read from external storage. 469 <p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly 470 granted this permission.</p> 471 <p>This permission is enforced starting in API level 19. Before API level 19, this 472 permission is not enforced and all apps still have access to read from external storage. 473 You can test your app with the permission enforced by enabling <em>Protect USB 474 storage</em> under Developer options in the Settings app on a device running Android 4.1 or 475 higher.</p> 476 <p>Also starting in API level 19, this permission is <em>not</em> required to 477 read/write files in your application-specific directories returned by 478 {@link android.content.Context#getExternalFilesDir} and 479 {@link android.content.Context#getExternalCacheDir}. 480 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 481 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 482 minSdkVersion}</a> and <a 483 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 484 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 485 grants your app this permission. If you don't need this permission, be sure your <a 486 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 487 targetSdkVersion}</a> is 4 or higher.--> 488 <permission android:name="android.permission.READ_EXTERNAL_STORAGE" 489 android:permissionGroup="android.permission-group.STORAGE" 490 android:label="@string/permlab_sdcardRead" 491 android:description="@string/permdesc_sdcardRead" 492 android:protectionLevel="normal" /> 493 494 <!-- Allows an application to write to external storage. 495 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 496 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 497 minSdkVersion}</a> and <a 498 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 499 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 500 grants your app this permission. If you don't need this permission, be sure your <a 501 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 502 targetSdkVersion}</a> is 4 or higher. 503 <p>Starting in API level 19, this permission is <em>not</em> required to 504 read/write files in your application-specific directories returned by 505 {@link android.content.Context#getExternalFilesDir} and 506 {@link android.content.Context#getExternalCacheDir}. --> 507 <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE" 508 android:permissionGroup="android.permission-group.STORAGE" 509 android:label="@string/permlab_sdcardWrite" 510 android:description="@string/permdesc_sdcardWrite" 511 android:protectionLevel="dangerous" /> 512 513 <!-- =============================================================== --> 514 <!-- Permissions for accessing social info --> 515 <!-- =============================================================== --> 516 <eat-comment /> 517 518 <!-- Used for permissions that provide access to the user's social connections, 519 such as contacts, call logs, social stream, etc. This includes 520 both reading and writing of this data (which should generally be 521 expressed as two distinct permissions). --> 522 523 <permission-group android:name="android.permission-group.SOCIAL_INFO" 524 android:label="@string/permgrouplab_socialInfo" 525 android:icon="@drawable/perm_group_social_info" 526 android:description="@string/permgroupdesc_socialInfo" 527 android:permissionGroupFlags="personalInfo" 528 android:priority="1200" /> 529 530 <!-- Allows an application to read from the user's social stream. 531 @deprecated This functionality will be unsupported in the future; cursors returned 532 will be empty. Please do not use. --> 533 <permission android:name="android.permission.READ_SOCIAL_STREAM" 534 android:permissionGroup="android.permission-group.SOCIAL_INFO" 535 android:protectionLevel="dangerous" 536 android:label="@string/permlab_readSocialStream" 537 android:description="@string/permdesc_readSocialStream" /> 538 539 <!-- Allows an application to write (but not read) the user's 540 social stream data. 541 @deprecated This functionality will be unsupported in the future; cursors returned 542 will be empty. Please do not use. --> 543 <permission android:name="android.permission.WRITE_SOCIAL_STREAM" 544 android:permissionGroup="android.permission-group.SOCIAL_INFO" 545 android:protectionLevel="dangerous" 546 android:label="@string/permlab_writeSocialStream" 547 android:description="@string/permdesc_writeSocialStream" /> 548 549 <!-- ====================================================================== --> 550 <!-- Permissions for accessing the device location --> 551 <!-- ====================================================================== --> 552 <eat-comment /> 553 554 <!-- Used for permissions that allow accessing the device location. --> 555 <permission-group android:name="android.permission-group.LOCATION" 556 android:icon="@drawable/perm_group_location" 557 android:label="@string/permgrouplab_location" 558 android:description="@string/permgroupdesc_location" 559 android:priority="400" /> 560 561 <!-- Allows an app to access precise location. --> 562 <permission android:name="android.permission.ACCESS_FINE_LOCATION" 563 android:permissionGroup="android.permission-group.LOCATION" 564 android:label="@string/permlab_accessFineLocation" 565 android:description="@string/permdesc_accessFineLocation" 566 android:protectionLevel="dangerous" /> 567 568 <!-- Allows an app to access approximate location. --> 569 <permission android:name="android.permission.ACCESS_COARSE_LOCATION" 570 android:permissionGroup="android.permission-group.LOCATION" 571 android:label="@string/permlab_accessCoarseLocation" 572 android:description="@string/permdesc_accessCoarseLocation" 573 android:protectionLevel="dangerous" /> 574 575 <!-- ====================================================================== --> 576 <!-- Permissions for accessing the device telephony --> 577 <!-- ====================================================================== --> 578 <eat-comment /> 579 580 <!-- Used for permissions that are associated telephony features. --> 581 <permission-group android:name="android.permission-group.PHONE" 582 android:icon="@drawable/perm_group_phone_calls" 583 android:label="@string/permgrouplab_phone" 584 android:description="@string/permgroupdesc_phone" 585 android:priority="500" /> 586 587 <!-- Allows read only access to phone state. 588 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 589 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 590 minSdkVersion}</a> and <a 591 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 592 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 593 grants your app this permission. If you don't need this permission, be sure your <a 594 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 595 targetSdkVersion}</a> is 4 or higher. --> 596 <permission android:name="android.permission.READ_PHONE_STATE" 597 android:permissionGroup="android.permission-group.PHONE" 598 android:label="@string/permlab_readPhoneState" 599 android:description="@string/permdesc_readPhoneState" 600 android:protectionLevel="dangerous" /> 601 602 <!-- Allows an application to initiate a phone call without going through 603 the Dialer user interface for the user to confirm the call. --> 604 <permission android:name="android.permission.CALL_PHONE" 605 android:permissionGroup="android.permission-group.PHONE" 606 android:permissionFlags="costsMoney" 607 android:label="@string/permlab_callPhone" 608 android:description="@string/permdesc_callPhone" 609 android:protectionLevel="dangerous" /> 610 611 <!-- Allows an application to read the user's call log. 612 <p class="note"><strong>Note:</strong> If your app uses the 613 {@link #READ_CONTACTS} permission and <em>both</em> your <a 614 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 615 minSdkVersion}</a> and <a 616 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 617 targetSdkVersion}</a> values are set to 15 or lower, the system implicitly 618 grants your app this permission. If you don't need this permission, be sure your <a 619 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 620 targetSdkVersion}</a> is 16 or higher.</p> --> 621 <permission android:name="android.permission.READ_CALL_LOG" 622 android:permissionGroup="android.permission-group.PHONE" 623 android:label="@string/permlab_readCallLog" 624 android:description="@string/permdesc_readCallLog" 625 android:protectionLevel="dangerous" /> 626 627 <!-- Allows an application to write (but not read) the user's 628 contacts data. 629 <p class="note"><strong>Note:</strong> If your app uses the 630 {@link #WRITE_CONTACTS} permission and <em>both</em> your <a 631 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 632 minSdkVersion}</a> and <a 633 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 634 targetSdkVersion}</a> values are set to 15 or lower, the system implicitly 635 grants your app this permission. If you don't need this permission, be sure your <a 636 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 637 targetSdkVersion}</a> is 16 or higher.</p> --> 638 <permission android:name="android.permission.WRITE_CALL_LOG" 639 android:permissionGroup="android.permission-group.PHONE" 640 android:label="@string/permlab_writeCallLog" 641 android:description="@string/permdesc_writeCallLog" 642 android:protectionLevel="dangerous" /> 643 644 <!-- Allows an application to add voicemails into the system. --> 645 <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL" 646 android:permissionGroup="android.permission-group.PHONE" 647 android:label="@string/permlab_addVoicemail" 648 android:description="@string/permdesc_addVoicemail" 649 android:protectionLevel="dangerous" /> 650 651 <!-- Allows an application to use SIP service. --> 652 <permission android:name="android.permission.USE_SIP" 653 android:permissionGroup="android.permission-group.PHONE" 654 android:description="@string/permdesc_use_sip" 655 android:label="@string/permlab_use_sip" 656 android:protectionLevel="dangerous"/> 657 658 <!-- Allows an application to see the number being dialed during an outgoing 659 call with the option to redirect the call to a different number or 660 abort the call altogether. --> 661 <permission android:name="android.permission.PROCESS_OUTGOING_CALLS" 662 android:permissionGroup="android.permission-group.PHONE" 663 android:label="@string/permlab_processOutgoingCalls" 664 android:description="@string/permdesc_processOutgoingCalls" 665 android:protectionLevel="dangerous" /> 666 667 <!-- ====================================================================== --> 668 <!-- Permissions for accessing the device microphone --> 669 <!-- ====================================================================== --> 670 <eat-comment /> 671 672 <!-- Used for permissions that are associated with accessing 673 microphone audio from the device. Note that phone calls also capture audio 674 but are in a separate (more visible) permission group. --> 675 <permission-group android:name="android.permission-group.MICROPHONE" 676 android:icon="@drawable/perm_group_microphone" 677 android:label="@string/permgrouplab_microphone" 678 android:description="@string/permgroupdesc_microphone" 679 android:priority="600" /> 680 681 <!-- Allows an application to record audio. --> 682 <permission android:name="android.permission.RECORD_AUDIO" 683 android:permissionGroup="android.permission-group.MICROPHONE" 684 android:label="@string/permlab_recordAudio" 685 android:description="@string/permdesc_recordAudio" 686 android:protectionLevel="dangerous"/> 687 688 <!-- ====================================================================== --> 689 <!-- Permissions for accessing the device camera --> 690 <!-- ====================================================================== --> 691 <eat-comment /> 692 693 <!-- Used for permissions that are associated with accessing 694 camera or capturing images/video from the device. --> 695 <permission-group android:name="android.permission-group.CAMERA" 696 android:icon="@drawable/perm_group_camera" 697 android:label="@string/permgrouplab_camera" 698 android:description="@string/permgroupdesc_camera" 699 android:priority="700" /> 700 701 <!-- Required to be able to access the camera device. 702 <p>This will automatically enforce the <a 703 href="{@docRoot}guide/topics/manifest/uses-feature-element.html">{@code 704 <uses-feature>}</a> manifest element for <em>all</em> camera features. 705 If you do not require all camera features or can properly operate if a camera 706 is not available, then you must modify your manifest as appropriate in order to 707 install on devices that don't support all camera features.</p> --> 708 <permission android:name="android.permission.CAMERA" 709 android:permissionGroup="android.permission-group.CAMERA" 710 android:label="@string/permlab_camera" 711 android:description="@string/permdesc_camera" 712 android:protectionLevel="dangerous" /> 713 714 715 <!-- ====================================================================== --> 716 <!-- Permissions for accessing the device sensors --> 717 <!-- ====================================================================== --> 718 <eat-comment /> 719 720 <!-- Used for permissions that are associated with accessing 721 camera or capturing images/video from the device. --> 722 <permission-group android:name="android.permission-group.SENSORS" 723 android:label="@string/permgrouplab_sensors" 724 android:description="@string/permgroupdesc_sensors" 725 android:priority="800" /> 726 727 <!-- Allows an application to access data from sensors that the user uses to 728 measure what is happening inside his/her body, such as heart rate. --> 729 <permission android:name="android.permission.BODY_SENSORS" 730 android:permissionGroup="android.permission-group.SENSORS" 731 android:label="@string/permlab_bodySensors" 732 android:description="@string/permdesc_bodySensors" 733 android:protectionLevel="dangerous" /> 734 735 <!-- Allows an app to use fingerprint hardware. --> 736 <permission android:name="android.permission.USE_FINGERPRINT" 737 android:permissionGroup="android.permission-group.SENSORS" 738 android:label="@string/permlab_useFingerprint" 739 android:description="@string/permdesc_useFingerprint" 740 android:protectionLevel="normal" /> 741 742 <!-- ====================================================================== --> 743 <!-- INSTALLTIME PERMISSIONS --> 744 <!-- ====================================================================== --> 745 746 <!-- ================================== --> 747 <!-- Permissions for accessing messages --> 748 <!-- ================================== --> 749 <eat-comment /> 750 751 <!-- @SystemApi Allows an application (Phone) to send a request to other applications 752 to handle the respond-via-message action during incoming calls. 753 <p>Not for use by third-party applications. --> 754 <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE" 755 android:protectionLevel="signature|system" /> 756 757 <!-- Allows an application to filter carrier specific sms. 758 @hide --> 759 <permission android:name="android.permission.CARRIER_FILTER_SMS" 760 android:protectionLevel="signature|system" /> 761 762 <!-- @SystemApi Allows an application to receive emergency cell broadcast messages, 763 to record or display them to the user. 764 <p>Not for use by third-party applications. 765 @hide Pending API council approval --> 766 <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST" 767 android:protectionLevel="signature|system" /> 768 769 <!-- Allows an application to monitor incoming Bluetooth MAP messages, to record 770 or perform processing on them. --> 771 <!-- @hide --> 772 <permission android:name="android.permission.RECEIVE_BLUETOOTH_MAP" 773 android:protectionLevel="signature|system" /> 774 775 <!-- @SystemApi @hide Allows an application to execute contacts directory search. 776 This should only be used by ContactsProvider. 777 <p>Not for use by third-party applications. --> 778 <permission android:name="android.permission.BIND_DIRECTORY_SEARCH" 779 android:protectionLevel="signature|system" /> 780 781 <!-- =============================================================== --> 782 <!-- Permissions for accessing the user dictionary--> 783 <!-- =============================================================== --> 784 <eat-comment /> 785 786 <!-- Used for permissions that provide access to the user 787 calendar to create / view events.--> 788 <permission-group android:name="android.permission-group.USER_DICTIONARY" 789 android:label="@string/permgrouplab_dictionary" 790 android:icon="@drawable/perm_group_user_dictionary" 791 android:description="@string/permgroupdesc_dictionary" 792 android:permissionGroupFlags="personalInfo" 793 android:priority="1100" /> 794 795 <!-- Allows an application to read the user dictionary. This should 796 really only be required by an IME, or a dictionary editor like 797 the Settings app. --> 798 <permission android:name="android.permission.READ_USER_DICTIONARY" 799 android:permissionGroup="android.permission-group.USER_DICTIONARY" 800 android:label="@string/permlab_readDictionary" 801 android:description="@string/permdesc_readDictionary" 802 android:protectionLevel="dangerous"/> 803 804 <!-- Allows an application to write to the user dictionary. --> 805 <permission android:name="android.permission.WRITE_USER_DICTIONARY" 806 android:permissionGroup="android.permission-group.USER_DICTIONARY" 807 android:label="@string/permlab_writeDictionary" 808 android:description="@string/permdesc_writeDictionary" 809 android:protectionLevel="normal"/> 810 811 <!-- =============================================================== --> 812 <!-- Permissions for setting the device alarm --> 813 <!-- =============================================================== --> 814 <eat-comment /> 815 816 <!-- Allows an application to broadcast an Intent to set an alarm for the user. --> 817 <permission android:name="com.android.alarm.permission.SET_ALARM" 818 android:label="@string/permlab_setAlarm" 819 android:description="@string/permdesc_setAlarm" 820 android:protectionLevel="normal" /> 821 822 <!-- =============================================================== --> 823 <!-- Permissions for accessing the user voicemail --> 824 <!-- =============================================================== --> 825 <eat-comment /> 826 827 <!-- Allows an application to modify and remove existing voicemails in the system --> 828 <permission android:name="com.android.voicemail.permission.WRITE_VOICEMAIL" 829 android:protectionLevel="system|signature" /> 830 831 <!-- Allows an application to read voicemails in the system. --> 832 <permission android:name="com.android.voicemail.permission.READ_VOICEMAIL" 833 android:protectionLevel="system|signature" /> 834 835 <!-- ======================================= --> 836 <!-- Permissions for accessing location info --> 837 <!-- ======================================= --> 838 <eat-comment /> 839 840 <!-- Allows an application to access extra location provider commands --> 841 <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS" 842 android:label="@string/permlab_accessLocationExtraCommands" 843 android:description="@string/permdesc_accessLocationExtraCommands" 844 android:protectionLevel="normal" /> 845 846 <!-- @SystemApi Allows an application to install a location provider into the Location Manager. 847 <p>Not for use by third-party applications. --> 848 <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER" 849 android:protectionLevel="signature|system" /> 850 851 <!-- @SystemApi @hide Allows HDMI-CEC service to access device and configuration files. 852 This should only be used by HDMI-CEC service. 853 --> 854 <permission android:name="android.permission.HDMI_CEC" 855 android:protectionLevel="signatureOrSystem" /> 856 857 <!-- @SystemApi Allows an application to use location features in hardware, 858 such as the geofencing api. 859 <p>Not for use by third-party applications. --> 860 <permission android:name="android.permission.LOCATION_HARDWARE" 861 android:protectionLevel="signature|system" /> 862 <uses-permission android:name="android.permission.LOCATION_HARDWARE"/> 863 864 <!-- Allows an application to create mock location providers for testing. --> 865 <permission android:name="android.permission.ACCESS_MOCK_LOCATION" 866 android:protectionLevel="signature" /> 867 868 <!-- ======================================= --> 869 <!-- Permissions for accessing networks --> 870 <!-- ======================================= --> 871 <eat-comment /> 872 873 <!-- Allows applications to open network sockets. --> 874 <permission android:name="android.permission.INTERNET" 875 android:description="@string/permdesc_createNetworkSockets" 876 android:label="@string/permlab_createNetworkSockets" 877 android:protectionLevel="normal" /> 878 879 <!-- Allows applications to access information about networks --> 880 <permission android:name="android.permission.ACCESS_NETWORK_STATE" 881 android:description="@string/permdesc_accessNetworkState" 882 android:label="@string/permlab_accessNetworkState" 883 android:protectionLevel="normal" /> 884 885 <!-- Allows applications to access information about Wi-Fi networks --> 886 <permission android:name="android.permission.ACCESS_WIFI_STATE" 887 android:description="@string/permdesc_accessWifiState" 888 android:label="@string/permlab_accessWifiState" 889 android:protectionLevel="normal" /> 890 891 <!-- Allows applications to change Wi-Fi connectivity state --> 892 <permission android:name="android.permission.CHANGE_WIFI_STATE" 893 android:description="@string/permdesc_changeWifiState" 894 android:label="@string/permlab_changeWifiState" 895 android:protectionLevel="normal" /> 896 897 <!-- @SystemApi @hide Allows applications to read Wi-Fi credential. 898 <p>Not for use by third-party applications. --> 899 <permission android:name="android.permission.READ_WIFI_CREDENTIAL" 900 android:protectionLevel="signature|system" /> 901 902 <!-- @SystemApi @hide Allow system apps to receive broadcast 903 when a wifi network credential is changed. 904 <p>Not for use by third-party applications. --> 905 <permission android:name="android.permission.RECEIVE_WIFI_CREDENTIAL_CHANGE" 906 android:protectionLevel="signature|system" /> 907 908 <!-- @SystemApi @hide Allows an application to modify any wifi configuration, even if created 909 by another application. Once reconfigured the original creator cannot make any further 910 modifications. 911 <p>Not for use by third-party applications. --> 912 <permission android:name="android.permission.OVERRIDE_WIFI_CONFIG" 913 android:protectionLevel="signature|system" /> 914 915 <!-- @hide --> 916 <permission android:name="android.permission.ACCESS_WIMAX_STATE" 917 android:description="@string/permdesc_accessWimaxState" 918 android:label="@string/permlab_accessWimaxState" 919 android:protectionLevel="normal" /> 920 921 <!-- @hide --> 922 <permission android:name="android.permission.CHANGE_WIMAX_STATE" 923 android:description="@string/permdesc_changeWimaxState" 924 android:label="@string/permlab_changeWimaxState" 925 android:protectionLevel="normal" /> 926 927 <!--@SystemApi Allows applications to the the local WiFi and Bluetooth MAC address. 928 @hide 929 --> 930 <permission android:name="android.permission.SCORE_NETWORKS" 931 android:protectionLevel="signature|system" /> 932 933 <!-- ======================================= --> 934 <!-- Permissions for short range, peripheral networks --> 935 <!-- ======================================= --> 936 <eat-comment /> 937 938 <!-- Allows applications to connect to paired bluetooth devices --> 939 <permission android:name="android.permission.BLUETOOTH" 940 android:description="@string/permdesc_bluetooth" 941 android:label="@string/permlab_bluetooth" 942 android:protectionLevel="normal" /> 943 944 <!-- Allows applications to discover and pair bluetooth devices --> 945 <permission android:name="android.permission.BLUETOOTH_ADMIN" 946 android:description="@string/permdesc_bluetoothAdmin" 947 android:label="@string/permlab_bluetoothAdmin" 948 android:protectionLevel="normal" /> 949 950 <!-- @SystemApi Allows applications to pair bluetooth devices without user interaction, and to 951 allow or disallow phonebook access or message access. 952 This is not available to third party applications. --> 953 <permission android:name="android.permission.BLUETOOTH_PRIVILEGED" 954 android:protectionLevel="system|signature" /> 955 956 <!-- Control access to email providers exclusively for Bluetooth 957 @hide 958 --> 959 <permission android:name="android.permission.BLUETOOTH_MAP" 960 android:protectionLevel="signature" /> 961 962 <!-- Allows bluetooth stack to access files 963 @hide This should only be used by Bluetooth apk. 964 --> 965 <permission android:name="android.permission.BLUETOOTH_STACK" 966 android:protectionLevel="signature" /> 967 968 <!-- Allows applications to perform I/O operations over NFC --> 969 <permission android:name="android.permission.NFC" 970 android:description="@string/permdesc_nfc" 971 android:label="@string/permlab_nfc" 972 android:protectionLevel="normal" /> 973 974 <!-- @SystemApi Allows an internal user to use privileged ConnectivityManager APIs. 975 @hide --> 976 <permission android:name="android.permission.CONNECTIVITY_INTERNAL" 977 android:protectionLevel="signature|system" /> 978 979 <!-- @SystemApi 980 @hide --> 981 <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE" 982 android:protectionLevel="signature|system" /> 983 984 <!-- @SystemApi Allows access to the loop radio (Android@Home mesh network) device. 985 @hide --> 986 <permission android:name="android.permission.LOOP_RADIO" 987 android:protectionLevel="signature|system" /> 988 989 <!-- Allows sending and receiving handover transfer status from Wifi and Bluetooth 990 @hide --> 991 <permission android:name="android.permission.NFC_HANDOVER_STATUS" 992 android:protectionLevel="signature|system" /> 993 994 <!-- ================================== --> 995 <!-- Permissions for accessing accounts --> 996 <!-- ================================== --> 997 <eat-comment /> 998 999 <!-- Permissions for direct access to the accounts managed 1000 by the Account Manager. --> 1001 <permission-group android:name="android.permission-group.ACCOUNTS" 1002 android:label="@string/permgrouplab_accounts" 1003 android:icon="@drawable/perm_group_accounts" 1004 android:description="@string/permgroupdesc_accounts" 1005 android:permissionGroupFlags="personalInfo" 1006 android:priority="1000" /> 1007 1008 <!-- Allows access to the list of accounts in the Accounts Service --> 1009 <permission android:name="android.permission.GET_ACCOUNTS" 1010 android:permissionGroup="android.permission-group.CONTACTS" 1011 android:protectionLevel="normal" 1012 android:description="@string/permdesc_getAccounts" 1013 android:label="@string/permlab_getAccounts" /> 1014 1015 <!-- @SystemApi Allows applications to call into AccountAuthenticators. 1016 <p>Not for use by third-party applications. --> 1017 <permission android:name="android.permission.ACCOUNT_MANAGER" 1018 android:permissionGroup="android.permission-group.ACCOUNTS" 1019 android:protectionLevel="signature" /> 1020 1021 <!-- ================================== --> 1022 <!-- Permissions for accessing hardware that may effect battery life--> 1023 <!-- ================================== --> 1024 <eat-comment /> 1025 1026 <!-- Allows applications to enter Wi-Fi Multicast mode --> 1027 <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE" 1028 android:description="@string/permdesc_changeWifiMulticastState" 1029 android:label="@string/permlab_changeWifiMulticastState" 1030 android:protectionLevel="normal" /> 1031 1032 <!-- Allows access to the vibrator --> 1033 <permission android:name="android.permission.VIBRATE" 1034 android:label="@string/permlab_vibrate" 1035 android:description="@string/permdesc_vibrate" 1036 android:protectionLevel="normal" /> 1037 1038 <!-- Allows access to the flashlight --> 1039 <permission android:name="android.permission.FLASHLIGHT" 1040 android:label="@string/permlab_flashlight" 1041 android:description="@string/permdesc_flashlight" 1042 android:protectionLevel="normal" /> 1043 1044 <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen 1045 from dimming --> 1046 <permission android:name="android.permission.WAKE_LOCK" 1047 android:label="@string/permlab_wakeLock" 1048 android:description="@string/permdesc_wakeLock" 1049 android:protectionLevel="normal" /> 1050 1051 <!-- Allows using the device's IR transmitter, if available --> 1052 <permission android:name="android.permission.TRANSMIT_IR" 1053 android:label="@string/permlab_transmitIr" 1054 android:description="@string/permdesc_transmitIr" 1055 android:protectionLevel="normal" /> 1056 1057 <!-- ==================================================== --> 1058 <!-- Permissions related to changing audio settings --> 1059 <!-- ==================================================== --> 1060 <eat-comment /> 1061 1062 <!-- Allows an application to modify global audio settings --> 1063 <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS" 1064 android:label="@string/permlab_modifyAudioSettings" 1065 android:description="@string/permdesc_modifyAudioSettings" 1066 android:protectionLevel="normal" /> 1067 1068 <!-- ================================== --> 1069 <!-- Permissions for accessing hardware --> 1070 <!-- ================================== --> 1071 <eat-comment /> 1072 1073 <!-- @SystemApi Allows an application to manage preferences and permissions for USB devices 1074 @hide --> 1075 <permission android:name="android.permission.MANAGE_USB" 1076 android:protectionLevel="signature|system" /> 1077 1078 <!-- @SystemApi Allows an application to access the MTP USB kernel driver. 1079 For use only by the device side MTP implementation. 1080 @hide --> 1081 <permission android:name="android.permission.ACCESS_MTP" 1082 android:protectionLevel="signature|system" /> 1083 1084 <!-- Allows access to hardware peripherals. Intended only for hardware testing. 1085 <p>Not for use by third-party applications. --> 1086 <permission android:name="android.permission.HARDWARE_TEST" 1087 android:protectionLevel="signature" /> 1088 1089 <!-- @SystemApi Allows access to FM 1090 @hide This is not a third-party API (intended for system apps).--> 1091 <permission android:name="android.permission.ACCESS_FM_RADIO" 1092 android:protectionLevel="signature|system" /> 1093 1094 <!-- Allows access to configure network interfaces, configure/use IPSec, etc. 1095 @hide --> 1096 <permission android:name="android.permission.NET_ADMIN" 1097 android:protectionLevel="signature" /> 1098 1099 <!-- Allows registration for remote audio playback. @hide --> 1100 <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK" 1101 android:protectionLevel="signature" /> 1102 1103 <!-- @SystemApi Allows TvInputService to access underlying TV input hardware such as 1104 built-in tuners and HDMI-in's. 1105 @hide This should only be used by OEM's TvInputService's. 1106 --> 1107 <permission android:name="android.permission.TV_INPUT_HARDWARE" 1108 android:protectionLevel="signatureOrSystem" /> 1109 1110 <!-- @SystemApi Allows to capture a frame of TV input hardware such as 1111 built-in tuners and HDMI-in's. 1112 @hide <p>Not for use by third-party applications. 1113 --> 1114 <permission android:name="android.permission.CAPTURE_TV_INPUT" 1115 android:protectionLevel="signatureOrSystem" /> 1116 1117 <!-- @hide Allows TvInputService to access DVB device. 1118 <p>Not for use by third-party applications. --> 1119 <permission android:name="android.permission.DVB_DEVICE" 1120 android:protectionLevel="signatureOrSystem" /> 1121 1122 <!-- @hide Allows enabling/disabling OEM unlock 1123 <p>Not for use by third-party applications. --> 1124 <permission android:name="android.permission.OEM_UNLOCK_STATE" 1125 android:protectionLevel="signature" /> 1126 1127 <!-- @hide Allows querying state of PersistentDataBlock 1128 <p>Not for use by third-party applications. --> 1129 <permission android:name="android.permission.ACCESS_PDB_STATE" 1130 android:protectionLevel="signature" /> 1131 1132 <!-- @hide Allows system update service to notify device owner about pending updates. 1133 <p>Not for use by third-party applications. --> 1134 <permission android:name="android.permission.NOTIFY_PENDING_SYSTEM_UPDATE" 1135 android:protectionLevel="signatureOrSystem" /> 1136 1137 <!-- =========================================== --> 1138 <!-- Permissions associated with camera and image capture --> 1139 <!-- =========================================== --> 1140 <eat-comment /> 1141 1142 <!-- @SystemApi Allows disabling the transmit-indicator LED that is normally on when 1143 a camera is in use by an application. 1144 @hide --> 1145 <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED" 1146 android:protectionLevel="signature|system" /> 1147 1148 <!-- Allows sending the camera service notifications about system-wide events. 1149 @hide --> 1150 <permission android:name="android.permission.CAMERA_SEND_SYSTEM_EVENTS" 1151 android:protectionLevel="signature|system" /> 1152 1153 <!-- =========================================== --> 1154 <!-- Permissions associated with telephony state --> 1155 <!-- =========================================== --> 1156 <eat-comment /> 1157 1158 <!-- @SystemApi Allows modification of the telephony state - power on, mmi, etc. 1159 Does not include placing calls. 1160 <p>Not for use by third-party applications. --> 1161 <permission android:name="android.permission.MODIFY_PHONE_STATE" 1162 android:protectionLevel="signature|system" /> 1163 1164 <!-- Allows read only access to precise phone state. 1165 @hide Pending API council approval --> 1166 <permission android:name="android.permission.READ_PRECISE_PHONE_STATE" 1167 android:protectionLevel="signature|system" /> 1168 1169 <!-- @SystemApi Allows read access to privileged phone state. 1170 @hide Used internally. --> 1171 <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE" 1172 android:protectionLevel="signature|system" /> 1173 1174 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1175 PhoneAccount#CAPABILITY_SIM_SUBSCRIPTION. This capability indicates that the PhoneAccount 1176 corresponds to a device SIM. 1177 @hide --> 1178 <permission android:name="android.permission.REGISTER_SIM_SUBSCRIPTION" 1179 android:protectionLevel="system|signature" /> 1180 1181 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1182 PhoneAccount#CAPABILITY_CALL_PROVIDER. 1183 @hide --> 1184 <permission android:name="android.permission.REGISTER_CALL_PROVIDER" 1185 android:protectionLevel="system|signature" /> 1186 1187 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1188 PhoneAccount#CAPABILITY_CONNECTION_MANAGER 1189 @hide --> 1190 <permission android:name="android.permission.REGISTER_CONNECTION_MANAGER" 1191 android:protectionLevel="system|signature" /> 1192 1193 <!-- Must be required by a {@link android.telecom.InCallService}, 1194 to ensure that only the system can bind to it. --> 1195 <permission android:name="android.permission.BIND_INCALL_SERVICE" 1196 android:protectionLevel="system|signature" /> 1197 1198 <!-- Must be required by a {@link android.telecom.ConnectionService}, 1199 to ensure that only the system can bind to it. 1200 @deprecated {@link android.telecom.ConnectionService}s should require 1201 android.permission.BIND_TELECOM_CONNECTION_SERVICE instead. 1202 @SystemApi 1203 @hide --> 1204 <permission android:name="android.permission.BIND_CONNECTION_SERVICE" 1205 android:protectionLevel="system|signature" /> 1206 1207 <!-- Must be required by a {@link android.telecom.ConnectionService}, 1208 to ensure that only the system can bind to it. --> 1209 <permission android:name="android.permission.BIND_TELECOM_CONNECTION_SERVICE" 1210 android:protectionLevel="system|signature" /> 1211 1212 <!-- @SystemApi Allows an application to control the in-call experience. 1213 @hide --> 1214 <permission android:name="android.permission.CONTROL_INCALL_EXPERIENCE" 1215 android:protectionLevel="system|signature" /> 1216 1217 <!-- Allows an application to receive STK related commands. 1218 @hide --> 1219 <permission android:name="android.permission.RECEIVE_STK_COMMANDS" 1220 android:protectionLevel="system|signature" /> 1221 1222 <!-- ================================== --> 1223 <!-- Permissions for sdcard interaction --> 1224 <!-- ================================== --> 1225 <eat-comment /> 1226 1227 <!-- @SystemApi Allows an application to write to internal media storage 1228 @hide --> 1229 <permission android:name="android.permission.WRITE_MEDIA_STORAGE" 1230 android:protectionLevel="signature|system" /> 1231 1232 <!-- Allows an application to manage access to documents, usually as part 1233 of a document picker. --> 1234 <permission android:name="android.permission.MANAGE_DOCUMENTS" 1235 android:protectionLevel="signature" /> 1236 1237 <!-- ================================== --> 1238 <!-- Permissions for screenlock --> 1239 <!-- ================================== --> 1240 <eat-comment /> 1241 1242 <!-- Allows applications to disable the keyguard if it is not secure. --> 1243 <permission android:name="android.permission.DISABLE_KEYGUARD" 1244 android:description="@string/permdesc_disableKeyguard" 1245 android:label="@string/permlab_disableKeyguard" 1246 android:protectionLevel="normal" /> 1247 1248 <!-- ================================== --> 1249 <!-- Permissions to access other installed applications --> 1250 <!-- ================================== --> 1251 <eat-comment /> 1252 1253 <!-- @deprecated No longer enforced. --> 1254 <permission android:name="android.permission.GET_TASKS" 1255 android:label="@string/permlab_getTasks" 1256 android:description="@string/permdesc_getTasks" 1257 android:protectionLevel="normal" /> 1258 1259 <!-- New version of GET_TASKS that apps can request, since GET_TASKS doesn't really 1260 give access to task information. We need this new one because there are 1261 many existing apps that use add libraries and such that have validation 1262 code to ensure the app has requested the GET_TASKS permission by seeing 1263 if it has been granted the permission... if it hasn't, it kills the app 1264 with a message about being upset. So we need to have it continue to look 1265 like the app is getting that permission, even though it will never be 1266 checked, and new privileged apps can now request this one for real access. 1267 @hide 1268 @SystemApi --> 1269 <permission android:name="android.permission.REAL_GET_TASKS" 1270 android:protectionLevel="signature|system" /> 1271 1272 <!-- Allows an application to start a task from a ActivityManager#RecentTaskInfo. 1273 @hide --> 1274 <permission android:name="android.permission.START_TASKS_FROM_RECENTS" 1275 android:protectionLevel="signature|system" /> 1276 1277 <!-- @SystemApi @hide Allows an application to call APIs that allow it to do interactions 1278 across the users on the device, using singleton services and 1279 user-targeted broadcasts. This permission is not available to 1280 third party applications. --> 1281 <permission android:name="android.permission.INTERACT_ACROSS_USERS" 1282 android:protectionLevel="signature|system|development" /> 1283 1284 <!-- @hide Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS} 1285 that removes restrictions on where broadcasts can be sent and allows other 1286 types of interactions. --> 1287 <permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL" 1288 android:protectionLevel="signature" /> 1289 1290 <!-- @SystemApi @hide Allows an application to call APIs that allow it to query and manage 1291 users on the device. This permission is not available to 1292 third party applications. --> 1293 <permission android:name="android.permission.MANAGE_USERS" 1294 android:protectionLevel="signature|system" /> 1295 1296 <!-- @hide Allows an application to set the profile owners and the device owner. 1297 This permission is not available to third party applications.--> 1298 <permission android:name="android.permission.MANAGE_PROFILE_AND_DEVICE_OWNERS" 1299 android:protectionLevel="signature" 1300 android:label="@string/permlab_manageProfileAndDeviceOwners" 1301 android:description="@string/permdesc_manageProfileAndDeviceOwners" /> 1302 1303 <!-- Allows an application to get full detailed information about 1304 recently running tasks, with full fidelity to the real state. 1305 @hide --> 1306 <permission android:name="android.permission.GET_DETAILED_TASKS" 1307 android:protectionLevel="signature" /> 1308 1309 <!-- Allows an application to change the Z-order of tasks --> 1310 <permission android:name="android.permission.REORDER_TASKS" 1311 android:label="@string/permlab_reorderTasks" 1312 android:description="@string/permdesc_reorderTasks" 1313 android:protectionLevel="normal" /> 1314 1315 <!-- @hide Allows an application to change to remove/kill tasks --> 1316 <permission android:name="android.permission.REMOVE_TASKS" 1317 android:protectionLevel="signature" /> 1318 1319 <!-- @SystemApi @hide Allows an application to create/manage/remove stacks --> 1320 <permission android:name="android.permission.MANAGE_ACTIVITY_STACKS" 1321 android:protectionLevel="signature|system" /> 1322 1323 <!-- Allows an application to start any activity, regardless of permission 1324 protection or exported state. 1325 @hide --> 1326 <permission android:name="android.permission.START_ANY_ACTIVITY" 1327 android:protectionLevel="signature" /> 1328 1329 <!-- @deprecated The {@link android.app.ActivityManager#restartPackage} 1330 API is no longer supported. --> 1331 <permission android:name="android.permission.RESTART_PACKAGES" 1332 android:label="@string/permlab_killBackgroundProcesses" 1333 android:description="@string/permdesc_killBackgroundProcesses" 1334 android:protectionLevel="normal" /> 1335 1336 <!-- Allows an application to call 1337 {@link android.app.ActivityManager#killBackgroundProcesses}. --> 1338 <permission android:name="android.permission.KILL_BACKGROUND_PROCESSES" 1339 android:label="@string/permlab_killBackgroundProcesses" 1340 android:description="@string/permdesc_killBackgroundProcesses" 1341 android:protectionLevel="normal" /> 1342 1343 <!-- ================================== --> 1344 <!-- Permissions affecting the display of other applications --> 1345 <!-- ================================== --> 1346 <eat-comment /> 1347 1348 <!-- Allows an application to open windows using the type 1349 {@link android.view.WindowManager.LayoutParams#TYPE_SYSTEM_ALERT}, 1350 shown on top of all other applications. Very few applications 1351 should use this permission; these windows are intended for 1352 system-level interaction with the user. --> 1353 <permission android:name="android.permission.SYSTEM_ALERT_WINDOW" 1354 android:label="@string/permlab_systemAlertWindow" 1355 android:description="@string/permdesc_systemAlertWindow" 1356 android:protectionLevel="dangerous" /> 1357 1358 <!-- ================================== --> 1359 <!-- Permissions affecting the system wallpaper --> 1360 <!-- ================================== --> 1361 <eat-comment /> 1362 1363 <!-- Allows applications to set the wallpaper --> 1364 <permission android:name="android.permission.SET_WALLPAPER" 1365 android:label="@string/permlab_setWallpaper" 1366 android:description="@string/permdesc_setWallpaper" 1367 android:protectionLevel="normal" /> 1368 1369 <!-- Allows applications to set the wallpaper hints --> 1370 <permission android:name="android.permission.SET_WALLPAPER_HINTS" 1371 android:label="@string/permlab_setWallpaperHints" 1372 android:description="@string/permdesc_setWallpaperHints" 1373 android:protectionLevel="normal" /> 1374 1375 <!-- ============================================ --> 1376 <!-- Permissions for changing the system clock --> 1377 <!-- ============================================ --> 1378 <eat-comment /> 1379 1380 <!-- @SystemApi Allows applications to set the system time. 1381 <p>Not for use by third-party applications. --> 1382 <permission android:name="android.permission.SET_TIME" 1383 android:protectionLevel="signature|system" /> 1384 1385 <!-- Allows applications to set the system time zone --> 1386 <permission android:name="android.permission.SET_TIME_ZONE" 1387 android:label="@string/permlab_setTimeZone" 1388 android:description="@string/permdesc_setTimeZone" 1389 android:protectionLevel="normal" /> 1390 1391 <!-- ==================================================== --> 1392 <!-- Permissions related to changing status bar --> 1393 <!-- ==================================================== --> 1394 <eat-comment /> 1395 1396 <!-- Allows an application to expand or collapse the status bar. --> 1397 <permission android:name="android.permission.EXPAND_STATUS_BAR" 1398 android:label="@string/permlab_expandStatusBar" 1399 android:description="@string/permdesc_expandStatusBar" 1400 android:protectionLevel="normal" /> 1401 1402 <!-- ============================================================== --> 1403 <!-- Permissions related to adding/removing shortcuts from Launcher --> 1404 <!-- ============================================================== --> 1405 <eat-comment /> 1406 1407 <!-- Allows an application to install a shortcut in Launcher --> 1408 <permission android:name="com.android.launcher.permission.INSTALL_SHORTCUT" 1409 android:label="@string/permlab_install_shortcut" 1410 android:description="@string/permdesc_install_shortcut" 1411 android:protectionLevel="dangerous"/> 1412 1413 <!-- Allows an application to uninstall a shortcut in Launcher --> 1414 <permission android:name="com.android.launcher.permission.UNINSTALL_SHORTCUT" 1415 android:label="@string/permlab_uninstall_shortcut" 1416 android:description="@string/permdesc_uninstall_shortcut" 1417 android:protectionLevel="dangerous"/> 1418 1419 <!-- ==================================================== --> 1420 <!-- Permissions related to accessing sync settings --> 1421 <!-- ==================================================== --> 1422 <eat-comment /> 1423 1424 <!-- Allows applications to read the sync settings --> 1425 <permission android:name="android.permission.READ_SYNC_SETTINGS" 1426 android:description="@string/permdesc_readSyncSettings" 1427 android:label="@string/permlab_readSyncSettings" 1428 android:protectionLevel="normal" /> 1429 1430 <!-- Allows applications to write the sync settings --> 1431 <permission android:name="android.permission.WRITE_SYNC_SETTINGS" 1432 android:description="@string/permdesc_writeSyncSettings" 1433 android:label="@string/permlab_writeSyncSettings" 1434 android:protectionLevel="normal" /> 1435 1436 <!-- Allows applications to read the sync stats --> 1437 <permission android:name="android.permission.READ_SYNC_STATS" 1438 android:description="@string/permdesc_readSyncStats" 1439 android:label="@string/permlab_readSyncStats" 1440 android:protectionLevel="normal" /> 1441 1442 <!-- ============================================ --> 1443 <!-- Permissions for low-level system interaction --> 1444 <!-- ============================================ --> 1445 <eat-comment /> 1446 1447 <!-- @SystemApi @hide Change the screen compatibility mode of applications --> 1448 <permission android:name="android.permission.SET_SCREEN_COMPATIBILITY" 1449 android:protectionLevel="signature" /> 1450 1451 <!-- Allows an application to access all multi-user external storage @hide --> 1452 <permission android:name="android.permission.ACCESS_ALL_EXTERNAL_STORAGE" 1453 android:protectionLevel="signature" /> 1454 1455 <!-- @SystemApi Allows an application to modify the current configuration, such 1456 as locale. --> 1457 <permission android:name="android.permission.CHANGE_CONFIGURATION" 1458 android:protectionLevel="signature|system|development" /> 1459 1460 <!-- Allows an application to read or write the system settings. --> 1461 <permission android:name="android.permission.WRITE_SETTINGS" 1462 android:label="@string/permlab_writeSettings" 1463 android:description="@string/permdesc_writeSettings" 1464 android:protectionLevel="dangerous" /> 1465 1466 <!-- @SystemApi Allows an application to modify the Google service map. 1467 <p>Not for use by third-party applications. --> 1468 <permission android:name="android.permission.WRITE_GSERVICES" 1469 android:protectionLevel="signature|system" /> 1470 1471 <!-- @SystemApi Allows an application to call 1472 {@link android.app.ActivityManager#forceStopPackage}. 1473 @hide --> 1474 <permission android:name="android.permission.FORCE_STOP_PACKAGES" 1475 android:protectionLevel="signature|system" /> 1476 1477 <!-- @SystemApi @hide Allows an application to retrieve the content of the active window 1478 An active window is the window that has fired an accessibility event. --> 1479 <permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT" 1480 android:protectionLevel="signature|system" /> 1481 1482 <!-- @SystemApi Modify the global animation scaling factor. 1483 <p>Not for use by third-party applications. --> 1484 <permission android:name="android.permission.SET_ANIMATION_SCALE" 1485 android:protectionLevel="signature|system|development" /> 1486 1487 <!-- @deprecated This functionality will be removed in the future; please do 1488 not use. Allow an application to make its activities persistent. --> 1489 <permission android:name="android.permission.PERSISTENT_ACTIVITY" 1490 android:label="@string/permlab_persistentActivity" 1491 android:description="@string/permdesc_persistentActivity" 1492 android:protectionLevel="normal" /> 1493 1494 <!-- Allows an application to find out the space used by any package. --> 1495 <permission android:name="android.permission.GET_PACKAGE_SIZE" 1496 android:label="@string/permlab_getPackageSize" 1497 android:description="@string/permdesc_getPackageSize" 1498 android:protectionLevel="normal" /> 1499 1500 <!-- @deprecated No longer useful, see 1501 {@link android.content.pm.PackageManager#addPackageToPreferred} 1502 for details. --> 1503 <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS" 1504 android:protectionLevel="signature" /> 1505 1506 <!-- Allows an application to receive the 1507 {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is 1508 broadcast after the system finishes booting. If you don't 1509 request this permission, you will not receive the broadcast at 1510 that time. Though holding this permission does not have any 1511 security implications, it can have a negative impact on the 1512 user experience by increasing the amount of time it takes the 1513 system to start and allowing applications to have themselves 1514 running without the user being aware of them. As such, you must 1515 explicitly declare your use of this facility to make that visible 1516 to the user. --> 1517 <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED" 1518 android:label="@string/permlab_receiveBootCompleted" 1519 android:description="@string/permdesc_receiveBootCompleted" 1520 android:protectionLevel="normal" /> 1521 1522 <!-- Allows an application to broadcast sticky intents. These are 1523 broadcasts whose data is held by the system after being finished, 1524 so that clients can quickly retrieve that data without having 1525 to wait for the next broadcast. --> 1526 <permission android:name="android.permission.BROADCAST_STICKY" 1527 android:label="@string/permlab_broadcastSticky" 1528 android:description="@string/permdesc_broadcastSticky" 1529 android:protectionLevel="normal" /> 1530 1531 <!-- @SystemApi Allows mounting and unmounting file systems for removable storage. 1532 <p>Not for use by third-party applications.--> 1533 <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS" 1534 android:protectionLevel="system|signature" /> 1535 1536 <!-- @SystemApi Allows formatting file systems for removable storage. 1537 <p>Not for use by third-party applications. --> 1538 <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS" 1539 android:protectionLevel="system|signature" /> 1540 1541 <!-- Allows access to ASEC non-destructive API calls 1542 @hide --> 1543 <permission android:name="android.permission.ASEC_ACCESS" 1544 android:protectionLevel="signature" /> 1545 1546 <!-- Allows creation of ASEC volumes 1547 @hide --> 1548 <permission android:name="android.permission.ASEC_CREATE" 1549 android:protectionLevel="signature" /> 1550 1551 <!-- Allows destruction of ASEC volumes 1552 @hide --> 1553 <permission android:name="android.permission.ASEC_DESTROY" 1554 android:protectionLevel="signature" /> 1555 1556 <!-- Allows mount / unmount of ASEC volumes 1557 @hide --> 1558 <permission android:name="android.permission.ASEC_MOUNT_UNMOUNT" 1559 android:protectionLevel="signature" /> 1560 1561 <!-- Allows rename of ASEC volumes 1562 @hide --> 1563 <permission android:name="android.permission.ASEC_RENAME" 1564 android:protectionLevel="signature" /> 1565 1566 <!-- @SystemApi Allows applications to write the apn settings. 1567 <p>Not for use by third-party applications. --> 1568 <permission android:name="android.permission.WRITE_APN_SETTINGS" 1569 android:protectionLevel="signature|system" /> 1570 1571 <!-- Allows applications to change network connectivity state --> 1572 <permission android:name="android.permission.CHANGE_NETWORK_STATE" 1573 android:description="@string/permdesc_changeNetworkState" 1574 android:label="@string/permlab_changeNetworkState" 1575 android:protectionLevel="normal" /> 1576 1577 <!-- Allows an application to clear the caches of all installed 1578 applications on the device. --> 1579 <permission android:name="android.permission.CLEAR_APP_CACHE" 1580 android:protectionLevel="signatureOrSystem" /> 1581 1582 <!-- @SystemApi Allows an application to use any media decoder when decoding for playback 1583 @hide --> 1584 <permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK" 1585 android:protectionLevel="signature|system" /> 1586 1587 <!-- @SystemApi Allows an application to install and/or uninstall CA certificates on 1588 behalf of the user. 1589 @hide --> 1590 <permission android:name="android.permission.MANAGE_CA_CERTIFICATES" 1591 android:protectionLevel="signature|system" /> 1592 1593 <!-- @SystemApi Allows an application to do certain operations needed for 1594 interacting with the recovery (system update) system. 1595 @hide --> 1596 <permission android:name="android.permission.RECOVERY" 1597 android:protectionLevel="signature|system" /> 1598 1599 <!-- Allows the system to bind to an application's task services 1600 @hide --> 1601 <permission android:name="android.permission.BIND_JOB_SERVICE" 1602 android:protectionLevel="signature" /> 1603 <uses-permission android:name="android.permission.BIND_JOB_SERVICE"/> 1604 1605 <!-- Allows an application to initiate configuration updates 1606 <p>An application requesting this permission is responsible for 1607 verifying the source and integrity of any update before passing 1608 it off to the various individual installer components 1609 @hide --> 1610 <permission android:name="android.permission.UPDATE_CONFIG" 1611 android:protectionLevel="signature|system" /> 1612 1613 <!-- ========================================= --> 1614 <!-- Permissions for special development tools --> 1615 <!-- ========================================= --> 1616 <eat-comment /> 1617 1618 <!-- @SystemApi Allows an application to read or write the secure system settings. 1619 <p>Not for use by third-party applications. --> 1620 <permission android:name="android.permission.WRITE_SECURE_SETTINGS" 1621 android:protectionLevel="signature|system|development" /> 1622 1623 <!-- @SystemApi Allows an application to retrieve state dump information from system services. 1624 <p>Not for use by third-party applications. --> 1625 <permission android:name="android.permission.DUMP" 1626 android:protectionLevel="signature|system|development" /> 1627 1628 <!-- @SystemApi Allows an application to read the low-level system log files. 1629 <p>Not for use by third-party applications, because 1630 Log entries can contain the user's private information. --> 1631 <permission android:name="android.permission.READ_LOGS" 1632 android:protectionLevel="signature|system|development" /> 1633 1634 <!-- @SystemApi Configure an application for debugging. 1635 <p>Not for use by third-party applications. --> 1636 <permission android:name="android.permission.SET_DEBUG_APP" 1637 android:protectionLevel="signature|system|development" /> 1638 1639 <!-- @SystemApi Allows an application to set the maximum number of (not needed) 1640 application processes that can be running. 1641 <p>Not for use by third-party applications. --> 1642 <permission android:name="android.permission.SET_PROCESS_LIMIT" 1643 android:protectionLevel="signature|system|development" /> 1644 1645 <!-- @SystemApi Allows an application to control whether activities are immediately 1646 finished when put in the background. 1647 <p>Not for use by third-party applications. --> 1648 <permission android:name="android.permission.SET_ALWAYS_FINISH" 1649 android:protectionLevel="signature|system|development" /> 1650 1651 <!-- @SystemApi Allow an application to request that a signal be sent to all persistent processes. 1652 <p>Not for use by third-party applications. --> 1653 <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES" 1654 android:protectionLevel="signature|system|development" /> 1655 1656 <!-- ==================================== --> 1657 <!-- Private permissions --> 1658 <!-- ==================================== --> 1659 <eat-comment /> 1660 1661 <!-- @SystemApi Allows applications to RW to diagnostic resources. 1662 <p>Not for use by third-party applications. --> 1663 <permission android:name="android.permission.DIAGNOSTIC" 1664 android:protectionLevel="signature" /> 1665 1666 <!-- @SystemApi Allows an application to open, close, or disable the status bar 1667 and its icons. 1668 <p>Not for use by third-party applications. --> 1669 <permission android:name="android.permission.STATUS_BAR" 1670 android:protectionLevel="signature|system" /> 1671 1672 <!-- Allows an application to be the status bar. Currently used only by SystemUI.apk 1673 @hide --> 1674 <permission android:name="android.permission.STATUS_BAR_SERVICE" 1675 android:protectionLevel="signature" /> 1676 1677 <!-- Allows an application to force a BACK operation on whatever is the 1678 top activity. 1679 <p>Not for use by third-party applications. --> 1680 <permission android:name="android.permission.FORCE_BACK" 1681 android:protectionLevel="signature" /> 1682 1683 <!-- @SystemApi Allows an application to update device statistics. 1684 <p>Not for use by third-party applications. --> 1685 <permission android:name="android.permission.UPDATE_DEVICE_STATS" 1686 android:protectionLevel="signature|system" /> 1687 1688 <!-- @SystemApi @hide Allows an application to collect battery statistics --> 1689 <permission android:name="android.permission.GET_APP_OPS_STATS" 1690 android:protectionLevel="signature|system|development" /> 1691 1692 <!-- @SystemApi Allows an application to update application operation statistics. Not for 1693 use by third party apps. @hide --> 1694 <permission android:name="android.permission.UPDATE_APP_OPS_STATS" 1695 android:protectionLevel="signature|system" /> 1696 1697 <!-- Allows an application to open windows that are for use by parts 1698 of the system user interface. 1699 <p>Not for use by third-party applications. --> 1700 <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW" 1701 android:protectionLevel="signature" /> 1702 1703 <!-- Allows an application to manage (create, destroy, 1704 Z-order) application tokens in the window manager. 1705 <p>Not for use by third-party applications. --> 1706 <permission android:name="android.permission.MANAGE_APP_TOKENS" 1707 android:protectionLevel="signature" /> 1708 1709 <!-- @hide Allows the application to temporarily freeze the screen for a 1710 full-screen transition. --> 1711 <permission android:name="android.permission.FREEZE_SCREEN" 1712 android:protectionLevel="signature" /> 1713 1714 <!-- Allows an application to inject user events (keys, touch, trackball) 1715 into the event stream and deliver them to ANY window. Without this 1716 permission, you can only deliver events to windows in your own process. 1717 <p>Not for use by third-party applications. --> 1718 <permission android:name="android.permission.INJECT_EVENTS" 1719 android:protectionLevel="signature" /> 1720 1721 <!-- @hide Allows an application to register an input filter which filters the stream 1722 of user events (keys, touch, trackball) before they are dispatched to any window. --> 1723 <permission android:name="android.permission.FILTER_EVENTS" 1724 android:protectionLevel="signature" /> 1725 1726 <!-- @hide Allows an application to retrieve the window token from the accessibility manager. --> 1727 <permission android:name="android.permission.RETRIEVE_WINDOW_TOKEN" 1728 android:protectionLevel="signature" /> 1729 1730 <!-- @hide Allows an application to collect frame statistics --> 1731 <permission android:name="android.permission.FRAME_STATS" 1732 android:protectionLevel="signature" /> 1733 1734 <!-- @hide Allows an application to temporary enable accessibility on the device. --> 1735 <permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY" 1736 android:protectionLevel="signature" /> 1737 1738 <!-- Allows an application to watch and control how activities are 1739 started globally in the system. Only for is in debugging 1740 (usually the monkey command). 1741 <p>Not for use by third-party applications. --> 1742 <permission android:name="android.permission.SET_ACTIVITY_WATCHER" 1743 android:protectionLevel="signature" /> 1744 1745 <!-- @SystemApi Allows an application to call the activity manager shutdown() API 1746 to put the higher-level system there into a shutdown state. 1747 @hide --> 1748 <permission android:name="android.permission.SHUTDOWN" 1749 android:protectionLevel="signature|system" /> 1750 1751 <!-- @SystemApi Allows an application to tell the activity manager to temporarily 1752 stop application switches, putting it into a special mode that 1753 prevents applications from immediately switching away from some 1754 critical UI such as the home screen. 1755 @hide --> 1756 <permission android:name="android.permission.STOP_APP_SWITCHES" 1757 android:protectionLevel="signature|system" /> 1758 1759 <!-- Allows an application to retrieve private information about 1760 the current top activity, such as any assist context it can provide. 1761 <p>Not for use by third-party applications. --> 1762 <permission android:name="android.permission.GET_TOP_ACTIVITY_INFO" 1763 android:protectionLevel="signature" /> 1764 1765 <!-- Allows an application to retrieve the current state of keys and 1766 switches. 1767 <p>Not for use by third-party applications. 1768 @deprecated The API that used this permission has been removed. --> 1769 <permission android:name="android.permission.READ_INPUT_STATE" 1770 android:protectionLevel="signature" /> 1771 1772 <!-- Must be required by an {@link android.inputmethodservice.InputMethodService}, 1773 to ensure that only the system can bind to it. --> 1774 <permission android:name="android.permission.BIND_INPUT_METHOD" 1775 android:protectionLevel="signature" /> 1776 1777 <!-- Must be required by an {@link android.media.midi.MidiDeviceService}, 1778 to ensure that only the system can bind to it. --> 1779 <permission android:name="android.permission.BIND_MIDI_DEVICE_SERVICE" 1780 android:protectionLevel="signature" /> 1781 1782 <!-- Must be required by an {@link android.accessibilityservice.AccessibilityService}, 1783 to ensure that only the system can bind to it. --> 1784 <permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE" 1785 android:protectionLevel="signature" /> 1786 1787 <!-- Must be required by a {@link android.printservice.PrintService}, 1788 to ensure that only the system can bind to it. --> 1789 <permission android:name="android.permission.BIND_PRINT_SERVICE" 1790 android:protectionLevel="signature" /> 1791 1792 <!-- Must be required by a {@link android.nfc.cardemulation.HostApduService} 1793 or {@link android.nfc.cardemulation.OffHostApduService} to ensure that only 1794 the system can bind to it. --> 1795 <permission android:name="android.permission.BIND_NFC_SERVICE" 1796 android:protectionLevel="signature" /> 1797 1798 <!-- Must be required by the PrintSpooler to ensure that only the system can bind to it. 1799 @hide --> 1800 <permission android:name="android.permission.BIND_PRINT_SPOOLER_SERVICE" 1801 android:protectionLevel="signature" /> 1802 1803 <!-- Must be required by a TextService (e.g. SpellCheckerService) 1804 to ensure that only the system can bind to it. --> 1805 <permission android:name="android.permission.BIND_TEXT_SERVICE" 1806 android:protectionLevel="signature" /> 1807 1808 <!-- Must be required by a {@link android.net.VpnService}, 1809 to ensure that only the system can bind to it. --> 1810 <permission android:name="android.permission.BIND_VPN_SERVICE" 1811 android:protectionLevel="signature" /> 1812 1813 <!-- Must be required by a {@link android.service.wallpaper.WallpaperService}, 1814 to ensure that only the system can bind to it. --> 1815 <permission android:name="android.permission.BIND_WALLPAPER" 1816 android:protectionLevel="signature|system" /> 1817 1818 <!-- Must be required by a {@link android.service.voice.VoiceInteractionService}, 1819 to ensure that only the system can bind to it. --> 1820 <permission android:name="android.permission.BIND_VOICE_INTERACTION" 1821 android:protectionLevel="signature" /> 1822 1823 <!-- Must be required by hotword enrollment application, 1824 to ensure that only the system can interact with it. 1825 @hide <p>Not for use by third-party applications.</p> --> 1826 <permission android:name="android.permission.MANAGE_VOICE_KEYPHRASES" 1827 android:protectionLevel="signature|system" /> 1828 1829 <!-- Must be required by a {@link com.android.media.remotedisplay.RemoteDisplayProvider}, 1830 to ensure that only the system can bind to it. 1831 @hide --> 1832 <permission android:name="android.permission.BIND_REMOTE_DISPLAY" 1833 android:protectionLevel="signature" /> 1834 1835 <!-- Must be required by a {@link android.media.tv.TvInputService} 1836 to ensure that only the system can bind to it. --> 1837 <permission android:name="android.permission.BIND_TV_INPUT" 1838 android:protectionLevel="signature|system" /> 1839 1840 <!-- @SystemApi Allows an application to modify parental controls 1841 <p>Not for use by third-party applications. 1842 @hide --> 1843 <permission android:name="android.permission.MODIFY_PARENTAL_CONTROLS" 1844 android:protectionLevel="signature|system" /> 1845 1846 <!-- Must be required by a {@link android.media.routing.MediaRouteService} 1847 to ensure that only the system can interact with it. 1848 @hide --> 1849 <permission android:name="android.permission.BIND_ROUTE_PROVIDER" 1850 android:protectionLevel="signature" /> 1851 1852 <!-- Must be required by device administration receiver, to ensure that only the 1853 system can interact with it. --> 1854 <permission android:name="android.permission.BIND_DEVICE_ADMIN" 1855 android:protectionLevel="signature" /> 1856 1857 <!-- @SystemApi Required to add or remove another application as a device admin. 1858 <p>Not for use by third-party applications. 1859 @hide --> 1860 <permission android:name="android.permission.MANAGE_DEVICE_ADMINS" 1861 android:protectionLevel="signature|system" /> 1862 1863 <!-- Allows low-level access to setting the orientation (actually 1864 rotation) of the screen. 1865 <p>Not for use by third-party applications. --> 1866 <permission android:name="android.permission.SET_ORIENTATION" 1867 android:protectionLevel="signature" /> 1868 1869 <!-- Allows low-level access to setting the pointer speed. 1870 <p>Not for use by third-party applications. --> 1871 <permission android:name="android.permission.SET_POINTER_SPEED" 1872 android:protectionLevel="signature" /> 1873 1874 <!-- Allows low-level access to setting input device calibration. 1875 <p>Not for use by normal applications. 1876 @hide --> 1877 <permission android:name="android.permission.SET_INPUT_CALIBRATION" 1878 android:protectionLevel="signature" /> 1879 1880 <!-- Allows low-level access to setting the keyboard layout. 1881 <p>Not for use by third-party applications. 1882 @hide --> 1883 <permission android:name="android.permission.SET_KEYBOARD_LAYOUT" 1884 android:protectionLevel="signature" /> 1885 1886 <!-- Allows an application to request installing packages. Apps 1887 targeting APIs greater than 22 must hold this permission in 1888 order to use {@link android.content.Intent#ACTION_INSTALL_PACKAGE}.--> 1889 <permission android:name="android.permission.REQUEST_INSTALL_PACKAGES" 1890 android:label="@string/permlab_requestInstallPackages" 1891 android:description="@string/permdesc_requestInstallPackages" 1892 android:protectionLevel="normal" /> 1893 1894 <!-- @SystemApi Allows an application to install packages. 1895 <p>Not for use by third-party applications. --> 1896 <permission android:name="android.permission.INSTALL_PACKAGES" 1897 android:protectionLevel="signature|system" /> 1898 1899 <!-- Allows an application to clear user data. 1900 <p>Not for use by third-party applications. --> 1901 <permission android:name="android.permission.CLEAR_APP_USER_DATA" 1902 android:protectionLevel="signature" /> 1903 1904 <!-- @SystemApi Allows an application to delete cache files. 1905 <p>Not for use by third-party applications. --> 1906 <permission android:name="android.permission.DELETE_CACHE_FILES" 1907 android:protectionLevel="signature|system" /> 1908 1909 <!-- @SystemApi Allows an application to delete packages. 1910 <p>Not for use by third-party applications. --> 1911 <permission android:name="android.permission.DELETE_PACKAGES" 1912 android:protectionLevel="signature|system" /> 1913 1914 <!-- @SystemApi Allows an application to move location of installed package. 1915 @hide --> 1916 <permission android:name="android.permission.MOVE_PACKAGE" 1917 android:protectionLevel="signature|system" /> 1918 1919 <!-- @SystemApi Allows an application to change whether an application component (other than its own) is 1920 enabled or not. 1921 <p>Not for use by third-party applications. --> 1922 <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE" 1923 android:protectionLevel="signature|system" /> 1924 1925 <!-- @hide Allows an application to grant or revoke specific permissions. --> 1926 <permission android:name="android.permission.GRANT_REVOKE_PERMISSIONS" 1927 android:protectionLevel="signature" /> 1928 1929 <!-- @hide Allows an application to observe permission changes. --> 1930 <permission android:name="android.permission.OBSERVE_GRANT_REVOKE_PERMISSIONS" 1931 android:protectionLevel="signatureOrSystem" /> 1932 1933 <!-- Allows an application to use SurfaceFlinger's low level features. 1934 <p>Not for use by third-party applications. --> 1935 <permission android:name="android.permission.ACCESS_SURFACE_FLINGER" 1936 android:protectionLevel="signature" /> 1937 1938 <!-- @SystemApi Allows an application to take screen shots and more generally 1939 get access to the frame buffer data. 1940 <p>Not for use by third-party applications. --> 1941 <permission android:name="android.permission.READ_FRAME_BUFFER" 1942 android:protectionLevel="signature|system" /> 1943 1944 <!-- Allows an application to use InputFlinger's low level features. 1945 @hide --> 1946 <permission android:name="android.permission.ACCESS_INPUT_FLINGER" 1947 android:protectionLevel="signature" /> 1948 1949 <!-- Allows an application to configure and connect to Wifi displays 1950 @hide --> 1951 <permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY" 1952 android:protectionLevel="signature" /> 1953 1954 <!-- Allows an application to control low-level features of Wifi displays 1955 such as opening an RTSP socket. This permission should only be used 1956 by the display manager. 1957 @hide --> 1958 <permission android:name="android.permission.CONTROL_WIFI_DISPLAY" 1959 android:protectionLevel="signature" /> 1960 1961 <!-- @SystemApi Allows an application to control VPN. 1962 <p>Not for use by third-party applications.</p> 1963 @hide --> 1964 <permission android:name="android.permission.CONTROL_VPN" 1965 android:protectionLevel="signature|system" /> 1966 <uses-permission android:name="android.permission.CONTROL_VPN" /> 1967 1968 <!-- @SystemApi Allows an application to capture audio output. 1969 <p>Not for use by third-party applications.</p> --> 1970 <permission android:name="android.permission.CAPTURE_AUDIO_OUTPUT" 1971 android:protectionLevel="signature|system" /> 1972 1973 <!-- @SystemApi Allows an application to capture audio for hotword detection. 1974 <p>Not for use by third-party applications.</p> 1975 @hide --> 1976 <permission android:name="android.permission.CAPTURE_AUDIO_HOTWORD" 1977 android:protectionLevel="signature|system" /> 1978 1979 <!-- @SystemApi Allows an application to modify audio routing and override policy decisions. 1980 <p>Not for use by third-party applications.</p> 1981 @hide --> 1982 <permission android:name="android.permission.MODIFY_AUDIO_ROUTING" 1983 android:protectionLevel="signature|system" /> 1984 1985 <!-- @SystemApi Allows an application to capture video output. 1986 <p>Not for use by third-party applications.</p> --> 1987 <permission android:name="android.permission.CAPTURE_VIDEO_OUTPUT" 1988 android:protectionLevel="signature|system" /> 1989 1990 <!-- @SystemApi Allows an application to capture secure video output. 1991 <p>Not for use by third-party applications.</p> --> 1992 <permission android:name="android.permission.CAPTURE_SECURE_VIDEO_OUTPUT" 1993 android:protectionLevel="signature|system" /> 1994 1995 <!-- @SystemApi Allows an application to know what content is playing and control its playback. 1996 <p>Not for use by third-party applications due to privacy of media consumption</p> --> 1997 <permission android:name="android.permission.MEDIA_CONTENT_CONTROL" 1998 android:protectionLevel="signature|system" /> 1999 2000 <!-- Required to be able to disable the device (very dangerous!). 2001 <p>Not for use by third-party applications.. --> 2002 <permission android:name="android.permission.BRICK" 2003 android:protectionLevel="signature" /> 2004 2005 <!-- @SystemApi Required to be able to reboot the device. 2006 <p>Not for use by third-party applications. --> 2007 <permission android:name="android.permission.REBOOT" 2008 android:protectionLevel="signature|system" /> 2009 2010 <!-- Allows low-level access to power management. 2011 <p>Not for use by third-party applications. --> 2012 <permission android:name="android.permission.DEVICE_POWER" 2013 android:protectionLevel="signature" /> 2014 2015 <!-- Allows access to the PowerManager.userActivity function. 2016 <p>Not for use by third-party applications. @hide @SystemApi --> 2017 <permission android:name="android.permission.USER_ACTIVITY" 2018 android:protectionLevel="signature|system" /> 2019 2020 <!-- @hide Allows low-level access to tun tap driver --> 2021 <permission android:name="android.permission.NET_TUNNELING" 2022 android:protectionLevel="signature" /> 2023 2024 <!-- Run as a manufacturer test application, running as the root user. 2025 Only available when the device is running in manufacturer test mode. 2026 <p>Not for use by third-party applications. --> 2027 <permission android:name="android.permission.FACTORY_TEST" 2028 android:protectionLevel="signature" /> 2029 2030 <!-- Allows an application to broadcast a notification that an application 2031 package has been removed. 2032 <p>Not for use by third-party applications. --> 2033 <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED" 2034 android:protectionLevel="signature" /> 2035 2036 <!-- Allows an application to broadcast an SMS receipt notification. 2037 <p>Not for use by third-party applications. --> 2038 <permission android:name="android.permission.BROADCAST_SMS" 2039 android:protectionLevel="signature" /> 2040 2041 <!-- Allows an application to broadcast a WAP PUSH receipt notification. 2042 <p>Not for use by third-party applications. --> 2043 <permission android:name="android.permission.BROADCAST_WAP_PUSH" 2044 android:protectionLevel="signature" /> 2045 2046 <!-- @SystemApi Allows an application to broadcast privileged networking requests. 2047 <p>Not for use by third-party applications. @hide --> 2048 <permission android:name="android.permission.BROADCAST_NETWORK_PRIVILEGED" 2049 android:protectionLevel="signature|system" /> 2050 2051 <!-- @SystemApi Not for use by third-party applications. --> 2052 <permission android:name="android.permission.MASTER_CLEAR" 2053 android:protectionLevel="signature|system" /> 2054 2055 <!-- @SystemApi Allows an application to call any phone number, including emergency 2056 numbers, without going through the Dialer user interface for the user 2057 to confirm the call being placed. 2058 <p>Not for use by third-party applications. --> 2059 <permission android:name="android.permission.CALL_PRIVILEGED" 2060 android:protectionLevel="signature|system" /> 2061 2062 <!-- @SystemApi Allows an application to perform CDMA OTA provisioning @hide --> 2063 <permission android:name="android.permission.PERFORM_CDMA_PROVISIONING" 2064 android:protectionLevel="signature|system" /> 2065 2066 <!-- @SystemApi Allows an application to perform SIM Activation @hide --> 2067 <permission android:name="android.permission.PERFORM_SIM_ACTIVATION" 2068 android:protectionLevel="signature|system" /> 2069 2070 <!-- @SystemApi Allows enabling/disabling location update notifications from 2071 the radio. 2072 <p>Not for use by third-party applications. --> 2073 <permission android:name="android.permission.CONTROL_LOCATION_UPDATES" 2074 android:protectionLevel="signature|system" /> 2075 2076 <!-- @SystemApi Allows read/write access to the "properties" table in the checkin 2077 database, to change values that get uploaded. 2078 <p>Not for use by third-party applications. --> 2079 <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES" 2080 android:protectionLevel="signature|system" /> 2081 2082 <!-- @SystemApi Allows an application to collect component usage 2083 statistics 2084 <p>Declaring the permission implies intention to use the API and the user of the 2085 device can grant permission through the Settings application. --> 2086 <permission android:name="android.permission.PACKAGE_USAGE_STATS" 2087 android:protectionLevel="signature|development|appop" /> 2088 <uses-permission android:name="android.permission.PACKAGE_USAGE_STATS" /> 2089 2090 <!-- @hide Allows an application to change the app idle state of an app. 2091 <p>Not for use by third-party applications. --> 2092 <permission android:name="android.permission.CHANGE_APP_IDLE_STATE" 2093 android:protectionLevel="signature" /> 2094 2095 <!-- @hide @SystemApi Allows an application to temporarily whitelist an inactive app to 2096 access the network and acquire wakelocks. 2097 <p>Not for use by third-party applications. --> 2098 <permission android:name="android.permission.CHANGE_DEVICE_IDLE_TEMP_WHITELIST" 2099 android:protectionLevel="system|signature" /> 2100 2101 <!-- @SystemApi Allows an application to collect battery statistics --> 2102 <permission android:name="android.permission.BATTERY_STATS" 2103 android:protectionLevel="signature|system|development" /> 2104 2105 <!-- @SystemApi Allows an application to control the backup and restore process. 2106 <p>Not for use by third-party applications. 2107 @hide pending API council --> 2108 <permission android:name="android.permission.BACKUP" 2109 android:protectionLevel="signature|system" /> 2110 2111 <!-- Allows a package to launch the secure full-backup confirmation UI. 2112 ONLY the system process may hold this permission. 2113 @hide --> 2114 <permission android:name="android.permission.CONFIRM_FULL_BACKUP" 2115 android:protectionLevel="signature" /> 2116 2117 <!-- @SystemApi Must be required by a {@link android.widget.RemoteViewsService}, 2118 to ensure that only the system can bind to it. --> 2119 <permission android:name="android.permission.BIND_REMOTEVIEWS" 2120 android:protectionLevel="signature|system" /> 2121 2122 <!-- @SystemApi Allows an application to tell the AppWidget service which application 2123 can access AppWidget's data. The normal user flow is that a user 2124 picks an AppWidget to go into a particular host, thereby giving that 2125 host application access to the private data from the AppWidget app. 2126 An application that has this permission should honor that contract. 2127 <p>Not for use by third-party applications. --> 2128 <permission android:name="android.permission.BIND_APPWIDGET" 2129 android:protectionLevel="signature|system" /> 2130 2131 <!-- @SystemApi Private permission, to restrict who can bring up a dialog to add a new 2132 keyguard widget 2133 @hide --> 2134 <permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET" 2135 android:protectionLevel="signature|system" /> 2136 2137 <!-- @SystemApi Internal permission allowing an application to query/set which 2138 applications can bind AppWidgets. 2139 @hide --> 2140 <permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS" 2141 android:protectionLevel="signature|system" /> 2142 2143 <!-- Allows applications to change the background data setting. 2144 <p>Not for use by third-party applications. 2145 @hide pending API council --> 2146 <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING" 2147 android:protectionLevel="signature" /> 2148 2149 <!-- @SystemApi This permission can be used on content providers to allow the global 2150 search system to access their data. Typically it used when the 2151 provider has some permissions protecting it (which global search 2152 would not be expected to hold), and added as a read-only permission 2153 to the path in the provider where global search queries are 2154 performed. This permission can not be held by regular applications; 2155 it is used by applications to protect themselves from everyone else 2156 besides global search. --> 2157 <permission android:name="android.permission.GLOBAL_SEARCH" 2158 android:protectionLevel="signature|system" /> 2159 2160 <!-- Internal permission protecting access to the global search 2161 system: ensures that only the system can access the provider 2162 to perform queries (since this otherwise provides unrestricted 2163 access to a variety of content providers), and to write the 2164 search statistics (to keep applications from gaming the source 2165 ranking). 2166 @hide --> 2167 <permission android:name="android.permission.GLOBAL_SEARCH_CONTROL" 2168 android:protectionLevel="signature" /> 2169 2170 <!-- @SystemApi Internal permission to allows an application to read indexable data. 2171 @hide --> 2172 <permission android:name="android.permission.READ_SEARCH_INDEXABLES" 2173 android:protectionLevel="signature|system" /> 2174 2175 <!-- @SystemApi Allows applications to set a live wallpaper. 2176 @hide XXX Change to signature once the picker is moved to its 2177 own apk as Ghod Intended. --> 2178 <permission android:name="android.permission.SET_WALLPAPER_COMPONENT" 2179 android:protectionLevel="signature|system" /> 2180 2181 <!-- @SystemApi Allows applications to read dream settings and dream state. 2182 @hide --> 2183 <permission android:name="android.permission.READ_DREAM_STATE" 2184 android:protectionLevel="signature|system" /> 2185 2186 <!-- @SystemApi Allows applications to write dream settings, and start or stop dreaming. 2187 @hide --> 2188 <permission android:name="android.permission.WRITE_DREAM_STATE" 2189 android:protectionLevel="signature|system" /> 2190 2191 <!-- @SystemApi Allow an application to read and write the cache partition. 2192 @hide --> 2193 <permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM" 2194 android:protectionLevel="signature|system" /> 2195 2196 <!-- Must be required by default container service so that only 2197 the system can bind to it and use it to copy 2198 protected data to secure containers or files 2199 accessible to the system. 2200 @hide --> 2201 <permission android:name="android.permission.COPY_PROTECTED_DATA" 2202 android:protectionLevel="signature" /> 2203 2204 <!-- @SystemApi Internal permission protecting access to the encryption methods 2205 @hide 2206 --> 2207 <permission android:name="android.permission.CRYPT_KEEPER" 2208 android:protectionLevel="signature|system" /> 2209 2210 <!-- @SystemApi Allows an application to read historical network usage for 2211 specific networks and applications. @hide --> 2212 <permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY" 2213 android:protectionLevel="signature|system" /> 2214 2215 <!-- Allows an application to manage network policies (such as warning and disable 2216 limits) and to define application-specific rules. @hide --> 2217 <permission android:name="android.permission.MANAGE_NETWORK_POLICY" 2218 android:protectionLevel="signature" /> 2219 2220 <!-- @SystemApi Allows an application to account its network traffic against other UIDs. Used 2221 by system services like download manager and media server. Not for use by 2222 third party apps. @hide --> 2223 <permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING" 2224 android:protectionLevel="signature|system" /> 2225 2226 <!-- C2DM permission. 2227 @hide Used internally. 2228 --> 2229 <permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE" 2230 android:protectionLevel="signature" /> 2231 <uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/> 2232 2233 <!-- @SystemApi @hide Package verifier needs to have this permission before the PackageManager will 2234 trust it to verify packages. 2235 --> 2236 <permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT" 2237 android:protectionLevel="signature|system" /> 2238 2239 <!-- Must be required by package verifier receiver, to ensure that only the 2240 system can interact with it. 2241 @hide 2242 --> 2243 <permission android:name="android.permission.BIND_PACKAGE_VERIFIER" 2244 android:protectionLevel="signature" /> 2245 2246 <!-- @SystemApi @hide Intent filter verifier needs to have this permission before the 2247 PackageManager will trust it to verify intent filters. 2248 --> 2249 <permission android:name="android.permission.INTENT_FILTER_VERIFICATION_AGENT" 2250 android:protectionLevel="signature|system" /> 2251 2252 <!-- Must be required by intent filter verifier receiver, to ensure that only the 2253 system can interact with it. 2254 @hide 2255 --> 2256 <permission android:name="android.permission.BIND_INTENT_FILTER_VERIFIER" 2257 android:protectionLevel="signature" /> 2258 2259 <!-- @SystemApi Allows applications to access serial ports via the SerialManager. 2260 @hide --> 2261 <permission android:name="android.permission.SERIAL_PORT" 2262 android:protectionLevel="signature|system" /> 2263 2264 <!-- Allows the holder to access content providers from outside an ApplicationThread. 2265 This permission is enforced by the ActivityManagerService on the corresponding APIs, 2266 in particular ActivityManagerService#getContentProviderExternal(String) and 2267 ActivityManagerService#removeContentProviderExternal(String). 2268 @hide 2269 --> 2270 <permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY" 2271 android:protectionLevel="signature" /> 2272 2273 <!-- @SystemApi Allows an application to hold an UpdateLock, recommending that a headless 2274 OTA reboot *not* occur while the lock is held. 2275 @hide --> 2276 <permission android:name="android.permission.UPDATE_LOCK" 2277 android:protectionLevel="signatureOrSystem" /> 2278 2279 <!-- @SystemApi Allows an application to read the current set of notifications, including 2280 any metadata and intents attached. 2281 @hide --> 2282 <permission android:name="android.permission.ACCESS_NOTIFICATIONS" 2283 android:protectionLevel="signature|system" /> 2284 2285 <!-- Marker permission for applications that wish to access notification policy. --> 2286 <permission android:name="android.permission.ACCESS_NOTIFICATION_POLICY" 2287 android:description="@string/permdesc_access_notification_policy" 2288 android:label="@string/permlab_access_notification_policy" 2289 android:protectionLevel="normal" /> 2290 2291 <!-- Allows access to keyguard secure storage. Only allowed for system processes. 2292 @hide --> 2293 <permission android:name="android.permission.ACCESS_KEYGUARD_SECURE_STORAGE" 2294 android:protectionLevel="signature" /> 2295 2296 <!-- Allows managing (adding, removing) fingerprint templates. Reserved for the system. @hide --> 2297 <permission android:name="android.permission.MANAGE_FINGERPRINT" 2298 android:protectionLevel="signature" /> 2299 2300 <!-- Allows an application to control keyguard. Only allowed for system processes. 2301 @hide --> 2302 <permission android:name="android.permission.CONTROL_KEYGUARD" 2303 android:protectionLevel="signature" /> 2304 2305 <!-- Allows an application to listen to trust changes. Only allowed for system processes. 2306 @hide --> 2307 <permission android:name="android.permission.TRUST_LISTENER" 2308 android:protectionLevel="signature" /> 2309 2310 <!-- @SystemApi Allows an application to provide a trust agent. 2311 @hide For security reasons, this is a platform-only permission. --> 2312 <permission android:name="android.permission.PROVIDE_TRUST_AGENT" 2313 android:protectionLevel="signatureOrSystem" /> 2314 2315 <!-- Allows an application to launch the trust agent settings activity. 2316 @hide --> 2317 <permission android:name="android.permission.LAUNCH_TRUST_AGENT_SETTINGS" 2318 android:protectionLevel="signatureOrSystem" /> 2319 2320 <!-- @SystemApi Must be required by an {@link 2321 android.service.trust.TrustAgentService}, 2322 to ensure that only the system can bind to it. 2323 @hide --> 2324 <permission android:name="android.permission.BIND_TRUST_AGENT" 2325 android:protectionLevel="signature" /> 2326 2327 <!-- Must be required by an {@link 2328 android.service.notification.NotificationListenerService}, 2329 to ensure that only the system can bind to it. --> 2330 <permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE" 2331 android:protectionLevel="signature" /> 2332 2333 <!-- Must be required by a {@link 2334 android.service.chooser.ChooserTargetService}, to ensure that 2335 only the system can bind to it. --> 2336 <permission android:name="android.permission.BIND_CHOOSER_TARGET_SERVICE" 2337 android:protectionLevel="signature" /> 2338 2339 <!-- @SystemApi Must be required by a {@link 2340 android.service.notification.ConditionProviderService}, 2341 to ensure that only the system can bind to it. 2342 @hide --> 2343 <permission android:name="android.permission.BIND_CONDITION_PROVIDER_SERVICE" 2344 android:protectionLevel="signature" /> 2345 2346 <!-- Must be required by an {@link android.service.dreams.DreamService}, 2347 to ensure that only the system can bind to it. --> 2348 <permission android:name="android.permission.BIND_DREAM_SERVICE" 2349 android:protectionLevel="signature" /> 2350 2351 <!-- @SystemApi Allows an application to call into a carrier setup flow. It is up to the 2352 carrier setup application to enforce that this permission is required 2353 @hide This is not a third-party API (intended for OEMs and system apps). --> 2354 <permission android:name="android.permission.INVOKE_CARRIER_SETUP" 2355 android:protectionLevel="signature|system" /> 2356 2357 <!-- @SystemApi Allows an application to listen for network condition observations. 2358 @hide This is not a third-party API (intended for system apps). --> 2359 <permission android:name="android.permission.ACCESS_NETWORK_CONDITIONS" 2360 android:protectionLevel="signature|system" /> 2361 2362 <!-- @SystemApi Allows an application to provision and access DRM certificates 2363 @hide This is not a third-party API (intended for system apps). --> 2364 <permission android:name="android.permission.ACCESS_DRM_CERTIFICATES" 2365 android:protectionLevel="signature|system" /> 2366 2367 <!-- Api Allows an application to manage media projection sessions. 2368 @hide This is not a third-party API (intended for system apps). --> 2369 <permission android:name="android.permission.MANAGE_MEDIA_PROJECTION" 2370 android:protectionLevel="signature" /> 2371 2372 <!-- @SystemApi Allows an application to read install sessions 2373 @hide This is not a third-party API (intended for system apps). --> 2374 <permission android:name="android.permission.READ_INSTALL_SESSIONS" 2375 android:label="@string/permlab_readInstallSessions" 2376 android:description="@string/permdesc_readInstallSessions" 2377 android:protectionLevel="normal"/> 2378 2379 <!-- @SystemApi Allows an application to remove DRM certificates 2380 @hide This is not a third-party API (intended for system apps). --> 2381 <permission android:name="android.permission.REMOVE_DRM_CERTIFICATES" 2382 android:protectionLevel="signature|system" /> 2383 2384 <!-- @deprecated Use {@link android.Manifest.permission#BIND_CARRIER_SERVICES} instead --> 2385 <permission android:name="android.permission.BIND_CARRIER_MESSAGING_SERVICE" 2386 android:protectionLevel="signature|system" /> 2387 2388 <!-- Allows an application to interact with the currently active 2389 {@link android.service.voice.VoiceInteractionService}. 2390 @hide --> 2391 <permission android:name="android.permission.ACCESS_VOICE_INTERACTION_SERVICE" 2392 android:protectionLevel="signature" /> 2393 2394 <!-- Allows an app that has this permission and a permissions to install packages 2395 to request all runtime permissions to be granted at installation. 2396 @hide --> 2397 <permission android:name="android.permission.INSTALL_GRANT_RUNTIME_PERMISSIONS" 2398 android:protectionLevel="signature" /> 2399 2400 <!-- The system process that is allowed to bind to services in carrier apps will 2401 have this permission. Carrier apps should use this permission to protect 2402 their services that only the system is allowed to bind to. --> 2403 <permission android:name="android.permission.BIND_CARRIER_SERVICES" 2404 android:label="@string/permlab_bindCarrierServices" 2405 android:description="@string/permdesc_bindCarrierServices" 2406 android:protectionLevel="signature|system" /> 2407 2408 <!-- Allows an application to query whether DO_NOT_ASK_CREDENTIALS_ON_BOOT 2409 flag is set. 2410 @hide --> 2411 <permission android:name="android.permission.QUERY_DO_NOT_ASK_CREDENTIALS_ON_BOOT" 2412 android:protectionLevel="signature" /> 2413 2414 <!-- @SystemApi Allows applications to kill UIDs. 2415 <p>Not for use by third-party applications. 2416 @hide --> 2417 <permission android:name="android.permission.KILL_UID" 2418 android:protectionLevel="signature" /> 2419 2420 <!-- Allows applications to act as network scorers. @hide @SystemApi--> 2421 <permission android:name="android.permission.LOCAL_MAC_ADDRESS" 2422 android:protectionLevel="signatureOrSystem" /> 2423 2424 <!-- Allows the Nfc stack to dispatch Nfc messages to applications. Applications 2425 can use this permission to ensure incoming Nfc messages are from the Nfc stack 2426 and not simulated by another application. 2427 @hide --> 2428 <permission android:name="android.permission.DISPATCH_NFC_MESSAGE" 2429 android:protectionLevel="signatureOrSystem" /> 2430 2431 <!-- The system process is explicitly the only one allowed to launch the 2432 confirmation UI for full backup/restore --> 2433 <uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/> 2434 2435 <application android:process="system" 2436 android:persistent="true" 2437 android:hasCode="false" 2438 android:label="@string/android_system_label" 2439 android:allowClearUserData="false" 2440 android:backupAgent="com.android.server.backup.SystemBackupAgent" 2441 android:killAfterRestore="false" 2442 android:icon="@drawable/ic_launcher_android" 2443 android:supportsRtl="true" 2444 android:theme="@style/Theme.Material.DayNight.DarkActionBar"> 2445 <activity android:name="com.android.internal.app.ChooserActivity" 2446 android:theme="@style/Theme.DeviceDefault.Resolver" 2447 android:finishOnCloseSystemDialogs="true" 2448 android:excludeFromRecents="true" 2449 android:documentLaunchMode="never" 2450 android:relinquishTaskIdentity="true" 2451 android:process=":ui"> 2452 <intent-filter> 2453 <action android:name="android.intent.action.CHOOSER" /> 2454 <category android:name="android.intent.category.DEFAULT" /> 2455 </intent-filter> 2456 </activity> 2457 <activity android:name="com.android.internal.app.IntentForwarderActivity" 2458 android:finishOnCloseSystemDialogs="true" 2459 android:theme="@style/Theme.NoDisplay" 2460 android:excludeFromRecents="true" 2461 android:label="@string/user_owner_label" 2462 android:exported="true" 2463 > 2464 </activity> 2465 <activity-alias android:name="com.android.internal.app.ForwardIntentToUserOwner" 2466 android:targetActivity="com.android.internal.app.IntentForwarderActivity" 2467 android:exported="true" 2468 android:label="@string/user_owner_label"> 2469 </activity-alias> 2470 <activity-alias android:name="com.android.internal.app.ForwardIntentToManagedProfile" 2471 android:targetActivity="com.android.internal.app.IntentForwarderActivity" 2472 android:icon="@drawable/ic_corp_icon" 2473 android:exported="true" 2474 android:label="@string/managed_profile_label"> 2475 </activity-alias> 2476 <activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity" 2477 android:theme="@style/Theme.Material.DayNight.Dialog" 2478 android:label="@string/heavy_weight_switcher_title" 2479 android:finishOnCloseSystemDialogs="true" 2480 android:excludeFromRecents="true" 2481 android:process=":ui"> 2482 </activity> 2483 <activity android:name="com.android.internal.app.PlatLogoActivity" 2484 android:theme="@style/Theme.Wallpaper.NoTitleBar.Fullscreen" 2485 android:configChanges="orientation|keyboardHidden" 2486 android:process=":ui"> 2487 </activity> 2488 <activity android:name="com.android.internal.app.DisableCarModeActivity" 2489 android:theme="@style/Theme.NoDisplay" 2490 android:excludeFromRecents="true" 2491 android:process=":ui"> 2492 </activity> 2493 <activity android:name="com.android.internal.app.DumpHeapActivity" 2494 android:theme="@style/Theme.Translucent.NoTitleBar" 2495 android:label="@string/dump_heap_title" 2496 android:finishOnCloseSystemDialogs="true" 2497 android:noHistory="true" 2498 android:excludeFromRecents="true" 2499 android:process=":ui"> 2500 </activity> 2501 <provider android:name="com.android.server.am.DumpHeapProvider" 2502 android:authorities="com.android.server.heapdump" 2503 android:grantUriPermissions="true" 2504 android:multiprocess="false" 2505 android:singleUser="true" /> 2506 2507 <activity android:name="android.accounts.ChooseAccountActivity" 2508 android:excludeFromRecents="true" 2509 android:exported="true" 2510 android:theme="@style/Theme.Material.DayNight.Dialog" 2511 android:label="@string/choose_account_label" 2512 android:process=":ui"> 2513 </activity> 2514 2515 <activity android:name="android.accounts.ChooseTypeAndAccountActivity" 2516 android:excludeFromRecents="true" 2517 android:exported="true" 2518 android:theme="@style/Theme.Material.DayNight.Dialog" 2519 android:label="@string/choose_account_label" 2520 android:process=":ui"> 2521 </activity> 2522 2523 <activity android:name="android.accounts.ChooseAccountTypeActivity" 2524 android:excludeFromRecents="true" 2525 android:theme="@style/Theme.Material.DayNight.Dialog" 2526 android:label="@string/choose_account_label" 2527 android:process=":ui"> 2528 </activity> 2529 2530 <activity android:name="android.accounts.CantAddAccountActivity" 2531 android:excludeFromRecents="true" 2532 android:exported="true" 2533 android:theme="@style/Theme.Material.DayNight.Dialog.NoActionBar" 2534 android:process=":ui"> 2535 </activity> 2536 2537 <activity android:name="android.accounts.GrantCredentialsPermissionActivity" 2538 android:excludeFromRecents="true" 2539 android:exported="true" 2540 android:theme="@style/Theme.Material.DayNight.DialogWhenLarge" 2541 android:process=":ui"> 2542 </activity> 2543 2544 <activity android:name="android.content.SyncActivityTooManyDeletes" 2545 android:theme="@style/Theme.Material.DayNight.Dialog" 2546 android:label="@string/sync_too_many_deletes" 2547 android:process=":ui"> 2548 </activity> 2549 2550 <activity android:name="com.android.internal.app.ShutdownActivity" 2551 android:permission="android.permission.SHUTDOWN" 2552 android:theme="@style/Theme.NoDisplay" 2553 android:excludeFromRecents="true"> 2554 <intent-filter> 2555 <action android:name="android.intent.action.ACTION_REQUEST_SHUTDOWN" /> 2556 <category android:name="android.intent.category.DEFAULT" /> 2557 </intent-filter> 2558 <intent-filter> 2559 <action android:name="android.intent.action.REBOOT" /> 2560 <category android:name="android.intent.category.DEFAULT" /> 2561 </intent-filter> 2562 </activity> 2563 2564 <activity android:name="com.android.internal.app.NetInitiatedActivity" 2565 android:theme="@style/Theme.Material.DayNight.Dialog.Alert" 2566 android:excludeFromRecents="true" 2567 android:process=":ui"> 2568 </activity> 2569 2570 <receiver android:name="com.android.server.BootReceiver" 2571 android:primaryUserOnly="true"> 2572 <intent-filter android:priority="1000"> 2573 <action android:name="android.intent.action.BOOT_COMPLETED" /> 2574 </intent-filter> 2575 </receiver> 2576 2577 <receiver android:name="com.android.server.updates.CertPinInstallReceiver" 2578 android:permission="android.permission.UPDATE_CONFIG"> 2579 <intent-filter> 2580 <action android:name="android.intent.action.UPDATE_PINS" /> 2581 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 2582 </intent-filter> 2583 </receiver> 2584 2585 <receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver" 2586 android:permission="android.permission.UPDATE_CONFIG"> 2587 <intent-filter> 2588 <action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" /> 2589 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 2590 </intent-filter> 2591 </receiver> 2592 2593 <receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver" 2594 android:permission="android.permission.UPDATE_CONFIG"> 2595 <intent-filter> 2596 <action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" /> 2597 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 2598 </intent-filter> 2599 </receiver> 2600 2601 <receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver" 2602 android:permission="android.permission.UPDATE_CONFIG"> 2603 <intent-filter> 2604 <action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" /> 2605 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 2606 </intent-filter> 2607 </receiver> 2608 2609 <receiver android:name="com.android.server.updates.TzDataInstallReceiver" 2610 android:permission="android.permission.UPDATE_CONFIG"> 2611 <intent-filter> 2612 <action android:name="android.intent.action.UPDATE_TZDATA" /> 2613 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 2614 </intent-filter> 2615 </receiver> 2616 2617 <receiver android:name="com.android.server.updates.SELinuxPolicyInstallReceiver" 2618 android:permission="android.permission.UPDATE_CONFIG"> 2619 <intent-filter> 2620 <action android:name="android.intent.action.UPDATE_SEPOLICY" /> 2621 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 2622 </intent-filter> 2623 </receiver> 2624 2625 <receiver android:name="com.android.server.MasterClearReceiver" 2626 android:permission="android.permission.MASTER_CLEAR"> 2627 <intent-filter 2628 android:priority="100" > 2629 <!-- For Checkin, Settings, etc.: action=MASTER_CLEAR --> 2630 <action android:name="android.intent.action.MASTER_CLEAR" /> 2631 2632 <!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR --> 2633 <action android:name="com.google.android.c2dm.intent.RECEIVE" /> 2634 <category android:name="android.intent.category.MASTER_CLEAR" /> 2635 </intent-filter> 2636 </receiver> 2637 2638 <service android:name="com.android.internal.os.storage.ExternalStorageFormatter" 2639 android:permission="android.permission.MASTER_CLEAR" 2640 android:exported="true" /> 2641 2642 <service android:name="android.hardware.location.GeofenceHardwareService" 2643 android:permission="android.permission.LOCATION_HARDWARE" 2644 android:exported="false" /> 2645 2646 <service android:name="com.android.internal.backup.LocalTransportService" 2647 android:permission="android.permission.CONFIRM_FULL_BACKUP" 2648 android:exported="false"> 2649 <intent-filter> 2650 <action android:name="android.backup.TRANSPORT_HOST" /> 2651 </intent-filter> 2652 </service> 2653 2654 <service android:name="com.android.server.MountServiceIdler" 2655 android:exported="true" 2656 android:permission="android.permission.BIND_JOB_SERVICE" > 2657 </service> 2658 2659 <service android:name="com.android.server.backup.FullBackupJob" 2660 android:exported="true" 2661 android:permission="android.permission.BIND_JOB_SERVICE" > 2662 </service> 2663 2664 <service android:name="com.android.server.backup.KeyValueBackupJob" 2665 android:permission="android.permission.BIND_JOB_SERVICE" > 2666 </service> 2667 2668 <service 2669 android:name="com.android.server.pm.BackgroundDexOptService" 2670 android:exported="true" 2671 android:permission="android.permission.BIND_JOB_SERVICE"> 2672 </service> 2673 2674 </application> 2675 2676</manifest> 2677