AndroidManifest.xml revision 302d02b95b151e32798f62d1f24ae3d6cb47b897
1<?xml version="1.0" encoding="utf-8"?>
2<!--
3/* //device/apps/common/AndroidManifest.xml
4**
5** Copyright 2006, The Android Open Source Project
6**
7** Licensed under the Apache License, Version 2.0 (the "License");
8** you may not use this file except in compliance with the License.
9** You may obtain a copy of the License at
10**
11**     http://www.apache.org/licenses/LICENSE-2.0
12**
13** Unless required by applicable law or agreed to in writing, software
14** distributed under the License is distributed on an "AS IS" BASIS,
15** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16** See the License for the specific language governing permissions and
17** limitations under the License.
18*/
19-->
20<manifest xmlns:android="http://schemas.android.com/apk/res/android"
21    package="android" coreApp="true" android:sharedUserId="android.uid.system"
22    android:sharedUserLabel="@string/android_system_label">
23
24    <!-- ================================================ -->
25    <!-- Special broadcasts that only the system can send -->
26    <!-- ================================================ -->
27    <eat-comment />
28
29    <protected-broadcast android:name="android.intent.action.SCREEN_OFF" />
30    <protected-broadcast android:name="android.intent.action.SCREEN_ON" />
31    <protected-broadcast android:name="android.intent.action.USER_PRESENT" />
32    <protected-broadcast android:name="android.intent.action.TIME_SET" />
33    <protected-broadcast android:name="android.intent.action.TIME_TICK" />
34    <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" />
35    <protected-broadcast android:name="android.intent.action.DATE_CHANGED" />
36    <protected-broadcast android:name="android.intent.action.PRE_BOOT_COMPLETED" />
37    <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" />
38    <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" />
39    <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" />
40    <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" />
41    <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" />
42    <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" />
43    <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" />
44    <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" />
45    <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" />
46    <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" />
47    <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" />
48    <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" />
49    <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" />
50    <protected-broadcast android:name="android.intent.action.PACKAGES_SUSPENDED" />
51    <protected-broadcast android:name="android.intent.action.PACKAGES_UNSUSPENDED" />
52    <protected-broadcast android:name="android.intent.action.ACTION_PREFERRED_ACTIVITY_CHANGED" />
53    <protected-broadcast android:name="android.intent.action.UID_REMOVED" />
54    <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" />
55    <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" />
56    <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" />
57    <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" />
58    <protected-broadcast android:name="android.intent.action.BATTERY_LOW" />
59    <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" />
60    <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" />
61    <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" />
62    <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" />
63    <protected-broadcast android:name="android.intent.action.CHARGING" />
64    <protected-broadcast android:name="android.intent.action.DISCHARGING" />
65    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" />
66    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" />
67    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" />
68    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" />
69    <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" />
70    <protected-broadcast android:name="android.intent.action.REBOOT" />
71    <protected-broadcast android:name="android.intent.action.DOCK_EVENT" />
72    <protected-broadcast android:name="android.intent.action.THERMAL_EVENT" />
73    <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" />
74    <protected-broadcast android:name="android.intent.action.USER_ADDED" />
75    <protected-broadcast android:name="android.intent.action.USER_REMOVED" />
76    <protected-broadcast android:name="android.intent.action.USER_STARTING" />
77    <protected-broadcast android:name="android.intent.action.USER_STARTED" />
78    <protected-broadcast android:name="android.intent.action.USER_STOPPING" />
79    <protected-broadcast android:name="android.intent.action.USER_STOPPED" />
80    <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" />
81    <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" />
82    <protected-broadcast android:name="android.intent.action.USER_SWITCHED" />
83    <protected-broadcast android:name="android.intent.action.USER_INITIALIZE" />
84    <protected-broadcast android:name="android.intent.action.INTENT_FILTER_NEEDS_VERIFICATION" />
85
86    <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED" />
87    <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGING" />
88    <protected-broadcast android:name="android.os.action.DEVICE_IDLE_MODE_CHANGED" />
89    <protected-broadcast android:name="android.os.action.POWER_SAVE_WHITELIST_CHANGED" />
90    <protected-broadcast android:name="android.os.action.POWER_SAVE_TEMP_WHITELIST_CHANGED" />
91    <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED_INTERNAL" />
92
93    <protected-broadcast android:name="android.os.action.SCREEN_BRIGHTNESS_BOOST_CHANGED" />
94
95    <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" />
96    <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" />
97    <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" />
98    <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" />
99    <protected-broadcast android:name="android.app.action.NEXT_ALARM_CLOCK_CHANGED" />
100
101    <protected-broadcast android:name="android.app.action.BUGREPORT_SHARING_DECLINED" />
102    <protected-broadcast android:name="android.app.action.BUGREPORT_FAILED" />
103    <protected-broadcast android:name="android.app.action.BUGREPORT_SHARE" />
104    <protected-broadcast android:name="android.app.action.SHOW_DEVICE_MONITORING_DIALOG" />
105
106    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" />
107    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" />
108    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" />
109    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" />
110    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_HOST_RESTORED" />
111    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_RESTORED" />
112
113    <protected-broadcast android:name="android.os.action.SETTING_RESTORED" />
114
115    <protected-broadcast android:name="android.app.backup.intent.RUN" />
116    <protected-broadcast android:name="android.app.backup.intent.CLEAR" />
117    <protected-broadcast android:name="android.app.backup.intent.INIT" />
118
119    <protected-broadcast android:name="android.bluetooth.intent.DISCOVERABLE_TIMEOUT" />
120    <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" />
121    <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" />
122    <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" />
123    <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" />
124    <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" />
125    <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" />
126    <protected-broadcast android:name="android.bluetooth.device.action.UUID" />
127    <protected-broadcast android:name="android.bluetooth.device.action.MAS_INSTANCE" />
128    <protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" />
129    <protected-broadcast android:name="android.bluetooth.device.action.FOUND" />
130    <protected-broadcast android:name="android.bluetooth.device.action.DISAPPEARED" />
131    <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" />
132    <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" />
133    <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" />
134    <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" />
135    <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" />
136    <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" />
137    <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" />
138    <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" />
139    <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" />
140    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" />
141    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" />
142    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" />
143    <protected-broadcast android:name="android.bluetooth.device.action.SDP_RECORD" />
144    <protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" />
145    <protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" />
146    <protected-broadcast
147        android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" />
148    <protected-broadcast
149        android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" />
150    <protected-broadcast
151        android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" />
152    <protected-broadcast
153        android:name="android.bluetooth.headset.action.HF_INDICATORS_VALUE_CHANGED" />
154    <protected-broadcast
155        android:name="android.bluetooth.headsetclient.profile.action.CONNECTION_STATE_CHANGED" />
156    <protected-broadcast
157        android:name="android.bluetooth.headsetclient.profile.action.AUDIO_STATE_CHANGED" />
158    <protected-broadcast
159        android:name="android.bluetooth.headsetclient.profile.action.AG_EVENT" />
160    <protected-broadcast
161        android:name="android.bluetooth.headsetclient.profile.action.AG_CALL_CHANGED" />
162    <protected-broadcast
163        android:name="android.bluetooth.headsetclient.profile.action.RESULT" />
164    <protected-broadcast
165        android:name="android.bluetooth.headsetclient.profile.action.LAST_VTAG" />
166    <protected-broadcast
167        android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" />
168    <protected-broadcast
169        android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" />
170    <protected-broadcast
171        android:name="android.bluetooth.a2dp.profile.action.CODEC_CONFIG_CHANGED" />
172    <protected-broadcast
173        android:name="android.bluetooth.a2dp-sink.profile.action.CONNECTION_STATE_CHANGED" />
174    <protected-broadcast
175        android:name="android.bluetooth.a2dp-sink.profile.action.PLAYING_STATE_CHANGED" />
176    <protected-broadcast
177        android:name="android.bluetooth.a2dp-sink.profile.action.AUDIO_CONFIG_CHANGED" />
178    <protected-broadcast
179        android:name="android.bluetooth.avrcp-controller.profile.action.CONNECTION_STATE_CHANGED" />
180    <protected-broadcast
181        android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" />
182    <protected-broadcast
183        android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" />
184    <protected-broadcast
185        android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" />
186    <protected-broadcast
187        android:name="android.bluetooth.inputhost.profile.action.CONNECTION_STATE_CHANGED" />
188    <protected-broadcast
189        android:name="android.bluetooth.map.profile.action.CONNECTION_STATE_CHANGED" />
190    <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.CONNECTION_STATE_CHANGED" />
191    <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_RECEIVED" />
192    <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_SENT_SUCCESSFULLY" />
193    <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_DELIVERED_SUCCESSFULLY" />
194    <protected-broadcast
195        android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_SENT" />
196    <protected-broadcast
197        android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_DELIVERY" />
198    <protected-broadcast
199        android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" />
200    <protected-broadcast android:name="android.bluetooth.pbap.intent.action.PBAP_STATE_CHANGED" />
201    <protected-broadcast android:name="android.bluetooth.pbap.profile.action.CONNECTION_STATE_CHANGED" />
202    <protected-broadcast android:name="android.bluetooth.sap.profile.action.CONNECTION_STATE_CHANGED" />
203    <protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" />
204    <protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" />
205    <protected-broadcast android:name="android.btopp.intent.action.LIST" />
206    <protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" />
207    <protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" />
208    <protected-broadcast android:name="android.btopp.intent.action.CONFIRM" />
209    <protected-broadcast android:name="android.btopp.intent.action.HIDE" />
210    <protected-broadcast android:name="android.btopp.intent.action.RETRY" />
211    <protected-broadcast android:name="android.btopp.intent.action.OPEN" />
212    <protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" />
213    <protected-broadcast android:name="android.btopp.intent.action.TRANSFER_COMPLETE" />
214    <protected-broadcast android:name="android.btopp.intent.action.ACCEPT" />
215    <protected-broadcast android:name="com.android.bluetooth.gatt.REFRESH_BATCHED_SCAN" />
216    <protected-broadcast android:name="com.android.bluetooth.pbap.authchall" />
217    <protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" />
218    <protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" />
219    <protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" />
220    <protected-broadcast android:name="com.android.bluetooth.sap.USER_CONFIRM_TIMEOUT" />
221    <protected-broadcast android:name="com.android.bluetooth.sap.action.DISCONNECT_ACTION" />
222
223    <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" />
224
225    <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" />
226    <protected-broadcast android:name="android.hardware.usb.action.USB_PORT_CHANGED" />
227    <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" />
228    <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_DETACHED" />
229    <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" />
230    <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" />
231
232    <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" />
233    <protected-broadcast android:name="android.media.action.HDMI_AUDIO_PLUG" />
234
235    <protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" />
236    <protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" />
237    <protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" />
238    <protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" />
239    <protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" />
240    <protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" />
241    <protected-broadcast android:name="android.media.MASTER_MONO_CHANGED_ACTION" />
242    <protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" />
243    <protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" />
244
245    <protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" />
246    <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" />
247    <protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" />
248    <protected-broadcast android:name="android.intent.action.MEDIA_NOFS" />
249    <protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" />
250    <protected-broadcast android:name="android.intent.action.MEDIA_SHARED" />
251    <protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" />
252    <protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" />
253    <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" />
254    <protected-broadcast android:name="android.intent.action.MEDIA_EJECT" />
255
256    <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL" />
257    <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" />
258    <!-- @deprecated.  Only {@link android.net.ConnectivityManager.CONNECTIVITY_ACTION} is sent. -->
259    <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" />
260    <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" />
261    <protected-broadcast android:name="android.net.conn.RESTRICT_BACKGROUND_CHANGED" />
262    <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" />
263    <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" />
264
265    <protected-broadcast android:name="android.net.nsd.STATE_CHANGED" />
266
267    <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" />
268    <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" />
269    <protected-broadcast android:name="com.android.nfc.action.LLCP_UP" />
270    <protected-broadcast android:name="com.android.nfc.action.LLCP_DOWN" />
271    <protected-broadcast android:name="com.android.nfc.cardemulation.action.CLOSE_TAP_DIALOG" />
272    <protected-broadcast android:name="com.android.nfc.handover.action.ALLOW_CONNECT" />
273    <protected-broadcast android:name="com.android.nfc.handover.action.DENY_CONNECT" />
274    <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" />
275    <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" />
276    <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" />
277    <!-- For NFC to BT handover -->
278    <protected-broadcast android:name="android.btopp.intent.action.WHITELIST_DEVICE" />
279    <protected-broadcast android:name="android.btopp.intent.action.STOP_HANDOVER_TRANSFER" />
280    <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND" />
281    <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND_MULTIPLE" />
282
283    <protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" />
284    <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" />
285
286    <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" />
287
288    <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" />
289    <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" />
290    <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" />
291
292    <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" />
293    <protected-broadcast android:name="com.android.server.WifiManager.action.START_PNO" />
294    <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" />
295    <protected-broadcast android:name="com.android.server.WifiManager.action.DEVICE_IDLE" />
296    <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_ACCEPTED" />
297    <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_DECLINED" />
298    <protected-broadcast android:name="com.android.server.usb.ACTION_OPEN_IN_APPS" />
299    <protected-broadcast android:name="com.android.server.am.DELETE_DUMPHEAP" />
300    <protected-broadcast android:name="com.android.server.net.action.SNOOZE_WARNING" />
301    <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" />
302    <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" />
303    <protected-broadcast android:name="android.net.wifi.WIFI_CREDENTIAL_CHANGED" />
304    <protected-broadcast android:name="android.net.wifi.WIFI_SCAN_AVAILABLE" />
305    <protected-broadcast android:name="android.net.wifi.aware.action.WIFI_AWARE_STATE_CHANGED" />
306    <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" />
307    <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" />
308    <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" />
309    <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" />
310    <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" />
311    <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" />
312    <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" />
313    <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" />
314    <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" />
315    <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" />
316    <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" />
317    <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" />
318    <protected-broadcast android:name="android.net.wifi.p2p.PERSISTENT_GROUPS_CHANGED" />
319    <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" />
320    <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" />
321    <protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" />
322    <protected-broadcast
323            android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" />
324    <protected-broadcast android:name="android.net.scoring.SCORE_NETWORKS" />
325    <protected-broadcast android:name="android.net.scoring.SCORER_CHANGED" />
326    <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" />
327    <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" />
328    <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" />
329    <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" />
330    <protected-broadcast android:name="android.intent.action.APPLICATION_RESTRICTIONS_CHANGED" />
331
332    <!-- Legacy -->
333    <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" />
334    <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" />
335
336    <protected-broadcast android:name="com.android.server.ACTION_TRIGGER_IDLE" />
337
338    <protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" />
339
340    <protected-broadcast android:name="android.intent.action.PHONE_STATE" />
341
342    <protected-broadcast android:name="android.intent.action.SUB_DEFAULT_CHANGED" />
343
344    <protected-broadcast android:name="android.location.GPS_ENABLED_CHANGE" />
345    <protected-broadcast android:name="android.location.PROVIDERS_CHANGED" />
346    <protected-broadcast android:name="android.location.MODE_CHANGED" />
347    <protected-broadcast android:name="android.location.GPS_FIX_CHANGE" />
348    <protected-broadcast android:name="android.net.proxy.PAC_REFRESH" />
349
350    <protected-broadcast android:name="android.telecom.action.DEFAULT_DIALER_CHANGED" />
351    <protected-broadcast android:name="android.provider.action.DEFAULT_SMS_PACKAGE_CHANGED" />
352    <protected-broadcast android:name="android.intent.action.CONTENT_CHANGED" />
353    <protected-broadcast android:name="android.provider.Telephony.MMS_DOWNLOADED" />
354
355    <protected-broadcast
356        android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" />
357
358    <!-- Defined in RestrictionsManager -->
359    <protected-broadcast
360        android:name="android.intent.action.PERMISSION_RESPONSE_RECEIVED" />
361    <!-- Defined in RestrictionsManager -->
362
363    <protected-broadcast android:name="android.intent.action.REQUEST_PERMISSION" />
364    <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_STARTED" />
365    <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
366    <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_PROGRESS" />
367    <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
368
369    <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_SUBSCRIPTION_CHANGED" />
370    <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_SMS_SUBSCRIPTION_CHANGED" />
371    <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_DATA_SUBSCRIPTION_CHANGED" />
372    <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_VOICE_SUBSCRIPTION_CHANGED" />
373    <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_CONTENT_CHANGE" />
374    <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_RECORD_UPDATED" />
375
376    <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_DONE" />
377    <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_FAILED" />
378
379    <protected-broadcast android:name="android.internal.policy.action.BURN_IN_PROTECTION" />
380    <protected-broadcast android:name="android.app.action.SYSTEM_UPDATE_POLICY_CHANGED" />
381    <protected-broadcast android:name="android.app.action.DEVICE_OWNER_CHANGED" />
382
383    <!-- Added in N -->
384    <protected-broadcast android:name="android.intent.action.ANR" />
385    <protected-broadcast android:name="android.intent.action.CALL" />
386    <protected-broadcast android:name="android.intent.action.CALL_PRIVILEGED" />
387    <protected-broadcast android:name="android.intent.action.DROPBOX_ENTRY_ADDED" />
388    <protected-broadcast android:name="android.intent.action.INPUT_METHOD_CHANGED" />
389    <protected-broadcast android:name="android.intent.action.internal_sim_state_changed" />
390    <protected-broadcast android:name="android.intent.action.LOCKED_BOOT_COMPLETED" />
391    <protected-broadcast android:name="android.intent.action.PRECISE_CALL_STATE" />
392    <protected-broadcast android:name="android.intent.action.PRECISE_DATA_CONNECTION_STATE_CHANGED" />
393    <protected-broadcast android:name="android.intent.action.SUBSCRIPTION_PHONE_STATE" />
394    <protected-broadcast android:name="android.intent.action.USER_INFO_CHANGED" />
395    <protected-broadcast android:name="android.intent.action.USER_UNLOCKED" />
396    <protected-broadcast android:name="android.intent.action.WALLPAPER_CHANGED" />
397
398    <protected-broadcast android:name="android.app.action.DEVICE_POLICY_MANAGER_STATE_CHANGED" />
399    <protected-broadcast android:name="android.app.action.CHOOSE_PRIVATE_KEY_ALIAS" />
400    <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLED" />
401    <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLE_REQUESTED" />
402    <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_ENABLED" />
403    <protected-broadcast android:name="android.app.action.LOCK_TASK_ENTERING" />
404    <protected-broadcast android:name="android.app.action.LOCK_TASK_EXITING" />
405    <protected-broadcast android:name="android.app.action.NOTIFY_PENDING_SYSTEM_UPDATE" />
406    <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_CHANGED" />
407    <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_EXPIRING" />
408    <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_FAILED" />
409    <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_SUCCEEDED" />
410    <protected-broadcast android:name="com.android.server.ACTION_EXPIRED_PASSWORD_NOTIFICATION" />
411
412    <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_ADDED" />
413    <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNLOCKED" />
414    <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_REMOVED" />
415
416    <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_STATE_CHANGED" />
417    <protected-broadcast android:name="com.android.bluetooth.map.USER_CONFIRM_TIMEOUT" />
418    <protected-broadcast android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_SENT" />
419    <protected-broadcast android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_DELIVERY" />
420    <protected-broadcast android:name="android.content.jobscheduler.JOB_DELAY_EXPIRED" />
421    <protected-broadcast android:name="android.content.syncmanager.SYNC_ALARM" />
422    <protected-broadcast android:name="android.media.INTERNAL_RINGER_MODE_CHANGED_ACTION" />
423    <protected-broadcast android:name="android.media.STREAM_DEVICES_CHANGED_ACTION" />
424    <protected-broadcast android:name="android.media.STREAM_MUTE_CHANGED_ACTION" />
425    <protected-broadcast android:name="android.net.sip.SIP_SERVICE_UP" />
426    <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" />
427    <protected-broadcast android:name="android.os.action.CHARGING" />
428    <protected-broadcast android:name="android.os.action.DISCHARGING" />
429    <protected-broadcast android:name="android.search.action.SEARCHABLES_CHANGED" />
430    <protected-broadcast android:name="android.security.STORAGE_CHANGED" />
431    <protected-broadcast android:name="android.security.action.TRUST_STORE_CHANGED" />
432    <protected-broadcast android:name="android.security.action.KEYCHAIN_CHANGED" />
433    <protected-broadcast android:name="android.security.action.KEY_ACCESS_CHANGED" />
434    <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_REGISTERED" />
435    <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_UNREGISTERED" />
436    <protected-broadcast android:name="android.telecom.action.SHOW_MISSED_CALLS_NOTIFICATION" />
437    <protected-broadcast android:name="android.telephony.action.CARRIER_CONFIG_CHANGED" />
438
439    <protected-broadcast android:name="com.android.bluetooth.btservice.action.ALARM_WAKEUP" />
440    <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_POLL" />
441    <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_UPDATED" />
442    <protected-broadcast android:name="com.android.server.NetworkTimeUpdateService.action.POLL" />
443    <protected-broadcast android:name="com.android.server.telecom.intent.action.CALLS_ADD_ENTRY" />
444    <protected-broadcast android:name="com.android.settings.location.MODE_CHANGING" />
445
446    <protected-broadcast android:name="ScheduleConditionProvider.EVALUATE" />
447    <protected-broadcast android:name="EventConditionProvider.EVALUATE" />
448    <protected-broadcast android:name="SnoozeHelper.EVALUATE" />
449    <protected-broadcast android:name="wifi_scan_available" />
450
451    <protected-broadcast android:name="action.cne.started" />
452    <protected-broadcast android:name="android.content.jobscheduler.JOB_DEADLINE_EXPIRED" />
453    <protected-broadcast android:name="android.intent.action.ACTION_UNSOL_RESPONSE_OEM_HOOK_RAW" />
454    <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_SUPL" />
455    <protected-broadcast android:name="android.os.action.ACTION_EFFECTS_SUPPRESSOR_CHANGED" />
456    <protected-broadcast android:name="android.os.action.LIGHT_DEVICE_IDLE_MODE_CHANGED" />
457    <protected-broadcast android:name="android.os.storage.action.VOLUME_STATE_CHANGED" />
458    <protected-broadcast android:name="android.os.storage.action.DISK_SCANNED" />
459    <protected-broadcast android:name="com.android.server.action.UPDATE_TWILIGHT_STATE" />
460    <protected-broadcast android:name="com.android.server.action.RESET_TWILIGHT_AUTO" />
461    <protected-broadcast android:name="com.android.server.device_idle.STEP_IDLE_STATE" />
462    <protected-broadcast android:name="com.android.server.device_idle.STEP_LIGHT_IDLE_STATE" />
463    <protected-broadcast android:name="com.android.server.Wifi.action.TOGGLE_PNO" />
464    <protected-broadcast android:name="intent.action.ACTION_RF_BAND_INFO" />
465    <protected-broadcast android:name="android.intent.action.MEDIA_RESOURCE_GRANTED" />
466    <protected-broadcast android:name="android.app.action.NETWORK_LOGS_AVAILABLE" />
467    <protected-broadcast android:name="android.app.action.SECURITY_LOGS_AVAILABLE" />
468
469    <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED" />
470    <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED_INTERNAL" />
471    <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_CHANGED" />
472    <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_ACCESS_GRANTED_CHANGED" />
473    <protected-broadcast android:name="android.os.action.ACTION_EFFECTS_SUPPRESSOR_CHANGED" />
474
475    <protected-broadcast android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS" />
476    <protected-broadcast android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS" />
477
478    <protected-broadcast android:name="android.intent.action.DYNAMIC_SENSOR_CHANGED" />
479
480    <protected-broadcast android:name="android.intent.action.ACTION_RADIO_OFF" />
481
482    <protected-broadcast android:name="android.accounts.LOGIN_ACCOUNTS_CHANGED" />
483    <protected-broadcast android:name="com.android.sync.SYNC_CONN_STATUS_CHANGED" />
484
485    <protected-broadcast android:name="com.android.phone.SIP_INCOMING_CALL" />
486    <protected-broadcast android:name="com.android.phone.SIP_ADD_PHONE" />
487    <protected-broadcast android:name="com.android.phone.SIP_REMOVE_PHONE" />
488    <protected-broadcast android:name="com.android.phone.SIP_CALL_OPTION_CHANGED" />
489
490    <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_CONNECTED" />
491    <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_DISCONNECTED" />
492
493    <protected-broadcast android:name="android.bluetooth.input.profile.action.HANDSHAKE" />
494    <protected-broadcast android:name="android.bluetooth.input.profile.action.REPORT" />
495
496    <protected-broadcast android:name="android.intent.action.TWILIGHT_CHANGED" />
497
498    <protected-broadcast android:name="com.android.server.fingerprint.ACTION_LOCKOUT_RESET" />
499    <protected-broadcast android:name="android.net.wifi.PASSPOINT_ICON_RECEIVED" />
500    <protected-broadcast android:name="com.android.server.notification.CountdownConditionProvider" />
501
502    <protected-broadcast android:name="com.android.internal.location.ALARM_WAKEUP" />
503    <protected-broadcast android:name="com.android.internal.location.ALARM_TIMEOUT" />
504    <protected-broadcast android:name="android.intent.action.GLOBAL_BUTTON" />
505
506    <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_AVAILABLE" />
507    <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNAVAILABLE" />
508    <protected-broadcast android:name="com.android.server.pm.DISABLE_QUIET_MODE_AFTER_UNLOCK" />
509
510    <protected-broadcast android:name="com.android.server.retaildemo.ACTION_RESET_DEMO" />
511
512    <protected-broadcast android:name="android.intent.action.DEVICE_LOCKED_CHANGED" />
513
514    <!-- Added in O -->
515    <!-- TODO: temporary broadcast used by AutoFillManagerServiceImpl; will be removed -->
516    <protected-broadcast android:name="com.android.internal.autofill.action.REQUEST_AUTOFILL" />
517
518    <!-- ====================================================================== -->
519    <!--                          RUNTIME PERMISSIONS                           -->
520    <!-- ====================================================================== -->
521    <eat-comment />
522
523    <!-- ====================================================================== -->
524    <!-- Permissions for accessing user's contacts including personal profile   -->
525    <!-- ====================================================================== -->
526    <eat-comment />
527
528    <!-- Used for runtime permissions related to contacts and profiles on this
529        device. -->
530    <permission-group android:name="android.permission-group.CONTACTS"
531        android:icon="@drawable/perm_group_contacts"
532        android:label="@string/permgrouplab_contacts"
533        android:description="@string/permgroupdesc_contacts"
534        android:priority="100" />
535
536    <!-- Allows an application to read the user's contacts data.
537        <p>Protection level: dangerous
538    -->
539    <permission android:name="android.permission.READ_CONTACTS"
540        android:permissionGroup="android.permission-group.CONTACTS"
541        android:label="@string/permlab_readContacts"
542        android:description="@string/permdesc_readContacts"
543        android:protectionLevel="dangerous" />
544
545    <!-- Allows an application to write the user's contacts data.
546         <p>Protection level: dangerous
547    -->
548    <permission android:name="android.permission.WRITE_CONTACTS"
549        android:permissionGroup="android.permission-group.CONTACTS"
550        android:label="@string/permlab_writeContacts"
551        android:description="@string/permdesc_writeContacts"
552        android:protectionLevel="dangerous" />
553
554    <!-- ====================================================================== -->
555    <!-- Permissions for accessing user's calendar                              -->
556    <!-- ====================================================================== -->
557    <eat-comment />
558
559    <!-- Used for runtime permissions related to user's calendar. -->
560    <permission-group android:name="android.permission-group.CALENDAR"
561        android:icon="@drawable/perm_group_calendar"
562        android:label="@string/permgrouplab_calendar"
563        android:description="@string/permgroupdesc_calendar"
564        android:priority="200" />
565
566    <!-- Allows an application to read the user's calendar data.
567         <p>Protection level: dangerous
568    -->
569    <permission android:name="android.permission.READ_CALENDAR"
570        android:permissionGroup="android.permission-group.CALENDAR"
571        android:label="@string/permlab_readCalendar"
572        android:description="@string/permdesc_readCalendar"
573        android:protectionLevel="dangerous" />
574
575    <!-- Allows an application to write the user's calendar data.
576         <p>Protection level: dangerous
577    -->
578    <permission android:name="android.permission.WRITE_CALENDAR"
579        android:permissionGroup="android.permission-group.CALENDAR"
580        android:label="@string/permlab_writeCalendar"
581        android:description="@string/permdesc_writeCalendar"
582        android:protectionLevel="dangerous" />
583
584    <!-- ====================================================================== -->
585    <!-- Permissions for accessing and modifying user's SMS messages            -->
586    <!-- ====================================================================== -->
587    <eat-comment />
588
589    <!-- Used for runtime permissions related to user's SMS messages. -->
590    <permission-group android:name="android.permission-group.SMS"
591        android:icon="@drawable/perm_group_sms"
592        android:label="@string/permgrouplab_sms"
593        android:description="@string/permgroupdesc_sms"
594        android:priority="300" />
595
596    <!-- Allows an application to send SMS messages.
597         <p>Protection level: dangerous
598    -->
599    <permission android:name="android.permission.SEND_SMS"
600        android:permissionGroup="android.permission-group.SMS"
601        android:label="@string/permlab_sendSms"
602        android:description="@string/permdesc_sendSms"
603        android:permissionFlags="costsMoney"
604        android:protectionLevel="dangerous" />
605
606    <!-- Allows an application to receive SMS messages.
607         <p>Protection level: dangerous
608    -->
609    <permission android:name="android.permission.RECEIVE_SMS"
610        android:permissionGroup="android.permission-group.SMS"
611        android:label="@string/permlab_receiveSms"
612        android:description="@string/permdesc_receiveSms"
613        android:protectionLevel="dangerous"/>
614
615    <!-- Allows an application to read SMS messages.
616         <p>Protection level: dangerous
617    -->
618    <permission android:name="android.permission.READ_SMS"
619        android:permissionGroup="android.permission-group.SMS"
620        android:label="@string/permlab_readSms"
621        android:description="@string/permdesc_readSms"
622        android:protectionLevel="dangerous" />
623
624    <!-- Allows an application to receive WAP push messages.
625         <p>Protection level: dangerous
626    -->
627    <permission android:name="android.permission.RECEIVE_WAP_PUSH"
628        android:permissionGroup="android.permission-group.SMS"
629        android:label="@string/permlab_receiveWapPush"
630        android:description="@string/permdesc_receiveWapPush"
631        android:protectionLevel="dangerous" />
632
633    <!-- Allows an application to monitor incoming MMS messages.
634        <p>Protection level: dangerous
635    -->
636    <permission android:name="android.permission.RECEIVE_MMS"
637        android:permissionGroup="android.permission-group.SMS"
638        android:label="@string/permlab_receiveMms"
639        android:description="@string/permdesc_receiveMms"
640        android:protectionLevel="dangerous" />
641
642    <!-- Allows an application to read previously received cell broadcast
643         messages and to register a content observer to get notifications when
644         a cell broadcast has been received and added to the database. For
645         emergency alerts, the database is updated immediately after the
646         alert dialog and notification sound/vibration/speech are presented.
647         The "read" column is then updated after the user dismisses the alert.
648         This enables supplementary emergency assistance apps to start loading
649         additional emergency information (if Internet access is available)
650         when the alert is first received, and to delay presenting the info
651         to the user until after the initial alert dialog is dismissed.
652         <p>Protection level: dangerous
653         @hide Pending API council approval -->
654    <permission android:name="android.permission.READ_CELL_BROADCASTS"
655        android:permissionGroup="android.permission-group.SMS"
656        android:label="@string/permlab_readCellBroadcasts"
657        android:description="@string/permdesc_readCellBroadcasts"
658        android:protectionLevel="dangerous" />
659
660    <!-- ====================================================================== -->
661    <!-- Permissions for accessing external storage                             -->
662    <!-- ====================================================================== -->
663    <eat-comment />
664
665    <!-- Used for runtime permissions related to the shared external storage. -->
666    <permission-group android:name="android.permission-group.STORAGE"
667        android:icon="@drawable/perm_group_storage"
668        android:label="@string/permgrouplab_storage"
669        android:description="@string/permgroupdesc_storage"
670        android:priority="900" />
671
672    <!-- Allows an application to read from external storage.
673     <p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly
674     granted this permission.</p>
675     <p>This permission is enforced starting in API level 19.  Before API level 19, this
676     permission is not enforced and all apps still have access to read from external storage.
677     You can test your app with the permission enforced by enabling <em>Protect USB
678     storage</em> under Developer options in the Settings app on a device running Android 4.1 or
679     higher.</p>
680     <p>Also starting in API level 19, this permission is <em>not</em> required to
681     read/write files in your application-specific directories returned by
682     {@link android.content.Context#getExternalFilesDir} and
683     {@link android.content.Context#getExternalCacheDir}.
684     <p class="note"><strong>Note:</strong> If <em>both</em> your <a
685     href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
686     minSdkVersion}</a> and <a
687     href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
688     targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
689     grants your app this permission. If you don't need this permission, be sure your <a
690     href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
691     targetSdkVersion}</a> is 4 or higher.
692     <p>Protection level: dangerous
693     -->
694    <permission android:name="android.permission.READ_EXTERNAL_STORAGE"
695        android:permissionGroup="android.permission-group.STORAGE"
696        android:label="@string/permlab_sdcardRead"
697        android:description="@string/permdesc_sdcardRead"
698        android:protectionLevel="dangerous" />
699
700    <!-- Allows an application to write to external storage.
701         <p class="note"><strong>Note:</strong> If <em>both</em> your <a
702         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
703         minSdkVersion}</a> and <a
704         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
705         targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
706         grants your app this permission. If you don't need this permission, be sure your <a
707         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
708         targetSdkVersion}</a> is 4 or higher.
709         <p>Starting in API level 19, this permission is <em>not</em> required to
710         read/write files in your application-specific directories returned by
711         {@link android.content.Context#getExternalFilesDir} and
712         {@link android.content.Context#getExternalCacheDir}.
713         <p>Protection level: dangerous
714    -->
715    <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE"
716        android:permissionGroup="android.permission-group.STORAGE"
717        android:label="@string/permlab_sdcardWrite"
718        android:description="@string/permdesc_sdcardWrite"
719        android:protectionLevel="dangerous" />
720
721    <!-- ====================================================================== -->
722    <!-- Permissions for accessing the device location                          -->
723    <!-- ====================================================================== -->
724    <eat-comment />
725
726    <!-- Used for permissions that allow accessing the device location. -->
727    <permission-group android:name="android.permission-group.LOCATION"
728        android:icon="@drawable/perm_group_location"
729        android:label="@string/permgrouplab_location"
730        android:description="@string/permgroupdesc_location"
731        android:priority="400" />
732
733    <!-- Allows an app to access precise location.
734         Alternatively, you might want {@link #ACCESS_COARSE_LOCATION}.
735         <p>Protection level: dangerous
736    -->
737    <permission android:name="android.permission.ACCESS_FINE_LOCATION"
738        android:permissionGroup="android.permission-group.LOCATION"
739        android:label="@string/permlab_accessFineLocation"
740        android:description="@string/permdesc_accessFineLocation"
741        android:protectionLevel="dangerous|ephemeral" />
742
743    <!-- Allows an app to access approximate location.
744         Alternatively, you might want {@link #ACCESS_FINE_LOCATION}.
745         <p>Protection level: dangerous
746    -->
747    <permission android:name="android.permission.ACCESS_COARSE_LOCATION"
748        android:permissionGroup="android.permission-group.LOCATION"
749        android:label="@string/permlab_accessCoarseLocation"
750        android:description="@string/permdesc_accessCoarseLocation"
751        android:protectionLevel="dangerous|ephemeral" />
752
753    <!-- ====================================================================== -->
754    <!-- Permissions for accessing the device telephony                         -->
755    <!-- ====================================================================== -->
756    <eat-comment />
757
758    <!-- Used for permissions that are associated telephony features. -->
759    <permission-group android:name="android.permission-group.PHONE"
760        android:icon="@drawable/perm_group_phone_calls"
761        android:label="@string/permgrouplab_phone"
762        android:description="@string/permgroupdesc_phone"
763        android:priority="500" />
764
765    <!-- Allows read only access to phone state, including the phone number of the device,
766         current cellular network information, the status of any ongoing calls, and a list of any
767         {@link android.telecom.PhoneAccount}s registered on the device.
768         <p class="note"><strong>Note:</strong> If <em>both</em> your <a
769         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
770         minSdkVersion}</a> and <a
771         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
772         targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
773         grants your app this permission. If you don't need this permission, be sure your <a
774         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
775         targetSdkVersion}</a> is 4 or higher.
776         <p>Protection level: dangerous
777    -->
778    <permission android:name="android.permission.READ_PHONE_STATE"
779        android:permissionGroup="android.permission-group.PHONE"
780        android:label="@string/permlab_readPhoneState"
781        android:description="@string/permdesc_readPhoneState"
782        android:protectionLevel="dangerous" />
783
784    <!-- Allows read access to the device's phone number. This is a subset of the capabilities
785         granted by {@link #READ_PHONE_STATE} but is exposed to ephemeral applications.
786         <p>Protection level: dangerous-->
787    <permission android:name="android.permission.READ_PHONE_NUMBER"
788        android:permissionGroup="android.permission-group.PHONE"
789        android:label="@string/permlab_readPhoneNumber"
790        android:description="@string/permdesc_readPhoneNumber"
791        android:protectionLevel="dangerous|ephemeral" />
792
793    <!-- Allows an application to initiate a phone call without going through
794        the Dialer user interface for the user to confirm the call.
795        <p>Protection level: dangerous
796    -->
797    <permission android:name="android.permission.CALL_PHONE"
798        android:permissionGroup="android.permission-group.PHONE"
799        android:permissionFlags="costsMoney"
800        android:label="@string/permlab_callPhone"
801        android:description="@string/permdesc_callPhone"
802        android:protectionLevel="dangerous" />
803
804    <!-- Allows an application to access the IMS call service: making and
805         modifying a call
806        <p>Protection level: signature|privileged
807        @hide
808    -->
809    <permission android:name="android.permission.ACCESS_IMS_CALL_SERVICE"
810        android:permissionGroup="android.permission-group.PHONE"
811        android:label="@string/permlab_accessImsCallService"
812        android:description="@string/permdesc_accessImsCallService"
813        android:protectionLevel="signature|privileged" />
814
815    <!-- Allows an application to read the user's call log.
816         <p class="note"><strong>Note:</strong> If your app uses the
817         {@link #READ_CONTACTS} permission and <em>both</em> your <a
818         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
819         minSdkVersion}</a> and <a
820         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
821         targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
822         grants your app this permission. If you don't need this permission, be sure your <a
823         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
824         targetSdkVersion}</a> is 16 or higher.</p>
825         <p>Protection level: dangerous
826    -->
827    <permission android:name="android.permission.READ_CALL_LOG"
828        android:permissionGroup="android.permission-group.PHONE"
829        android:label="@string/permlab_readCallLog"
830        android:description="@string/permdesc_readCallLog"
831        android:protectionLevel="dangerous" />
832
833    <!-- Allows an application to write (but not read) the user's
834         call log data.
835         <p class="note"><strong>Note:</strong> If your app uses the
836         {@link #WRITE_CONTACTS} permission and <em>both</em> your <a
837         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
838         minSdkVersion}</a> and <a
839         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
840         targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
841         grants your app this permission. If you don't need this permission, be sure your <a
842         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
843         targetSdkVersion}</a> is 16 or higher.</p>
844         <p>Protection level: dangerous
845    -->
846    <permission android:name="android.permission.WRITE_CALL_LOG"
847        android:permissionGroup="android.permission-group.PHONE"
848        android:label="@string/permlab_writeCallLog"
849        android:description="@string/permdesc_writeCallLog"
850        android:protectionLevel="dangerous" />
851
852    <!-- Allows an application to add voicemails into the system.
853         <p>Protection level: dangerous
854    -->
855    <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL"
856        android:permissionGroup="android.permission-group.PHONE"
857        android:label="@string/permlab_addVoicemail"
858        android:description="@string/permdesc_addVoicemail"
859        android:protectionLevel="dangerous" />
860
861    <!-- Allows an application to use SIP service.
862         <p>Protection level: dangerous
863    -->
864    <permission android:name="android.permission.USE_SIP"
865        android:permissionGroup="android.permission-group.PHONE"
866        android:description="@string/permdesc_use_sip"
867        android:label="@string/permlab_use_sip"
868        android:protectionLevel="dangerous"/>
869
870    <!-- Allows an application to see the number being dialed during an outgoing
871         call with the option to redirect the call to a different number or
872         abort the call altogether.
873         <p>Protection level: dangerous
874    -->
875    <permission android:name="android.permission.PROCESS_OUTGOING_CALLS"
876        android:permissionGroup="android.permission-group.PHONE"
877        android:label="@string/permlab_processOutgoingCalls"
878        android:description="@string/permdesc_processOutgoingCalls"
879        android:protectionLevel="dangerous" />
880
881    <!-- ====================================================================== -->
882    <!-- Permissions for accessing the device microphone                        -->
883    <!-- ====================================================================== -->
884    <eat-comment />
885
886    <!-- Used for permissions that are associated with accessing
887         microphone audio from the device. Note that phone calls also capture audio
888         but are in a separate (more visible) permission group. -->
889    <permission-group android:name="android.permission-group.MICROPHONE"
890        android:icon="@drawable/perm_group_microphone"
891        android:label="@string/permgrouplab_microphone"
892        android:description="@string/permgroupdesc_microphone"
893        android:priority="600" />
894
895    <!-- Allows an application to record audio.
896         <p>Protection level: dangerous
897    -->
898    <permission android:name="android.permission.RECORD_AUDIO"
899        android:permissionGroup="android.permission-group.MICROPHONE"
900        android:label="@string/permlab_recordAudio"
901        android:description="@string/permdesc_recordAudio"
902        android:protectionLevel="dangerous"/>
903
904    <!-- ====================================================================== -->
905    <!-- Permissions for accessing the UCE Service                              -->
906    <!-- ====================================================================== -->
907
908    <!-- @hide Allows an application to Access UCE-Presence.
909         <p>Protection level: dangerous
910    -->
911    <permission android:name="android.permission.ACCESS_UCE_PRESENCE_SERVICE"
912        android:permissionGroup="android.permission-group.PHONE"
913        android:protectionLevel="signatureOrSystem"/>
914
915    <!-- @hide Allows an application to Access UCE-OPTIONS.
916         <p>Protection level: dangerous
917    -->
918    <permission android:name="android.permission.ACCESS_UCE_OPTIONS_SERVICE"
919        android:permissionGroup="android.permission-group.PHONE"
920        android:protectionLevel="signatureOrSystem"/>
921
922
923
924    <!-- ====================================================================== -->
925    <!-- Permissions for accessing the device camera                            -->
926    <!-- ====================================================================== -->
927    <eat-comment />
928
929    <!-- Used for permissions that are associated with accessing
930     camera or capturing images/video from the device. -->
931    <permission-group android:name="android.permission-group.CAMERA"
932        android:icon="@drawable/perm_group_camera"
933        android:label="@string/permgrouplab_camera"
934        android:description="@string/permgroupdesc_camera"
935        android:priority="700" />
936
937    <!-- Required to be able to access the camera device.
938         <p>This will automatically enforce the <a
939         href="{@docRoot}guide/topics/manifest/uses-feature-element.html">
940         <uses-feature>}</a> manifest element for <em>all</em> camera features.
941         If you do not require all camera features or can properly operate if a camera
942         is not available, then you must modify your manifest as appropriate in order to
943         install on devices that don't support all camera features.</p>
944         <p>Protection level: dangerous
945    -->
946    <permission android:name="android.permission.CAMERA"
947        android:permissionGroup="android.permission-group.CAMERA"
948        android:label="@string/permlab_camera"
949        android:description="@string/permdesc_camera"
950        android:protectionLevel="dangerous|ephemeral" />
951
952
953    <!-- ====================================================================== -->
954    <!-- Permissions for accessing the device sensors                           -->
955    <!-- ====================================================================== -->
956    <eat-comment />
957
958    <!-- Used for permissions that are associated with accessing
959         camera or capturing images/video from the device. -->
960    <permission-group android:name="android.permission-group.SENSORS"
961        android:icon="@drawable/perm_group_sensors"
962        android:label="@string/permgrouplab_sensors"
963        android:description="@string/permgroupdesc_sensors"
964        android:priority="800" />
965
966    <!-- Allows an application to access data from sensors that the user uses to
967         measure what is happening inside his/her body, such as heart rate.
968         <p>Protection level: dangerous -->
969    <permission android:name="android.permission.BODY_SENSORS"
970        android:permissionGroup="android.permission-group.SENSORS"
971        android:label="@string/permlab_bodySensors"
972        android:description="@string/permdesc_bodySensors"
973        android:protectionLevel="dangerous" />
974
975    <!-- Allows an app to use fingerprint hardware.
976         <p>Protection level: normal
977    -->
978    <permission android:name="android.permission.USE_FINGERPRINT"
979        android:permissionGroup="android.permission-group.SENSORS"
980        android:label="@string/permlab_useFingerprint"
981        android:description="@string/permdesc_useFingerprint"
982        android:protectionLevel="normal" />
983
984    <!-- ====================================================================== -->
985    <!-- REMOVED PERMISSIONS                                                    -->
986    <!-- ====================================================================== -->
987
988    <!-- @hide We need to keep this around for backwards compatibility -->
989    <permission android:name="android.permission.READ_PROFILE"
990        android:protectionLevel="normal"
991        android:permissionFlags="removed"/>
992
993    <!-- @hide We need to keep this around for backwards compatibility -->
994    <permission android:name="android.permission.WRITE_PROFILE"
995        android:protectionLevel="normal"
996        android:permissionFlags="removed"/>
997
998    <!-- @hide We need to keep this around for backwards compatibility -->
999    <permission android:name="android.permission.READ_SOCIAL_STREAM"
1000        android:protectionLevel="normal"
1001        android:permissionFlags="removed"/>
1002
1003    <!-- @hide We need to keep this around for backwards compatibility -->
1004    <permission android:name="android.permission.WRITE_SOCIAL_STREAM"
1005        android:protectionLevel="normal"
1006        android:permissionFlags="removed"/>
1007
1008    <!-- @hide We need to keep this around for backwards compatibility -->
1009    <permission android:name="android.permission.READ_USER_DICTIONARY"
1010        android:protectionLevel="normal"
1011        android:permissionFlags="removed"/>
1012
1013    <!-- @hide We need to keep this around for backwards compatibility -->
1014    <permission android:name="android.permission.WRITE_USER_DICTIONARY"
1015        android:protectionLevel="normal"
1016        android:permissionFlags="removed"/>
1017
1018    <!-- @hide We need to keep this around for backwards compatibility -->
1019    <permission android:name="android.permission.WRITE_SMS"
1020        android:protectionLevel="normal"
1021        android:permissionFlags="removed"/>
1022
1023    <!-- @hide We need to keep this around for backwards compatibility -->
1024    <permission android:name="com.android.browser.permission.READ_HISTORY_BOOKMARKS"
1025        android:protectionLevel="normal"
1026        android:permissionFlags="removed"/>
1027
1028    <!-- @hide We need to keep this around for backwards compatibility -->
1029    <permission android:name="com.android.browser.permission.WRITE_HISTORY_BOOKMARKS"
1030        android:protectionLevel="normal"
1031        android:permissionFlags="removed"/>
1032
1033    <!-- @hide We need to keep this around for backwards compatibility -->
1034    <permission android:name="android.permission.AUTHENTICATE_ACCOUNTS"
1035        android:protectionLevel="normal"
1036        android:permissionFlags="removed"/>
1037
1038    <!-- @hide We need to keep this around for backwards compatibility -->
1039    <permission android:name="android.permission.MANAGE_ACCOUNTS"
1040        android:protectionLevel="normal"
1041        android:permissionFlags="removed"/>
1042
1043    <!-- @hide We need to keep this around for backwards compatibility -->
1044    <permission android:name="android.permission.USE_CREDENTIALS"
1045        android:protectionLevel="normal"
1046        android:permissionFlags="removed"/>
1047
1048    <!-- @hide We need to keep this around for backwards compatibility -->
1049    <permission android:name="android.permission.SUBSCRIBED_FEEDS_READ"
1050        android:protectionLevel="normal"
1051        android:permissionFlags="removed"/>
1052
1053    <!-- @hide We need to keep this around for backwards compatibility -->
1054    <permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE"
1055        android:protectionLevel="normal"
1056        android:permissionFlags="removed"/>
1057
1058    <!-- @hide We need to keep this around for backwards compatibility -->
1059    <permission android:name="android.permission.FLASHLIGHT"
1060        android:protectionLevel="normal"
1061        android:permissionFlags="removed"/>
1062
1063    <!-- ====================================================================== -->
1064    <!-- INSTALL PERMISSIONS                                                    -->
1065    <!-- ====================================================================== -->
1066
1067    <!-- ================================== -->
1068    <!-- Permissions for accessing messages -->
1069    <!-- ================================== -->
1070    <eat-comment />
1071
1072    <!-- @SystemApi Allows an application (Phone) to send a request to other applications
1073         to handle the respond-via-message action during incoming calls.
1074         <p>Not for use by third-party applications. -->
1075    <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE"
1076        android:protectionLevel="signature|privileged" />
1077
1078    <!-- @SystemApi Allows an application to send SMS to premium shortcodes without user permission.
1079         <p>Not for use by third-party applications.
1080         @hide -->
1081    <permission android:name="android.permission.SEND_SMS_NO_CONFIRMATION"
1082        android:protectionLevel="signature|privileged" />
1083
1084    <!-- Allows an application to filter carrier specific sms.
1085         @hide -->
1086    <permission android:name="android.permission.CARRIER_FILTER_SMS"
1087        android:protectionLevel="signature|privileged" />
1088
1089    <!-- @SystemApi Allows an application to receive emergency cell broadcast messages,
1090         to record or display them to the user.
1091         <p>Not for use by third-party applications.
1092         @hide -->
1093    <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST"
1094        android:protectionLevel="signature|privileged" />
1095
1096    <!-- Allows an application to monitor incoming Bluetooth MAP messages, to record
1097         or perform processing on them. -->
1098    <!-- @hide -->
1099    <permission android:name="android.permission.RECEIVE_BLUETOOTH_MAP"
1100        android:protectionLevel="signature|privileged" />
1101
1102    <!-- @SystemApi @hide Allows an application to execute contacts directory search.
1103         This should only be used by ContactsProvider.
1104         <p>Not for use by third-party applications. -->
1105    <permission android:name="android.permission.BIND_DIRECTORY_SEARCH"
1106        android:protectionLevel="signature|privileged" />
1107
1108    <!-- @SystemApi @hide Allows an application to modify cell broadcasts through the content provider.
1109         <p>Not for use by third-party applications. -->
1110    <permission android:name="android.permission.MODIFY_CELL_BROADCASTS"
1111                android:protectionLevel="signature|privileged" />
1112
1113    <!-- =============================================================== -->
1114    <!-- Permissions for setting the device alarm                        -->
1115    <!-- =============================================================== -->
1116    <eat-comment />
1117
1118    <!-- Allows an application to broadcast an Intent to set an alarm for the user.
1119         <p>Protection level: normal
1120    -->
1121    <permission android:name="com.android.alarm.permission.SET_ALARM"
1122        android:label="@string/permlab_setAlarm"
1123        android:description="@string/permdesc_setAlarm"
1124        android:protectionLevel="normal" />
1125
1126    <!-- =============================================================== -->
1127    <!-- Permissions for accessing the user voicemail                    -->
1128    <!-- =============================================================== -->
1129    <eat-comment />
1130
1131    <!-- Allows an application to modify and remove existing voicemails in the system.
1132        <p>Protection level: signature|privileged
1133    -->
1134    <permission android:name="com.android.voicemail.permission.WRITE_VOICEMAIL"
1135        android:protectionLevel="signature|privileged" />
1136
1137    <!-- Allows an application to read voicemails in the system.
1138         <p>Protection level: signature|privileged
1139    -->
1140    <permission android:name="com.android.voicemail.permission.READ_VOICEMAIL"
1141        android:protectionLevel="signature|privileged" />
1142
1143    <!-- ======================================= -->
1144    <!-- Permissions for accessing location info -->
1145    <!-- ======================================= -->
1146    <eat-comment />
1147
1148    <!-- Allows an application to access extra location provider commands.
1149         <p>Protection level: normal
1150    -->
1151    <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS"
1152        android:label="@string/permlab_accessLocationExtraCommands"
1153        android:description="@string/permdesc_accessLocationExtraCommands"
1154        android:protectionLevel="normal" />
1155
1156    <!-- @SystemApi Allows an application to install a location provider into the Location Manager.
1157    <p>Not for use by third-party applications. -->
1158    <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER"
1159        android:protectionLevel="signature|privileged" />
1160
1161    <!-- @SystemApi @hide Allows HDMI-CEC service to access device and configuration files.
1162         This should only be used by HDMI-CEC service.
1163    -->
1164    <permission android:name="android.permission.HDMI_CEC"
1165        android:protectionLevel="signature|privileged" />
1166
1167    <!-- @SystemApi Allows an application to use location features in hardware,
1168         such as the geofencing api.
1169         <p>Not for use by third-party applications. -->
1170    <permission android:name="android.permission.LOCATION_HARDWARE"
1171        android:protectionLevel="signature|privileged" />
1172    <uses-permission android:name="android.permission.LOCATION_HARDWARE"/>
1173
1174    <!-- @SystemApi Allows an application to create mock location providers for testing.
1175         <p>Protection level: signature
1176         @hide
1177    -->
1178    <permission android:name="android.permission.ACCESS_MOCK_LOCATION"
1179        android:protectionLevel="signature" />
1180
1181    <!-- ======================================= -->
1182    <!-- Permissions for accessing networks -->
1183    <!-- ======================================= -->
1184    <eat-comment />
1185
1186    <!-- Allows applications to open network sockets.
1187         <p>Protection level: normal
1188    -->
1189    <permission android:name="android.permission.INTERNET"
1190        android:description="@string/permdesc_createNetworkSockets"
1191        android:label="@string/permlab_createNetworkSockets"
1192        android:protectionLevel="normal|ephemeral" />
1193
1194    <!-- Allows applications to access information about networks.
1195         <p>Protection level: normal
1196    -->
1197    <permission android:name="android.permission.ACCESS_NETWORK_STATE"
1198        android:description="@string/permdesc_accessNetworkState"
1199        android:label="@string/permlab_accessNetworkState"
1200        android:protectionLevel="normal|ephemeral" />
1201
1202    <!-- Allows applications to access information about Wi-Fi networks.
1203         <p>Protection level: normal
1204    -->
1205    <permission android:name="android.permission.ACCESS_WIFI_STATE"
1206        android:description="@string/permdesc_accessWifiState"
1207        android:label="@string/permlab_accessWifiState"
1208        android:protectionLevel="normal" />
1209
1210    <!-- Allows applications to change Wi-Fi connectivity state.
1211         <p>Protection level: normal
1212    -->
1213    <permission android:name="android.permission.CHANGE_WIFI_STATE"
1214        android:description="@string/permdesc_changeWifiState"
1215        android:label="@string/permlab_changeWifiState"
1216        android:protectionLevel="normal" />
1217
1218    <!-- @SystemApi @hide Allows applications to read Wi-Fi credential.
1219         <p>Not for use by third-party applications. -->
1220    <permission android:name="android.permission.READ_WIFI_CREDENTIAL"
1221        android:protectionLevel="signature|privileged" />
1222
1223    <!-- @SystemApi @hide Allows applications to change tether state and run
1224         tether carrier provisioning.
1225         <p>Not for use by third-party applications. -->
1226    <permission android:name="android.permission.TETHER_PRIVILEGED"
1227        android:protectionLevel="signature|privileged" />
1228
1229    <!-- @SystemApi @hide Allow system apps to receive broadcast
1230         when a wifi network credential is changed.
1231         <p>Not for use by third-party applications. -->
1232    <permission android:name="android.permission.RECEIVE_WIFI_CREDENTIAL_CHANGE"
1233        android:protectionLevel="signature|privileged" />
1234
1235    <!-- @SystemApi @hide Allows an application to modify any wifi configuration, even if created
1236     by another application. Once reconfigured the original creator cannot make any further
1237     modifications.
1238     <p>Not for use by third-party applications. -->
1239    <permission android:name="android.permission.OVERRIDE_WIFI_CONFIG"
1240        android:protectionLevel="signature|privileged" />
1241
1242    <!-- @hide -->
1243    <permission android:name="android.permission.ACCESS_WIMAX_STATE"
1244        android:description="@string/permdesc_accessWimaxState"
1245        android:label="@string/permlab_accessWimaxState"
1246        android:protectionLevel="normal" />
1247
1248    <!-- @hide -->
1249    <permission android:name="android.permission.CHANGE_WIMAX_STATE"
1250        android:description="@string/permdesc_changeWimaxState"
1251        android:label="@string/permlab_changeWimaxState"
1252        android:protectionLevel="normal" />
1253
1254    <!-- Allows applications to act as network scorers. @hide @SystemApi-->
1255    <permission android:name="android.permission.SCORE_NETWORKS"
1256        android:protectionLevel="signature|privileged" />
1257
1258    <!-- @SystemApi Allows applications to request network
1259         recommendations and scores from the NetworkScoreService.
1260         <p>Not for use by third-party applications. @hide -->
1261    <permission android:name="android.permission.REQUEST_NETWORK_SCORES"
1262        android:protectionLevel="signature" />
1263
1264    <!-- ======================================= -->
1265    <!-- Permissions for short range, peripheral networks -->
1266    <!-- ======================================= -->
1267    <eat-comment />
1268
1269    <!-- Allows applications to connect to paired bluetooth devices.
1270         <p>Protection level: normal
1271    -->
1272    <permission android:name="android.permission.BLUETOOTH"
1273        android:description="@string/permdesc_bluetooth"
1274        android:label="@string/permlab_bluetooth"
1275        android:protectionLevel="normal" />
1276
1277    <!-- Allows applications to discover and pair bluetooth devices.
1278         <p>Protection level: normal
1279    -->
1280    <permission android:name="android.permission.BLUETOOTH_ADMIN"
1281        android:description="@string/permdesc_bluetoothAdmin"
1282        android:label="@string/permlab_bluetoothAdmin"
1283        android:protectionLevel="normal" />
1284
1285    <!-- @SystemApi Allows applications to pair bluetooth devices without user interaction, and to
1286         allow or disallow phonebook access or message access.
1287         This is not available to third party applications. -->
1288    <permission android:name="android.permission.BLUETOOTH_PRIVILEGED"
1289        android:protectionLevel="signature|privileged" />
1290
1291    <!-- Control access to email providers exclusively for Bluetooth
1292         @hide
1293    -->
1294    <permission android:name="android.permission.BLUETOOTH_MAP"
1295        android:protectionLevel="signature" />
1296
1297    <!-- Allows bluetooth stack to access files
1298         @hide This should only be used by Bluetooth apk.
1299    -->
1300    <permission android:name="android.permission.BLUETOOTH_STACK"
1301        android:protectionLevel="signature" />
1302
1303    <!-- Allows applications to perform I/O operations over NFC.
1304         <p>Protection level: normal
1305    -->
1306    <permission android:name="android.permission.NFC"
1307        android:description="@string/permdesc_nfc"
1308        android:label="@string/permlab_nfc"
1309        android:protectionLevel="normal" />
1310
1311    <!-- @SystemApi Allows an internal user to use privileged ConnectivityManager APIs.
1312         @hide -->
1313    <permission android:name="android.permission.CONNECTIVITY_INTERNAL"
1314        android:protectionLevel="signature|privileged" />
1315
1316    <!-- Allows an internal user to use restricted Networks.
1317         @hide -->
1318    <permission android:name="android.permission.CONNECTIVITY_USE_RESTRICTED_NETWORKS"
1319        android:protectionLevel="signature|privileged" />
1320
1321    <!-- Allows a system application to access hardware packet offload capabilities.
1322         @hide -->
1323    <permission android:name="android.permission.PACKET_KEEPALIVE_OFFLOAD"
1324        android:protectionLevel="signature|privileged" />
1325
1326    <!-- @SystemApi
1327         @hide -->
1328    <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE"
1329        android:protectionLevel="signature|privileged" />
1330
1331    <!-- @SystemApi Allows access to the loop radio (Android@Home mesh network) device.
1332         @hide -->
1333    <permission android:name="android.permission.LOOP_RADIO"
1334        android:protectionLevel="signature|privileged" />
1335
1336    <!-- Allows sending and receiving handover transfer status from Wifi and Bluetooth
1337         @hide -->
1338    <permission android:name="android.permission.NFC_HANDOVER_STATUS"
1339        android:protectionLevel="signature|privileged" />
1340
1341    <!-- ================================== -->
1342    <!-- Permissions for accessing accounts -->
1343    <!-- ================================== -->
1344    <eat-comment />
1345
1346    <!-- Allows access to the list of accounts in the Accounts Service.
1347
1348    <p class="note"><strong>Note:</strong> Beginning with Android 6.0 (API level
1349    23), if an app shares the signature of the authenticator that manages an
1350    account, it does not need <code>"GET_ACCOUNTS"</code> permission to read
1351    information about that account. On Android 5.1 and lower, all apps need
1352    <code>"GET_ACCOUNTS"</code> permission to read information about any
1353    account.</p>
1354
1355    <p>Protection level: dangerous
1356    -->
1357    <permission android:name="android.permission.GET_ACCOUNTS"
1358        android:permissionGroup="android.permission-group.CONTACTS"
1359        android:protectionLevel="dangerous"
1360        android:description="@string/permdesc_getAccounts"
1361        android:label="@string/permlab_getAccounts" />
1362    <uses-permission android:name="android.permission.GET_ACCOUNTS"/>
1363
1364    <!-- @SystemApi Allows applications to call into AccountAuthenticators.
1365    <p>Not for use by third-party applications. -->
1366    <permission android:name="android.permission.ACCOUNT_MANAGER"
1367        android:protectionLevel="signature" />
1368
1369    <!-- ================================== -->
1370    <!-- Permissions for accessing hardware that may effect battery life-->
1371    <!-- ================================== -->
1372    <eat-comment />
1373
1374    <!-- Allows applications to enter Wi-Fi Multicast mode.
1375         <p>Protection level: normal
1376    -->
1377    <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE"
1378        android:description="@string/permdesc_changeWifiMulticastState"
1379        android:label="@string/permlab_changeWifiMulticastState"
1380        android:protectionLevel="normal" />
1381
1382    <!-- Allows access to the vibrator.
1383         <p>Protection level: normal
1384    -->
1385    <permission android:name="android.permission.VIBRATE"
1386        android:label="@string/permlab_vibrate"
1387        android:description="@string/permdesc_vibrate"
1388        android:protectionLevel="normal|ephemeral" />
1389
1390    <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen
1391         from dimming.
1392         <p>Protection level: normal
1393    -->
1394    <permission android:name="android.permission.WAKE_LOCK"
1395        android:label="@string/permlab_wakeLock"
1396        android:description="@string/permdesc_wakeLock"
1397        android:protectionLevel="normal|ephemeral" />
1398
1399    <!-- Allows using the device's IR transmitter, if available.
1400         <p>Protection level: normal
1401    -->
1402    <permission android:name="android.permission.TRANSMIT_IR"
1403        android:label="@string/permlab_transmitIr"
1404        android:description="@string/permdesc_transmitIr"
1405        android:protectionLevel="normal" />
1406
1407    <!-- ==================================================== -->
1408    <!-- Permissions related to changing audio settings   -->
1409    <!-- ==================================================== -->
1410    <eat-comment />
1411
1412    <!-- Allows an application to modify global audio settings.
1413         <p>Protection level: normal
1414    -->
1415    <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS"
1416        android:label="@string/permlab_modifyAudioSettings"
1417        android:description="@string/permdesc_modifyAudioSettings"
1418        android:protectionLevel="normal" />
1419
1420    <!-- ================================== -->
1421    <!-- Permissions for accessing hardware -->
1422    <!-- ================================== -->
1423    <eat-comment />
1424
1425    <!-- @SystemApi Allows an application to manage preferences and permissions for USB devices
1426         @hide -->
1427    <permission android:name="android.permission.MANAGE_USB"
1428        android:protectionLevel="signature|privileged" />
1429
1430    <!-- @SystemApi Allows an application to access the MTP USB kernel driver.
1431         For use only by the device side MTP implementation.
1432         @hide -->
1433    <permission android:name="android.permission.ACCESS_MTP"
1434        android:protectionLevel="signature|privileged" />
1435
1436    <!-- @SystemApi Allows access to hardware peripherals.  Intended only for hardware testing.
1437         <p>Not for use by third-party applications.
1438         @hide
1439    -->
1440    <permission android:name="android.permission.HARDWARE_TEST"
1441        android:protectionLevel="signature" />
1442
1443    <!-- @SystemApi Allows access to FM
1444         @hide This is not a third-party API (intended for system apps).-->
1445    <permission android:name="android.permission.ACCESS_FM_RADIO"
1446        android:protectionLevel="signature|privileged" />
1447
1448    <!-- Allows access to configure network interfaces, configure/use IPSec, etc.
1449         @hide -->
1450    <permission android:name="android.permission.NET_ADMIN"
1451        android:protectionLevel="signature" />
1452
1453    <!-- Allows registration for remote audio playback. @hide -->
1454    <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK"
1455        android:protectionLevel="signature" />
1456
1457    <!-- @SystemApi Allows TvInputService to access underlying TV input hardware such as
1458         built-in tuners and HDMI-in's.
1459         @hide This should only be used by OEM's TvInputService's.
1460    -->
1461    <permission android:name="android.permission.TV_INPUT_HARDWARE"
1462        android:protectionLevel="signature|privileged" />
1463
1464    <!-- @SystemApi Allows to capture a frame of TV input hardware such as
1465         built-in tuners and HDMI-in's.
1466         @hide <p>Not for use by third-party applications.
1467    -->
1468    <permission android:name="android.permission.CAPTURE_TV_INPUT"
1469        android:protectionLevel="signature|privileged" />
1470
1471    <!-- @hide Allows TvInputService to access DVB device.
1472   <p>Not for use by third-party applications. -->
1473    <permission android:name="android.permission.DVB_DEVICE"
1474        android:protectionLevel="signature|privileged" />
1475
1476    <!-- @SystemApi Allows reading the OEM unlock state
1477         @hide <p>Not for use by third-party applications. -->
1478    <permission android:name="android.permission.READ_OEM_UNLOCK_STATE"
1479        android:protectionLevel="signature|privileged" />
1480
1481    <!-- @hide Allows enabling/disabling OEM unlock
1482   <p>Not for use by third-party applications. -->
1483    <permission android:name="android.permission.OEM_UNLOCK_STATE"
1484        android:protectionLevel="signature" />
1485
1486    <!-- @hide Allows querying state of PersistentDataBlock
1487   <p>Not for use by third-party applications. -->
1488    <permission android:name="android.permission.ACCESS_PDB_STATE"
1489        android:protectionLevel="signature" />
1490
1491    <!-- @hide Allows system update service to notify device owner about pending updates.
1492   <p>Not for use by third-party applications. -->
1493    <permission android:name="android.permission.NOTIFY_PENDING_SYSTEM_UPDATE"
1494        android:protectionLevel="signature|privileged" />
1495
1496    <!-- =========================================== -->
1497    <!-- Permissions associated with camera and image capture -->
1498    <!-- =========================================== -->
1499    <eat-comment />
1500
1501    <!-- @SystemApi Allows disabling the transmit-indicator LED that is normally on when
1502         a camera is in use by an application.
1503         @hide -->
1504    <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED"
1505        android:protectionLevel="signature|privileged" />
1506
1507    <!-- Allows sending the camera service notifications about system-wide events.
1508        @hide -->
1509    <permission android:name="android.permission.CAMERA_SEND_SYSTEM_EVENTS"
1510        android:protectionLevel="signature|privileged" />
1511
1512    <!-- =========================================== -->
1513    <!-- Permissions associated with telephony state -->
1514    <!-- =========================================== -->
1515    <eat-comment />
1516
1517    <!-- @SystemApi Allows modification of the telephony state - power on, mmi, etc.
1518         Does not include placing calls.
1519         <p>Not for use by third-party applications. -->
1520    <permission android:name="android.permission.MODIFY_PHONE_STATE"
1521        android:protectionLevel="signature|privileged" />
1522
1523    <!-- Allows read only access to precise phone state.
1524         @hide Pending API council approval -->
1525    <permission android:name="android.permission.READ_PRECISE_PHONE_STATE"
1526        android:protectionLevel="signature|privileged" />
1527
1528    <!-- @SystemApi Allows read access to privileged phone state.
1529         @hide Used internally. -->
1530    <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE"
1531        android:protectionLevel="signature|privileged" />
1532
1533    <!-- @SystemApi Protects the ability to register any PhoneAccount with
1534         PhoneAccount#CAPABILITY_SIM_SUBSCRIPTION. This capability indicates that the PhoneAccount
1535         corresponds to a device SIM.
1536         @hide -->
1537    <permission android:name="android.permission.REGISTER_SIM_SUBSCRIPTION"
1538        android:protectionLevel="signature|privileged" />
1539
1540    <!-- @SystemApi Protects the ability to register any PhoneAccount with
1541         PhoneAccount#CAPABILITY_CALL_PROVIDER.
1542         @hide -->
1543    <permission android:name="android.permission.REGISTER_CALL_PROVIDER"
1544        android:protectionLevel="signature|privileged" />
1545
1546    <!-- @SystemApi Protects the ability to register any PhoneAccount with
1547         PhoneAccount#CAPABILITY_CONNECTION_MANAGER
1548         @hide -->
1549    <permission android:name="android.permission.REGISTER_CONNECTION_MANAGER"
1550        android:protectionLevel="signature|privileged" />
1551
1552    <!-- Must be required by a {@link android.telecom.InCallService},
1553         to ensure that only the system can bind to it.
1554         <p>Protection level: signature|privileged
1555    -->
1556    <permission android:name="android.permission.BIND_INCALL_SERVICE"
1557        android:protectionLevel="signature|privileged" />
1558
1559    <!-- Must be required by a link {@link android.telephony.VisualVoicemailService} to ensure that
1560         only the system can bind to it.
1561         <p>Protection level: signature|privileged
1562    -->
1563    <permission
1564      android:name="android.permission.BIND_VISUAL_VOICEMAIL_SERVICE"
1565      android:protectionLevel="signature|privileged"/>
1566
1567    <!-- Must be required by a {@link android.telecom.CallScreeningService},
1568         to ensure that only the system can bind to it.
1569         <p>Protection level: signature|privileged
1570    -->
1571    <permission android:name="android.permission.BIND_SCREENING_SERVICE"
1572        android:protectionLevel="signature|privileged" />
1573
1574    <!-- Must be required by a {@link android.telecom.ConnectionService},
1575         to ensure that only the system can bind to it.
1576         @deprecated {@link android.telecom.ConnectionService}s should require
1577                 android.permission.BIND_TELECOM_CONNECTION_SERVICE instead.
1578         @SystemApi
1579         @hide -->
1580    <permission android:name="android.permission.BIND_CONNECTION_SERVICE"
1581        android:protectionLevel="signature|privileged" />
1582
1583    <!-- Must be required by a {@link android.telecom.ConnectionService},
1584         to ensure that only the system can bind to it.
1585         <p>Protection level: signature|privileged
1586    -->
1587    <permission android:name="android.permission.BIND_TELECOM_CONNECTION_SERVICE"
1588        android:protectionLevel="signature|privileged" />
1589
1590    <!-- @SystemApi Allows an application to control the in-call experience.
1591         @hide -->
1592    <permission android:name="android.permission.CONTROL_INCALL_EXPERIENCE"
1593        android:protectionLevel="signature|privileged" />
1594
1595    <!-- Allows an application to receive STK related commands.
1596         @hide -->
1597    <permission android:name="android.permission.RECEIVE_STK_COMMANDS"
1598        android:protectionLevel="signature|privileged" />
1599
1600    <!-- ================================== -->
1601    <!-- Permissions for sdcard interaction -->
1602    <!-- ================================== -->
1603    <eat-comment />
1604
1605    <!-- @SystemApi Allows an application to write to internal media storage
1606         @hide  -->
1607    <permission android:name="android.permission.WRITE_MEDIA_STORAGE"
1608        android:protectionLevel="signature|privileged" />
1609
1610    <!-- Allows an application to manage access to documents, usually as part
1611         of a document picker.
1612         <p>This permission should <em>only</em> be requested by the platform
1613         document management app.  This permission cannot be granted to
1614         third-party apps.
1615         <p>Protection level: signature
1616    -->
1617    <permission android:name="android.permission.MANAGE_DOCUMENTS"
1618        android:protectionLevel="signature" />
1619
1620    <!-- @hide Allows an application to cache content.
1621         <p>Not for use by third-party applications.
1622         <p>Protection level: signature
1623    -->
1624    <permission android:name="android.permission.CACHE_CONTENT"
1625        android:protectionLevel="signature" />
1626
1627    <!-- ================================== -->
1628    <!-- Permissions for screenlock         -->
1629    <!-- ================================== -->
1630    <eat-comment />
1631
1632    <!-- Allows applications to disable the keyguard if it is not secure.
1633         <p>Protection level: normal
1634    -->
1635    <permission android:name="android.permission.DISABLE_KEYGUARD"
1636        android:description="@string/permdesc_disableKeyguard"
1637        android:label="@string/permlab_disableKeyguard"
1638        android:protectionLevel="normal" />
1639
1640    <!-- ================================== -->
1641    <!-- Permissions to access other installed applications  -->
1642    <!-- ================================== -->
1643    <eat-comment />
1644
1645    <!-- @deprecated No longer enforced. -->
1646    <permission android:name="android.permission.GET_TASKS"
1647        android:label="@string/permlab_getTasks"
1648        android:description="@string/permdesc_getTasks"
1649        android:protectionLevel="normal" />
1650
1651    <!-- New version of GET_TASKS that apps can request, since GET_TASKS doesn't really
1652         give access to task information.  We need this new one because there are
1653         many existing apps that use add libraries and such that have validation
1654         code to ensure the app has requested the GET_TASKS permission by seeing
1655         if it has been granted the permission...  if it hasn't, it kills the app
1656         with a message about being upset.  So we need to have it continue to look
1657         like the app is getting that permission, even though it will never be
1658         checked, and new privileged apps can now request this one for real access.
1659         @hide
1660         @SystemApi -->
1661    <permission android:name="android.permission.REAL_GET_TASKS"
1662        android:protectionLevel="signature|privileged" />
1663
1664    <!-- Allows an application to start a task from a ActivityManager#RecentTaskInfo.
1665         @hide -->
1666    <permission android:name="android.permission.START_TASKS_FROM_RECENTS"
1667        android:protectionLevel="signature|privileged" />
1668
1669    <!-- @SystemApi @hide Allows an application to call APIs that allow it to do interactions
1670         across the users on the device, using singleton services and
1671         user-targeted broadcasts.  This permission is not available to
1672         third party applications. -->
1673    <permission android:name="android.permission.INTERACT_ACROSS_USERS"
1674        android:protectionLevel="signature|privileged|development" />
1675
1676    <!-- @SystemApi Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS}
1677         that removes restrictions on where broadcasts can be sent and allows other
1678         types of interactions
1679         @hide -->
1680    <permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL"
1681        android:protectionLevel="signature|installer" />
1682
1683    <!-- @SystemApi @hide Allows an application to call APIs that allow it to query and manage
1684         users on the device. This permission is not available to
1685         third party applications. -->
1686    <permission android:name="android.permission.MANAGE_USERS"
1687        android:protectionLevel="signature|privileged" />
1688
1689    <!-- @hide Allows an application to create, remove users and get the list of
1690         users on the device. Applications holding this permission can only create restricted,
1691         guest, managed, demo, and ephemeral users. For creating other kind of users,
1692         {@link android.Manifest.permission#MANAGE_USERS} is needed.
1693         This permission is not available to third party applications. -->
1694    <permission android:name="android.permission.CREATE_USERS"
1695        android:protectionLevel="signature" />
1696
1697    <!-- @hide Allows an application to set the profile owners and the device owner.
1698         This permission is not available to third party applications.-->
1699    <permission android:name="android.permission.MANAGE_PROFILE_AND_DEVICE_OWNERS"
1700        android:protectionLevel="signature"
1701        android:label="@string/permlab_manageProfileAndDeviceOwners"
1702        android:description="@string/permdesc_manageProfileAndDeviceOwners" />
1703
1704    <!-- Allows an application to get full detailed information about
1705         recently running tasks, with full fidelity to the real state.
1706         @hide -->
1707    <permission android:name="android.permission.GET_DETAILED_TASKS"
1708        android:protectionLevel="signature" />
1709
1710    <!-- Allows an application to change the Z-order of tasks.
1711         <p>Protection level: normal
1712    -->
1713    <permission android:name="android.permission.REORDER_TASKS"
1714        android:label="@string/permlab_reorderTasks"
1715        android:description="@string/permdesc_reorderTasks"
1716        android:protectionLevel="normal" />
1717
1718    <!-- @hide Allows an application to change to remove/kill tasks -->
1719    <permission android:name="android.permission.REMOVE_TASKS"
1720        android:protectionLevel="signature" />
1721
1722    <!-- @SystemApi @hide Allows an application to create/manage/remove stacks -->
1723    <permission android:name="android.permission.MANAGE_ACTIVITY_STACKS"
1724        android:protectionLevel="signature|privileged" />
1725
1726    <!-- Allows an application to start any activity, regardless of permission
1727         protection or exported state.
1728         @hide -->
1729    <permission android:name="android.permission.START_ANY_ACTIVITY"
1730        android:protectionLevel="signature" />
1731
1732    <!-- @deprecated The {@link android.app.ActivityManager#restartPackage}
1733        API is no longer supported. -->
1734    <permission android:name="android.permission.RESTART_PACKAGES"
1735        android:label="@string/permlab_killBackgroundProcesses"
1736        android:description="@string/permdesc_killBackgroundProcesses"
1737        android:protectionLevel="normal" />
1738
1739    <!-- Allows an application to call
1740        {@link android.app.ActivityManager#killBackgroundProcesses}.
1741         <p>Protection level: normal
1742    -->
1743    <permission android:name="android.permission.KILL_BACKGROUND_PROCESSES"
1744        android:label="@string/permlab_killBackgroundProcesses"
1745        android:description="@string/permdesc_killBackgroundProcesses"
1746        android:protectionLevel="normal" />
1747
1748    <!-- @SystemApi @hide Allows an application to query process states and current
1749         OOM adjustment scores.
1750         <p>Not for use by third-party applications. -->
1751    <permission android:name="android.permission.GET_PROCESS_STATE_AND_OOM_SCORE"
1752        android:protectionLevel="signature|privileged|development" />
1753
1754    <!-- Allows use of PendingIntent.getIntent().
1755         @hide -->
1756    <permission android:name="android.permission.GET_INTENT_SENDER_INTENT"
1757        android:protectionLevel="signature" />
1758
1759    <!-- ================================== -->
1760    <!-- Permissions affecting the display of other applications  -->
1761    <!-- ================================== -->
1762    <eat-comment />
1763
1764    <!-- Allows an app to create windows using the type
1765         {@link android.view.WindowManager.LayoutParams#TYPE_SYSTEM_ALERT},
1766         shown on top of all other apps.  Very few apps
1767         should use this permission; these windows are intended for
1768         system-level interaction with the user.
1769
1770         <p class="note"><strong>Note:</strong> If the app
1771         targets API level 23 or higher, the app user must explicitly grant
1772         this permission to the app through a permission management screen. The app requests
1773         the user's approval by sending an intent with action
1774         {@link android.provider.Settings#ACTION_MANAGE_OVERLAY_PERMISSION}.
1775         The app can check whether it has this authorization by calling
1776         {@link android.provider.Settings#canDrawOverlays
1777         Settings.canDrawOverlays()}.
1778         <p>Protection level: signature -->
1779    <permission android:name="android.permission.SYSTEM_ALERT_WINDOW"
1780        android:label="@string/permlab_systemAlertWindow"
1781        android:description="@string/permdesc_systemAlertWindow"
1782        android:protectionLevel="signature|preinstalled|appop|pre23|development" />
1783
1784    <!-- ================================== -->
1785    <!-- Permissions affecting the system wallpaper -->
1786    <!-- ================================== -->
1787    <eat-comment />
1788
1789    <!-- Allows applications to set the wallpaper.
1790         <p>Protection level: normal
1791     -->
1792    <permission android:name="android.permission.SET_WALLPAPER"
1793        android:label="@string/permlab_setWallpaper"
1794        android:description="@string/permdesc_setWallpaper"
1795        android:protectionLevel="normal" />
1796
1797    <!-- Allows applications to set the wallpaper hints.
1798         <p>Protection level: normal
1799    -->
1800    <permission android:name="android.permission.SET_WALLPAPER_HINTS"
1801        android:label="@string/permlab_setWallpaperHints"
1802        android:description="@string/permdesc_setWallpaperHints"
1803        android:protectionLevel="normal" />
1804
1805    <!-- ============================================ -->
1806    <!-- Permissions for changing the system clock -->
1807    <!-- ============================================ -->
1808    <eat-comment />
1809
1810    <!-- @SystemApi Allows applications to set the system time.
1811    <p>Not for use by third-party applications. -->
1812    <permission android:name="android.permission.SET_TIME"
1813        android:protectionLevel="signature|privileged" />
1814
1815    <!-- Allows applications to set the system time zone.
1816         <p>Not for use by third-party applications.
1817    -->
1818    <permission android:name="android.permission.SET_TIME_ZONE"
1819        android:label="@string/permlab_setTimeZone"
1820        android:description="@string/permdesc_setTimeZone"
1821        android:protectionLevel="signature|privileged" />
1822
1823    <!-- ==================================================== -->
1824    <!-- Permissions related to changing status bar   -->
1825    <!-- ==================================================== -->
1826    <eat-comment />
1827
1828    <!-- Allows an application to expand or collapse the status bar.
1829         <p>Protection level: normal
1830    -->
1831    <permission android:name="android.permission.EXPAND_STATUS_BAR"
1832        android:label="@string/permlab_expandStatusBar"
1833        android:description="@string/permdesc_expandStatusBar"
1834        android:protectionLevel="normal" />
1835
1836    <!-- ============================================================== -->
1837    <!-- Permissions related to adding/removing shortcuts from Launcher -->
1838    <!-- ============================================================== -->
1839    <eat-comment />
1840
1841    <!-- Allows an application to install a shortcut in Launcher.
1842         <p>Protection level: normal
1843    -->
1844    <permission android:name="com.android.launcher.permission.INSTALL_SHORTCUT"
1845        android:label="@string/permlab_install_shortcut"
1846        android:description="@string/permdesc_install_shortcut"
1847        android:protectionLevel="normal"/>
1848
1849    <!--This permission is no longer supported.
1850    -->
1851    <permission android:name="com.android.launcher.permission.UNINSTALL_SHORTCUT"
1852        android:label="@string/permlab_uninstall_shortcut"
1853        android:description="@string/permdesc_uninstall_shortcut"
1854        android:protectionLevel="normal"/>
1855
1856    <!-- ==================================================== -->
1857    <!-- Permissions related to accessing sync settings   -->
1858    <!-- ==================================================== -->
1859    <eat-comment />
1860
1861    <!-- Allows applications to read the sync settings.
1862         <p>Protection level: normal
1863    -->
1864    <permission android:name="android.permission.READ_SYNC_SETTINGS"
1865        android:description="@string/permdesc_readSyncSettings"
1866        android:label="@string/permlab_readSyncSettings"
1867        android:protectionLevel="normal" />
1868
1869    <!-- Allows applications to write the sync settings.
1870         <p>Protection level: normal
1871    -->
1872    <permission android:name="android.permission.WRITE_SYNC_SETTINGS"
1873        android:description="@string/permdesc_writeSyncSettings"
1874        android:label="@string/permlab_writeSyncSettings"
1875        android:protectionLevel="normal" />
1876
1877    <!-- Allows applications to read the sync stats.
1878         <p>Protection level: normal
1879    -->
1880    <permission android:name="android.permission.READ_SYNC_STATS"
1881        android:description="@string/permdesc_readSyncStats"
1882        android:label="@string/permlab_readSyncStats"
1883        android:protectionLevel="normal" />
1884
1885    <!-- ============================================ -->
1886    <!-- Permissions for low-level system interaction -->
1887    <!-- ============================================ -->
1888    <eat-comment />
1889
1890    <!-- @SystemApi @hide Change the screen compatibility mode of applications -->
1891    <permission android:name="android.permission.SET_SCREEN_COMPATIBILITY"
1892        android:protectionLevel="signature" />
1893
1894    <!-- @SystemApi Allows an application to modify the current configuration, such
1895         as locale. -->
1896    <permission android:name="android.permission.CHANGE_CONFIGURATION"
1897        android:protectionLevel="signature|privileged|development" />
1898
1899    <!-- Allows an application to read or write the system settings.
1900
1901        <p class="note"><strong>Note:</strong> If the app targets API level 23
1902        or higher, the app user
1903        must explicitly grant this permission to the app through a permission management screen.
1904        The app requests the user's approval by sending an intent with action
1905        {@link android.provider.Settings#ACTION_MANAGE_WRITE_SETTINGS}. The app
1906        can check whether it has this authorization by calling {@link
1907        android.provider.Settings.System#canWrite Settings.System.canWrite()}.
1908
1909        <p>Protection level: signature
1910    -->
1911    <permission android:name="android.permission.WRITE_SETTINGS"
1912        android:label="@string/permlab_writeSettings"
1913        android:description="@string/permdesc_writeSettings"
1914        android:protectionLevel="signature|preinstalled|appop|pre23" />
1915
1916    <!-- @SystemApi Allows an application to modify the Google service map.
1917    <p>Not for use by third-party applications. -->
1918    <permission android:name="android.permission.WRITE_GSERVICES"
1919        android:protectionLevel="signature|privileged" />
1920
1921    <!-- @SystemApi Allows an application to call
1922        {@link android.app.ActivityManager#forceStopPackage}.
1923        @hide -->
1924    <permission android:name="android.permission.FORCE_STOP_PACKAGES"
1925        android:protectionLevel="signature|privileged" />
1926
1927    <!-- @SystemApi @hide Allows an application to retrieve the content of the active window
1928         An active window is the window that has fired an accessibility event. -->
1929    <permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT"
1930        android:protectionLevel="signature|privileged" />
1931
1932    <!-- @SystemApi Modify the global animation scaling factor.
1933    <p>Not for use by third-party applications. -->
1934    <permission android:name="android.permission.SET_ANIMATION_SCALE"
1935        android:protectionLevel="signature|privileged|development" />
1936
1937    <!-- @deprecated This functionality will be removed in the future; please do
1938         not use. Allow an application to make its activities persistent. -->
1939    <permission android:name="android.permission.PERSISTENT_ACTIVITY"
1940        android:label="@string/permlab_persistentActivity"
1941        android:description="@string/permdesc_persistentActivity"
1942        android:protectionLevel="normal" />
1943
1944    <!-- Allows an application to find out the space used by any package.
1945         <p>Protection level: normal
1946    -->
1947    <permission android:name="android.permission.GET_PACKAGE_SIZE"
1948        android:label="@string/permlab_getPackageSize"
1949        android:description="@string/permdesc_getPackageSize"
1950        android:protectionLevel="normal" />
1951
1952    <!-- @deprecated No longer useful, see
1953         {@link android.content.pm.PackageManager#addPackageToPreferred}
1954         for details. -->
1955    <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS"
1956        android:protectionLevel="signature" />
1957
1958    <!-- Allows an application to receive the
1959         {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is
1960         broadcast after the system finishes booting.  If you don't
1961         request this permission, you will not receive the broadcast at
1962         that time.  Though holding this permission does not have any
1963         security implications, it can have a negative impact on the
1964         user experience by increasing the amount of time it takes the
1965         system to start and allowing applications to have themselves
1966         running without the user being aware of them.  As such, you must
1967         explicitly declare your use of this facility to make that visible
1968         to the user.
1969         <p>Protection level: normal
1970    -->
1971    <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED"
1972        android:label="@string/permlab_receiveBootCompleted"
1973        android:description="@string/permdesc_receiveBootCompleted"
1974        android:protectionLevel="normal" />
1975
1976    <!-- Allows an application to broadcast sticky intents.  These are
1977         broadcasts whose data is held by the system after being finished,
1978         so that clients can quickly retrieve that data without having
1979         to wait for the next broadcast.
1980         <p>Protection level: normal
1981    -->
1982    <permission android:name="android.permission.BROADCAST_STICKY"
1983        android:label="@string/permlab_broadcastSticky"
1984        android:description="@string/permdesc_broadcastSticky"
1985        android:protectionLevel="normal" />
1986
1987    <!-- @SystemApi Allows mounting and unmounting file systems for removable storage.
1988    <p>Not for use by third-party applications.-->
1989    <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS"
1990        android:protectionLevel="signature|privileged" />
1991
1992    <!-- @SystemApi Allows formatting file systems for removable storage.
1993    <p>Not for use by third-party applications. -->
1994    <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS"
1995        android:protectionLevel="signature|privileged" />
1996
1997    <!-- @hide -->
1998    <permission android:name="android.permission.STORAGE_INTERNAL"
1999        android:protectionLevel="signature" />
2000
2001    <!-- Allows access to ASEC non-destructive API calls
2002         @hide  -->
2003    <permission android:name="android.permission.ASEC_ACCESS"
2004        android:protectionLevel="signature" />
2005
2006    <!-- Allows creation of ASEC volumes
2007         @hide  -->
2008    <permission android:name="android.permission.ASEC_CREATE"
2009        android:protectionLevel="signature" />
2010
2011    <!-- Allows destruction of ASEC volumes
2012         @hide  -->
2013    <permission android:name="android.permission.ASEC_DESTROY"
2014        android:protectionLevel="signature" />
2015
2016    <!-- Allows mount / unmount of ASEC volumes
2017         @hide  -->
2018    <permission android:name="android.permission.ASEC_MOUNT_UNMOUNT"
2019        android:protectionLevel="signature" />
2020
2021    <!-- Allows rename of ASEC volumes
2022         @hide  -->
2023    <permission android:name="android.permission.ASEC_RENAME"
2024        android:protectionLevel="signature" />
2025
2026    <!-- @SystemApi Allows applications to write the apn settings.
2027    <p>Not for use by third-party applications. -->
2028    <permission android:name="android.permission.WRITE_APN_SETTINGS"
2029        android:protectionLevel="signature|privileged" />
2030
2031    <!-- Allows applications to change network connectivity state.
2032         <p>Protection level: normal
2033    -->
2034    <permission android:name="android.permission.CHANGE_NETWORK_STATE"
2035        android:description="@string/permdesc_changeNetworkState"
2036        android:label="@string/permlab_changeNetworkState"
2037        android:protectionLevel="normal" />
2038
2039    <!-- Allows an application to clear the caches of all installed
2040         applications on the device.
2041         <p>Protection level: system|signature
2042    -->
2043    <permission android:name="android.permission.CLEAR_APP_CACHE"
2044        android:protectionLevel="signature|privileged" />
2045
2046    <!-- @SystemApi Allows an application to use any media decoder when decoding for playback
2047         @hide -->
2048    <permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK"
2049        android:protectionLevel="signature|privileged" />
2050
2051    <!-- @SystemApi Allows an application to install and/or uninstall CA certificates on
2052         behalf of the user.
2053         @hide -->
2054    <permission android:name="android.permission.MANAGE_CA_CERTIFICATES"
2055        android:protectionLevel="signature|privileged" />
2056
2057    <!-- @SystemApi Allows an application to do certain operations needed for
2058         interacting with the recovery (system update) system.
2059         @hide -->
2060    <permission android:name="android.permission.RECOVERY"
2061        android:protectionLevel="signature|privileged" />
2062
2063    <!-- Allows the system to bind to an application's task services
2064         @hide -->
2065    <permission android:name="android.permission.BIND_JOB_SERVICE"
2066        android:protectionLevel="signature" />
2067    <uses-permission android:name="android.permission.BIND_JOB_SERVICE"/>
2068
2069    <!-- Allows an application to initiate configuration updates
2070         <p>An application requesting this permission is responsible for
2071         verifying the source and integrity of any update before passing
2072         it off to the various individual installer components
2073         @hide -->
2074    <permission android:name="android.permission.UPDATE_CONFIG"
2075        android:protectionLevel="signature|privileged" />
2076
2077    <!-- Allows the system to reset throttling in shortcut manager.
2078         @hide -->
2079    <permission android:name="android.permission.RESET_SHORTCUT_MANAGER_THROTTLING"
2080        android:protectionLevel="signature" />
2081
2082    <!-- Allows the system to bind to the discovered Network Recommendation Service.
2083         @SystemApi @hide -->
2084    <permission android:name="android.permission.BIND_NETWORK_RECOMMENDATION_SERVICE"
2085        android:protectionLevel="signature" />
2086    <uses-permission android:name="android.permission.BIND_NETWORK_RECOMMENDATION_SERVICE"/>
2087
2088    <!-- ========================================= -->
2089    <!-- Permissions for special development tools -->
2090    <!-- ========================================= -->
2091    <eat-comment />
2092
2093    <!-- @SystemApi Allows an application to read or write the secure system settings.
2094    <p>Not for use by third-party applications. -->
2095    <permission android:name="android.permission.WRITE_SECURE_SETTINGS"
2096        android:protectionLevel="signature|privileged|development" />
2097
2098    <!-- @SystemApi Allows an application to retrieve state dump information from system services.
2099    <p>Not for use by third-party applications. -->
2100    <permission android:name="android.permission.DUMP"
2101        android:protectionLevel="signature|privileged|development" />
2102
2103    <!-- @SystemApi Allows an application to read the low-level system log files.
2104    <p>Not for use by third-party applications, because
2105    Log entries can contain the user's private information. -->
2106    <permission android:name="android.permission.READ_LOGS"
2107        android:protectionLevel="signature|privileged|development" />
2108
2109    <!-- @SystemApi Configure an application for debugging.
2110    <p>Not for use by third-party applications. -->
2111    <permission android:name="android.permission.SET_DEBUG_APP"
2112        android:protectionLevel="signature|privileged|development" />
2113
2114    <!-- @SystemApi Allows an application to set the maximum number of (not needed)
2115         application processes that can be running.
2116         <p>Not for use by third-party applications. -->
2117    <permission android:name="android.permission.SET_PROCESS_LIMIT"
2118        android:protectionLevel="signature|privileged|development" />
2119
2120    <!-- @SystemApi Allows an application to control whether activities are immediately
2121         finished when put in the background.
2122         <p>Not for use by third-party applications. -->
2123    <permission android:name="android.permission.SET_ALWAYS_FINISH"
2124        android:protectionLevel="signature|privileged|development" />
2125
2126    <!-- @SystemApi Allow an application to request that a signal be sent to all persistent processes.
2127    <p>Not for use by third-party applications. -->
2128    <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES"
2129        android:protectionLevel="signature|privileged|development" />
2130
2131    <!-- ==================================== -->
2132    <!-- Private permissions                  -->
2133    <!-- ==================================== -->
2134    <eat-comment />
2135
2136    <!-- @SystemApi Allows access to the list of accounts in the Accounts Service. -->
2137    <permission android:name="android.permission.GET_ACCOUNTS_PRIVILEGED"
2138        android:protectionLevel="signature|privileged" />
2139
2140    <!-- Allows but does not guarantee access to user passwords at the conclusion of add account
2141    @hide -->
2142    <permission android:name="android.permission.GET_PASSWORD"
2143        android:protectionLevel="signature" />
2144
2145    <!-- @SystemApi Allows applications to RW to diagnostic resources.
2146    <p>Not for use by third-party applications. -->
2147    <permission android:name="android.permission.DIAGNOSTIC"
2148        android:protectionLevel="signature" />
2149
2150    <!-- @SystemApi Allows an application to open, close, or disable the status bar
2151         and its icons.
2152         <p>Not for use by third-party applications. -->
2153    <permission android:name="android.permission.STATUS_BAR"
2154        android:protectionLevel="signature|privileged" />
2155
2156    <!-- Allows an application to be the status bar.  Currently used only by SystemUI.apk
2157    @hide -->
2158    <permission android:name="android.permission.STATUS_BAR_SERVICE"
2159        android:protectionLevel="signature" />
2160
2161    <!-- Allows an application to bind to third party quick settings tiles.
2162         <p>Should only be requested by the System, should be required by
2163         TileService declarations.-->
2164    <permission android:name="android.permission.BIND_QUICK_SETTINGS_TILE"
2165        android:protectionLevel="signature" />
2166
2167    <!-- @SystemApi Allows an application to force a BACK operation on whatever is the
2168         top activity.
2169         <p>Not for use by third-party applications.
2170         @hide
2171    -->
2172    <permission android:name="android.permission.FORCE_BACK"
2173        android:protectionLevel="signature" />
2174
2175    <!-- @SystemApi Allows an application to update device statistics.
2176    <p>Not for use by third-party applications. -->
2177    <permission android:name="android.permission.UPDATE_DEVICE_STATS"
2178        android:protectionLevel="signature|privileged" />
2179
2180    <!-- @SystemApi @hide Allows an application to collect battery statistics -->
2181    <permission android:name="android.permission.GET_APP_OPS_STATS"
2182        android:protectionLevel="signature|privileged|development" />
2183
2184    <!-- @SystemApi Allows an application to update application operation statistics. Not for
2185         use by third party apps.
2186         @hide -->
2187    <permission android:name="android.permission.UPDATE_APP_OPS_STATS"
2188        android:protectionLevel="signature|privileged|installer" />
2189
2190    <!-- @SystemApi Allows an application to update the user app op restrictions.
2191         Not for use by third party apps.
2192         @hide -->
2193    <permission android:name="android.permission.MANAGE_APP_OPS_RESTRICTIONS"
2194        android:protectionLevel="signature|installer" />
2195
2196    <!-- @SystemApi Allows an application to open windows that are for use by parts
2197         of the system user interface.
2198         <p>Not for use by third-party applications.
2199         @hide
2200    -->
2201    <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW"
2202        android:protectionLevel="signature" />
2203
2204    <!-- @SystemApi Allows an application to manage (create, destroy,
2205         Z-order) application tokens in the window manager.
2206         <p>Not for use by third-party applications.
2207         @hide
2208    -->
2209    <permission android:name="android.permission.MANAGE_APP_TOKENS"
2210        android:protectionLevel="signature" />
2211
2212    <!-- Allows System UI to register listeners for events from Window Manager.
2213         @hide -->
2214    <permission android:name="android.permission.REGISTER_WINDOW_MANAGER_LISTENERS"
2215        android:protectionLevel="signature" />
2216
2217    <!-- @hide Allows the application to temporarily freeze the screen for a
2218         full-screen transition. -->
2219    <permission android:name="android.permission.FREEZE_SCREEN"
2220        android:protectionLevel="signature" />
2221
2222    <!-- @SystemApi Allows an application to inject user events (keys, touch, trackball)
2223         into the event stream and deliver them to ANY window.  Without this
2224         permission, you can only deliver events to windows in your own process.
2225         <p>Not for use by third-party applications.
2226         @hide
2227    -->
2228    <permission android:name="android.permission.INJECT_EVENTS"
2229        android:protectionLevel="signature" />
2230
2231    <!-- @hide Allows an application to register an input filter which filters the stream
2232         of user events (keys, touch, trackball) before they are dispatched to any window. -->
2233    <permission android:name="android.permission.FILTER_EVENTS"
2234        android:protectionLevel="signature" />
2235
2236    <!-- @hide Allows an application to retrieve the window token from the accessibility manager. -->
2237    <permission android:name="android.permission.RETRIEVE_WINDOW_TOKEN"
2238        android:protectionLevel="signature" />
2239
2240    <!-- @hide Allows an application to collect frame statistics -->
2241    <permission android:name="android.permission.FRAME_STATS"
2242         android:protectionLevel="signature" />
2243
2244    <!-- @hide Allows an application to temporary enable accessibility on the device. -->
2245    <permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY"
2246        android:protectionLevel="signature" />
2247
2248    <!-- @SystemApi Allows an application to watch and control how activities are
2249         started globally in the system.  Only for is in debugging
2250         (usually the monkey command).
2251         <p>Not for use by third-party applications.
2252         @hide
2253    -->
2254    <permission android:name="android.permission.SET_ACTIVITY_WATCHER"
2255        android:protectionLevel="signature" />
2256
2257    <!-- @SystemApi Allows an application to call the activity manager shutdown() API
2258         to put the higher-level system there into a shutdown state.
2259         @hide -->
2260    <permission android:name="android.permission.SHUTDOWN"
2261        android:protectionLevel="signature|privileged" />
2262
2263    <!-- @SystemApi Allows an application to tell the activity manager to temporarily
2264         stop application switches, putting it into a special mode that
2265         prevents applications from immediately switching away from some
2266         critical UI such as the home screen.
2267         @hide -->
2268    <permission android:name="android.permission.STOP_APP_SWITCHES"
2269        android:protectionLevel="signature|privileged" />
2270
2271    <!-- @SystemApi Allows an application to retrieve private information about
2272         the current top activity, such as any assist context it can provide.
2273         <p>Not for use by third-party applications.
2274         @hide
2275    -->
2276    <permission android:name="android.permission.GET_TOP_ACTIVITY_INFO"
2277        android:protectionLevel="signature" />
2278
2279    <!-- Allows an application to retrieve the current state of keys and
2280         switches.
2281         <p>Not for use by third-party applications.
2282         @deprecated The API that used this permission has been removed. -->
2283    <permission android:name="android.permission.READ_INPUT_STATE"
2284        android:protectionLevel="signature" />
2285
2286    <!-- Must be required by an {@link android.inputmethodservice.InputMethodService},
2287         to ensure that only the system can bind to it.
2288         <p>Protection level: signature
2289    -->
2290    <permission android:name="android.permission.BIND_INPUT_METHOD"
2291        android:protectionLevel="signature" />
2292
2293    <!-- Must be required by an {@link android.media.midi.MidiDeviceService},
2294         to ensure that only the system can bind to it.
2295         <p>Protection level: signature
2296    -->
2297    <permission android:name="android.permission.BIND_MIDI_DEVICE_SERVICE"
2298        android:protectionLevel="signature" />
2299
2300    <!-- Must be required by an {@link android.accessibilityservice.AccessibilityService},
2301         to ensure that only the system can bind to it.
2302         <p>Protection level: signature
2303    -->
2304    <permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE"
2305        android:protectionLevel="signature" />
2306
2307    <!-- Must be required by a {@link android.printservice.PrintService},
2308         to ensure that only the system can bind to it.
2309         <p>Protection level: signature
2310    -->
2311    <permission android:name="android.permission.BIND_PRINT_SERVICE"
2312        android:protectionLevel="signature" />
2313
2314    <!-- Must be required by a {@link android.printservice.recommendation.RecommendationService},
2315     to ensure that only the system can bind to it.
2316     @hide
2317     @SystemApi
2318     <p>Protection level: signature
2319    -->
2320    <permission android:name="android.permission.BIND_PRINT_RECOMMENDATION_SERVICE"
2321            android:protectionLevel="signature" />
2322
2323    <!-- Must be required by a {@link android.nfc.cardemulation.HostApduService}
2324         or {@link android.nfc.cardemulation.OffHostApduService} to ensure that only
2325         the system can bind to it.
2326         <p>Protection level: signature
2327    -->
2328    <permission android:name="android.permission.BIND_NFC_SERVICE"
2329        android:protectionLevel="signature" />
2330
2331    <!-- Must be required by the PrintSpooler to ensure that only the system can bind to it.
2332         @hide -->
2333    <permission android:name="android.permission.BIND_PRINT_SPOOLER_SERVICE"
2334        android:protectionLevel="signature" />
2335
2336    <!-- @SystemApi Must be required by the RuntimePermissionPresenterService to ensure
2337         that only the system can bind to it.
2338         @hide -->
2339    <permission android:name="android.permission.BIND_RUNTIME_PERMISSION_PRESENTER_SERVICE"
2340        android:protectionLevel="signature" />
2341
2342    <!-- Must be required by a TextService (e.g. SpellCheckerService)
2343         to ensure that only the system can bind to it.
2344         <p>Protection level: signature
2345    -->
2346    <permission android:name="android.permission.BIND_TEXT_SERVICE"
2347        android:protectionLevel="signature" />
2348
2349    <!-- Must be required by a {@link android.net.VpnService},
2350         to ensure that only the system can bind to it.
2351         <p>Protection level: signature
2352    -->
2353    <permission android:name="android.permission.BIND_VPN_SERVICE"
2354        android:protectionLevel="signature" />
2355
2356    <!-- Must be required by a {@link android.service.wallpaper.WallpaperService},
2357         to ensure that only the system can bind to it.
2358         <p>Protection level: system|signature
2359    -->
2360    <permission android:name="android.permission.BIND_WALLPAPER"
2361        android:protectionLevel="signature|privileged" />
2362
2363    <!-- Must be required by a {@link android.service.voice.VoiceInteractionService},
2364         to ensure that only the system can bind to it.
2365         <p>Protection level: signature
2366    -->
2367    <permission android:name="android.permission.BIND_VOICE_INTERACTION"
2368        android:protectionLevel="signature" />
2369
2370    <!-- Must be required by a {@link android.service.autofill.AutoFillService},
2371         to ensure that only the system can bind to it.
2372         <p>Protection level: signature
2373    -->
2374    <permission android:name="android.permission.BIND_AUTO_FILL"
2375        android:protectionLevel="signature" />
2376
2377    <!-- Must be required by hotword enrollment application,
2378         to ensure that only the system can interact with it.
2379         @hide <p>Not for use by third-party applications.</p> -->
2380    <permission android:name="android.permission.MANAGE_VOICE_KEYPHRASES"
2381        android:protectionLevel="signature|privileged" />
2382
2383    <!-- Must be required by a {@link com.android.media.remotedisplay.RemoteDisplayProvider},
2384         to ensure that only the system can bind to it.
2385         @hide -->
2386    <permission android:name="android.permission.BIND_REMOTE_DISPLAY"
2387        android:protectionLevel="signature" />
2388
2389    <!-- Must be required by a {@link android.media.tv.TvInputService}
2390         to ensure that only the system can bind to it.
2391         <p>Protection level: signature
2392    -->
2393    <permission android:name="android.permission.BIND_TV_INPUT"
2394        android:protectionLevel="signature|privileged" />
2395
2396    <!-- @SystemApi
2397         Must be required by a {@link com.android.media.tv.remoteprovider.TvRemoteProvider}
2398         to ensure that only the system can bind to it.
2399         <p>Protection level: signature|privileged
2400         <p>Not for use by third-party applications. </p>
2401         @hide  -->
2402    <permission android:name="android.permission.BIND_TV_REMOTE_SERVICE"
2403        android:protectionLevel="signature|privileged" />
2404
2405    <!-- @SystemApi
2406         Must be required for a virtual remote controller for TV.
2407         <p>Protection level: signature|privileged
2408         <p>Not for use by third-party applications. </p>
2409         @hide  -->
2410    <permission android:name="android.permission.TV_VIRTUAL_REMOTE_CONTROLLER"
2411        android:protectionLevel="signature|privileged" />
2412
2413    <!-- @SystemApi Allows an application to modify parental controls
2414         <p>Not for use by third-party applications.
2415         @hide -->
2416    <permission android:name="android.permission.MODIFY_PARENTAL_CONTROLS"
2417        android:protectionLevel="signature|privileged" />
2418
2419    <!-- Must be required by a {@link android.media.routing.MediaRouteService}
2420         to ensure that only the system can interact with it.
2421         @hide -->
2422    <permission android:name="android.permission.BIND_ROUTE_PROVIDER"
2423        android:protectionLevel="signature" />
2424
2425    <!-- Must be required by device administration receiver, to ensure that only the
2426         system can interact with it.
2427         <p>Protection level: signature
2428    -->
2429    <permission android:name="android.permission.BIND_DEVICE_ADMIN"
2430        android:protectionLevel="signature" />
2431
2432    <!-- @SystemApi Required to add or remove another application as a device admin.
2433         <p>Not for use by third-party applications.
2434         @hide -->
2435    <permission android:name="android.permission.MANAGE_DEVICE_ADMINS"
2436        android:protectionLevel="signature|privileged" />
2437
2438    <!-- @SystemApi Allows low-level access to setting the orientation (actually
2439         rotation) of the screen.
2440         <p>Not for use by third-party applications.
2441         @hide
2442    -->
2443    <permission android:name="android.permission.SET_ORIENTATION"
2444        android:protectionLevel="signature" />
2445
2446    <!-- @SystemApi Allows low-level access to setting the pointer speed.
2447         <p>Not for use by third-party applications.
2448         @hide
2449    -->
2450    <permission android:name="android.permission.SET_POINTER_SPEED"
2451        android:protectionLevel="signature" />
2452
2453    <!-- Allows low-level access to setting input device calibration.
2454         <p>Not for use by normal applications.
2455         @hide -->
2456    <permission android:name="android.permission.SET_INPUT_CALIBRATION"
2457        android:protectionLevel="signature" />
2458
2459    <!-- Allows low-level access to setting the keyboard layout.
2460         <p>Not for use by third-party applications.
2461         @hide -->
2462    <permission android:name="android.permission.SET_KEYBOARD_LAYOUT"
2463        android:protectionLevel="signature" />
2464
2465    <!-- Allows an application to query tablet mode state and monitor changes
2466         in it.
2467         <p>Not for use by third-party applications.
2468         @hide -->
2469    <permission android:name="android.permission.TABLET_MODE"
2470        android:protectionLevel="signature" />
2471
2472    <!-- Allows an application to request installing packages. Apps
2473         targeting APIs greater than 22 must hold this permission in
2474         order to use {@link android.content.Intent#ACTION_INSTALL_PACKAGE}.
2475         <p>Protection level: normal
2476    -->
2477    <permission android:name="android.permission.REQUEST_INSTALL_PACKAGES"
2478        android:label="@string/permlab_requestInstallPackages"
2479        android:description="@string/permdesc_requestInstallPackages"
2480        android:protectionLevel="normal" />
2481
2482    <!-- @SystemApi Allows an application to install packages.
2483    <p>Not for use by third-party applications. -->
2484    <permission android:name="android.permission.INSTALL_PACKAGES"
2485        android:protectionLevel="signature|privileged" />
2486
2487    <!-- @SystemApi Allows an application to clear user data.
2488         <p>Not for use by third-party applications
2489         @hide
2490    -->
2491    <permission android:name="android.permission.CLEAR_APP_USER_DATA"
2492        android:protectionLevel="signature|installer" />
2493
2494    <!-- @hide Allows an application to get the URI permissions
2495         granted to another application.
2496         <p>Not for use by third-party applications
2497    -->
2498    <permission android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS"
2499        android:protectionLevel="signature" />
2500
2501    <!-- @hide Allows an application to clear the URI permissions
2502         granted to another application.
2503         <p>Not for use by third-party applications
2504    -->
2505    <permission
2506        android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS"
2507        android:protectionLevel="signature" />
2508
2509    <!-- @SystemApi Allows an application to delete cache files.
2510    <p>Not for use by third-party applications. -->
2511    <permission android:name="android.permission.DELETE_CACHE_FILES"
2512        android:protectionLevel="signature|privileged" />
2513
2514    <!-- @SystemApi Allows an application to delete packages.
2515         <p>Not for use by third-party applications.
2516         <p>Starting in {@link android.os.Build.VERSION_CODES#N}, user confirmation is requested
2517         when the application deleting the package is not the same application that installed the
2518         package. -->
2519    <permission android:name="android.permission.DELETE_PACKAGES"
2520        android:protectionLevel="signature|privileged" />
2521
2522    <!-- @SystemApi Allows an application to move location of installed package.
2523         @hide -->
2524    <permission android:name="android.permission.MOVE_PACKAGE"
2525        android:protectionLevel="signature|privileged" />
2526
2527    <!-- @SystemApi Allows an application to change whether an application component (other than its own) is
2528         enabled or not.
2529         <p>Not for use by third-party applications. -->
2530    <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE"
2531        android:protectionLevel="signature|privileged" />
2532
2533    <!-- @SystemApi Allows an application to grant specific permissions.
2534         @hide -->
2535    <permission android:name="android.permission.GRANT_RUNTIME_PERMISSIONS"
2536        android:protectionLevel="signature|installer|verifier" />
2537
2538    <!-- @SystemApi Allows an app that has this permission and the permissions to install packages
2539         to request certain runtime permissions to be granted at installation.
2540         @hide -->
2541    <permission android:name="android.permission.INSTALL_GRANT_RUNTIME_PERMISSIONS"
2542        android:protectionLevel="signature|installer|verifier" />
2543
2544    <!-- @SystemApi Allows an application to revoke specific permissions.
2545        @hide -->
2546    <permission android:name="android.permission.REVOKE_RUNTIME_PERMISSIONS"
2547         android:protectionLevel="signature|installer|verifier" />
2548
2549    <!-- @hide Allows an application to observe permission changes. -->
2550    <permission android:name="android.permission.OBSERVE_GRANT_REVOKE_PERMISSIONS"
2551        android:protectionLevel="signature|privileged" />
2552
2553    <!-- @SystemApi Allows an application to use SurfaceFlinger's low level features.
2554         <p>Not for use by third-party applications.
2555         @hide
2556    -->
2557    <permission android:name="android.permission.ACCESS_SURFACE_FLINGER"
2558        android:protectionLevel="signature" />
2559
2560    <!-- @SystemApi Allows an application to take screen shots and more generally
2561         get access to the frame buffer data.
2562         <p>Not for use by third-party applications. -->
2563    <permission android:name="android.permission.READ_FRAME_BUFFER"
2564        android:protectionLevel="signature|privileged" />
2565
2566    <!-- Allows an application to use InputFlinger's low level features.
2567         @hide -->
2568    <permission android:name="android.permission.ACCESS_INPUT_FLINGER"
2569        android:protectionLevel="signature" />
2570
2571    <!-- Allows an application to configure and connect to Wifi displays
2572         @hide -->
2573    <permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY"
2574        android:protectionLevel="signature" />
2575
2576    <!-- Allows an application to control low-level features of Wifi displays
2577         such as opening an RTSP socket.  This permission should only be used
2578         by the display manager.
2579         @hide -->
2580    <permission android:name="android.permission.CONTROL_WIFI_DISPLAY"
2581        android:protectionLevel="signature" />
2582
2583    <!-- Allows an application to control the color modes set for displays system-wide.
2584         <p>Not for use by third-party applications.</p>
2585         @hide -->
2586    <permission android:name="android.permission.CONFIGURE_DISPLAY_COLOR_MODE"
2587        android:protectionLevel="signature" />
2588
2589    <!-- @SystemApi Allows an application to control VPN.
2590         <p>Not for use by third-party applications.</p>
2591         @hide -->
2592    <permission android:name="android.permission.CONTROL_VPN"
2593        android:protectionLevel="signature|privileged" />
2594    <uses-permission android:name="android.permission.CONTROL_VPN" />
2595
2596    <!-- @SystemApi Allows an application to capture audio output.
2597         <p>Not for use by third-party applications.</p> -->
2598    <permission android:name="android.permission.CAPTURE_AUDIO_OUTPUT"
2599        android:protectionLevel="signature|privileged" />
2600
2601    <!-- @SystemApi Allows an application to capture audio for hotword detection.
2602         <p>Not for use by third-party applications.</p>
2603         @hide -->
2604    <permission android:name="android.permission.CAPTURE_AUDIO_HOTWORD"
2605        android:protectionLevel="signature|privileged" />
2606
2607    <!-- @SystemApi Allows an application to modify audio routing and override policy decisions.
2608         <p>Not for use by third-party applications.</p>
2609         @hide -->
2610    <permission android:name="android.permission.MODIFY_AUDIO_ROUTING"
2611        android:protectionLevel="signature|privileged" />
2612
2613    <!-- @SystemApi Allows an application to capture video output.
2614         <p>Not for use by third-party applications.</p> -->
2615    <permission android:name="android.permission.CAPTURE_VIDEO_OUTPUT"
2616        android:protectionLevel="signature|privileged" />
2617
2618    <!-- @SystemApi Allows an application to capture secure video output.
2619         <p>Not for use by third-party applications.</p> -->
2620    <permission android:name="android.permission.CAPTURE_SECURE_VIDEO_OUTPUT"
2621        android:protectionLevel="signature|privileged" />
2622
2623    <!-- @SystemApi Allows an application to know what content is playing and control its playback.
2624         <p>Not for use by third-party applications due to privacy of media consumption</p>  -->
2625    <permission android:name="android.permission.MEDIA_CONTENT_CONTROL"
2626        android:protectionLevel="signature|privileged" />
2627
2628    <!-- @SystemApi Required to be able to disable the device (very dangerous!).
2629         <p>Not for use by third-party applications.
2630         @hide
2631    -->
2632    <permission android:name="android.permission.BRICK"
2633        android:protectionLevel="signature" />
2634
2635    <!-- @SystemApi Required to be able to reboot the device.
2636    <p>Not for use by third-party applications. -->
2637    <permission android:name="android.permission.REBOOT"
2638        android:protectionLevel="signature|privileged" />
2639
2640   <!-- @SystemApi Allows low-level access to power management.
2641        <p>Not for use by third-party applications.
2642        @hide
2643    -->
2644   <permission android:name="android.permission.DEVICE_POWER"
2645        android:protectionLevel="signature" />
2646
2647   <!-- Allows access to the PowerManager.userActivity function.
2648   <p>Not for use by third-party applications. @hide @SystemApi -->
2649    <permission android:name="android.permission.USER_ACTIVITY"
2650        android:protectionLevel="signature|privileged" />
2651
2652   <!-- @hide Allows low-level access to tun tap driver -->
2653    <permission android:name="android.permission.NET_TUNNELING"
2654        android:protectionLevel="signature" />
2655
2656    <!-- Run as a manufacturer test application, running as the root user.
2657         Only available when the device is running in manufacturer test mode.
2658         <p>Not for use by third-party applications.
2659    -->
2660    <permission android:name="android.permission.FACTORY_TEST"
2661        android:protectionLevel="signature" />
2662
2663    <!-- Allows an application to broadcast a notification that an application
2664         package has been removed.
2665         <p>Not for use by third-party applications.
2666    -->
2667    <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED"
2668        android:protectionLevel="signature" />
2669
2670    <!-- Allows an application to broadcast an SMS receipt notification.
2671         <p>Not for use by third-party applications.
2672    -->
2673    <permission android:name="android.permission.BROADCAST_SMS"
2674        android:protectionLevel="signature" />
2675
2676    <!-- Allows an application to broadcast a WAP PUSH receipt notification.
2677         <p>Not for use by third-party applications.
2678    -->
2679    <permission android:name="android.permission.BROADCAST_WAP_PUSH"
2680        android:protectionLevel="signature" />
2681
2682    <!-- @SystemApi Allows an application to broadcast privileged networking requests.
2683         <p>Not for use by third-party applications.
2684         @hide
2685         @deprecated Use {@link android.Manifest.permission#REQUEST_NETWORK_SCORES} instead
2686    -->
2687    <permission android:name="android.permission.BROADCAST_NETWORK_PRIVILEGED"
2688        android:protectionLevel="signature|privileged" />
2689
2690    <!-- @SystemApi Not for use by third-party applications. -->
2691    <permission android:name="android.permission.MASTER_CLEAR"
2692        android:protectionLevel="signature|privileged" />
2693
2694    <!-- @SystemApi Allows an application to call any phone number, including emergency
2695         numbers, without going through the Dialer user interface for the user
2696         to confirm the call being placed.
2697         <p>Not for use by third-party applications. -->
2698    <permission android:name="android.permission.CALL_PRIVILEGED"
2699        android:protectionLevel="signature|privileged" />
2700
2701    <!-- @SystemApi Allows an application to perform CDMA OTA provisioning @hide -->
2702    <permission android:name="android.permission.PERFORM_CDMA_PROVISIONING"
2703        android:protectionLevel="signature|privileged" />
2704
2705    <!-- @SystemApi Allows an application to perform SIM Activation @hide -->
2706    <permission android:name="android.permission.PERFORM_SIM_ACTIVATION"
2707        android:protectionLevel="signature|privileged" />
2708
2709    <!-- @SystemApi Allows enabling/disabling location update notifications from
2710         the radio.
2711         <p>Not for use by third-party applications. -->
2712    <permission android:name="android.permission.CONTROL_LOCATION_UPDATES"
2713        android:protectionLevel="signature|privileged" />
2714
2715    <!-- @SystemApi Allows read/write access to the "properties" table in the checkin
2716         database, to change values that get uploaded.
2717         <p>Not for use by third-party applications. -->
2718    <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES"
2719        android:protectionLevel="signature|privileged" />
2720
2721    <!-- @SystemApi Allows an application to collect component usage
2722         statistics
2723         <p>Declaring the permission implies intention to use the API and the user of the
2724         device can grant permission through the Settings application. -->
2725    <permission android:name="android.permission.PACKAGE_USAGE_STATS"
2726        android:protectionLevel="signature|privileged|development|appop" />
2727    <uses-permission android:name="android.permission.PACKAGE_USAGE_STATS" />
2728
2729    <!-- @hide Allows an application to change the app idle state of an app.
2730         <p>Not for use by third-party applications. -->
2731    <permission android:name="android.permission.CHANGE_APP_IDLE_STATE"
2732        android:protectionLevel="signature" />
2733
2734    <!-- @hide @SystemApi Allows an application to temporarily whitelist an inactive app to
2735         access the network and acquire wakelocks.
2736         <p>Not for use by third-party applications. -->
2737    <permission android:name="android.permission.CHANGE_DEVICE_IDLE_TEMP_WHITELIST"
2738        android:protectionLevel="signature|privileged" />
2739
2740    <!-- Permission an application must hold in order to use
2741         {@link android.provider.Settings#ACTION_REQUEST_IGNORE_BATTERY_OPTIMIZATIONS}.
2742         This is a normal permission: an app requesting it will always be granted the
2743         permission, without the user needing to approve or see it. -->
2744    <permission android:name="android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS"
2745        android:label="@string/permlab_requestIgnoreBatteryOptimizations"
2746        android:description="@string/permdesc_requestIgnoreBatteryOptimizations"
2747        android:protectionLevel="normal" />
2748
2749    <!-- @SystemApi Allows an application to collect battery statistics -->
2750    <permission android:name="android.permission.BATTERY_STATS"
2751        android:protectionLevel="signature|privileged|development" />
2752
2753    <!-- @SystemApi Allows an application to control the backup and restore process.
2754    <p>Not for use by third-party applications.
2755         @hide pending API council -->
2756    <permission android:name="android.permission.BACKUP"
2757        android:protectionLevel="signature|privileged" />
2758
2759    <!-- Allows a package to launch the secure full-backup confirmation UI.
2760         ONLY the system process may hold this permission.
2761         @hide -->
2762    <permission android:name="android.permission.CONFIRM_FULL_BACKUP"
2763        android:protectionLevel="signature" />
2764
2765    <!-- @SystemApi Must be required by a {@link android.widget.RemoteViewsService},
2766         to ensure that only the system can bind to it. -->
2767    <permission android:name="android.permission.BIND_REMOTEVIEWS"
2768        android:protectionLevel="signature|privileged" />
2769
2770    <!-- @SystemApi Allows an application to tell the AppWidget service which application
2771         can access AppWidget's data.  The normal user flow is that a user
2772         picks an AppWidget to go into a particular host, thereby giving that
2773         host application access to the private data from the AppWidget app.
2774         An application that has this permission should honor that contract.
2775         <p>Not for use by third-party applications. -->
2776    <permission android:name="android.permission.BIND_APPWIDGET"
2777        android:protectionLevel="signature|privileged" />
2778
2779    <!-- @SystemApi Private permission, to restrict who can bring up a dialog to add a new
2780         keyguard widget
2781         @hide -->
2782    <permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET"
2783        android:protectionLevel="signature|privileged" />
2784
2785    <!-- @SystemApi Internal permission allowing an application to query/set which
2786         applications can bind AppWidgets.
2787         @hide -->
2788    <permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS"
2789        android:protectionLevel="signature|privileged" />
2790
2791    <!-- Allows applications to change the background data setting.
2792    <p>Not for use by third-party applications.
2793         @hide pending API council -->
2794    <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING"
2795        android:protectionLevel="signature" />
2796
2797    <!-- @SystemApi This permission can be used on content providers to allow the global
2798         search system to access their data.  Typically it used when the
2799         provider has some permissions protecting it (which global search
2800         would not be expected to hold), and added as a read-only permission
2801         to the path in the provider where global search queries are
2802         performed.  This permission can not be held by regular applications;
2803         it is used by applications to protect themselves from everyone else
2804         besides global search. -->
2805    <permission android:name="android.permission.GLOBAL_SEARCH"
2806        android:protectionLevel="signature|privileged" />
2807
2808    <!-- Internal permission protecting access to the global search
2809         system: ensures that only the system can access the provider
2810         to perform queries (since this otherwise provides unrestricted
2811         access to a variety of content providers), and to write the
2812         search statistics (to keep applications from gaming the source
2813         ranking).
2814         @hide -->
2815    <permission android:name="android.permission.GLOBAL_SEARCH_CONTROL"
2816        android:protectionLevel="signature" />
2817
2818    <!-- @SystemApi Internal permission to allows an application to read indexable data.
2819        @hide -->
2820    <permission android:name="android.permission.READ_SEARCH_INDEXABLES"
2821        android:protectionLevel="signature|privileged" />
2822
2823    <!-- @SystemApi Allows applications to set a live wallpaper.
2824         @hide XXX Change to signature once the picker is moved to its
2825         own apk as Ghod Intended. -->
2826    <permission android:name="android.permission.SET_WALLPAPER_COMPONENT"
2827        android:protectionLevel="signature|privileged" />
2828
2829    <!-- @SystemApi Allows applications to read dream settings and dream state.
2830         @hide -->
2831    <permission android:name="android.permission.READ_DREAM_STATE"
2832        android:protectionLevel="signature|privileged" />
2833
2834    <!-- @SystemApi Allows applications to write dream settings, and start or stop dreaming.
2835         @hide -->
2836    <permission android:name="android.permission.WRITE_DREAM_STATE"
2837        android:protectionLevel="signature|privileged" />
2838
2839    <!-- @SystemApi Allow an application to read and write the cache partition.
2840         @hide -->
2841    <permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM"
2842        android:protectionLevel="signature|privileged" />
2843
2844    <!-- Must be required by default container service so that only
2845         the system can bind to it and use it to copy
2846         protected data to secure containers or files
2847         accessible to the system.
2848         @hide -->
2849    <permission android:name="android.permission.COPY_PROTECTED_DATA"
2850        android:protectionLevel="signature" />
2851
2852    <!-- @SystemApi Internal permission protecting access to the encryption methods
2853        @hide
2854    -->
2855    <permission android:name="android.permission.CRYPT_KEEPER"
2856        android:protectionLevel="signature|privileged" />
2857
2858    <!-- @SystemApi Allows an application to read historical network usage for
2859         specific networks and applications. @hide -->
2860    <permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY"
2861        android:protectionLevel="signature|privileged" />
2862
2863    <!-- Allows an application to manage network policies (such as warning and disable
2864         limits) and to define application-specific rules. @hide -->
2865    <permission android:name="android.permission.MANAGE_NETWORK_POLICY"
2866        android:protectionLevel="signature" />
2867
2868    <!-- @SystemApi Allows an application to account its network traffic against other UIDs. Used
2869         by system services like download manager and media server. Not for use by
2870         third party apps. @hide -->
2871    <permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING"
2872        android:protectionLevel="signature|privileged" />
2873
2874    <!-- C2DM permission.
2875         @hide Used internally.
2876     -->
2877    <permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"
2878          android:protectionLevel="signature" />
2879    <uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/>
2880
2881    <!-- @SystemApi @hide Package verifier needs to have this permission before the PackageManager will
2882         trust it to verify packages.
2883    -->
2884    <permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT"
2885        android:protectionLevel="signature|privileged" />
2886
2887    <!-- Must be required by package verifier receiver, to ensure that only the
2888         system can interact with it.
2889         @hide
2890    -->
2891    <permission android:name="android.permission.BIND_PACKAGE_VERIFIER"
2892        android:protectionLevel="signature" />
2893
2894    <!-- @SystemApi @hide Intent filter verifier needs to have this permission before the
2895         PackageManager will trust it to verify intent filters.
2896    -->
2897    <permission android:name="android.permission.INTENT_FILTER_VERIFICATION_AGENT"
2898        android:protectionLevel="signature|privileged" />
2899
2900    <!-- Must be required by intent filter verifier receiver, to ensure that only the
2901         system can interact with it.
2902         @hide
2903    -->
2904    <permission android:name="android.permission.BIND_INTENT_FILTER_VERIFIER"
2905        android:protectionLevel="signature" />
2906
2907    <!-- @SystemApi Allows applications to access serial ports via the SerialManager.
2908         @hide -->
2909    <permission android:name="android.permission.SERIAL_PORT"
2910        android:protectionLevel="signature|privileged" />
2911
2912    <!-- Allows the holder to access content providers from outside an ApplicationThread.
2913         This permission is enforced by the ActivityManagerService on the corresponding APIs,
2914         in particular ActivityManagerService#getContentProviderExternal(String) and
2915         ActivityManagerService#removeContentProviderExternal(String).
2916         @hide
2917    -->
2918    <permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY"
2919        android:protectionLevel="signature" />
2920
2921    <!-- @SystemApi Allows an application to hold an UpdateLock, recommending that a headless
2922         OTA reboot *not* occur while the lock is held.
2923         @hide -->
2924    <permission android:name="android.permission.UPDATE_LOCK"
2925        android:protectionLevel="signature|privileged" />
2926
2927    <!-- @SystemApi Allows an application to read the current set of notifications, including
2928         any metadata and intents attached.
2929         @hide -->
2930    <permission android:name="android.permission.ACCESS_NOTIFICATIONS"
2931        android:protectionLevel="signature|privileged" />
2932
2933    <!-- Marker permission for applications that wish to access notification policy.
2934         <p>Protection level: normal
2935    -->
2936    <permission android:name="android.permission.ACCESS_NOTIFICATION_POLICY"
2937        android:description="@string/permdesc_access_notification_policy"
2938        android:label="@string/permlab_access_notification_policy"
2939        android:protectionLevel="normal" />
2940
2941    <!-- Allows modification of do not disturb rules and policies. Only allowed for system
2942        processes.
2943        @hide -->
2944    <permission android:name="android.permission.MANAGE_NOTIFICATIONS"
2945                android:protectionLevel="signature" />
2946
2947    <!-- Allows access to keyguard secure storage.  Only allowed for system processes.
2948        @hide -->
2949    <permission android:name="android.permission.ACCESS_KEYGUARD_SECURE_STORAGE"
2950        android:protectionLevel="signature" />
2951
2952    <!-- Allows managing (adding, removing) fingerprint templates. Reserved for the system. @hide -->
2953    <permission android:name="android.permission.MANAGE_FINGERPRINT"
2954        android:protectionLevel="signature|privileged" />
2955
2956    <!-- Allows an app to reset fingerprint attempt counter. Reserved for the system. @hide -->
2957    <permission android:name="android.permission.RESET_FINGERPRINT_LOCKOUT"
2958        android:protectionLevel="signature" />
2959
2960    <!-- Allows an application to control keyguard.  Only allowed for system processes.
2961        @hide -->
2962    <permission android:name="android.permission.CONTROL_KEYGUARD"
2963        android:protectionLevel="signature" />
2964
2965    <!-- Allows an application to listen to trust changes.  Only allowed for system processes.
2966        @hide -->
2967    <permission android:name="android.permission.TRUST_LISTENER"
2968        android:protectionLevel="signature" />
2969
2970    <!-- @SystemApi Allows an application to provide a trust agent.
2971         @hide For security reasons, this is a platform-only permission. -->
2972    <permission android:name="android.permission.PROVIDE_TRUST_AGENT"
2973        android:protectionLevel="signature|privileged" />
2974
2975    <!-- Allows an application to launch the trust agent settings activity.
2976        @hide -->
2977    <permission android:name="android.permission.LAUNCH_TRUST_AGENT_SETTINGS"
2978        android:protectionLevel="signature|privileged" />
2979
2980    <!-- @SystemApi Must be required by an {@link
2981        android.service.trust.TrustAgentService},
2982        to ensure that only the system can bind to it.
2983        @hide -->
2984    <permission android:name="android.permission.BIND_TRUST_AGENT"
2985        android:protectionLevel="signature" />
2986
2987    <!-- Must be required by an {@link
2988         android.service.notification.NotificationListenerService},
2989         to ensure that only the system can bind to it.
2990         <p>Protection level: signature
2991    -->
2992    <permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE"
2993        android:protectionLevel="signature" />
2994
2995    <!-- Must be required by an {@link
2996         android.service.notification.NotificationAssistantService to ensure that only the system
2997         can bind to it.
2998         <p>Protection level: signature
2999    -->
3000    <permission android:name="android.permission.BIND_NOTIFICATION_ASSISTANT_SERVICE"
3001        android:protectionLevel="signature" />
3002
3003    <!-- Must be required by a {@link
3004         android.service.chooser.ChooserTargetService}, to ensure that
3005         only the system can bind to it.
3006         <p>Protection level: signature
3007    -->
3008    <permission android:name="android.permission.BIND_CHOOSER_TARGET_SERVICE"
3009        android:protectionLevel="signature" />
3010
3011    <!-- Must be required by a {@link
3012         android.service.notification.ConditionProviderService},
3013         to ensure that only the system can bind to it.
3014         <p>Protection level: signature
3015         -->
3016    <permission android:name="android.permission.BIND_CONDITION_PROVIDER_SERVICE"
3017        android:protectionLevel="signature" />
3018
3019    <!-- Must be required by an {@link android.service.dreams.DreamService},
3020         to ensure that only the system can bind to it.
3021         <p>Protection level: signature
3022    -->
3023    <permission android:name="android.permission.BIND_DREAM_SERVICE"
3024        android:protectionLevel="signature" />
3025
3026    <!-- @SystemApi Allows an application to call into a carrier setup flow. It is up to the
3027         carrier setup application to enforce that this permission is required
3028         @hide This is not a third-party API (intended for OEMs and system apps). -->
3029    <permission android:name="android.permission.INVOKE_CARRIER_SETUP"
3030        android:protectionLevel="signature|privileged" />
3031
3032    <!-- @SystemApi Allows an application to listen for network condition observations.
3033         @hide This is not a third-party API (intended for system apps). -->
3034    <permission android:name="android.permission.ACCESS_NETWORK_CONDITIONS"
3035        android:protectionLevel="signature|privileged" />
3036
3037    <!-- @SystemApi Allows an application to provision and access DRM certificates
3038         @hide This is not a third-party API (intended for system apps). -->
3039    <permission android:name="android.permission.ACCESS_DRM_CERTIFICATES"
3040        android:protectionLevel="signature|privileged" />
3041
3042    <!-- Api Allows an application to manage media projection sessions.
3043         @hide This is not a third-party API (intended for system apps). -->
3044    <permission android:name="android.permission.MANAGE_MEDIA_PROJECTION"
3045        android:protectionLevel="signature" />
3046
3047    <!-- @SystemApi Allows an application to read install sessions
3048         @hide This is not a third-party API (intended for system apps). -->
3049    <permission android:name="android.permission.READ_INSTALL_SESSIONS"
3050        android:label="@string/permlab_readInstallSessions"
3051        android:description="@string/permdesc_readInstallSessions"
3052        android:protectionLevel="normal"/>
3053
3054    <!-- @SystemApi Allows an application to remove DRM certificates
3055         @hide This is not a third-party API (intended for system apps). -->
3056    <permission android:name="android.permission.REMOVE_DRM_CERTIFICATES"
3057        android:protectionLevel="signature|privileged" />
3058
3059    <!-- @deprecated Use {@link android.Manifest.permission#BIND_CARRIER_SERVICES} instead -->
3060    <permission android:name="android.permission.BIND_CARRIER_MESSAGING_SERVICE"
3061        android:protectionLevel="signature|privileged" />
3062
3063    <!-- Allows an application to interact with the currently active
3064         {@link android.service.voice.VoiceInteractionService}.
3065         @hide -->
3066    <permission android:name="android.permission.ACCESS_VOICE_INTERACTION_SERVICE"
3067        android:protectionLevel="signature" />
3068
3069    <!-- The system process that is allowed to bind to services in carrier apps will
3070         have this permission. Carrier apps should use this permission to protect
3071         their services that only the system is allowed to bind to.
3072         <p>Protection level: system|signature
3073    -->
3074    <permission android:name="android.permission.BIND_CARRIER_SERVICES"
3075        android:label="@string/permlab_bindCarrierServices"
3076        android:description="@string/permdesc_bindCarrierServices"
3077        android:protectionLevel="signature|privileged" />
3078
3079    <!-- Allows an application to query whether DO_NOT_ASK_CREDENTIALS_ON_BOOT
3080         flag is set.
3081         @hide -->
3082    <permission android:name="android.permission.QUERY_DO_NOT_ASK_CREDENTIALS_ON_BOOT"
3083                android:protectionLevel="signature" />
3084
3085    <!-- @SystemApi Allows applications to kill UIDs.
3086        <p>Not for use by third-party applications.
3087         @hide -->
3088    <permission android:name="android.permission.KILL_UID"
3089                android:protectionLevel="signature|installer" />
3090
3091    <!-- @SystemApi Allows applications to read the local WiFi and Bluetooth MAC address.
3092        @hide -->
3093    <permission android:name="android.permission.LOCAL_MAC_ADDRESS"
3094                android:protectionLevel="signature|privileged" />
3095
3096    <!-- @SystemApi Allows access to MAC addresses of WiFi and Bluetooth peer devices.
3097        @hide -->
3098    <permission android:name="android.permission.PEERS_MAC_ADDRESS"
3099                android:protectionLevel="signature|setup" />
3100
3101    <!-- Allows the Nfc stack to dispatch Nfc messages to applications. Applications
3102        can use this permission to ensure incoming Nfc messages are from the Nfc stack
3103        and not simulated by another application.
3104        @hide -->
3105    <permission android:name="android.permission.DISPATCH_NFC_MESSAGE"
3106                android:protectionLevel="signature|privileged" />
3107
3108    <!-- @SystemApi Allows changing day / night mode when system is configured with
3109         config_lockDayNightMode set to true. If requesting app does not have permission,
3110         it will be ignored.
3111        @hide -->
3112    <permission android:name="android.permission.MODIFY_DAY_NIGHT_MODE"
3113                android:protectionLevel="signature|privileged" />
3114
3115    <!-- The system process is explicitly the only one allowed to launch the
3116         confirmation UI for full backup/restore -->
3117    <uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/>
3118
3119
3120    <!-- Allows the holder to access the ephemeral applications on the device.
3121    @hide -->
3122    <permission android:name="android.permission.ACCESS_EPHEMERAL_APPS"
3123            android:protectionLevel="signature" />
3124
3125    <!-- Allows receiving the usage of media resource e.g. video/audio codec and
3126         graphic memory.
3127         @hide -->
3128    <permission android:name="android.permission.RECEIVE_MEDIA_RESOURCE_USAGE"
3129                android:protectionLevel="signature|privileged" />
3130
3131    <!-- Must be required by system/priv apps when accessing the sound trigger
3132         APIs given by {@link SoundTriggerManager}.
3133         @hide <p>Not for use by third-party applications.</p> -->
3134    <permission android:name="android.permission.MANAGE_SOUND_TRIGGER"
3135        android:protectionLevel="signature|privileged" />
3136
3137    <!-- @SystemApi Allows trusted applications to dispatch managed provisioning message to Managed
3138         Provisioning app. If requesting app does not have permission, it will be ignored.
3139         @hide -->
3140    <permission android:name="android.permission.DISPATCH_PROVISIONING_MESSAGE"
3141                android:protectionLevel="signature|privileged" />
3142
3143    <!-- Allows the holder to read blocked numbers. See
3144         {@link android.provider.BlockedNumberContract}.
3145         @hide -->
3146    <permission android:name="android.permission.READ_BLOCKED_NUMBERS"
3147                android:protectionLevel="signature" />
3148
3149    <!-- Allows the holder to write blocked numbers. See
3150         {@link android.provider.BlockedNumberContract}.
3151         @hide -->
3152    <permission android:name="android.permission.WRITE_BLOCKED_NUMBERS"
3153                android:protectionLevel="signature" />
3154
3155    <!-- Must be required by an {@link android.service.vr.VrListenerService}, to ensure that only
3156         the system can bind to it.
3157         <p>Protection level: signature -->
3158    <permission android:name="android.permission.BIND_VR_LISTENER_SERVICE"
3159        android:protectionLevel="signature" />
3160
3161    <!-- Required to make calls to {@link android.service.vr.IVrManager}.
3162         @hide -->
3163    <permission android:name="android.permission.ACCESS_VR_MANAGER"
3164            android:protectionLevel="signature" />
3165
3166    <!-- Allows an application to whitelist tasks during lock task mode
3167         @hide <p>Not for use by third-party applications.</p> -->
3168    <permission android:name="android.permission.UPDATE_LOCK_TASK_PACKAGES"
3169        android:protectionLevel="signature|setup" />
3170
3171    <!-- @SystemApi Allows an application to replace the app name displayed alongside notifications
3172         in the N-release and later.
3173         @hide  <p>Not for use by third-party applications.</p> -->
3174    <permission android:name="android.permission.SUBSTITUTE_NOTIFICATION_APP_NAME"
3175                android:protectionLevel="signature|privileged" />
3176
3177    <!-- @SystemApi Allows an application to manage auto-fill sessions.
3178         @hide  <p>Not for use by third-party applications.</p> -->
3179    <permission android:name="android.permission.MANAGE_AUTO_FILL"
3180        android:protectionLevel="signature" />
3181
3182    <!-- Allows an app to set the theme overlay in /vendor/overlay
3183         being used.
3184         @hide  <p>Not for use by third-party applications.</p> -->
3185    <permission android:name="android.permission.MODIFY_THEME_OVERLAY"
3186                android:protectionLevel="signature" />
3187
3188    <application android:process="system"
3189                 android:persistent="true"
3190                 android:hasCode="false"
3191                 android:label="@string/android_system_label"
3192                 android:allowClearUserData="false"
3193                 android:backupAgent="com.android.server.backup.SystemBackupAgent"
3194                 android:killAfterRestore="false"
3195                 android:icon="@drawable/ic_launcher_android"
3196                 android:supportsRtl="true"
3197                 android:theme="@style/Theme.DeviceDefault.Light.DarkActionBar"
3198                 android:defaultToDeviceProtectedStorage="true"
3199                 android:directBootAware="true">
3200        <activity android:name="com.android.internal.app.ChooserActivity"
3201                android:theme="@style/Theme.DeviceDefault.Resolver"
3202                android:finishOnCloseSystemDialogs="true"
3203                android:excludeFromRecents="true"
3204                android:documentLaunchMode="never"
3205                android:relinquishTaskIdentity="true"
3206                android:configChanges="screenSize|smallestScreenSize|screenLayout|orientation|keyboard|keyboardHidden"
3207                android:process=":ui">
3208            <intent-filter>
3209                <action android:name="android.intent.action.CHOOSER" />
3210                <category android:name="android.intent.category.DEFAULT" />
3211                <category android:name="android.intent.category.VOICE" />
3212            </intent-filter>
3213        </activity>
3214        <activity android:name="com.android.internal.app.IntentForwarderActivity"
3215                android:finishOnCloseSystemDialogs="true"
3216                android:theme="@style/Theme.NoDisplay"
3217                android:excludeFromRecents="true"
3218                android:label="@string/user_owner_label"
3219                android:exported="true"
3220                >
3221        </activity>
3222        <activity-alias android:name="com.android.internal.app.ForwardIntentToParent"
3223                android:targetActivity="com.android.internal.app.IntentForwarderActivity"
3224                android:exported="true"
3225                android:label="@string/user_owner_label">
3226        </activity-alias>
3227        <activity-alias android:name="com.android.internal.app.ForwardIntentToManagedProfile"
3228                android:targetActivity="com.android.internal.app.IntentForwarderActivity"
3229                android:icon="@drawable/ic_corp_icon"
3230                android:exported="true"
3231                android:label="@string/managed_profile_label">
3232        </activity-alias>
3233        <activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity"
3234                android:theme="@style/Theme.DeviceDefault.Light.Dialog"
3235                android:label="@string/heavy_weight_switcher_title"
3236                android:finishOnCloseSystemDialogs="true"
3237                android:excludeFromRecents="true"
3238                android:process=":ui">
3239        </activity>
3240        <activity android:name="com.android.internal.app.PlatLogoActivity"
3241                android:theme="@style/Theme.Wallpaper.NoTitleBar.Fullscreen"
3242                android:configChanges="orientation|keyboardHidden"
3243                android:process=":ui">
3244        </activity>
3245        <activity android:name="com.android.internal.app.DisableCarModeActivity"
3246                android:theme="@style/Theme.NoDisplay"
3247                android:excludeFromRecents="true"
3248                android:process=":ui">
3249        </activity>
3250        <activity android:name="com.android.internal.app.DumpHeapActivity"
3251                android:theme="@style/Theme.Translucent.NoTitleBar"
3252                android:label="@string/dump_heap_title"
3253                android:finishOnCloseSystemDialogs="true"
3254                android:noHistory="true"
3255                android:excludeFromRecents="true"
3256                android:process=":ui">
3257        </activity>
3258        <provider android:name="com.android.server.am.DumpHeapProvider"
3259                android:authorities="com.android.server.heapdump"
3260                android:grantUriPermissions="true"
3261                android:multiprocess="false"
3262                android:singleUser="true" />
3263
3264        <activity android:name="android.accounts.ChooseAccountActivity"
3265                android:excludeFromRecents="true"
3266                android:exported="true"
3267                android:theme="@style/Theme.DeviceDefault.Light.Dialog"
3268                android:label="@string/choose_account_label"
3269                android:process=":ui">
3270        </activity>
3271
3272        <activity android:name="android.accounts.ChooseTypeAndAccountActivity"
3273                android:excludeFromRecents="true"
3274                android:exported="true"
3275                android:theme="@style/Theme.DeviceDefault.Light.Dialog"
3276                android:label="@string/choose_account_label"
3277                android:process=":ui">
3278        </activity>
3279
3280        <activity android:name="android.accounts.ChooseAccountTypeActivity"
3281                android:excludeFromRecents="true"
3282                android:theme="@style/Theme.DeviceDefault.Light.Dialog"
3283                android:label="@string/choose_account_label"
3284                android:process=":ui">
3285        </activity>
3286
3287        <activity android:name="android.accounts.CantAddAccountActivity"
3288                android:excludeFromRecents="true"
3289                android:exported="true"
3290                android:theme="@style/Theme.DeviceDefault.Light.Dialog.NoActionBar"
3291                android:process=":ui">
3292        </activity>
3293
3294        <activity android:name="android.accounts.GrantCredentialsPermissionActivity"
3295                android:excludeFromRecents="true"
3296                android:exported="true"
3297                android:theme="@style/Theme.DeviceDefault.Light.DialogWhenLarge"
3298                android:process=":ui">
3299        </activity>
3300
3301        <activity android:name="android.content.SyncActivityTooManyDeletes"
3302               android:theme="@style/Theme.DeviceDefault.Light.Dialog"
3303               android:label="@string/sync_too_many_deletes"
3304               android:process=":ui">
3305        </activity>
3306
3307        <activity android:name="com.android.internal.app.ShutdownActivity"
3308            android:permission="android.permission.SHUTDOWN"
3309            android:theme="@style/Theme.NoDisplay"
3310            android:excludeFromRecents="true">
3311            <intent-filter>
3312                <action android:name="android.intent.action.ACTION_REQUEST_SHUTDOWN" />
3313                <category android:name="android.intent.category.DEFAULT" />
3314            </intent-filter>
3315            <intent-filter>
3316                <action android:name="android.intent.action.REBOOT" />
3317                <category android:name="android.intent.category.DEFAULT" />
3318            </intent-filter>
3319        </activity>
3320
3321        <activity android:name="com.android.internal.app.NetInitiatedActivity"
3322                android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert"
3323                android:excludeFromRecents="true"
3324                android:process=":ui">
3325        </activity>
3326
3327        <activity android:name="com.android.internal.app.SystemUserHomeActivity"
3328                  android:enabled="false"
3329                  android:process=":ui"
3330                  android:systemUserOnly="true"
3331                  android:theme="@style/Theme.Translucent.NoTitleBar">
3332            <intent-filter android:priority="-100">
3333                <action android:name="android.intent.action.MAIN" />
3334                <category android:name="android.intent.category.HOME" />
3335            </intent-filter>
3336        </activity>
3337
3338        <!-- Activity to prompt user if it's ok to create a new user sandbox for a
3339             specified account. -->
3340        <activity android:name="com.android.internal.app.ConfirmUserCreationActivity"
3341                android:excludeFromRecents="true"
3342                android:process=":ui"
3343                android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert">
3344            <intent-filter android:priority="1000">
3345                <action android:name="android.os.action.CREATE_USER" />
3346                <category android:name="android.intent.category.DEFAULT" />
3347            </intent-filter>
3348        </activity>
3349
3350        <activity android:name="com.android.internal.app.UnlaunchableAppActivity"
3351                android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert"
3352                android:excludeFromRecents="true"
3353                android:process=":ui">
3354        </activity>
3355
3356        <receiver android:name="com.android.server.BootReceiver"
3357                android:systemUserOnly="true">
3358            <intent-filter android:priority="1000">
3359                <action android:name="android.intent.action.BOOT_COMPLETED" />
3360            </intent-filter>
3361        </receiver>
3362
3363        <receiver android:name="com.android.server.updates.CertPinInstallReceiver"
3364                android:permission="android.permission.UPDATE_CONFIG">
3365            <intent-filter>
3366                <action android:name="android.intent.action.UPDATE_PINS" />
3367                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3368            </intent-filter>
3369        </receiver>
3370
3371        <receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver"
3372                android:permission="android.permission.UPDATE_CONFIG">
3373            <intent-filter>
3374                <action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" />
3375                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3376            </intent-filter>
3377        </receiver>
3378
3379        <receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver"
3380                android:permission="android.permission.UPDATE_CONFIG">
3381            <intent-filter>
3382                <action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" />
3383                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3384            </intent-filter>
3385        </receiver>
3386
3387        <receiver android:name="com.android.server.updates.ApnDbInstallReceiver"
3388                android:permission="android.permission.UPDATE_CONFIG">
3389            <intent-filter>
3390                <action android:name="android.intent.action.UPDATE_APN_DB" />
3391                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3392            </intent-filter>
3393        </receiver>
3394
3395        <receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver"
3396                android:permission="android.permission.UPDATE_CONFIG">
3397            <intent-filter>
3398                <action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" />
3399                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3400            </intent-filter>
3401        </receiver>
3402
3403        <receiver android:name="com.android.server.updates.TzDataInstallReceiver"
3404                android:permission="android.permission.UPDATE_CONFIG">
3405            <intent-filter>
3406                <action android:name="android.intent.action.UPDATE_TZDATA" />
3407                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3408            </intent-filter>
3409        </receiver>
3410
3411        <receiver android:name="com.android.server.updates.CertificateTransparencyLogInstallReceiver"
3412                android:permission="android.permission.UPDATE_CONFIG">
3413            <intent-filter>
3414                <action android:name="android.intent.action.UPDATE_CT_LOGS" />
3415                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3416            </intent-filter>
3417        </receiver>
3418
3419        <receiver android:name="com.android.server.MasterClearReceiver"
3420            android:permission="android.permission.MASTER_CLEAR">
3421            <intent-filter
3422                    android:priority="100" >
3423                <!-- For Checkin, Settings, etc.: action=FACTORY_RESET -->
3424                <action android:name="android.intent.action.FACTORY_RESET" />
3425                <!-- As above until all the references to the deprecated MASTER_CLEAR get updated to
3426                     FACTORY_RESET. -->
3427                <action android:name="android.intent.action.MASTER_CLEAR" />
3428
3429                <!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR -->
3430                <action android:name="com.google.android.c2dm.intent.RECEIVE" />
3431                <category android:name="android.intent.category.MASTER_CLEAR" />
3432            </intent-filter>
3433        </receiver>
3434
3435        <service android:name="android.hardware.location.GeofenceHardwareService"
3436            android:permission="android.permission.LOCATION_HARDWARE"
3437            android:exported="false" />
3438
3439        <service android:name="com.android.internal.backup.LocalTransportService"
3440                android:permission="android.permission.CONFIRM_FULL_BACKUP"
3441                android:exported="false">
3442            <intent-filter>
3443                <action android:name="android.backup.TRANSPORT_HOST" />
3444            </intent-filter>
3445        </service>
3446
3447        <service android:name="com.android.server.MountServiceIdler"
3448                 android:exported="true"
3449                 android:permission="android.permission.BIND_JOB_SERVICE" >
3450        </service>
3451
3452        <service android:name="com.android.server.backup.FullBackupJob"
3453                 android:exported="true"
3454                 android:permission="android.permission.BIND_JOB_SERVICE" >
3455        </service>
3456
3457        <service android:name="com.android.server.backup.KeyValueBackupJob"
3458                 android:permission="android.permission.BIND_JOB_SERVICE" >
3459        </service>
3460
3461        <service android:name="com.android.server.content.SyncJobService"
3462                 android:permission="android.permission.BIND_JOB_SERVICE" >
3463        </service>
3464
3465        <service android:name="com.android.server.pm.BackgroundDexOptService"
3466                 android:exported="true"
3467                 android:permission="android.permission.BIND_JOB_SERVICE">
3468        </service>
3469
3470        <service android:name="com.android.server.storage.DiskStatsLoggingService"
3471                 android:permission="android.permission.BIND_JOB_SERVICE" >
3472        </service>
3473
3474    </application>
3475
3476</manifest>
3477