AndroidManifest.xml revision 302d02b95b151e32798f62d1f24ae3d6cb47b897
1<?xml version="1.0" encoding="utf-8"?> 2<!-- 3/* //device/apps/common/AndroidManifest.xml 4** 5** Copyright 2006, The Android Open Source Project 6** 7** Licensed under the Apache License, Version 2.0 (the "License"); 8** you may not use this file except in compliance with the License. 9** You may obtain a copy of the License at 10** 11** http://www.apache.org/licenses/LICENSE-2.0 12** 13** Unless required by applicable law or agreed to in writing, software 14** distributed under the License is distributed on an "AS IS" BASIS, 15** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 16** See the License for the specific language governing permissions and 17** limitations under the License. 18*/ 19--> 20<manifest xmlns:android="http://schemas.android.com/apk/res/android" 21 package="android" coreApp="true" android:sharedUserId="android.uid.system" 22 android:sharedUserLabel="@string/android_system_label"> 23 24 <!-- ================================================ --> 25 <!-- Special broadcasts that only the system can send --> 26 <!-- ================================================ --> 27 <eat-comment /> 28 29 <protected-broadcast android:name="android.intent.action.SCREEN_OFF" /> 30 <protected-broadcast android:name="android.intent.action.SCREEN_ON" /> 31 <protected-broadcast android:name="android.intent.action.USER_PRESENT" /> 32 <protected-broadcast android:name="android.intent.action.TIME_SET" /> 33 <protected-broadcast android:name="android.intent.action.TIME_TICK" /> 34 <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" /> 35 <protected-broadcast android:name="android.intent.action.DATE_CHANGED" /> 36 <protected-broadcast android:name="android.intent.action.PRE_BOOT_COMPLETED" /> 37 <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" /> 38 <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" /> 39 <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" /> 40 <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" /> 41 <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" /> 42 <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" /> 43 <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" /> 44 <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" /> 45 <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" /> 46 <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" /> 47 <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" /> 48 <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" /> 49 <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" /> 50 <protected-broadcast android:name="android.intent.action.PACKAGES_SUSPENDED" /> 51 <protected-broadcast android:name="android.intent.action.PACKAGES_UNSUSPENDED" /> 52 <protected-broadcast android:name="android.intent.action.ACTION_PREFERRED_ACTIVITY_CHANGED" /> 53 <protected-broadcast android:name="android.intent.action.UID_REMOVED" /> 54 <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" /> 55 <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" /> 56 <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" /> 57 <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" /> 58 <protected-broadcast android:name="android.intent.action.BATTERY_LOW" /> 59 <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" /> 60 <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" /> 61 <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" /> 62 <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" /> 63 <protected-broadcast android:name="android.intent.action.CHARGING" /> 64 <protected-broadcast android:name="android.intent.action.DISCHARGING" /> 65 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" /> 66 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" /> 67 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" /> 68 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" /> 69 <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" /> 70 <protected-broadcast android:name="android.intent.action.REBOOT" /> 71 <protected-broadcast android:name="android.intent.action.DOCK_EVENT" /> 72 <protected-broadcast android:name="android.intent.action.THERMAL_EVENT" /> 73 <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" /> 74 <protected-broadcast android:name="android.intent.action.USER_ADDED" /> 75 <protected-broadcast android:name="android.intent.action.USER_REMOVED" /> 76 <protected-broadcast android:name="android.intent.action.USER_STARTING" /> 77 <protected-broadcast android:name="android.intent.action.USER_STARTED" /> 78 <protected-broadcast android:name="android.intent.action.USER_STOPPING" /> 79 <protected-broadcast android:name="android.intent.action.USER_STOPPED" /> 80 <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" /> 81 <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" /> 82 <protected-broadcast android:name="android.intent.action.USER_SWITCHED" /> 83 <protected-broadcast android:name="android.intent.action.USER_INITIALIZE" /> 84 <protected-broadcast android:name="android.intent.action.INTENT_FILTER_NEEDS_VERIFICATION" /> 85 86 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED" /> 87 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGING" /> 88 <protected-broadcast android:name="android.os.action.DEVICE_IDLE_MODE_CHANGED" /> 89 <protected-broadcast android:name="android.os.action.POWER_SAVE_WHITELIST_CHANGED" /> 90 <protected-broadcast android:name="android.os.action.POWER_SAVE_TEMP_WHITELIST_CHANGED" /> 91 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED_INTERNAL" /> 92 93 <protected-broadcast android:name="android.os.action.SCREEN_BRIGHTNESS_BOOST_CHANGED" /> 94 95 <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" /> 96 <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" /> 97 <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" /> 98 <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" /> 99 <protected-broadcast android:name="android.app.action.NEXT_ALARM_CLOCK_CHANGED" /> 100 101 <protected-broadcast android:name="android.app.action.BUGREPORT_SHARING_DECLINED" /> 102 <protected-broadcast android:name="android.app.action.BUGREPORT_FAILED" /> 103 <protected-broadcast android:name="android.app.action.BUGREPORT_SHARE" /> 104 <protected-broadcast android:name="android.app.action.SHOW_DEVICE_MONITORING_DIALOG" /> 105 106 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" /> 107 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" /> 108 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" /> 109 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" /> 110 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_HOST_RESTORED" /> 111 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_RESTORED" /> 112 113 <protected-broadcast android:name="android.os.action.SETTING_RESTORED" /> 114 115 <protected-broadcast android:name="android.app.backup.intent.RUN" /> 116 <protected-broadcast android:name="android.app.backup.intent.CLEAR" /> 117 <protected-broadcast android:name="android.app.backup.intent.INIT" /> 118 119 <protected-broadcast android:name="android.bluetooth.intent.DISCOVERABLE_TIMEOUT" /> 120 <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" /> 121 <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" /> 122 <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" /> 123 <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" /> 124 <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" /> 125 <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" /> 126 <protected-broadcast android:name="android.bluetooth.device.action.UUID" /> 127 <protected-broadcast android:name="android.bluetooth.device.action.MAS_INSTANCE" /> 128 <protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" /> 129 <protected-broadcast android:name="android.bluetooth.device.action.FOUND" /> 130 <protected-broadcast android:name="android.bluetooth.device.action.DISAPPEARED" /> 131 <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" /> 132 <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" /> 133 <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" /> 134 <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" /> 135 <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" /> 136 <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" /> 137 <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" /> 138 <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" /> 139 <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" /> 140 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" /> 141 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" /> 142 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" /> 143 <protected-broadcast android:name="android.bluetooth.device.action.SDP_RECORD" /> 144 <protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" /> 145 <protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" /> 146 <protected-broadcast 147 android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" /> 148 <protected-broadcast 149 android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" /> 150 <protected-broadcast 151 android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" /> 152 <protected-broadcast 153 android:name="android.bluetooth.headset.action.HF_INDICATORS_VALUE_CHANGED" /> 154 <protected-broadcast 155 android:name="android.bluetooth.headsetclient.profile.action.CONNECTION_STATE_CHANGED" /> 156 <protected-broadcast 157 android:name="android.bluetooth.headsetclient.profile.action.AUDIO_STATE_CHANGED" /> 158 <protected-broadcast 159 android:name="android.bluetooth.headsetclient.profile.action.AG_EVENT" /> 160 <protected-broadcast 161 android:name="android.bluetooth.headsetclient.profile.action.AG_CALL_CHANGED" /> 162 <protected-broadcast 163 android:name="android.bluetooth.headsetclient.profile.action.RESULT" /> 164 <protected-broadcast 165 android:name="android.bluetooth.headsetclient.profile.action.LAST_VTAG" /> 166 <protected-broadcast 167 android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" /> 168 <protected-broadcast 169 android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" /> 170 <protected-broadcast 171 android:name="android.bluetooth.a2dp.profile.action.CODEC_CONFIG_CHANGED" /> 172 <protected-broadcast 173 android:name="android.bluetooth.a2dp-sink.profile.action.CONNECTION_STATE_CHANGED" /> 174 <protected-broadcast 175 android:name="android.bluetooth.a2dp-sink.profile.action.PLAYING_STATE_CHANGED" /> 176 <protected-broadcast 177 android:name="android.bluetooth.a2dp-sink.profile.action.AUDIO_CONFIG_CHANGED" /> 178 <protected-broadcast 179 android:name="android.bluetooth.avrcp-controller.profile.action.CONNECTION_STATE_CHANGED" /> 180 <protected-broadcast 181 android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" /> 182 <protected-broadcast 183 android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" /> 184 <protected-broadcast 185 android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" /> 186 <protected-broadcast 187 android:name="android.bluetooth.inputhost.profile.action.CONNECTION_STATE_CHANGED" /> 188 <protected-broadcast 189 android:name="android.bluetooth.map.profile.action.CONNECTION_STATE_CHANGED" /> 190 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.CONNECTION_STATE_CHANGED" /> 191 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_RECEIVED" /> 192 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_SENT_SUCCESSFULLY" /> 193 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_DELIVERED_SUCCESSFULLY" /> 194 <protected-broadcast 195 android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_SENT" /> 196 <protected-broadcast 197 android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_DELIVERY" /> 198 <protected-broadcast 199 android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" /> 200 <protected-broadcast android:name="android.bluetooth.pbap.intent.action.PBAP_STATE_CHANGED" /> 201 <protected-broadcast android:name="android.bluetooth.pbap.profile.action.CONNECTION_STATE_CHANGED" /> 202 <protected-broadcast android:name="android.bluetooth.sap.profile.action.CONNECTION_STATE_CHANGED" /> 203 <protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" /> 204 <protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" /> 205 <protected-broadcast android:name="android.btopp.intent.action.LIST" /> 206 <protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" /> 207 <protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" /> 208 <protected-broadcast android:name="android.btopp.intent.action.CONFIRM" /> 209 <protected-broadcast android:name="android.btopp.intent.action.HIDE" /> 210 <protected-broadcast android:name="android.btopp.intent.action.RETRY" /> 211 <protected-broadcast android:name="android.btopp.intent.action.OPEN" /> 212 <protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" /> 213 <protected-broadcast android:name="android.btopp.intent.action.TRANSFER_COMPLETE" /> 214 <protected-broadcast android:name="android.btopp.intent.action.ACCEPT" /> 215 <protected-broadcast android:name="com.android.bluetooth.gatt.REFRESH_BATCHED_SCAN" /> 216 <protected-broadcast android:name="com.android.bluetooth.pbap.authchall" /> 217 <protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" /> 218 <protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" /> 219 <protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" /> 220 <protected-broadcast android:name="com.android.bluetooth.sap.USER_CONFIRM_TIMEOUT" /> 221 <protected-broadcast android:name="com.android.bluetooth.sap.action.DISCONNECT_ACTION" /> 222 223 <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" /> 224 225 <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" /> 226 <protected-broadcast android:name="android.hardware.usb.action.USB_PORT_CHANGED" /> 227 <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" /> 228 <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_DETACHED" /> 229 <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" /> 230 <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" /> 231 232 <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" /> 233 <protected-broadcast android:name="android.media.action.HDMI_AUDIO_PLUG" /> 234 235 <protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" /> 236 <protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" /> 237 <protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" /> 238 <protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" /> 239 <protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" /> 240 <protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" /> 241 <protected-broadcast android:name="android.media.MASTER_MONO_CHANGED_ACTION" /> 242 <protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" /> 243 <protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" /> 244 245 <protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" /> 246 <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" /> 247 <protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" /> 248 <protected-broadcast android:name="android.intent.action.MEDIA_NOFS" /> 249 <protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" /> 250 <protected-broadcast android:name="android.intent.action.MEDIA_SHARED" /> 251 <protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" /> 252 <protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" /> 253 <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" /> 254 <protected-broadcast android:name="android.intent.action.MEDIA_EJECT" /> 255 256 <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL" /> 257 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" /> 258 <!-- @deprecated. Only {@link android.net.ConnectivityManager.CONNECTIVITY_ACTION} is sent. --> 259 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" /> 260 <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" /> 261 <protected-broadcast android:name="android.net.conn.RESTRICT_BACKGROUND_CHANGED" /> 262 <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" /> 263 <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" /> 264 265 <protected-broadcast android:name="android.net.nsd.STATE_CHANGED" /> 266 267 <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" /> 268 <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" /> 269 <protected-broadcast android:name="com.android.nfc.action.LLCP_UP" /> 270 <protected-broadcast android:name="com.android.nfc.action.LLCP_DOWN" /> 271 <protected-broadcast android:name="com.android.nfc.cardemulation.action.CLOSE_TAP_DIALOG" /> 272 <protected-broadcast android:name="com.android.nfc.handover.action.ALLOW_CONNECT" /> 273 <protected-broadcast android:name="com.android.nfc.handover.action.DENY_CONNECT" /> 274 <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" /> 275 <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" /> 276 <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" /> 277 <!-- For NFC to BT handover --> 278 <protected-broadcast android:name="android.btopp.intent.action.WHITELIST_DEVICE" /> 279 <protected-broadcast android:name="android.btopp.intent.action.STOP_HANDOVER_TRANSFER" /> 280 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND" /> 281 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND_MULTIPLE" /> 282 283 <protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" /> 284 <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" /> 285 286 <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" /> 287 288 <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" /> 289 <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" /> 290 <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" /> 291 292 <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" /> 293 <protected-broadcast android:name="com.android.server.WifiManager.action.START_PNO" /> 294 <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" /> 295 <protected-broadcast android:name="com.android.server.WifiManager.action.DEVICE_IDLE" /> 296 <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_ACCEPTED" /> 297 <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_DECLINED" /> 298 <protected-broadcast android:name="com.android.server.usb.ACTION_OPEN_IN_APPS" /> 299 <protected-broadcast android:name="com.android.server.am.DELETE_DUMPHEAP" /> 300 <protected-broadcast android:name="com.android.server.net.action.SNOOZE_WARNING" /> 301 <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" /> 302 <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" /> 303 <protected-broadcast android:name="android.net.wifi.WIFI_CREDENTIAL_CHANGED" /> 304 <protected-broadcast android:name="android.net.wifi.WIFI_SCAN_AVAILABLE" /> 305 <protected-broadcast android:name="android.net.wifi.aware.action.WIFI_AWARE_STATE_CHANGED" /> 306 <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" /> 307 <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" /> 308 <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" /> 309 <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" /> 310 <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" /> 311 <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" /> 312 <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" /> 313 <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" /> 314 <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" /> 315 <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" /> 316 <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" /> 317 <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" /> 318 <protected-broadcast android:name="android.net.wifi.p2p.PERSISTENT_GROUPS_CHANGED" /> 319 <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" /> 320 <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" /> 321 <protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" /> 322 <protected-broadcast 323 android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" /> 324 <protected-broadcast android:name="android.net.scoring.SCORE_NETWORKS" /> 325 <protected-broadcast android:name="android.net.scoring.SCORER_CHANGED" /> 326 <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" /> 327 <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" /> 328 <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" /> 329 <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" /> 330 <protected-broadcast android:name="android.intent.action.APPLICATION_RESTRICTIONS_CHANGED" /> 331 332 <!-- Legacy --> 333 <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" /> 334 <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" /> 335 336 <protected-broadcast android:name="com.android.server.ACTION_TRIGGER_IDLE" /> 337 338 <protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" /> 339 340 <protected-broadcast android:name="android.intent.action.PHONE_STATE" /> 341 342 <protected-broadcast android:name="android.intent.action.SUB_DEFAULT_CHANGED" /> 343 344 <protected-broadcast android:name="android.location.GPS_ENABLED_CHANGE" /> 345 <protected-broadcast android:name="android.location.PROVIDERS_CHANGED" /> 346 <protected-broadcast android:name="android.location.MODE_CHANGED" /> 347 <protected-broadcast android:name="android.location.GPS_FIX_CHANGE" /> 348 <protected-broadcast android:name="android.net.proxy.PAC_REFRESH" /> 349 350 <protected-broadcast android:name="android.telecom.action.DEFAULT_DIALER_CHANGED" /> 351 <protected-broadcast android:name="android.provider.action.DEFAULT_SMS_PACKAGE_CHANGED" /> 352 <protected-broadcast android:name="android.intent.action.CONTENT_CHANGED" /> 353 <protected-broadcast android:name="android.provider.Telephony.MMS_DOWNLOADED" /> 354 355 <protected-broadcast 356 android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" /> 357 358 <!-- Defined in RestrictionsManager --> 359 <protected-broadcast 360 android:name="android.intent.action.PERMISSION_RESPONSE_RECEIVED" /> 361 <!-- Defined in RestrictionsManager --> 362 363 <protected-broadcast android:name="android.intent.action.REQUEST_PERMISSION" /> 364 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_STARTED" /> 365 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" /> 366 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_PROGRESS" /> 367 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" /> 368 369 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_SUBSCRIPTION_CHANGED" /> 370 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_SMS_SUBSCRIPTION_CHANGED" /> 371 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_DATA_SUBSCRIPTION_CHANGED" /> 372 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_VOICE_SUBSCRIPTION_CHANGED" /> 373 <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_CONTENT_CHANGE" /> 374 <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_RECORD_UPDATED" /> 375 376 <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_DONE" /> 377 <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_FAILED" /> 378 379 <protected-broadcast android:name="android.internal.policy.action.BURN_IN_PROTECTION" /> 380 <protected-broadcast android:name="android.app.action.SYSTEM_UPDATE_POLICY_CHANGED" /> 381 <protected-broadcast android:name="android.app.action.DEVICE_OWNER_CHANGED" /> 382 383 <!-- Added in N --> 384 <protected-broadcast android:name="android.intent.action.ANR" /> 385 <protected-broadcast android:name="android.intent.action.CALL" /> 386 <protected-broadcast android:name="android.intent.action.CALL_PRIVILEGED" /> 387 <protected-broadcast android:name="android.intent.action.DROPBOX_ENTRY_ADDED" /> 388 <protected-broadcast android:name="android.intent.action.INPUT_METHOD_CHANGED" /> 389 <protected-broadcast android:name="android.intent.action.internal_sim_state_changed" /> 390 <protected-broadcast android:name="android.intent.action.LOCKED_BOOT_COMPLETED" /> 391 <protected-broadcast android:name="android.intent.action.PRECISE_CALL_STATE" /> 392 <protected-broadcast android:name="android.intent.action.PRECISE_DATA_CONNECTION_STATE_CHANGED" /> 393 <protected-broadcast android:name="android.intent.action.SUBSCRIPTION_PHONE_STATE" /> 394 <protected-broadcast android:name="android.intent.action.USER_INFO_CHANGED" /> 395 <protected-broadcast android:name="android.intent.action.USER_UNLOCKED" /> 396 <protected-broadcast android:name="android.intent.action.WALLPAPER_CHANGED" /> 397 398 <protected-broadcast android:name="android.app.action.DEVICE_POLICY_MANAGER_STATE_CHANGED" /> 399 <protected-broadcast android:name="android.app.action.CHOOSE_PRIVATE_KEY_ALIAS" /> 400 <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLED" /> 401 <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLE_REQUESTED" /> 402 <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_ENABLED" /> 403 <protected-broadcast android:name="android.app.action.LOCK_TASK_ENTERING" /> 404 <protected-broadcast android:name="android.app.action.LOCK_TASK_EXITING" /> 405 <protected-broadcast android:name="android.app.action.NOTIFY_PENDING_SYSTEM_UPDATE" /> 406 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_CHANGED" /> 407 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_EXPIRING" /> 408 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_FAILED" /> 409 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_SUCCEEDED" /> 410 <protected-broadcast android:name="com.android.server.ACTION_EXPIRED_PASSWORD_NOTIFICATION" /> 411 412 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_ADDED" /> 413 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNLOCKED" /> 414 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_REMOVED" /> 415 416 <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_STATE_CHANGED" /> 417 <protected-broadcast android:name="com.android.bluetooth.map.USER_CONFIRM_TIMEOUT" /> 418 <protected-broadcast android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_SENT" /> 419 <protected-broadcast android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_DELIVERY" /> 420 <protected-broadcast android:name="android.content.jobscheduler.JOB_DELAY_EXPIRED" /> 421 <protected-broadcast android:name="android.content.syncmanager.SYNC_ALARM" /> 422 <protected-broadcast android:name="android.media.INTERNAL_RINGER_MODE_CHANGED_ACTION" /> 423 <protected-broadcast android:name="android.media.STREAM_DEVICES_CHANGED_ACTION" /> 424 <protected-broadcast android:name="android.media.STREAM_MUTE_CHANGED_ACTION" /> 425 <protected-broadcast android:name="android.net.sip.SIP_SERVICE_UP" /> 426 <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" /> 427 <protected-broadcast android:name="android.os.action.CHARGING" /> 428 <protected-broadcast android:name="android.os.action.DISCHARGING" /> 429 <protected-broadcast android:name="android.search.action.SEARCHABLES_CHANGED" /> 430 <protected-broadcast android:name="android.security.STORAGE_CHANGED" /> 431 <protected-broadcast android:name="android.security.action.TRUST_STORE_CHANGED" /> 432 <protected-broadcast android:name="android.security.action.KEYCHAIN_CHANGED" /> 433 <protected-broadcast android:name="android.security.action.KEY_ACCESS_CHANGED" /> 434 <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_REGISTERED" /> 435 <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_UNREGISTERED" /> 436 <protected-broadcast android:name="android.telecom.action.SHOW_MISSED_CALLS_NOTIFICATION" /> 437 <protected-broadcast android:name="android.telephony.action.CARRIER_CONFIG_CHANGED" /> 438 439 <protected-broadcast android:name="com.android.bluetooth.btservice.action.ALARM_WAKEUP" /> 440 <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_POLL" /> 441 <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_UPDATED" /> 442 <protected-broadcast android:name="com.android.server.NetworkTimeUpdateService.action.POLL" /> 443 <protected-broadcast android:name="com.android.server.telecom.intent.action.CALLS_ADD_ENTRY" /> 444 <protected-broadcast android:name="com.android.settings.location.MODE_CHANGING" /> 445 446 <protected-broadcast android:name="ScheduleConditionProvider.EVALUATE" /> 447 <protected-broadcast android:name="EventConditionProvider.EVALUATE" /> 448 <protected-broadcast android:name="SnoozeHelper.EVALUATE" /> 449 <protected-broadcast android:name="wifi_scan_available" /> 450 451 <protected-broadcast android:name="action.cne.started" /> 452 <protected-broadcast android:name="android.content.jobscheduler.JOB_DEADLINE_EXPIRED" /> 453 <protected-broadcast android:name="android.intent.action.ACTION_UNSOL_RESPONSE_OEM_HOOK_RAW" /> 454 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_SUPL" /> 455 <protected-broadcast android:name="android.os.action.ACTION_EFFECTS_SUPPRESSOR_CHANGED" /> 456 <protected-broadcast android:name="android.os.action.LIGHT_DEVICE_IDLE_MODE_CHANGED" /> 457 <protected-broadcast android:name="android.os.storage.action.VOLUME_STATE_CHANGED" /> 458 <protected-broadcast android:name="android.os.storage.action.DISK_SCANNED" /> 459 <protected-broadcast android:name="com.android.server.action.UPDATE_TWILIGHT_STATE" /> 460 <protected-broadcast android:name="com.android.server.action.RESET_TWILIGHT_AUTO" /> 461 <protected-broadcast android:name="com.android.server.device_idle.STEP_IDLE_STATE" /> 462 <protected-broadcast android:name="com.android.server.device_idle.STEP_LIGHT_IDLE_STATE" /> 463 <protected-broadcast android:name="com.android.server.Wifi.action.TOGGLE_PNO" /> 464 <protected-broadcast android:name="intent.action.ACTION_RF_BAND_INFO" /> 465 <protected-broadcast android:name="android.intent.action.MEDIA_RESOURCE_GRANTED" /> 466 <protected-broadcast android:name="android.app.action.NETWORK_LOGS_AVAILABLE" /> 467 <protected-broadcast android:name="android.app.action.SECURITY_LOGS_AVAILABLE" /> 468 469 <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED" /> 470 <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED_INTERNAL" /> 471 <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_CHANGED" /> 472 <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_ACCESS_GRANTED_CHANGED" /> 473 <protected-broadcast android:name="android.os.action.ACTION_EFFECTS_SUPPRESSOR_CHANGED" /> 474 475 <protected-broadcast android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS" /> 476 <protected-broadcast android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS" /> 477 478 <protected-broadcast android:name="android.intent.action.DYNAMIC_SENSOR_CHANGED" /> 479 480 <protected-broadcast android:name="android.intent.action.ACTION_RADIO_OFF" /> 481 482 <protected-broadcast android:name="android.accounts.LOGIN_ACCOUNTS_CHANGED" /> 483 <protected-broadcast android:name="com.android.sync.SYNC_CONN_STATUS_CHANGED" /> 484 485 <protected-broadcast android:name="com.android.phone.SIP_INCOMING_CALL" /> 486 <protected-broadcast android:name="com.android.phone.SIP_ADD_PHONE" /> 487 <protected-broadcast android:name="com.android.phone.SIP_REMOVE_PHONE" /> 488 <protected-broadcast android:name="com.android.phone.SIP_CALL_OPTION_CHANGED" /> 489 490 <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_CONNECTED" /> 491 <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_DISCONNECTED" /> 492 493 <protected-broadcast android:name="android.bluetooth.input.profile.action.HANDSHAKE" /> 494 <protected-broadcast android:name="android.bluetooth.input.profile.action.REPORT" /> 495 496 <protected-broadcast android:name="android.intent.action.TWILIGHT_CHANGED" /> 497 498 <protected-broadcast android:name="com.android.server.fingerprint.ACTION_LOCKOUT_RESET" /> 499 <protected-broadcast android:name="android.net.wifi.PASSPOINT_ICON_RECEIVED" /> 500 <protected-broadcast android:name="com.android.server.notification.CountdownConditionProvider" /> 501 502 <protected-broadcast android:name="com.android.internal.location.ALARM_WAKEUP" /> 503 <protected-broadcast android:name="com.android.internal.location.ALARM_TIMEOUT" /> 504 <protected-broadcast android:name="android.intent.action.GLOBAL_BUTTON" /> 505 506 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_AVAILABLE" /> 507 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNAVAILABLE" /> 508 <protected-broadcast android:name="com.android.server.pm.DISABLE_QUIET_MODE_AFTER_UNLOCK" /> 509 510 <protected-broadcast android:name="com.android.server.retaildemo.ACTION_RESET_DEMO" /> 511 512 <protected-broadcast android:name="android.intent.action.DEVICE_LOCKED_CHANGED" /> 513 514 <!-- Added in O --> 515 <!-- TODO: temporary broadcast used by AutoFillManagerServiceImpl; will be removed --> 516 <protected-broadcast android:name="com.android.internal.autofill.action.REQUEST_AUTOFILL" /> 517 518 <!-- ====================================================================== --> 519 <!-- RUNTIME PERMISSIONS --> 520 <!-- ====================================================================== --> 521 <eat-comment /> 522 523 <!-- ====================================================================== --> 524 <!-- Permissions for accessing user's contacts including personal profile --> 525 <!-- ====================================================================== --> 526 <eat-comment /> 527 528 <!-- Used for runtime permissions related to contacts and profiles on this 529 device. --> 530 <permission-group android:name="android.permission-group.CONTACTS" 531 android:icon="@drawable/perm_group_contacts" 532 android:label="@string/permgrouplab_contacts" 533 android:description="@string/permgroupdesc_contacts" 534 android:priority="100" /> 535 536 <!-- Allows an application to read the user's contacts data. 537 <p>Protection level: dangerous 538 --> 539 <permission android:name="android.permission.READ_CONTACTS" 540 android:permissionGroup="android.permission-group.CONTACTS" 541 android:label="@string/permlab_readContacts" 542 android:description="@string/permdesc_readContacts" 543 android:protectionLevel="dangerous" /> 544 545 <!-- Allows an application to write the user's contacts data. 546 <p>Protection level: dangerous 547 --> 548 <permission android:name="android.permission.WRITE_CONTACTS" 549 android:permissionGroup="android.permission-group.CONTACTS" 550 android:label="@string/permlab_writeContacts" 551 android:description="@string/permdesc_writeContacts" 552 android:protectionLevel="dangerous" /> 553 554 <!-- ====================================================================== --> 555 <!-- Permissions for accessing user's calendar --> 556 <!-- ====================================================================== --> 557 <eat-comment /> 558 559 <!-- Used for runtime permissions related to user's calendar. --> 560 <permission-group android:name="android.permission-group.CALENDAR" 561 android:icon="@drawable/perm_group_calendar" 562 android:label="@string/permgrouplab_calendar" 563 android:description="@string/permgroupdesc_calendar" 564 android:priority="200" /> 565 566 <!-- Allows an application to read the user's calendar data. 567 <p>Protection level: dangerous 568 --> 569 <permission android:name="android.permission.READ_CALENDAR" 570 android:permissionGroup="android.permission-group.CALENDAR" 571 android:label="@string/permlab_readCalendar" 572 android:description="@string/permdesc_readCalendar" 573 android:protectionLevel="dangerous" /> 574 575 <!-- Allows an application to write the user's calendar data. 576 <p>Protection level: dangerous 577 --> 578 <permission android:name="android.permission.WRITE_CALENDAR" 579 android:permissionGroup="android.permission-group.CALENDAR" 580 android:label="@string/permlab_writeCalendar" 581 android:description="@string/permdesc_writeCalendar" 582 android:protectionLevel="dangerous" /> 583 584 <!-- ====================================================================== --> 585 <!-- Permissions for accessing and modifying user's SMS messages --> 586 <!-- ====================================================================== --> 587 <eat-comment /> 588 589 <!-- Used for runtime permissions related to user's SMS messages. --> 590 <permission-group android:name="android.permission-group.SMS" 591 android:icon="@drawable/perm_group_sms" 592 android:label="@string/permgrouplab_sms" 593 android:description="@string/permgroupdesc_sms" 594 android:priority="300" /> 595 596 <!-- Allows an application to send SMS messages. 597 <p>Protection level: dangerous 598 --> 599 <permission android:name="android.permission.SEND_SMS" 600 android:permissionGroup="android.permission-group.SMS" 601 android:label="@string/permlab_sendSms" 602 android:description="@string/permdesc_sendSms" 603 android:permissionFlags="costsMoney" 604 android:protectionLevel="dangerous" /> 605 606 <!-- Allows an application to receive SMS messages. 607 <p>Protection level: dangerous 608 --> 609 <permission android:name="android.permission.RECEIVE_SMS" 610 android:permissionGroup="android.permission-group.SMS" 611 android:label="@string/permlab_receiveSms" 612 android:description="@string/permdesc_receiveSms" 613 android:protectionLevel="dangerous"/> 614 615 <!-- Allows an application to read SMS messages. 616 <p>Protection level: dangerous 617 --> 618 <permission android:name="android.permission.READ_SMS" 619 android:permissionGroup="android.permission-group.SMS" 620 android:label="@string/permlab_readSms" 621 android:description="@string/permdesc_readSms" 622 android:protectionLevel="dangerous" /> 623 624 <!-- Allows an application to receive WAP push messages. 625 <p>Protection level: dangerous 626 --> 627 <permission android:name="android.permission.RECEIVE_WAP_PUSH" 628 android:permissionGroup="android.permission-group.SMS" 629 android:label="@string/permlab_receiveWapPush" 630 android:description="@string/permdesc_receiveWapPush" 631 android:protectionLevel="dangerous" /> 632 633 <!-- Allows an application to monitor incoming MMS messages. 634 <p>Protection level: dangerous 635 --> 636 <permission android:name="android.permission.RECEIVE_MMS" 637 android:permissionGroup="android.permission-group.SMS" 638 android:label="@string/permlab_receiveMms" 639 android:description="@string/permdesc_receiveMms" 640 android:protectionLevel="dangerous" /> 641 642 <!-- Allows an application to read previously received cell broadcast 643 messages and to register a content observer to get notifications when 644 a cell broadcast has been received and added to the database. For 645 emergency alerts, the database is updated immediately after the 646 alert dialog and notification sound/vibration/speech are presented. 647 The "read" column is then updated after the user dismisses the alert. 648 This enables supplementary emergency assistance apps to start loading 649 additional emergency information (if Internet access is available) 650 when the alert is first received, and to delay presenting the info 651 to the user until after the initial alert dialog is dismissed. 652 <p>Protection level: dangerous 653 @hide Pending API council approval --> 654 <permission android:name="android.permission.READ_CELL_BROADCASTS" 655 android:permissionGroup="android.permission-group.SMS" 656 android:label="@string/permlab_readCellBroadcasts" 657 android:description="@string/permdesc_readCellBroadcasts" 658 android:protectionLevel="dangerous" /> 659 660 <!-- ====================================================================== --> 661 <!-- Permissions for accessing external storage --> 662 <!-- ====================================================================== --> 663 <eat-comment /> 664 665 <!-- Used for runtime permissions related to the shared external storage. --> 666 <permission-group android:name="android.permission-group.STORAGE" 667 android:icon="@drawable/perm_group_storage" 668 android:label="@string/permgrouplab_storage" 669 android:description="@string/permgroupdesc_storage" 670 android:priority="900" /> 671 672 <!-- Allows an application to read from external storage. 673 <p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly 674 granted this permission.</p> 675 <p>This permission is enforced starting in API level 19. Before API level 19, this 676 permission is not enforced and all apps still have access to read from external storage. 677 You can test your app with the permission enforced by enabling <em>Protect USB 678 storage</em> under Developer options in the Settings app on a device running Android 4.1 or 679 higher.</p> 680 <p>Also starting in API level 19, this permission is <em>not</em> required to 681 read/write files in your application-specific directories returned by 682 {@link android.content.Context#getExternalFilesDir} and 683 {@link android.content.Context#getExternalCacheDir}. 684 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 685 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 686 minSdkVersion}</a> and <a 687 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 688 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 689 grants your app this permission. If you don't need this permission, be sure your <a 690 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 691 targetSdkVersion}</a> is 4 or higher. 692 <p>Protection level: dangerous 693 --> 694 <permission android:name="android.permission.READ_EXTERNAL_STORAGE" 695 android:permissionGroup="android.permission-group.STORAGE" 696 android:label="@string/permlab_sdcardRead" 697 android:description="@string/permdesc_sdcardRead" 698 android:protectionLevel="dangerous" /> 699 700 <!-- Allows an application to write to external storage. 701 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 702 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 703 minSdkVersion}</a> and <a 704 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 705 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 706 grants your app this permission. If you don't need this permission, be sure your <a 707 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 708 targetSdkVersion}</a> is 4 or higher. 709 <p>Starting in API level 19, this permission is <em>not</em> required to 710 read/write files in your application-specific directories returned by 711 {@link android.content.Context#getExternalFilesDir} and 712 {@link android.content.Context#getExternalCacheDir}. 713 <p>Protection level: dangerous 714 --> 715 <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE" 716 android:permissionGroup="android.permission-group.STORAGE" 717 android:label="@string/permlab_sdcardWrite" 718 android:description="@string/permdesc_sdcardWrite" 719 android:protectionLevel="dangerous" /> 720 721 <!-- ====================================================================== --> 722 <!-- Permissions for accessing the device location --> 723 <!-- ====================================================================== --> 724 <eat-comment /> 725 726 <!-- Used for permissions that allow accessing the device location. --> 727 <permission-group android:name="android.permission-group.LOCATION" 728 android:icon="@drawable/perm_group_location" 729 android:label="@string/permgrouplab_location" 730 android:description="@string/permgroupdesc_location" 731 android:priority="400" /> 732 733 <!-- Allows an app to access precise location. 734 Alternatively, you might want {@link #ACCESS_COARSE_LOCATION}. 735 <p>Protection level: dangerous 736 --> 737 <permission android:name="android.permission.ACCESS_FINE_LOCATION" 738 android:permissionGroup="android.permission-group.LOCATION" 739 android:label="@string/permlab_accessFineLocation" 740 android:description="@string/permdesc_accessFineLocation" 741 android:protectionLevel="dangerous|ephemeral" /> 742 743 <!-- Allows an app to access approximate location. 744 Alternatively, you might want {@link #ACCESS_FINE_LOCATION}. 745 <p>Protection level: dangerous 746 --> 747 <permission android:name="android.permission.ACCESS_COARSE_LOCATION" 748 android:permissionGroup="android.permission-group.LOCATION" 749 android:label="@string/permlab_accessCoarseLocation" 750 android:description="@string/permdesc_accessCoarseLocation" 751 android:protectionLevel="dangerous|ephemeral" /> 752 753 <!-- ====================================================================== --> 754 <!-- Permissions for accessing the device telephony --> 755 <!-- ====================================================================== --> 756 <eat-comment /> 757 758 <!-- Used for permissions that are associated telephony features. --> 759 <permission-group android:name="android.permission-group.PHONE" 760 android:icon="@drawable/perm_group_phone_calls" 761 android:label="@string/permgrouplab_phone" 762 android:description="@string/permgroupdesc_phone" 763 android:priority="500" /> 764 765 <!-- Allows read only access to phone state, including the phone number of the device, 766 current cellular network information, the status of any ongoing calls, and a list of any 767 {@link android.telecom.PhoneAccount}s registered on the device. 768 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 769 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 770 minSdkVersion}</a> and <a 771 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 772 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 773 grants your app this permission. If you don't need this permission, be sure your <a 774 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 775 targetSdkVersion}</a> is 4 or higher. 776 <p>Protection level: dangerous 777 --> 778 <permission android:name="android.permission.READ_PHONE_STATE" 779 android:permissionGroup="android.permission-group.PHONE" 780 android:label="@string/permlab_readPhoneState" 781 android:description="@string/permdesc_readPhoneState" 782 android:protectionLevel="dangerous" /> 783 784 <!-- Allows read access to the device's phone number. This is a subset of the capabilities 785 granted by {@link #READ_PHONE_STATE} but is exposed to ephemeral applications. 786 <p>Protection level: dangerous--> 787 <permission android:name="android.permission.READ_PHONE_NUMBER" 788 android:permissionGroup="android.permission-group.PHONE" 789 android:label="@string/permlab_readPhoneNumber" 790 android:description="@string/permdesc_readPhoneNumber" 791 android:protectionLevel="dangerous|ephemeral" /> 792 793 <!-- Allows an application to initiate a phone call without going through 794 the Dialer user interface for the user to confirm the call. 795 <p>Protection level: dangerous 796 --> 797 <permission android:name="android.permission.CALL_PHONE" 798 android:permissionGroup="android.permission-group.PHONE" 799 android:permissionFlags="costsMoney" 800 android:label="@string/permlab_callPhone" 801 android:description="@string/permdesc_callPhone" 802 android:protectionLevel="dangerous" /> 803 804 <!-- Allows an application to access the IMS call service: making and 805 modifying a call 806 <p>Protection level: signature|privileged 807 @hide 808 --> 809 <permission android:name="android.permission.ACCESS_IMS_CALL_SERVICE" 810 android:permissionGroup="android.permission-group.PHONE" 811 android:label="@string/permlab_accessImsCallService" 812 android:description="@string/permdesc_accessImsCallService" 813 android:protectionLevel="signature|privileged" /> 814 815 <!-- Allows an application to read the user's call log. 816 <p class="note"><strong>Note:</strong> If your app uses the 817 {@link #READ_CONTACTS} permission and <em>both</em> your <a 818 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 819 minSdkVersion}</a> and <a 820 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 821 targetSdkVersion}</a> values are set to 15 or lower, the system implicitly 822 grants your app this permission. If you don't need this permission, be sure your <a 823 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 824 targetSdkVersion}</a> is 16 or higher.</p> 825 <p>Protection level: dangerous 826 --> 827 <permission android:name="android.permission.READ_CALL_LOG" 828 android:permissionGroup="android.permission-group.PHONE" 829 android:label="@string/permlab_readCallLog" 830 android:description="@string/permdesc_readCallLog" 831 android:protectionLevel="dangerous" /> 832 833 <!-- Allows an application to write (but not read) the user's 834 call log data. 835 <p class="note"><strong>Note:</strong> If your app uses the 836 {@link #WRITE_CONTACTS} permission and <em>both</em> your <a 837 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 838 minSdkVersion}</a> and <a 839 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 840 targetSdkVersion}</a> values are set to 15 or lower, the system implicitly 841 grants your app this permission. If you don't need this permission, be sure your <a 842 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 843 targetSdkVersion}</a> is 16 or higher.</p> 844 <p>Protection level: dangerous 845 --> 846 <permission android:name="android.permission.WRITE_CALL_LOG" 847 android:permissionGroup="android.permission-group.PHONE" 848 android:label="@string/permlab_writeCallLog" 849 android:description="@string/permdesc_writeCallLog" 850 android:protectionLevel="dangerous" /> 851 852 <!-- Allows an application to add voicemails into the system. 853 <p>Protection level: dangerous 854 --> 855 <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL" 856 android:permissionGroup="android.permission-group.PHONE" 857 android:label="@string/permlab_addVoicemail" 858 android:description="@string/permdesc_addVoicemail" 859 android:protectionLevel="dangerous" /> 860 861 <!-- Allows an application to use SIP service. 862 <p>Protection level: dangerous 863 --> 864 <permission android:name="android.permission.USE_SIP" 865 android:permissionGroup="android.permission-group.PHONE" 866 android:description="@string/permdesc_use_sip" 867 android:label="@string/permlab_use_sip" 868 android:protectionLevel="dangerous"/> 869 870 <!-- Allows an application to see the number being dialed during an outgoing 871 call with the option to redirect the call to a different number or 872 abort the call altogether. 873 <p>Protection level: dangerous 874 --> 875 <permission android:name="android.permission.PROCESS_OUTGOING_CALLS" 876 android:permissionGroup="android.permission-group.PHONE" 877 android:label="@string/permlab_processOutgoingCalls" 878 android:description="@string/permdesc_processOutgoingCalls" 879 android:protectionLevel="dangerous" /> 880 881 <!-- ====================================================================== --> 882 <!-- Permissions for accessing the device microphone --> 883 <!-- ====================================================================== --> 884 <eat-comment /> 885 886 <!-- Used for permissions that are associated with accessing 887 microphone audio from the device. Note that phone calls also capture audio 888 but are in a separate (more visible) permission group. --> 889 <permission-group android:name="android.permission-group.MICROPHONE" 890 android:icon="@drawable/perm_group_microphone" 891 android:label="@string/permgrouplab_microphone" 892 android:description="@string/permgroupdesc_microphone" 893 android:priority="600" /> 894 895 <!-- Allows an application to record audio. 896 <p>Protection level: dangerous 897 --> 898 <permission android:name="android.permission.RECORD_AUDIO" 899 android:permissionGroup="android.permission-group.MICROPHONE" 900 android:label="@string/permlab_recordAudio" 901 android:description="@string/permdesc_recordAudio" 902 android:protectionLevel="dangerous"/> 903 904 <!-- ====================================================================== --> 905 <!-- Permissions for accessing the UCE Service --> 906 <!-- ====================================================================== --> 907 908 <!-- @hide Allows an application to Access UCE-Presence. 909 <p>Protection level: dangerous 910 --> 911 <permission android:name="android.permission.ACCESS_UCE_PRESENCE_SERVICE" 912 android:permissionGroup="android.permission-group.PHONE" 913 android:protectionLevel="signatureOrSystem"/> 914 915 <!-- @hide Allows an application to Access UCE-OPTIONS. 916 <p>Protection level: dangerous 917 --> 918 <permission android:name="android.permission.ACCESS_UCE_OPTIONS_SERVICE" 919 android:permissionGroup="android.permission-group.PHONE" 920 android:protectionLevel="signatureOrSystem"/> 921 922 923 924 <!-- ====================================================================== --> 925 <!-- Permissions for accessing the device camera --> 926 <!-- ====================================================================== --> 927 <eat-comment /> 928 929 <!-- Used for permissions that are associated with accessing 930 camera or capturing images/video from the device. --> 931 <permission-group android:name="android.permission-group.CAMERA" 932 android:icon="@drawable/perm_group_camera" 933 android:label="@string/permgrouplab_camera" 934 android:description="@string/permgroupdesc_camera" 935 android:priority="700" /> 936 937 <!-- Required to be able to access the camera device. 938 <p>This will automatically enforce the <a 939 href="{@docRoot}guide/topics/manifest/uses-feature-element.html"> 940 <uses-feature>}</a> manifest element for <em>all</em> camera features. 941 If you do not require all camera features or can properly operate if a camera 942 is not available, then you must modify your manifest as appropriate in order to 943 install on devices that don't support all camera features.</p> 944 <p>Protection level: dangerous 945 --> 946 <permission android:name="android.permission.CAMERA" 947 android:permissionGroup="android.permission-group.CAMERA" 948 android:label="@string/permlab_camera" 949 android:description="@string/permdesc_camera" 950 android:protectionLevel="dangerous|ephemeral" /> 951 952 953 <!-- ====================================================================== --> 954 <!-- Permissions for accessing the device sensors --> 955 <!-- ====================================================================== --> 956 <eat-comment /> 957 958 <!-- Used for permissions that are associated with accessing 959 camera or capturing images/video from the device. --> 960 <permission-group android:name="android.permission-group.SENSORS" 961 android:icon="@drawable/perm_group_sensors" 962 android:label="@string/permgrouplab_sensors" 963 android:description="@string/permgroupdesc_sensors" 964 android:priority="800" /> 965 966 <!-- Allows an application to access data from sensors that the user uses to 967 measure what is happening inside his/her body, such as heart rate. 968 <p>Protection level: dangerous --> 969 <permission android:name="android.permission.BODY_SENSORS" 970 android:permissionGroup="android.permission-group.SENSORS" 971 android:label="@string/permlab_bodySensors" 972 android:description="@string/permdesc_bodySensors" 973 android:protectionLevel="dangerous" /> 974 975 <!-- Allows an app to use fingerprint hardware. 976 <p>Protection level: normal 977 --> 978 <permission android:name="android.permission.USE_FINGERPRINT" 979 android:permissionGroup="android.permission-group.SENSORS" 980 android:label="@string/permlab_useFingerprint" 981 android:description="@string/permdesc_useFingerprint" 982 android:protectionLevel="normal" /> 983 984 <!-- ====================================================================== --> 985 <!-- REMOVED PERMISSIONS --> 986 <!-- ====================================================================== --> 987 988 <!-- @hide We need to keep this around for backwards compatibility --> 989 <permission android:name="android.permission.READ_PROFILE" 990 android:protectionLevel="normal" 991 android:permissionFlags="removed"/> 992 993 <!-- @hide We need to keep this around for backwards compatibility --> 994 <permission android:name="android.permission.WRITE_PROFILE" 995 android:protectionLevel="normal" 996 android:permissionFlags="removed"/> 997 998 <!-- @hide We need to keep this around for backwards compatibility --> 999 <permission android:name="android.permission.READ_SOCIAL_STREAM" 1000 android:protectionLevel="normal" 1001 android:permissionFlags="removed"/> 1002 1003 <!-- @hide We need to keep this around for backwards compatibility --> 1004 <permission android:name="android.permission.WRITE_SOCIAL_STREAM" 1005 android:protectionLevel="normal" 1006 android:permissionFlags="removed"/> 1007 1008 <!-- @hide We need to keep this around for backwards compatibility --> 1009 <permission android:name="android.permission.READ_USER_DICTIONARY" 1010 android:protectionLevel="normal" 1011 android:permissionFlags="removed"/> 1012 1013 <!-- @hide We need to keep this around for backwards compatibility --> 1014 <permission android:name="android.permission.WRITE_USER_DICTIONARY" 1015 android:protectionLevel="normal" 1016 android:permissionFlags="removed"/> 1017 1018 <!-- @hide We need to keep this around for backwards compatibility --> 1019 <permission android:name="android.permission.WRITE_SMS" 1020 android:protectionLevel="normal" 1021 android:permissionFlags="removed"/> 1022 1023 <!-- @hide We need to keep this around for backwards compatibility --> 1024 <permission android:name="com.android.browser.permission.READ_HISTORY_BOOKMARKS" 1025 android:protectionLevel="normal" 1026 android:permissionFlags="removed"/> 1027 1028 <!-- @hide We need to keep this around for backwards compatibility --> 1029 <permission android:name="com.android.browser.permission.WRITE_HISTORY_BOOKMARKS" 1030 android:protectionLevel="normal" 1031 android:permissionFlags="removed"/> 1032 1033 <!-- @hide We need to keep this around for backwards compatibility --> 1034 <permission android:name="android.permission.AUTHENTICATE_ACCOUNTS" 1035 android:protectionLevel="normal" 1036 android:permissionFlags="removed"/> 1037 1038 <!-- @hide We need to keep this around for backwards compatibility --> 1039 <permission android:name="android.permission.MANAGE_ACCOUNTS" 1040 android:protectionLevel="normal" 1041 android:permissionFlags="removed"/> 1042 1043 <!-- @hide We need to keep this around for backwards compatibility --> 1044 <permission android:name="android.permission.USE_CREDENTIALS" 1045 android:protectionLevel="normal" 1046 android:permissionFlags="removed"/> 1047 1048 <!-- @hide We need to keep this around for backwards compatibility --> 1049 <permission android:name="android.permission.SUBSCRIBED_FEEDS_READ" 1050 android:protectionLevel="normal" 1051 android:permissionFlags="removed"/> 1052 1053 <!-- @hide We need to keep this around for backwards compatibility --> 1054 <permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE" 1055 android:protectionLevel="normal" 1056 android:permissionFlags="removed"/> 1057 1058 <!-- @hide We need to keep this around for backwards compatibility --> 1059 <permission android:name="android.permission.FLASHLIGHT" 1060 android:protectionLevel="normal" 1061 android:permissionFlags="removed"/> 1062 1063 <!-- ====================================================================== --> 1064 <!-- INSTALL PERMISSIONS --> 1065 <!-- ====================================================================== --> 1066 1067 <!-- ================================== --> 1068 <!-- Permissions for accessing messages --> 1069 <!-- ================================== --> 1070 <eat-comment /> 1071 1072 <!-- @SystemApi Allows an application (Phone) to send a request to other applications 1073 to handle the respond-via-message action during incoming calls. 1074 <p>Not for use by third-party applications. --> 1075 <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE" 1076 android:protectionLevel="signature|privileged" /> 1077 1078 <!-- @SystemApi Allows an application to send SMS to premium shortcodes without user permission. 1079 <p>Not for use by third-party applications. 1080 @hide --> 1081 <permission android:name="android.permission.SEND_SMS_NO_CONFIRMATION" 1082 android:protectionLevel="signature|privileged" /> 1083 1084 <!-- Allows an application to filter carrier specific sms. 1085 @hide --> 1086 <permission android:name="android.permission.CARRIER_FILTER_SMS" 1087 android:protectionLevel="signature|privileged" /> 1088 1089 <!-- @SystemApi Allows an application to receive emergency cell broadcast messages, 1090 to record or display them to the user. 1091 <p>Not for use by third-party applications. 1092 @hide --> 1093 <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST" 1094 android:protectionLevel="signature|privileged" /> 1095 1096 <!-- Allows an application to monitor incoming Bluetooth MAP messages, to record 1097 or perform processing on them. --> 1098 <!-- @hide --> 1099 <permission android:name="android.permission.RECEIVE_BLUETOOTH_MAP" 1100 android:protectionLevel="signature|privileged" /> 1101 1102 <!-- @SystemApi @hide Allows an application to execute contacts directory search. 1103 This should only be used by ContactsProvider. 1104 <p>Not for use by third-party applications. --> 1105 <permission android:name="android.permission.BIND_DIRECTORY_SEARCH" 1106 android:protectionLevel="signature|privileged" /> 1107 1108 <!-- @SystemApi @hide Allows an application to modify cell broadcasts through the content provider. 1109 <p>Not for use by third-party applications. --> 1110 <permission android:name="android.permission.MODIFY_CELL_BROADCASTS" 1111 android:protectionLevel="signature|privileged" /> 1112 1113 <!-- =============================================================== --> 1114 <!-- Permissions for setting the device alarm --> 1115 <!-- =============================================================== --> 1116 <eat-comment /> 1117 1118 <!-- Allows an application to broadcast an Intent to set an alarm for the user. 1119 <p>Protection level: normal 1120 --> 1121 <permission android:name="com.android.alarm.permission.SET_ALARM" 1122 android:label="@string/permlab_setAlarm" 1123 android:description="@string/permdesc_setAlarm" 1124 android:protectionLevel="normal" /> 1125 1126 <!-- =============================================================== --> 1127 <!-- Permissions for accessing the user voicemail --> 1128 <!-- =============================================================== --> 1129 <eat-comment /> 1130 1131 <!-- Allows an application to modify and remove existing voicemails in the system. 1132 <p>Protection level: signature|privileged 1133 --> 1134 <permission android:name="com.android.voicemail.permission.WRITE_VOICEMAIL" 1135 android:protectionLevel="signature|privileged" /> 1136 1137 <!-- Allows an application to read voicemails in the system. 1138 <p>Protection level: signature|privileged 1139 --> 1140 <permission android:name="com.android.voicemail.permission.READ_VOICEMAIL" 1141 android:protectionLevel="signature|privileged" /> 1142 1143 <!-- ======================================= --> 1144 <!-- Permissions for accessing location info --> 1145 <!-- ======================================= --> 1146 <eat-comment /> 1147 1148 <!-- Allows an application to access extra location provider commands. 1149 <p>Protection level: normal 1150 --> 1151 <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS" 1152 android:label="@string/permlab_accessLocationExtraCommands" 1153 android:description="@string/permdesc_accessLocationExtraCommands" 1154 android:protectionLevel="normal" /> 1155 1156 <!-- @SystemApi Allows an application to install a location provider into the Location Manager. 1157 <p>Not for use by third-party applications. --> 1158 <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER" 1159 android:protectionLevel="signature|privileged" /> 1160 1161 <!-- @SystemApi @hide Allows HDMI-CEC service to access device and configuration files. 1162 This should only be used by HDMI-CEC service. 1163 --> 1164 <permission android:name="android.permission.HDMI_CEC" 1165 android:protectionLevel="signature|privileged" /> 1166 1167 <!-- @SystemApi Allows an application to use location features in hardware, 1168 such as the geofencing api. 1169 <p>Not for use by third-party applications. --> 1170 <permission android:name="android.permission.LOCATION_HARDWARE" 1171 android:protectionLevel="signature|privileged" /> 1172 <uses-permission android:name="android.permission.LOCATION_HARDWARE"/> 1173 1174 <!-- @SystemApi Allows an application to create mock location providers for testing. 1175 <p>Protection level: signature 1176 @hide 1177 --> 1178 <permission android:name="android.permission.ACCESS_MOCK_LOCATION" 1179 android:protectionLevel="signature" /> 1180 1181 <!-- ======================================= --> 1182 <!-- Permissions for accessing networks --> 1183 <!-- ======================================= --> 1184 <eat-comment /> 1185 1186 <!-- Allows applications to open network sockets. 1187 <p>Protection level: normal 1188 --> 1189 <permission android:name="android.permission.INTERNET" 1190 android:description="@string/permdesc_createNetworkSockets" 1191 android:label="@string/permlab_createNetworkSockets" 1192 android:protectionLevel="normal|ephemeral" /> 1193 1194 <!-- Allows applications to access information about networks. 1195 <p>Protection level: normal 1196 --> 1197 <permission android:name="android.permission.ACCESS_NETWORK_STATE" 1198 android:description="@string/permdesc_accessNetworkState" 1199 android:label="@string/permlab_accessNetworkState" 1200 android:protectionLevel="normal|ephemeral" /> 1201 1202 <!-- Allows applications to access information about Wi-Fi networks. 1203 <p>Protection level: normal 1204 --> 1205 <permission android:name="android.permission.ACCESS_WIFI_STATE" 1206 android:description="@string/permdesc_accessWifiState" 1207 android:label="@string/permlab_accessWifiState" 1208 android:protectionLevel="normal" /> 1209 1210 <!-- Allows applications to change Wi-Fi connectivity state. 1211 <p>Protection level: normal 1212 --> 1213 <permission android:name="android.permission.CHANGE_WIFI_STATE" 1214 android:description="@string/permdesc_changeWifiState" 1215 android:label="@string/permlab_changeWifiState" 1216 android:protectionLevel="normal" /> 1217 1218 <!-- @SystemApi @hide Allows applications to read Wi-Fi credential. 1219 <p>Not for use by third-party applications. --> 1220 <permission android:name="android.permission.READ_WIFI_CREDENTIAL" 1221 android:protectionLevel="signature|privileged" /> 1222 1223 <!-- @SystemApi @hide Allows applications to change tether state and run 1224 tether carrier provisioning. 1225 <p>Not for use by third-party applications. --> 1226 <permission android:name="android.permission.TETHER_PRIVILEGED" 1227 android:protectionLevel="signature|privileged" /> 1228 1229 <!-- @SystemApi @hide Allow system apps to receive broadcast 1230 when a wifi network credential is changed. 1231 <p>Not for use by third-party applications. --> 1232 <permission android:name="android.permission.RECEIVE_WIFI_CREDENTIAL_CHANGE" 1233 android:protectionLevel="signature|privileged" /> 1234 1235 <!-- @SystemApi @hide Allows an application to modify any wifi configuration, even if created 1236 by another application. Once reconfigured the original creator cannot make any further 1237 modifications. 1238 <p>Not for use by third-party applications. --> 1239 <permission android:name="android.permission.OVERRIDE_WIFI_CONFIG" 1240 android:protectionLevel="signature|privileged" /> 1241 1242 <!-- @hide --> 1243 <permission android:name="android.permission.ACCESS_WIMAX_STATE" 1244 android:description="@string/permdesc_accessWimaxState" 1245 android:label="@string/permlab_accessWimaxState" 1246 android:protectionLevel="normal" /> 1247 1248 <!-- @hide --> 1249 <permission android:name="android.permission.CHANGE_WIMAX_STATE" 1250 android:description="@string/permdesc_changeWimaxState" 1251 android:label="@string/permlab_changeWimaxState" 1252 android:protectionLevel="normal" /> 1253 1254 <!-- Allows applications to act as network scorers. @hide @SystemApi--> 1255 <permission android:name="android.permission.SCORE_NETWORKS" 1256 android:protectionLevel="signature|privileged" /> 1257 1258 <!-- @SystemApi Allows applications to request network 1259 recommendations and scores from the NetworkScoreService. 1260 <p>Not for use by third-party applications. @hide --> 1261 <permission android:name="android.permission.REQUEST_NETWORK_SCORES" 1262 android:protectionLevel="signature" /> 1263 1264 <!-- ======================================= --> 1265 <!-- Permissions for short range, peripheral networks --> 1266 <!-- ======================================= --> 1267 <eat-comment /> 1268 1269 <!-- Allows applications to connect to paired bluetooth devices. 1270 <p>Protection level: normal 1271 --> 1272 <permission android:name="android.permission.BLUETOOTH" 1273 android:description="@string/permdesc_bluetooth" 1274 android:label="@string/permlab_bluetooth" 1275 android:protectionLevel="normal" /> 1276 1277 <!-- Allows applications to discover and pair bluetooth devices. 1278 <p>Protection level: normal 1279 --> 1280 <permission android:name="android.permission.BLUETOOTH_ADMIN" 1281 android:description="@string/permdesc_bluetoothAdmin" 1282 android:label="@string/permlab_bluetoothAdmin" 1283 android:protectionLevel="normal" /> 1284 1285 <!-- @SystemApi Allows applications to pair bluetooth devices without user interaction, and to 1286 allow or disallow phonebook access or message access. 1287 This is not available to third party applications. --> 1288 <permission android:name="android.permission.BLUETOOTH_PRIVILEGED" 1289 android:protectionLevel="signature|privileged" /> 1290 1291 <!-- Control access to email providers exclusively for Bluetooth 1292 @hide 1293 --> 1294 <permission android:name="android.permission.BLUETOOTH_MAP" 1295 android:protectionLevel="signature" /> 1296 1297 <!-- Allows bluetooth stack to access files 1298 @hide This should only be used by Bluetooth apk. 1299 --> 1300 <permission android:name="android.permission.BLUETOOTH_STACK" 1301 android:protectionLevel="signature" /> 1302 1303 <!-- Allows applications to perform I/O operations over NFC. 1304 <p>Protection level: normal 1305 --> 1306 <permission android:name="android.permission.NFC" 1307 android:description="@string/permdesc_nfc" 1308 android:label="@string/permlab_nfc" 1309 android:protectionLevel="normal" /> 1310 1311 <!-- @SystemApi Allows an internal user to use privileged ConnectivityManager APIs. 1312 @hide --> 1313 <permission android:name="android.permission.CONNECTIVITY_INTERNAL" 1314 android:protectionLevel="signature|privileged" /> 1315 1316 <!-- Allows an internal user to use restricted Networks. 1317 @hide --> 1318 <permission android:name="android.permission.CONNECTIVITY_USE_RESTRICTED_NETWORKS" 1319 android:protectionLevel="signature|privileged" /> 1320 1321 <!-- Allows a system application to access hardware packet offload capabilities. 1322 @hide --> 1323 <permission android:name="android.permission.PACKET_KEEPALIVE_OFFLOAD" 1324 android:protectionLevel="signature|privileged" /> 1325 1326 <!-- @SystemApi 1327 @hide --> 1328 <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE" 1329 android:protectionLevel="signature|privileged" /> 1330 1331 <!-- @SystemApi Allows access to the loop radio (Android@Home mesh network) device. 1332 @hide --> 1333 <permission android:name="android.permission.LOOP_RADIO" 1334 android:protectionLevel="signature|privileged" /> 1335 1336 <!-- Allows sending and receiving handover transfer status from Wifi and Bluetooth 1337 @hide --> 1338 <permission android:name="android.permission.NFC_HANDOVER_STATUS" 1339 android:protectionLevel="signature|privileged" /> 1340 1341 <!-- ================================== --> 1342 <!-- Permissions for accessing accounts --> 1343 <!-- ================================== --> 1344 <eat-comment /> 1345 1346 <!-- Allows access to the list of accounts in the Accounts Service. 1347 1348 <p class="note"><strong>Note:</strong> Beginning with Android 6.0 (API level 1349 23), if an app shares the signature of the authenticator that manages an 1350 account, it does not need <code>"GET_ACCOUNTS"</code> permission to read 1351 information about that account. On Android 5.1 and lower, all apps need 1352 <code>"GET_ACCOUNTS"</code> permission to read information about any 1353 account.</p> 1354 1355 <p>Protection level: dangerous 1356 --> 1357 <permission android:name="android.permission.GET_ACCOUNTS" 1358 android:permissionGroup="android.permission-group.CONTACTS" 1359 android:protectionLevel="dangerous" 1360 android:description="@string/permdesc_getAccounts" 1361 android:label="@string/permlab_getAccounts" /> 1362 <uses-permission android:name="android.permission.GET_ACCOUNTS"/> 1363 1364 <!-- @SystemApi Allows applications to call into AccountAuthenticators. 1365 <p>Not for use by third-party applications. --> 1366 <permission android:name="android.permission.ACCOUNT_MANAGER" 1367 android:protectionLevel="signature" /> 1368 1369 <!-- ================================== --> 1370 <!-- Permissions for accessing hardware that may effect battery life--> 1371 <!-- ================================== --> 1372 <eat-comment /> 1373 1374 <!-- Allows applications to enter Wi-Fi Multicast mode. 1375 <p>Protection level: normal 1376 --> 1377 <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE" 1378 android:description="@string/permdesc_changeWifiMulticastState" 1379 android:label="@string/permlab_changeWifiMulticastState" 1380 android:protectionLevel="normal" /> 1381 1382 <!-- Allows access to the vibrator. 1383 <p>Protection level: normal 1384 --> 1385 <permission android:name="android.permission.VIBRATE" 1386 android:label="@string/permlab_vibrate" 1387 android:description="@string/permdesc_vibrate" 1388 android:protectionLevel="normal|ephemeral" /> 1389 1390 <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen 1391 from dimming. 1392 <p>Protection level: normal 1393 --> 1394 <permission android:name="android.permission.WAKE_LOCK" 1395 android:label="@string/permlab_wakeLock" 1396 android:description="@string/permdesc_wakeLock" 1397 android:protectionLevel="normal|ephemeral" /> 1398 1399 <!-- Allows using the device's IR transmitter, if available. 1400 <p>Protection level: normal 1401 --> 1402 <permission android:name="android.permission.TRANSMIT_IR" 1403 android:label="@string/permlab_transmitIr" 1404 android:description="@string/permdesc_transmitIr" 1405 android:protectionLevel="normal" /> 1406 1407 <!-- ==================================================== --> 1408 <!-- Permissions related to changing audio settings --> 1409 <!-- ==================================================== --> 1410 <eat-comment /> 1411 1412 <!-- Allows an application to modify global audio settings. 1413 <p>Protection level: normal 1414 --> 1415 <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS" 1416 android:label="@string/permlab_modifyAudioSettings" 1417 android:description="@string/permdesc_modifyAudioSettings" 1418 android:protectionLevel="normal" /> 1419 1420 <!-- ================================== --> 1421 <!-- Permissions for accessing hardware --> 1422 <!-- ================================== --> 1423 <eat-comment /> 1424 1425 <!-- @SystemApi Allows an application to manage preferences and permissions for USB devices 1426 @hide --> 1427 <permission android:name="android.permission.MANAGE_USB" 1428 android:protectionLevel="signature|privileged" /> 1429 1430 <!-- @SystemApi Allows an application to access the MTP USB kernel driver. 1431 For use only by the device side MTP implementation. 1432 @hide --> 1433 <permission android:name="android.permission.ACCESS_MTP" 1434 android:protectionLevel="signature|privileged" /> 1435 1436 <!-- @SystemApi Allows access to hardware peripherals. Intended only for hardware testing. 1437 <p>Not for use by third-party applications. 1438 @hide 1439 --> 1440 <permission android:name="android.permission.HARDWARE_TEST" 1441 android:protectionLevel="signature" /> 1442 1443 <!-- @SystemApi Allows access to FM 1444 @hide This is not a third-party API (intended for system apps).--> 1445 <permission android:name="android.permission.ACCESS_FM_RADIO" 1446 android:protectionLevel="signature|privileged" /> 1447 1448 <!-- Allows access to configure network interfaces, configure/use IPSec, etc. 1449 @hide --> 1450 <permission android:name="android.permission.NET_ADMIN" 1451 android:protectionLevel="signature" /> 1452 1453 <!-- Allows registration for remote audio playback. @hide --> 1454 <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK" 1455 android:protectionLevel="signature" /> 1456 1457 <!-- @SystemApi Allows TvInputService to access underlying TV input hardware such as 1458 built-in tuners and HDMI-in's. 1459 @hide This should only be used by OEM's TvInputService's. 1460 --> 1461 <permission android:name="android.permission.TV_INPUT_HARDWARE" 1462 android:protectionLevel="signature|privileged" /> 1463 1464 <!-- @SystemApi Allows to capture a frame of TV input hardware such as 1465 built-in tuners and HDMI-in's. 1466 @hide <p>Not for use by third-party applications. 1467 --> 1468 <permission android:name="android.permission.CAPTURE_TV_INPUT" 1469 android:protectionLevel="signature|privileged" /> 1470 1471 <!-- @hide Allows TvInputService to access DVB device. 1472 <p>Not for use by third-party applications. --> 1473 <permission android:name="android.permission.DVB_DEVICE" 1474 android:protectionLevel="signature|privileged" /> 1475 1476 <!-- @SystemApi Allows reading the OEM unlock state 1477 @hide <p>Not for use by third-party applications. --> 1478 <permission android:name="android.permission.READ_OEM_UNLOCK_STATE" 1479 android:protectionLevel="signature|privileged" /> 1480 1481 <!-- @hide Allows enabling/disabling OEM unlock 1482 <p>Not for use by third-party applications. --> 1483 <permission android:name="android.permission.OEM_UNLOCK_STATE" 1484 android:protectionLevel="signature" /> 1485 1486 <!-- @hide Allows querying state of PersistentDataBlock 1487 <p>Not for use by third-party applications. --> 1488 <permission android:name="android.permission.ACCESS_PDB_STATE" 1489 android:protectionLevel="signature" /> 1490 1491 <!-- @hide Allows system update service to notify device owner about pending updates. 1492 <p>Not for use by third-party applications. --> 1493 <permission android:name="android.permission.NOTIFY_PENDING_SYSTEM_UPDATE" 1494 android:protectionLevel="signature|privileged" /> 1495 1496 <!-- =========================================== --> 1497 <!-- Permissions associated with camera and image capture --> 1498 <!-- =========================================== --> 1499 <eat-comment /> 1500 1501 <!-- @SystemApi Allows disabling the transmit-indicator LED that is normally on when 1502 a camera is in use by an application. 1503 @hide --> 1504 <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED" 1505 android:protectionLevel="signature|privileged" /> 1506 1507 <!-- Allows sending the camera service notifications about system-wide events. 1508 @hide --> 1509 <permission android:name="android.permission.CAMERA_SEND_SYSTEM_EVENTS" 1510 android:protectionLevel="signature|privileged" /> 1511 1512 <!-- =========================================== --> 1513 <!-- Permissions associated with telephony state --> 1514 <!-- =========================================== --> 1515 <eat-comment /> 1516 1517 <!-- @SystemApi Allows modification of the telephony state - power on, mmi, etc. 1518 Does not include placing calls. 1519 <p>Not for use by third-party applications. --> 1520 <permission android:name="android.permission.MODIFY_PHONE_STATE" 1521 android:protectionLevel="signature|privileged" /> 1522 1523 <!-- Allows read only access to precise phone state. 1524 @hide Pending API council approval --> 1525 <permission android:name="android.permission.READ_PRECISE_PHONE_STATE" 1526 android:protectionLevel="signature|privileged" /> 1527 1528 <!-- @SystemApi Allows read access to privileged phone state. 1529 @hide Used internally. --> 1530 <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE" 1531 android:protectionLevel="signature|privileged" /> 1532 1533 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1534 PhoneAccount#CAPABILITY_SIM_SUBSCRIPTION. This capability indicates that the PhoneAccount 1535 corresponds to a device SIM. 1536 @hide --> 1537 <permission android:name="android.permission.REGISTER_SIM_SUBSCRIPTION" 1538 android:protectionLevel="signature|privileged" /> 1539 1540 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1541 PhoneAccount#CAPABILITY_CALL_PROVIDER. 1542 @hide --> 1543 <permission android:name="android.permission.REGISTER_CALL_PROVIDER" 1544 android:protectionLevel="signature|privileged" /> 1545 1546 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1547 PhoneAccount#CAPABILITY_CONNECTION_MANAGER 1548 @hide --> 1549 <permission android:name="android.permission.REGISTER_CONNECTION_MANAGER" 1550 android:protectionLevel="signature|privileged" /> 1551 1552 <!-- Must be required by a {@link android.telecom.InCallService}, 1553 to ensure that only the system can bind to it. 1554 <p>Protection level: signature|privileged 1555 --> 1556 <permission android:name="android.permission.BIND_INCALL_SERVICE" 1557 android:protectionLevel="signature|privileged" /> 1558 1559 <!-- Must be required by a link {@link android.telephony.VisualVoicemailService} to ensure that 1560 only the system can bind to it. 1561 <p>Protection level: signature|privileged 1562 --> 1563 <permission 1564 android:name="android.permission.BIND_VISUAL_VOICEMAIL_SERVICE" 1565 android:protectionLevel="signature|privileged"/> 1566 1567 <!-- Must be required by a {@link android.telecom.CallScreeningService}, 1568 to ensure that only the system can bind to it. 1569 <p>Protection level: signature|privileged 1570 --> 1571 <permission android:name="android.permission.BIND_SCREENING_SERVICE" 1572 android:protectionLevel="signature|privileged" /> 1573 1574 <!-- Must be required by a {@link android.telecom.ConnectionService}, 1575 to ensure that only the system can bind to it. 1576 @deprecated {@link android.telecom.ConnectionService}s should require 1577 android.permission.BIND_TELECOM_CONNECTION_SERVICE instead. 1578 @SystemApi 1579 @hide --> 1580 <permission android:name="android.permission.BIND_CONNECTION_SERVICE" 1581 android:protectionLevel="signature|privileged" /> 1582 1583 <!-- Must be required by a {@link android.telecom.ConnectionService}, 1584 to ensure that only the system can bind to it. 1585 <p>Protection level: signature|privileged 1586 --> 1587 <permission android:name="android.permission.BIND_TELECOM_CONNECTION_SERVICE" 1588 android:protectionLevel="signature|privileged" /> 1589 1590 <!-- @SystemApi Allows an application to control the in-call experience. 1591 @hide --> 1592 <permission android:name="android.permission.CONTROL_INCALL_EXPERIENCE" 1593 android:protectionLevel="signature|privileged" /> 1594 1595 <!-- Allows an application to receive STK related commands. 1596 @hide --> 1597 <permission android:name="android.permission.RECEIVE_STK_COMMANDS" 1598 android:protectionLevel="signature|privileged" /> 1599 1600 <!-- ================================== --> 1601 <!-- Permissions for sdcard interaction --> 1602 <!-- ================================== --> 1603 <eat-comment /> 1604 1605 <!-- @SystemApi Allows an application to write to internal media storage 1606 @hide --> 1607 <permission android:name="android.permission.WRITE_MEDIA_STORAGE" 1608 android:protectionLevel="signature|privileged" /> 1609 1610 <!-- Allows an application to manage access to documents, usually as part 1611 of a document picker. 1612 <p>This permission should <em>only</em> be requested by the platform 1613 document management app. This permission cannot be granted to 1614 third-party apps. 1615 <p>Protection level: signature 1616 --> 1617 <permission android:name="android.permission.MANAGE_DOCUMENTS" 1618 android:protectionLevel="signature" /> 1619 1620 <!-- @hide Allows an application to cache content. 1621 <p>Not for use by third-party applications. 1622 <p>Protection level: signature 1623 --> 1624 <permission android:name="android.permission.CACHE_CONTENT" 1625 android:protectionLevel="signature" /> 1626 1627 <!-- ================================== --> 1628 <!-- Permissions for screenlock --> 1629 <!-- ================================== --> 1630 <eat-comment /> 1631 1632 <!-- Allows applications to disable the keyguard if it is not secure. 1633 <p>Protection level: normal 1634 --> 1635 <permission android:name="android.permission.DISABLE_KEYGUARD" 1636 android:description="@string/permdesc_disableKeyguard" 1637 android:label="@string/permlab_disableKeyguard" 1638 android:protectionLevel="normal" /> 1639 1640 <!-- ================================== --> 1641 <!-- Permissions to access other installed applications --> 1642 <!-- ================================== --> 1643 <eat-comment /> 1644 1645 <!-- @deprecated No longer enforced. --> 1646 <permission android:name="android.permission.GET_TASKS" 1647 android:label="@string/permlab_getTasks" 1648 android:description="@string/permdesc_getTasks" 1649 android:protectionLevel="normal" /> 1650 1651 <!-- New version of GET_TASKS that apps can request, since GET_TASKS doesn't really 1652 give access to task information. We need this new one because there are 1653 many existing apps that use add libraries and such that have validation 1654 code to ensure the app has requested the GET_TASKS permission by seeing 1655 if it has been granted the permission... if it hasn't, it kills the app 1656 with a message about being upset. So we need to have it continue to look 1657 like the app is getting that permission, even though it will never be 1658 checked, and new privileged apps can now request this one for real access. 1659 @hide 1660 @SystemApi --> 1661 <permission android:name="android.permission.REAL_GET_TASKS" 1662 android:protectionLevel="signature|privileged" /> 1663 1664 <!-- Allows an application to start a task from a ActivityManager#RecentTaskInfo. 1665 @hide --> 1666 <permission android:name="android.permission.START_TASKS_FROM_RECENTS" 1667 android:protectionLevel="signature|privileged" /> 1668 1669 <!-- @SystemApi @hide Allows an application to call APIs that allow it to do interactions 1670 across the users on the device, using singleton services and 1671 user-targeted broadcasts. This permission is not available to 1672 third party applications. --> 1673 <permission android:name="android.permission.INTERACT_ACROSS_USERS" 1674 android:protectionLevel="signature|privileged|development" /> 1675 1676 <!-- @SystemApi Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS} 1677 that removes restrictions on where broadcasts can be sent and allows other 1678 types of interactions 1679 @hide --> 1680 <permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL" 1681 android:protectionLevel="signature|installer" /> 1682 1683 <!-- @SystemApi @hide Allows an application to call APIs that allow it to query and manage 1684 users on the device. This permission is not available to 1685 third party applications. --> 1686 <permission android:name="android.permission.MANAGE_USERS" 1687 android:protectionLevel="signature|privileged" /> 1688 1689 <!-- @hide Allows an application to create, remove users and get the list of 1690 users on the device. Applications holding this permission can only create restricted, 1691 guest, managed, demo, and ephemeral users. For creating other kind of users, 1692 {@link android.Manifest.permission#MANAGE_USERS} is needed. 1693 This permission is not available to third party applications. --> 1694 <permission android:name="android.permission.CREATE_USERS" 1695 android:protectionLevel="signature" /> 1696 1697 <!-- @hide Allows an application to set the profile owners and the device owner. 1698 This permission is not available to third party applications.--> 1699 <permission android:name="android.permission.MANAGE_PROFILE_AND_DEVICE_OWNERS" 1700 android:protectionLevel="signature" 1701 android:label="@string/permlab_manageProfileAndDeviceOwners" 1702 android:description="@string/permdesc_manageProfileAndDeviceOwners" /> 1703 1704 <!-- Allows an application to get full detailed information about 1705 recently running tasks, with full fidelity to the real state. 1706 @hide --> 1707 <permission android:name="android.permission.GET_DETAILED_TASKS" 1708 android:protectionLevel="signature" /> 1709 1710 <!-- Allows an application to change the Z-order of tasks. 1711 <p>Protection level: normal 1712 --> 1713 <permission android:name="android.permission.REORDER_TASKS" 1714 android:label="@string/permlab_reorderTasks" 1715 android:description="@string/permdesc_reorderTasks" 1716 android:protectionLevel="normal" /> 1717 1718 <!-- @hide Allows an application to change to remove/kill tasks --> 1719 <permission android:name="android.permission.REMOVE_TASKS" 1720 android:protectionLevel="signature" /> 1721 1722 <!-- @SystemApi @hide Allows an application to create/manage/remove stacks --> 1723 <permission android:name="android.permission.MANAGE_ACTIVITY_STACKS" 1724 android:protectionLevel="signature|privileged" /> 1725 1726 <!-- Allows an application to start any activity, regardless of permission 1727 protection or exported state. 1728 @hide --> 1729 <permission android:name="android.permission.START_ANY_ACTIVITY" 1730 android:protectionLevel="signature" /> 1731 1732 <!-- @deprecated The {@link android.app.ActivityManager#restartPackage} 1733 API is no longer supported. --> 1734 <permission android:name="android.permission.RESTART_PACKAGES" 1735 android:label="@string/permlab_killBackgroundProcesses" 1736 android:description="@string/permdesc_killBackgroundProcesses" 1737 android:protectionLevel="normal" /> 1738 1739 <!-- Allows an application to call 1740 {@link android.app.ActivityManager#killBackgroundProcesses}. 1741 <p>Protection level: normal 1742 --> 1743 <permission android:name="android.permission.KILL_BACKGROUND_PROCESSES" 1744 android:label="@string/permlab_killBackgroundProcesses" 1745 android:description="@string/permdesc_killBackgroundProcesses" 1746 android:protectionLevel="normal" /> 1747 1748 <!-- @SystemApi @hide Allows an application to query process states and current 1749 OOM adjustment scores. 1750 <p>Not for use by third-party applications. --> 1751 <permission android:name="android.permission.GET_PROCESS_STATE_AND_OOM_SCORE" 1752 android:protectionLevel="signature|privileged|development" /> 1753 1754 <!-- Allows use of PendingIntent.getIntent(). 1755 @hide --> 1756 <permission android:name="android.permission.GET_INTENT_SENDER_INTENT" 1757 android:protectionLevel="signature" /> 1758 1759 <!-- ================================== --> 1760 <!-- Permissions affecting the display of other applications --> 1761 <!-- ================================== --> 1762 <eat-comment /> 1763 1764 <!-- Allows an app to create windows using the type 1765 {@link android.view.WindowManager.LayoutParams#TYPE_SYSTEM_ALERT}, 1766 shown on top of all other apps. Very few apps 1767 should use this permission; these windows are intended for 1768 system-level interaction with the user. 1769 1770 <p class="note"><strong>Note:</strong> If the app 1771 targets API level 23 or higher, the app user must explicitly grant 1772 this permission to the app through a permission management screen. The app requests 1773 the user's approval by sending an intent with action 1774 {@link android.provider.Settings#ACTION_MANAGE_OVERLAY_PERMISSION}. 1775 The app can check whether it has this authorization by calling 1776 {@link android.provider.Settings#canDrawOverlays 1777 Settings.canDrawOverlays()}. 1778 <p>Protection level: signature --> 1779 <permission android:name="android.permission.SYSTEM_ALERT_WINDOW" 1780 android:label="@string/permlab_systemAlertWindow" 1781 android:description="@string/permdesc_systemAlertWindow" 1782 android:protectionLevel="signature|preinstalled|appop|pre23|development" /> 1783 1784 <!-- ================================== --> 1785 <!-- Permissions affecting the system wallpaper --> 1786 <!-- ================================== --> 1787 <eat-comment /> 1788 1789 <!-- Allows applications to set the wallpaper. 1790 <p>Protection level: normal 1791 --> 1792 <permission android:name="android.permission.SET_WALLPAPER" 1793 android:label="@string/permlab_setWallpaper" 1794 android:description="@string/permdesc_setWallpaper" 1795 android:protectionLevel="normal" /> 1796 1797 <!-- Allows applications to set the wallpaper hints. 1798 <p>Protection level: normal 1799 --> 1800 <permission android:name="android.permission.SET_WALLPAPER_HINTS" 1801 android:label="@string/permlab_setWallpaperHints" 1802 android:description="@string/permdesc_setWallpaperHints" 1803 android:protectionLevel="normal" /> 1804 1805 <!-- ============================================ --> 1806 <!-- Permissions for changing the system clock --> 1807 <!-- ============================================ --> 1808 <eat-comment /> 1809 1810 <!-- @SystemApi Allows applications to set the system time. 1811 <p>Not for use by third-party applications. --> 1812 <permission android:name="android.permission.SET_TIME" 1813 android:protectionLevel="signature|privileged" /> 1814 1815 <!-- Allows applications to set the system time zone. 1816 <p>Not for use by third-party applications. 1817 --> 1818 <permission android:name="android.permission.SET_TIME_ZONE" 1819 android:label="@string/permlab_setTimeZone" 1820 android:description="@string/permdesc_setTimeZone" 1821 android:protectionLevel="signature|privileged" /> 1822 1823 <!-- ==================================================== --> 1824 <!-- Permissions related to changing status bar --> 1825 <!-- ==================================================== --> 1826 <eat-comment /> 1827 1828 <!-- Allows an application to expand or collapse the status bar. 1829 <p>Protection level: normal 1830 --> 1831 <permission android:name="android.permission.EXPAND_STATUS_BAR" 1832 android:label="@string/permlab_expandStatusBar" 1833 android:description="@string/permdesc_expandStatusBar" 1834 android:protectionLevel="normal" /> 1835 1836 <!-- ============================================================== --> 1837 <!-- Permissions related to adding/removing shortcuts from Launcher --> 1838 <!-- ============================================================== --> 1839 <eat-comment /> 1840 1841 <!-- Allows an application to install a shortcut in Launcher. 1842 <p>Protection level: normal 1843 --> 1844 <permission android:name="com.android.launcher.permission.INSTALL_SHORTCUT" 1845 android:label="@string/permlab_install_shortcut" 1846 android:description="@string/permdesc_install_shortcut" 1847 android:protectionLevel="normal"/> 1848 1849 <!--This permission is no longer supported. 1850 --> 1851 <permission android:name="com.android.launcher.permission.UNINSTALL_SHORTCUT" 1852 android:label="@string/permlab_uninstall_shortcut" 1853 android:description="@string/permdesc_uninstall_shortcut" 1854 android:protectionLevel="normal"/> 1855 1856 <!-- ==================================================== --> 1857 <!-- Permissions related to accessing sync settings --> 1858 <!-- ==================================================== --> 1859 <eat-comment /> 1860 1861 <!-- Allows applications to read the sync settings. 1862 <p>Protection level: normal 1863 --> 1864 <permission android:name="android.permission.READ_SYNC_SETTINGS" 1865 android:description="@string/permdesc_readSyncSettings" 1866 android:label="@string/permlab_readSyncSettings" 1867 android:protectionLevel="normal" /> 1868 1869 <!-- Allows applications to write the sync settings. 1870 <p>Protection level: normal 1871 --> 1872 <permission android:name="android.permission.WRITE_SYNC_SETTINGS" 1873 android:description="@string/permdesc_writeSyncSettings" 1874 android:label="@string/permlab_writeSyncSettings" 1875 android:protectionLevel="normal" /> 1876 1877 <!-- Allows applications to read the sync stats. 1878 <p>Protection level: normal 1879 --> 1880 <permission android:name="android.permission.READ_SYNC_STATS" 1881 android:description="@string/permdesc_readSyncStats" 1882 android:label="@string/permlab_readSyncStats" 1883 android:protectionLevel="normal" /> 1884 1885 <!-- ============================================ --> 1886 <!-- Permissions for low-level system interaction --> 1887 <!-- ============================================ --> 1888 <eat-comment /> 1889 1890 <!-- @SystemApi @hide Change the screen compatibility mode of applications --> 1891 <permission android:name="android.permission.SET_SCREEN_COMPATIBILITY" 1892 android:protectionLevel="signature" /> 1893 1894 <!-- @SystemApi Allows an application to modify the current configuration, such 1895 as locale. --> 1896 <permission android:name="android.permission.CHANGE_CONFIGURATION" 1897 android:protectionLevel="signature|privileged|development" /> 1898 1899 <!-- Allows an application to read or write the system settings. 1900 1901 <p class="note"><strong>Note:</strong> If the app targets API level 23 1902 or higher, the app user 1903 must explicitly grant this permission to the app through a permission management screen. 1904 The app requests the user's approval by sending an intent with action 1905 {@link android.provider.Settings#ACTION_MANAGE_WRITE_SETTINGS}. The app 1906 can check whether it has this authorization by calling {@link 1907 android.provider.Settings.System#canWrite Settings.System.canWrite()}. 1908 1909 <p>Protection level: signature 1910 --> 1911 <permission android:name="android.permission.WRITE_SETTINGS" 1912 android:label="@string/permlab_writeSettings" 1913 android:description="@string/permdesc_writeSettings" 1914 android:protectionLevel="signature|preinstalled|appop|pre23" /> 1915 1916 <!-- @SystemApi Allows an application to modify the Google service map. 1917 <p>Not for use by third-party applications. --> 1918 <permission android:name="android.permission.WRITE_GSERVICES" 1919 android:protectionLevel="signature|privileged" /> 1920 1921 <!-- @SystemApi Allows an application to call 1922 {@link android.app.ActivityManager#forceStopPackage}. 1923 @hide --> 1924 <permission android:name="android.permission.FORCE_STOP_PACKAGES" 1925 android:protectionLevel="signature|privileged" /> 1926 1927 <!-- @SystemApi @hide Allows an application to retrieve the content of the active window 1928 An active window is the window that has fired an accessibility event. --> 1929 <permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT" 1930 android:protectionLevel="signature|privileged" /> 1931 1932 <!-- @SystemApi Modify the global animation scaling factor. 1933 <p>Not for use by third-party applications. --> 1934 <permission android:name="android.permission.SET_ANIMATION_SCALE" 1935 android:protectionLevel="signature|privileged|development" /> 1936 1937 <!-- @deprecated This functionality will be removed in the future; please do 1938 not use. Allow an application to make its activities persistent. --> 1939 <permission android:name="android.permission.PERSISTENT_ACTIVITY" 1940 android:label="@string/permlab_persistentActivity" 1941 android:description="@string/permdesc_persistentActivity" 1942 android:protectionLevel="normal" /> 1943 1944 <!-- Allows an application to find out the space used by any package. 1945 <p>Protection level: normal 1946 --> 1947 <permission android:name="android.permission.GET_PACKAGE_SIZE" 1948 android:label="@string/permlab_getPackageSize" 1949 android:description="@string/permdesc_getPackageSize" 1950 android:protectionLevel="normal" /> 1951 1952 <!-- @deprecated No longer useful, see 1953 {@link android.content.pm.PackageManager#addPackageToPreferred} 1954 for details. --> 1955 <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS" 1956 android:protectionLevel="signature" /> 1957 1958 <!-- Allows an application to receive the 1959 {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is 1960 broadcast after the system finishes booting. If you don't 1961 request this permission, you will not receive the broadcast at 1962 that time. Though holding this permission does not have any 1963 security implications, it can have a negative impact on the 1964 user experience by increasing the amount of time it takes the 1965 system to start and allowing applications to have themselves 1966 running without the user being aware of them. As such, you must 1967 explicitly declare your use of this facility to make that visible 1968 to the user. 1969 <p>Protection level: normal 1970 --> 1971 <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED" 1972 android:label="@string/permlab_receiveBootCompleted" 1973 android:description="@string/permdesc_receiveBootCompleted" 1974 android:protectionLevel="normal" /> 1975 1976 <!-- Allows an application to broadcast sticky intents. These are 1977 broadcasts whose data is held by the system after being finished, 1978 so that clients can quickly retrieve that data without having 1979 to wait for the next broadcast. 1980 <p>Protection level: normal 1981 --> 1982 <permission android:name="android.permission.BROADCAST_STICKY" 1983 android:label="@string/permlab_broadcastSticky" 1984 android:description="@string/permdesc_broadcastSticky" 1985 android:protectionLevel="normal" /> 1986 1987 <!-- @SystemApi Allows mounting and unmounting file systems for removable storage. 1988 <p>Not for use by third-party applications.--> 1989 <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS" 1990 android:protectionLevel="signature|privileged" /> 1991 1992 <!-- @SystemApi Allows formatting file systems for removable storage. 1993 <p>Not for use by third-party applications. --> 1994 <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS" 1995 android:protectionLevel="signature|privileged" /> 1996 1997 <!-- @hide --> 1998 <permission android:name="android.permission.STORAGE_INTERNAL" 1999 android:protectionLevel="signature" /> 2000 2001 <!-- Allows access to ASEC non-destructive API calls 2002 @hide --> 2003 <permission android:name="android.permission.ASEC_ACCESS" 2004 android:protectionLevel="signature" /> 2005 2006 <!-- Allows creation of ASEC volumes 2007 @hide --> 2008 <permission android:name="android.permission.ASEC_CREATE" 2009 android:protectionLevel="signature" /> 2010 2011 <!-- Allows destruction of ASEC volumes 2012 @hide --> 2013 <permission android:name="android.permission.ASEC_DESTROY" 2014 android:protectionLevel="signature" /> 2015 2016 <!-- Allows mount / unmount of ASEC volumes 2017 @hide --> 2018 <permission android:name="android.permission.ASEC_MOUNT_UNMOUNT" 2019 android:protectionLevel="signature" /> 2020 2021 <!-- Allows rename of ASEC volumes 2022 @hide --> 2023 <permission android:name="android.permission.ASEC_RENAME" 2024 android:protectionLevel="signature" /> 2025 2026 <!-- @SystemApi Allows applications to write the apn settings. 2027 <p>Not for use by third-party applications. --> 2028 <permission android:name="android.permission.WRITE_APN_SETTINGS" 2029 android:protectionLevel="signature|privileged" /> 2030 2031 <!-- Allows applications to change network connectivity state. 2032 <p>Protection level: normal 2033 --> 2034 <permission android:name="android.permission.CHANGE_NETWORK_STATE" 2035 android:description="@string/permdesc_changeNetworkState" 2036 android:label="@string/permlab_changeNetworkState" 2037 android:protectionLevel="normal" /> 2038 2039 <!-- Allows an application to clear the caches of all installed 2040 applications on the device. 2041 <p>Protection level: system|signature 2042 --> 2043 <permission android:name="android.permission.CLEAR_APP_CACHE" 2044 android:protectionLevel="signature|privileged" /> 2045 2046 <!-- @SystemApi Allows an application to use any media decoder when decoding for playback 2047 @hide --> 2048 <permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK" 2049 android:protectionLevel="signature|privileged" /> 2050 2051 <!-- @SystemApi Allows an application to install and/or uninstall CA certificates on 2052 behalf of the user. 2053 @hide --> 2054 <permission android:name="android.permission.MANAGE_CA_CERTIFICATES" 2055 android:protectionLevel="signature|privileged" /> 2056 2057 <!-- @SystemApi Allows an application to do certain operations needed for 2058 interacting with the recovery (system update) system. 2059 @hide --> 2060 <permission android:name="android.permission.RECOVERY" 2061 android:protectionLevel="signature|privileged" /> 2062 2063 <!-- Allows the system to bind to an application's task services 2064 @hide --> 2065 <permission android:name="android.permission.BIND_JOB_SERVICE" 2066 android:protectionLevel="signature" /> 2067 <uses-permission android:name="android.permission.BIND_JOB_SERVICE"/> 2068 2069 <!-- Allows an application to initiate configuration updates 2070 <p>An application requesting this permission is responsible for 2071 verifying the source and integrity of any update before passing 2072 it off to the various individual installer components 2073 @hide --> 2074 <permission android:name="android.permission.UPDATE_CONFIG" 2075 android:protectionLevel="signature|privileged" /> 2076 2077 <!-- Allows the system to reset throttling in shortcut manager. 2078 @hide --> 2079 <permission android:name="android.permission.RESET_SHORTCUT_MANAGER_THROTTLING" 2080 android:protectionLevel="signature" /> 2081 2082 <!-- Allows the system to bind to the discovered Network Recommendation Service. 2083 @SystemApi @hide --> 2084 <permission android:name="android.permission.BIND_NETWORK_RECOMMENDATION_SERVICE" 2085 android:protectionLevel="signature" /> 2086 <uses-permission android:name="android.permission.BIND_NETWORK_RECOMMENDATION_SERVICE"/> 2087 2088 <!-- ========================================= --> 2089 <!-- Permissions for special development tools --> 2090 <!-- ========================================= --> 2091 <eat-comment /> 2092 2093 <!-- @SystemApi Allows an application to read or write the secure system settings. 2094 <p>Not for use by third-party applications. --> 2095 <permission android:name="android.permission.WRITE_SECURE_SETTINGS" 2096 android:protectionLevel="signature|privileged|development" /> 2097 2098 <!-- @SystemApi Allows an application to retrieve state dump information from system services. 2099 <p>Not for use by third-party applications. --> 2100 <permission android:name="android.permission.DUMP" 2101 android:protectionLevel="signature|privileged|development" /> 2102 2103 <!-- @SystemApi Allows an application to read the low-level system log files. 2104 <p>Not for use by third-party applications, because 2105 Log entries can contain the user's private information. --> 2106 <permission android:name="android.permission.READ_LOGS" 2107 android:protectionLevel="signature|privileged|development" /> 2108 2109 <!-- @SystemApi Configure an application for debugging. 2110 <p>Not for use by third-party applications. --> 2111 <permission android:name="android.permission.SET_DEBUG_APP" 2112 android:protectionLevel="signature|privileged|development" /> 2113 2114 <!-- @SystemApi Allows an application to set the maximum number of (not needed) 2115 application processes that can be running. 2116 <p>Not for use by third-party applications. --> 2117 <permission android:name="android.permission.SET_PROCESS_LIMIT" 2118 android:protectionLevel="signature|privileged|development" /> 2119 2120 <!-- @SystemApi Allows an application to control whether activities are immediately 2121 finished when put in the background. 2122 <p>Not for use by third-party applications. --> 2123 <permission android:name="android.permission.SET_ALWAYS_FINISH" 2124 android:protectionLevel="signature|privileged|development" /> 2125 2126 <!-- @SystemApi Allow an application to request that a signal be sent to all persistent processes. 2127 <p>Not for use by third-party applications. --> 2128 <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES" 2129 android:protectionLevel="signature|privileged|development" /> 2130 2131 <!-- ==================================== --> 2132 <!-- Private permissions --> 2133 <!-- ==================================== --> 2134 <eat-comment /> 2135 2136 <!-- @SystemApi Allows access to the list of accounts in the Accounts Service. --> 2137 <permission android:name="android.permission.GET_ACCOUNTS_PRIVILEGED" 2138 android:protectionLevel="signature|privileged" /> 2139 2140 <!-- Allows but does not guarantee access to user passwords at the conclusion of add account 2141 @hide --> 2142 <permission android:name="android.permission.GET_PASSWORD" 2143 android:protectionLevel="signature" /> 2144 2145 <!-- @SystemApi Allows applications to RW to diagnostic resources. 2146 <p>Not for use by third-party applications. --> 2147 <permission android:name="android.permission.DIAGNOSTIC" 2148 android:protectionLevel="signature" /> 2149 2150 <!-- @SystemApi Allows an application to open, close, or disable the status bar 2151 and its icons. 2152 <p>Not for use by third-party applications. --> 2153 <permission android:name="android.permission.STATUS_BAR" 2154 android:protectionLevel="signature|privileged" /> 2155 2156 <!-- Allows an application to be the status bar. Currently used only by SystemUI.apk 2157 @hide --> 2158 <permission android:name="android.permission.STATUS_BAR_SERVICE" 2159 android:protectionLevel="signature" /> 2160 2161 <!-- Allows an application to bind to third party quick settings tiles. 2162 <p>Should only be requested by the System, should be required by 2163 TileService declarations.--> 2164 <permission android:name="android.permission.BIND_QUICK_SETTINGS_TILE" 2165 android:protectionLevel="signature" /> 2166 2167 <!-- @SystemApi Allows an application to force a BACK operation on whatever is the 2168 top activity. 2169 <p>Not for use by third-party applications. 2170 @hide 2171 --> 2172 <permission android:name="android.permission.FORCE_BACK" 2173 android:protectionLevel="signature" /> 2174 2175 <!-- @SystemApi Allows an application to update device statistics. 2176 <p>Not for use by third-party applications. --> 2177 <permission android:name="android.permission.UPDATE_DEVICE_STATS" 2178 android:protectionLevel="signature|privileged" /> 2179 2180 <!-- @SystemApi @hide Allows an application to collect battery statistics --> 2181 <permission android:name="android.permission.GET_APP_OPS_STATS" 2182 android:protectionLevel="signature|privileged|development" /> 2183 2184 <!-- @SystemApi Allows an application to update application operation statistics. Not for 2185 use by third party apps. 2186 @hide --> 2187 <permission android:name="android.permission.UPDATE_APP_OPS_STATS" 2188 android:protectionLevel="signature|privileged|installer" /> 2189 2190 <!-- @SystemApi Allows an application to update the user app op restrictions. 2191 Not for use by third party apps. 2192 @hide --> 2193 <permission android:name="android.permission.MANAGE_APP_OPS_RESTRICTIONS" 2194 android:protectionLevel="signature|installer" /> 2195 2196 <!-- @SystemApi Allows an application to open windows that are for use by parts 2197 of the system user interface. 2198 <p>Not for use by third-party applications. 2199 @hide 2200 --> 2201 <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW" 2202 android:protectionLevel="signature" /> 2203 2204 <!-- @SystemApi Allows an application to manage (create, destroy, 2205 Z-order) application tokens in the window manager. 2206 <p>Not for use by third-party applications. 2207 @hide 2208 --> 2209 <permission android:name="android.permission.MANAGE_APP_TOKENS" 2210 android:protectionLevel="signature" /> 2211 2212 <!-- Allows System UI to register listeners for events from Window Manager. 2213 @hide --> 2214 <permission android:name="android.permission.REGISTER_WINDOW_MANAGER_LISTENERS" 2215 android:protectionLevel="signature" /> 2216 2217 <!-- @hide Allows the application to temporarily freeze the screen for a 2218 full-screen transition. --> 2219 <permission android:name="android.permission.FREEZE_SCREEN" 2220 android:protectionLevel="signature" /> 2221 2222 <!-- @SystemApi Allows an application to inject user events (keys, touch, trackball) 2223 into the event stream and deliver them to ANY window. Without this 2224 permission, you can only deliver events to windows in your own process. 2225 <p>Not for use by third-party applications. 2226 @hide 2227 --> 2228 <permission android:name="android.permission.INJECT_EVENTS" 2229 android:protectionLevel="signature" /> 2230 2231 <!-- @hide Allows an application to register an input filter which filters the stream 2232 of user events (keys, touch, trackball) before they are dispatched to any window. --> 2233 <permission android:name="android.permission.FILTER_EVENTS" 2234 android:protectionLevel="signature" /> 2235 2236 <!-- @hide Allows an application to retrieve the window token from the accessibility manager. --> 2237 <permission android:name="android.permission.RETRIEVE_WINDOW_TOKEN" 2238 android:protectionLevel="signature" /> 2239 2240 <!-- @hide Allows an application to collect frame statistics --> 2241 <permission android:name="android.permission.FRAME_STATS" 2242 android:protectionLevel="signature" /> 2243 2244 <!-- @hide Allows an application to temporary enable accessibility on the device. --> 2245 <permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY" 2246 android:protectionLevel="signature" /> 2247 2248 <!-- @SystemApi Allows an application to watch and control how activities are 2249 started globally in the system. Only for is in debugging 2250 (usually the monkey command). 2251 <p>Not for use by third-party applications. 2252 @hide 2253 --> 2254 <permission android:name="android.permission.SET_ACTIVITY_WATCHER" 2255 android:protectionLevel="signature" /> 2256 2257 <!-- @SystemApi Allows an application to call the activity manager shutdown() API 2258 to put the higher-level system there into a shutdown state. 2259 @hide --> 2260 <permission android:name="android.permission.SHUTDOWN" 2261 android:protectionLevel="signature|privileged" /> 2262 2263 <!-- @SystemApi Allows an application to tell the activity manager to temporarily 2264 stop application switches, putting it into a special mode that 2265 prevents applications from immediately switching away from some 2266 critical UI such as the home screen. 2267 @hide --> 2268 <permission android:name="android.permission.STOP_APP_SWITCHES" 2269 android:protectionLevel="signature|privileged" /> 2270 2271 <!-- @SystemApi Allows an application to retrieve private information about 2272 the current top activity, such as any assist context it can provide. 2273 <p>Not for use by third-party applications. 2274 @hide 2275 --> 2276 <permission android:name="android.permission.GET_TOP_ACTIVITY_INFO" 2277 android:protectionLevel="signature" /> 2278 2279 <!-- Allows an application to retrieve the current state of keys and 2280 switches. 2281 <p>Not for use by third-party applications. 2282 @deprecated The API that used this permission has been removed. --> 2283 <permission android:name="android.permission.READ_INPUT_STATE" 2284 android:protectionLevel="signature" /> 2285 2286 <!-- Must be required by an {@link android.inputmethodservice.InputMethodService}, 2287 to ensure that only the system can bind to it. 2288 <p>Protection level: signature 2289 --> 2290 <permission android:name="android.permission.BIND_INPUT_METHOD" 2291 android:protectionLevel="signature" /> 2292 2293 <!-- Must be required by an {@link android.media.midi.MidiDeviceService}, 2294 to ensure that only the system can bind to it. 2295 <p>Protection level: signature 2296 --> 2297 <permission android:name="android.permission.BIND_MIDI_DEVICE_SERVICE" 2298 android:protectionLevel="signature" /> 2299 2300 <!-- Must be required by an {@link android.accessibilityservice.AccessibilityService}, 2301 to ensure that only the system can bind to it. 2302 <p>Protection level: signature 2303 --> 2304 <permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE" 2305 android:protectionLevel="signature" /> 2306 2307 <!-- Must be required by a {@link android.printservice.PrintService}, 2308 to ensure that only the system can bind to it. 2309 <p>Protection level: signature 2310 --> 2311 <permission android:name="android.permission.BIND_PRINT_SERVICE" 2312 android:protectionLevel="signature" /> 2313 2314 <!-- Must be required by a {@link android.printservice.recommendation.RecommendationService}, 2315 to ensure that only the system can bind to it. 2316 @hide 2317 @SystemApi 2318 <p>Protection level: signature 2319 --> 2320 <permission android:name="android.permission.BIND_PRINT_RECOMMENDATION_SERVICE" 2321 android:protectionLevel="signature" /> 2322 2323 <!-- Must be required by a {@link android.nfc.cardemulation.HostApduService} 2324 or {@link android.nfc.cardemulation.OffHostApduService} to ensure that only 2325 the system can bind to it. 2326 <p>Protection level: signature 2327 --> 2328 <permission android:name="android.permission.BIND_NFC_SERVICE" 2329 android:protectionLevel="signature" /> 2330 2331 <!-- Must be required by the PrintSpooler to ensure that only the system can bind to it. 2332 @hide --> 2333 <permission android:name="android.permission.BIND_PRINT_SPOOLER_SERVICE" 2334 android:protectionLevel="signature" /> 2335 2336 <!-- @SystemApi Must be required by the RuntimePermissionPresenterService to ensure 2337 that only the system can bind to it. 2338 @hide --> 2339 <permission android:name="android.permission.BIND_RUNTIME_PERMISSION_PRESENTER_SERVICE" 2340 android:protectionLevel="signature" /> 2341 2342 <!-- Must be required by a TextService (e.g. SpellCheckerService) 2343 to ensure that only the system can bind to it. 2344 <p>Protection level: signature 2345 --> 2346 <permission android:name="android.permission.BIND_TEXT_SERVICE" 2347 android:protectionLevel="signature" /> 2348 2349 <!-- Must be required by a {@link android.net.VpnService}, 2350 to ensure that only the system can bind to it. 2351 <p>Protection level: signature 2352 --> 2353 <permission android:name="android.permission.BIND_VPN_SERVICE" 2354 android:protectionLevel="signature" /> 2355 2356 <!-- Must be required by a {@link android.service.wallpaper.WallpaperService}, 2357 to ensure that only the system can bind to it. 2358 <p>Protection level: system|signature 2359 --> 2360 <permission android:name="android.permission.BIND_WALLPAPER" 2361 android:protectionLevel="signature|privileged" /> 2362 2363 <!-- Must be required by a {@link android.service.voice.VoiceInteractionService}, 2364 to ensure that only the system can bind to it. 2365 <p>Protection level: signature 2366 --> 2367 <permission android:name="android.permission.BIND_VOICE_INTERACTION" 2368 android:protectionLevel="signature" /> 2369 2370 <!-- Must be required by a {@link android.service.autofill.AutoFillService}, 2371 to ensure that only the system can bind to it. 2372 <p>Protection level: signature 2373 --> 2374 <permission android:name="android.permission.BIND_AUTO_FILL" 2375 android:protectionLevel="signature" /> 2376 2377 <!-- Must be required by hotword enrollment application, 2378 to ensure that only the system can interact with it. 2379 @hide <p>Not for use by third-party applications.</p> --> 2380 <permission android:name="android.permission.MANAGE_VOICE_KEYPHRASES" 2381 android:protectionLevel="signature|privileged" /> 2382 2383 <!-- Must be required by a {@link com.android.media.remotedisplay.RemoteDisplayProvider}, 2384 to ensure that only the system can bind to it. 2385 @hide --> 2386 <permission android:name="android.permission.BIND_REMOTE_DISPLAY" 2387 android:protectionLevel="signature" /> 2388 2389 <!-- Must be required by a {@link android.media.tv.TvInputService} 2390 to ensure that only the system can bind to it. 2391 <p>Protection level: signature 2392 --> 2393 <permission android:name="android.permission.BIND_TV_INPUT" 2394 android:protectionLevel="signature|privileged" /> 2395 2396 <!-- @SystemApi 2397 Must be required by a {@link com.android.media.tv.remoteprovider.TvRemoteProvider} 2398 to ensure that only the system can bind to it. 2399 <p>Protection level: signature|privileged 2400 <p>Not for use by third-party applications. </p> 2401 @hide --> 2402 <permission android:name="android.permission.BIND_TV_REMOTE_SERVICE" 2403 android:protectionLevel="signature|privileged" /> 2404 2405 <!-- @SystemApi 2406 Must be required for a virtual remote controller for TV. 2407 <p>Protection level: signature|privileged 2408 <p>Not for use by third-party applications. </p> 2409 @hide --> 2410 <permission android:name="android.permission.TV_VIRTUAL_REMOTE_CONTROLLER" 2411 android:protectionLevel="signature|privileged" /> 2412 2413 <!-- @SystemApi Allows an application to modify parental controls 2414 <p>Not for use by third-party applications. 2415 @hide --> 2416 <permission android:name="android.permission.MODIFY_PARENTAL_CONTROLS" 2417 android:protectionLevel="signature|privileged" /> 2418 2419 <!-- Must be required by a {@link android.media.routing.MediaRouteService} 2420 to ensure that only the system can interact with it. 2421 @hide --> 2422 <permission android:name="android.permission.BIND_ROUTE_PROVIDER" 2423 android:protectionLevel="signature" /> 2424 2425 <!-- Must be required by device administration receiver, to ensure that only the 2426 system can interact with it. 2427 <p>Protection level: signature 2428 --> 2429 <permission android:name="android.permission.BIND_DEVICE_ADMIN" 2430 android:protectionLevel="signature" /> 2431 2432 <!-- @SystemApi Required to add or remove another application as a device admin. 2433 <p>Not for use by third-party applications. 2434 @hide --> 2435 <permission android:name="android.permission.MANAGE_DEVICE_ADMINS" 2436 android:protectionLevel="signature|privileged" /> 2437 2438 <!-- @SystemApi Allows low-level access to setting the orientation (actually 2439 rotation) of the screen. 2440 <p>Not for use by third-party applications. 2441 @hide 2442 --> 2443 <permission android:name="android.permission.SET_ORIENTATION" 2444 android:protectionLevel="signature" /> 2445 2446 <!-- @SystemApi Allows low-level access to setting the pointer speed. 2447 <p>Not for use by third-party applications. 2448 @hide 2449 --> 2450 <permission android:name="android.permission.SET_POINTER_SPEED" 2451 android:protectionLevel="signature" /> 2452 2453 <!-- Allows low-level access to setting input device calibration. 2454 <p>Not for use by normal applications. 2455 @hide --> 2456 <permission android:name="android.permission.SET_INPUT_CALIBRATION" 2457 android:protectionLevel="signature" /> 2458 2459 <!-- Allows low-level access to setting the keyboard layout. 2460 <p>Not for use by third-party applications. 2461 @hide --> 2462 <permission android:name="android.permission.SET_KEYBOARD_LAYOUT" 2463 android:protectionLevel="signature" /> 2464 2465 <!-- Allows an application to query tablet mode state and monitor changes 2466 in it. 2467 <p>Not for use by third-party applications. 2468 @hide --> 2469 <permission android:name="android.permission.TABLET_MODE" 2470 android:protectionLevel="signature" /> 2471 2472 <!-- Allows an application to request installing packages. Apps 2473 targeting APIs greater than 22 must hold this permission in 2474 order to use {@link android.content.Intent#ACTION_INSTALL_PACKAGE}. 2475 <p>Protection level: normal 2476 --> 2477 <permission android:name="android.permission.REQUEST_INSTALL_PACKAGES" 2478 android:label="@string/permlab_requestInstallPackages" 2479 android:description="@string/permdesc_requestInstallPackages" 2480 android:protectionLevel="normal" /> 2481 2482 <!-- @SystemApi Allows an application to install packages. 2483 <p>Not for use by third-party applications. --> 2484 <permission android:name="android.permission.INSTALL_PACKAGES" 2485 android:protectionLevel="signature|privileged" /> 2486 2487 <!-- @SystemApi Allows an application to clear user data. 2488 <p>Not for use by third-party applications 2489 @hide 2490 --> 2491 <permission android:name="android.permission.CLEAR_APP_USER_DATA" 2492 android:protectionLevel="signature|installer" /> 2493 2494 <!-- @hide Allows an application to get the URI permissions 2495 granted to another application. 2496 <p>Not for use by third-party applications 2497 --> 2498 <permission android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS" 2499 android:protectionLevel="signature" /> 2500 2501 <!-- @hide Allows an application to clear the URI permissions 2502 granted to another application. 2503 <p>Not for use by third-party applications 2504 --> 2505 <permission 2506 android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS" 2507 android:protectionLevel="signature" /> 2508 2509 <!-- @SystemApi Allows an application to delete cache files. 2510 <p>Not for use by third-party applications. --> 2511 <permission android:name="android.permission.DELETE_CACHE_FILES" 2512 android:protectionLevel="signature|privileged" /> 2513 2514 <!-- @SystemApi Allows an application to delete packages. 2515 <p>Not for use by third-party applications. 2516 <p>Starting in {@link android.os.Build.VERSION_CODES#N}, user confirmation is requested 2517 when the application deleting the package is not the same application that installed the 2518 package. --> 2519 <permission android:name="android.permission.DELETE_PACKAGES" 2520 android:protectionLevel="signature|privileged" /> 2521 2522 <!-- @SystemApi Allows an application to move location of installed package. 2523 @hide --> 2524 <permission android:name="android.permission.MOVE_PACKAGE" 2525 android:protectionLevel="signature|privileged" /> 2526 2527 <!-- @SystemApi Allows an application to change whether an application component (other than its own) is 2528 enabled or not. 2529 <p>Not for use by third-party applications. --> 2530 <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE" 2531 android:protectionLevel="signature|privileged" /> 2532 2533 <!-- @SystemApi Allows an application to grant specific permissions. 2534 @hide --> 2535 <permission android:name="android.permission.GRANT_RUNTIME_PERMISSIONS" 2536 android:protectionLevel="signature|installer|verifier" /> 2537 2538 <!-- @SystemApi Allows an app that has this permission and the permissions to install packages 2539 to request certain runtime permissions to be granted at installation. 2540 @hide --> 2541 <permission android:name="android.permission.INSTALL_GRANT_RUNTIME_PERMISSIONS" 2542 android:protectionLevel="signature|installer|verifier" /> 2543 2544 <!-- @SystemApi Allows an application to revoke specific permissions. 2545 @hide --> 2546 <permission android:name="android.permission.REVOKE_RUNTIME_PERMISSIONS" 2547 android:protectionLevel="signature|installer|verifier" /> 2548 2549 <!-- @hide Allows an application to observe permission changes. --> 2550 <permission android:name="android.permission.OBSERVE_GRANT_REVOKE_PERMISSIONS" 2551 android:protectionLevel="signature|privileged" /> 2552 2553 <!-- @SystemApi Allows an application to use SurfaceFlinger's low level features. 2554 <p>Not for use by third-party applications. 2555 @hide 2556 --> 2557 <permission android:name="android.permission.ACCESS_SURFACE_FLINGER" 2558 android:protectionLevel="signature" /> 2559 2560 <!-- @SystemApi Allows an application to take screen shots and more generally 2561 get access to the frame buffer data. 2562 <p>Not for use by third-party applications. --> 2563 <permission android:name="android.permission.READ_FRAME_BUFFER" 2564 android:protectionLevel="signature|privileged" /> 2565 2566 <!-- Allows an application to use InputFlinger's low level features. 2567 @hide --> 2568 <permission android:name="android.permission.ACCESS_INPUT_FLINGER" 2569 android:protectionLevel="signature" /> 2570 2571 <!-- Allows an application to configure and connect to Wifi displays 2572 @hide --> 2573 <permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY" 2574 android:protectionLevel="signature" /> 2575 2576 <!-- Allows an application to control low-level features of Wifi displays 2577 such as opening an RTSP socket. This permission should only be used 2578 by the display manager. 2579 @hide --> 2580 <permission android:name="android.permission.CONTROL_WIFI_DISPLAY" 2581 android:protectionLevel="signature" /> 2582 2583 <!-- Allows an application to control the color modes set for displays system-wide. 2584 <p>Not for use by third-party applications.</p> 2585 @hide --> 2586 <permission android:name="android.permission.CONFIGURE_DISPLAY_COLOR_MODE" 2587 android:protectionLevel="signature" /> 2588 2589 <!-- @SystemApi Allows an application to control VPN. 2590 <p>Not for use by third-party applications.</p> 2591 @hide --> 2592 <permission android:name="android.permission.CONTROL_VPN" 2593 android:protectionLevel="signature|privileged" /> 2594 <uses-permission android:name="android.permission.CONTROL_VPN" /> 2595 2596 <!-- @SystemApi Allows an application to capture audio output. 2597 <p>Not for use by third-party applications.</p> --> 2598 <permission android:name="android.permission.CAPTURE_AUDIO_OUTPUT" 2599 android:protectionLevel="signature|privileged" /> 2600 2601 <!-- @SystemApi Allows an application to capture audio for hotword detection. 2602 <p>Not for use by third-party applications.</p> 2603 @hide --> 2604 <permission android:name="android.permission.CAPTURE_AUDIO_HOTWORD" 2605 android:protectionLevel="signature|privileged" /> 2606 2607 <!-- @SystemApi Allows an application to modify audio routing and override policy decisions. 2608 <p>Not for use by third-party applications.</p> 2609 @hide --> 2610 <permission android:name="android.permission.MODIFY_AUDIO_ROUTING" 2611 android:protectionLevel="signature|privileged" /> 2612 2613 <!-- @SystemApi Allows an application to capture video output. 2614 <p>Not for use by third-party applications.</p> --> 2615 <permission android:name="android.permission.CAPTURE_VIDEO_OUTPUT" 2616 android:protectionLevel="signature|privileged" /> 2617 2618 <!-- @SystemApi Allows an application to capture secure video output. 2619 <p>Not for use by third-party applications.</p> --> 2620 <permission android:name="android.permission.CAPTURE_SECURE_VIDEO_OUTPUT" 2621 android:protectionLevel="signature|privileged" /> 2622 2623 <!-- @SystemApi Allows an application to know what content is playing and control its playback. 2624 <p>Not for use by third-party applications due to privacy of media consumption</p> --> 2625 <permission android:name="android.permission.MEDIA_CONTENT_CONTROL" 2626 android:protectionLevel="signature|privileged" /> 2627 2628 <!-- @SystemApi Required to be able to disable the device (very dangerous!). 2629 <p>Not for use by third-party applications. 2630 @hide 2631 --> 2632 <permission android:name="android.permission.BRICK" 2633 android:protectionLevel="signature" /> 2634 2635 <!-- @SystemApi Required to be able to reboot the device. 2636 <p>Not for use by third-party applications. --> 2637 <permission android:name="android.permission.REBOOT" 2638 android:protectionLevel="signature|privileged" /> 2639 2640 <!-- @SystemApi Allows low-level access to power management. 2641 <p>Not for use by third-party applications. 2642 @hide 2643 --> 2644 <permission android:name="android.permission.DEVICE_POWER" 2645 android:protectionLevel="signature" /> 2646 2647 <!-- Allows access to the PowerManager.userActivity function. 2648 <p>Not for use by third-party applications. @hide @SystemApi --> 2649 <permission android:name="android.permission.USER_ACTIVITY" 2650 android:protectionLevel="signature|privileged" /> 2651 2652 <!-- @hide Allows low-level access to tun tap driver --> 2653 <permission android:name="android.permission.NET_TUNNELING" 2654 android:protectionLevel="signature" /> 2655 2656 <!-- Run as a manufacturer test application, running as the root user. 2657 Only available when the device is running in manufacturer test mode. 2658 <p>Not for use by third-party applications. 2659 --> 2660 <permission android:name="android.permission.FACTORY_TEST" 2661 android:protectionLevel="signature" /> 2662 2663 <!-- Allows an application to broadcast a notification that an application 2664 package has been removed. 2665 <p>Not for use by third-party applications. 2666 --> 2667 <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED" 2668 android:protectionLevel="signature" /> 2669 2670 <!-- Allows an application to broadcast an SMS receipt notification. 2671 <p>Not for use by third-party applications. 2672 --> 2673 <permission android:name="android.permission.BROADCAST_SMS" 2674 android:protectionLevel="signature" /> 2675 2676 <!-- Allows an application to broadcast a WAP PUSH receipt notification. 2677 <p>Not for use by third-party applications. 2678 --> 2679 <permission android:name="android.permission.BROADCAST_WAP_PUSH" 2680 android:protectionLevel="signature" /> 2681 2682 <!-- @SystemApi Allows an application to broadcast privileged networking requests. 2683 <p>Not for use by third-party applications. 2684 @hide 2685 @deprecated Use {@link android.Manifest.permission#REQUEST_NETWORK_SCORES} instead 2686 --> 2687 <permission android:name="android.permission.BROADCAST_NETWORK_PRIVILEGED" 2688 android:protectionLevel="signature|privileged" /> 2689 2690 <!-- @SystemApi Not for use by third-party applications. --> 2691 <permission android:name="android.permission.MASTER_CLEAR" 2692 android:protectionLevel="signature|privileged" /> 2693 2694 <!-- @SystemApi Allows an application to call any phone number, including emergency 2695 numbers, without going through the Dialer user interface for the user 2696 to confirm the call being placed. 2697 <p>Not for use by third-party applications. --> 2698 <permission android:name="android.permission.CALL_PRIVILEGED" 2699 android:protectionLevel="signature|privileged" /> 2700 2701 <!-- @SystemApi Allows an application to perform CDMA OTA provisioning @hide --> 2702 <permission android:name="android.permission.PERFORM_CDMA_PROVISIONING" 2703 android:protectionLevel="signature|privileged" /> 2704 2705 <!-- @SystemApi Allows an application to perform SIM Activation @hide --> 2706 <permission android:name="android.permission.PERFORM_SIM_ACTIVATION" 2707 android:protectionLevel="signature|privileged" /> 2708 2709 <!-- @SystemApi Allows enabling/disabling location update notifications from 2710 the radio. 2711 <p>Not for use by third-party applications. --> 2712 <permission android:name="android.permission.CONTROL_LOCATION_UPDATES" 2713 android:protectionLevel="signature|privileged" /> 2714 2715 <!-- @SystemApi Allows read/write access to the "properties" table in the checkin 2716 database, to change values that get uploaded. 2717 <p>Not for use by third-party applications. --> 2718 <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES" 2719 android:protectionLevel="signature|privileged" /> 2720 2721 <!-- @SystemApi Allows an application to collect component usage 2722 statistics 2723 <p>Declaring the permission implies intention to use the API and the user of the 2724 device can grant permission through the Settings application. --> 2725 <permission android:name="android.permission.PACKAGE_USAGE_STATS" 2726 android:protectionLevel="signature|privileged|development|appop" /> 2727 <uses-permission android:name="android.permission.PACKAGE_USAGE_STATS" /> 2728 2729 <!-- @hide Allows an application to change the app idle state of an app. 2730 <p>Not for use by third-party applications. --> 2731 <permission android:name="android.permission.CHANGE_APP_IDLE_STATE" 2732 android:protectionLevel="signature" /> 2733 2734 <!-- @hide @SystemApi Allows an application to temporarily whitelist an inactive app to 2735 access the network and acquire wakelocks. 2736 <p>Not for use by third-party applications. --> 2737 <permission android:name="android.permission.CHANGE_DEVICE_IDLE_TEMP_WHITELIST" 2738 android:protectionLevel="signature|privileged" /> 2739 2740 <!-- Permission an application must hold in order to use 2741 {@link android.provider.Settings#ACTION_REQUEST_IGNORE_BATTERY_OPTIMIZATIONS}. 2742 This is a normal permission: an app requesting it will always be granted the 2743 permission, without the user needing to approve or see it. --> 2744 <permission android:name="android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS" 2745 android:label="@string/permlab_requestIgnoreBatteryOptimizations" 2746 android:description="@string/permdesc_requestIgnoreBatteryOptimizations" 2747 android:protectionLevel="normal" /> 2748 2749 <!-- @SystemApi Allows an application to collect battery statistics --> 2750 <permission android:name="android.permission.BATTERY_STATS" 2751 android:protectionLevel="signature|privileged|development" /> 2752 2753 <!-- @SystemApi Allows an application to control the backup and restore process. 2754 <p>Not for use by third-party applications. 2755 @hide pending API council --> 2756 <permission android:name="android.permission.BACKUP" 2757 android:protectionLevel="signature|privileged" /> 2758 2759 <!-- Allows a package to launch the secure full-backup confirmation UI. 2760 ONLY the system process may hold this permission. 2761 @hide --> 2762 <permission android:name="android.permission.CONFIRM_FULL_BACKUP" 2763 android:protectionLevel="signature" /> 2764 2765 <!-- @SystemApi Must be required by a {@link android.widget.RemoteViewsService}, 2766 to ensure that only the system can bind to it. --> 2767 <permission android:name="android.permission.BIND_REMOTEVIEWS" 2768 android:protectionLevel="signature|privileged" /> 2769 2770 <!-- @SystemApi Allows an application to tell the AppWidget service which application 2771 can access AppWidget's data. The normal user flow is that a user 2772 picks an AppWidget to go into a particular host, thereby giving that 2773 host application access to the private data from the AppWidget app. 2774 An application that has this permission should honor that contract. 2775 <p>Not for use by third-party applications. --> 2776 <permission android:name="android.permission.BIND_APPWIDGET" 2777 android:protectionLevel="signature|privileged" /> 2778 2779 <!-- @SystemApi Private permission, to restrict who can bring up a dialog to add a new 2780 keyguard widget 2781 @hide --> 2782 <permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET" 2783 android:protectionLevel="signature|privileged" /> 2784 2785 <!-- @SystemApi Internal permission allowing an application to query/set which 2786 applications can bind AppWidgets. 2787 @hide --> 2788 <permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS" 2789 android:protectionLevel="signature|privileged" /> 2790 2791 <!-- Allows applications to change the background data setting. 2792 <p>Not for use by third-party applications. 2793 @hide pending API council --> 2794 <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING" 2795 android:protectionLevel="signature" /> 2796 2797 <!-- @SystemApi This permission can be used on content providers to allow the global 2798 search system to access their data. Typically it used when the 2799 provider has some permissions protecting it (which global search 2800 would not be expected to hold), and added as a read-only permission 2801 to the path in the provider where global search queries are 2802 performed. This permission can not be held by regular applications; 2803 it is used by applications to protect themselves from everyone else 2804 besides global search. --> 2805 <permission android:name="android.permission.GLOBAL_SEARCH" 2806 android:protectionLevel="signature|privileged" /> 2807 2808 <!-- Internal permission protecting access to the global search 2809 system: ensures that only the system can access the provider 2810 to perform queries (since this otherwise provides unrestricted 2811 access to a variety of content providers), and to write the 2812 search statistics (to keep applications from gaming the source 2813 ranking). 2814 @hide --> 2815 <permission android:name="android.permission.GLOBAL_SEARCH_CONTROL" 2816 android:protectionLevel="signature" /> 2817 2818 <!-- @SystemApi Internal permission to allows an application to read indexable data. 2819 @hide --> 2820 <permission android:name="android.permission.READ_SEARCH_INDEXABLES" 2821 android:protectionLevel="signature|privileged" /> 2822 2823 <!-- @SystemApi Allows applications to set a live wallpaper. 2824 @hide XXX Change to signature once the picker is moved to its 2825 own apk as Ghod Intended. --> 2826 <permission android:name="android.permission.SET_WALLPAPER_COMPONENT" 2827 android:protectionLevel="signature|privileged" /> 2828 2829 <!-- @SystemApi Allows applications to read dream settings and dream state. 2830 @hide --> 2831 <permission android:name="android.permission.READ_DREAM_STATE" 2832 android:protectionLevel="signature|privileged" /> 2833 2834 <!-- @SystemApi Allows applications to write dream settings, and start or stop dreaming. 2835 @hide --> 2836 <permission android:name="android.permission.WRITE_DREAM_STATE" 2837 android:protectionLevel="signature|privileged" /> 2838 2839 <!-- @SystemApi Allow an application to read and write the cache partition. 2840 @hide --> 2841 <permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM" 2842 android:protectionLevel="signature|privileged" /> 2843 2844 <!-- Must be required by default container service so that only 2845 the system can bind to it and use it to copy 2846 protected data to secure containers or files 2847 accessible to the system. 2848 @hide --> 2849 <permission android:name="android.permission.COPY_PROTECTED_DATA" 2850 android:protectionLevel="signature" /> 2851 2852 <!-- @SystemApi Internal permission protecting access to the encryption methods 2853 @hide 2854 --> 2855 <permission android:name="android.permission.CRYPT_KEEPER" 2856 android:protectionLevel="signature|privileged" /> 2857 2858 <!-- @SystemApi Allows an application to read historical network usage for 2859 specific networks and applications. @hide --> 2860 <permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY" 2861 android:protectionLevel="signature|privileged" /> 2862 2863 <!-- Allows an application to manage network policies (such as warning and disable 2864 limits) and to define application-specific rules. @hide --> 2865 <permission android:name="android.permission.MANAGE_NETWORK_POLICY" 2866 android:protectionLevel="signature" /> 2867 2868 <!-- @SystemApi Allows an application to account its network traffic against other UIDs. Used 2869 by system services like download manager and media server. Not for use by 2870 third party apps. @hide --> 2871 <permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING" 2872 android:protectionLevel="signature|privileged" /> 2873 2874 <!-- C2DM permission. 2875 @hide Used internally. 2876 --> 2877 <permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE" 2878 android:protectionLevel="signature" /> 2879 <uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/> 2880 2881 <!-- @SystemApi @hide Package verifier needs to have this permission before the PackageManager will 2882 trust it to verify packages. 2883 --> 2884 <permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT" 2885 android:protectionLevel="signature|privileged" /> 2886 2887 <!-- Must be required by package verifier receiver, to ensure that only the 2888 system can interact with it. 2889 @hide 2890 --> 2891 <permission android:name="android.permission.BIND_PACKAGE_VERIFIER" 2892 android:protectionLevel="signature" /> 2893 2894 <!-- @SystemApi @hide Intent filter verifier needs to have this permission before the 2895 PackageManager will trust it to verify intent filters. 2896 --> 2897 <permission android:name="android.permission.INTENT_FILTER_VERIFICATION_AGENT" 2898 android:protectionLevel="signature|privileged" /> 2899 2900 <!-- Must be required by intent filter verifier receiver, to ensure that only the 2901 system can interact with it. 2902 @hide 2903 --> 2904 <permission android:name="android.permission.BIND_INTENT_FILTER_VERIFIER" 2905 android:protectionLevel="signature" /> 2906 2907 <!-- @SystemApi Allows applications to access serial ports via the SerialManager. 2908 @hide --> 2909 <permission android:name="android.permission.SERIAL_PORT" 2910 android:protectionLevel="signature|privileged" /> 2911 2912 <!-- Allows the holder to access content providers from outside an ApplicationThread. 2913 This permission is enforced by the ActivityManagerService on the corresponding APIs, 2914 in particular ActivityManagerService#getContentProviderExternal(String) and 2915 ActivityManagerService#removeContentProviderExternal(String). 2916 @hide 2917 --> 2918 <permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY" 2919 android:protectionLevel="signature" /> 2920 2921 <!-- @SystemApi Allows an application to hold an UpdateLock, recommending that a headless 2922 OTA reboot *not* occur while the lock is held. 2923 @hide --> 2924 <permission android:name="android.permission.UPDATE_LOCK" 2925 android:protectionLevel="signature|privileged" /> 2926 2927 <!-- @SystemApi Allows an application to read the current set of notifications, including 2928 any metadata and intents attached. 2929 @hide --> 2930 <permission android:name="android.permission.ACCESS_NOTIFICATIONS" 2931 android:protectionLevel="signature|privileged" /> 2932 2933 <!-- Marker permission for applications that wish to access notification policy. 2934 <p>Protection level: normal 2935 --> 2936 <permission android:name="android.permission.ACCESS_NOTIFICATION_POLICY" 2937 android:description="@string/permdesc_access_notification_policy" 2938 android:label="@string/permlab_access_notification_policy" 2939 android:protectionLevel="normal" /> 2940 2941 <!-- Allows modification of do not disturb rules and policies. Only allowed for system 2942 processes. 2943 @hide --> 2944 <permission android:name="android.permission.MANAGE_NOTIFICATIONS" 2945 android:protectionLevel="signature" /> 2946 2947 <!-- Allows access to keyguard secure storage. Only allowed for system processes. 2948 @hide --> 2949 <permission android:name="android.permission.ACCESS_KEYGUARD_SECURE_STORAGE" 2950 android:protectionLevel="signature" /> 2951 2952 <!-- Allows managing (adding, removing) fingerprint templates. Reserved for the system. @hide --> 2953 <permission android:name="android.permission.MANAGE_FINGERPRINT" 2954 android:protectionLevel="signature|privileged" /> 2955 2956 <!-- Allows an app to reset fingerprint attempt counter. Reserved for the system. @hide --> 2957 <permission android:name="android.permission.RESET_FINGERPRINT_LOCKOUT" 2958 android:protectionLevel="signature" /> 2959 2960 <!-- Allows an application to control keyguard. Only allowed for system processes. 2961 @hide --> 2962 <permission android:name="android.permission.CONTROL_KEYGUARD" 2963 android:protectionLevel="signature" /> 2964 2965 <!-- Allows an application to listen to trust changes. Only allowed for system processes. 2966 @hide --> 2967 <permission android:name="android.permission.TRUST_LISTENER" 2968 android:protectionLevel="signature" /> 2969 2970 <!-- @SystemApi Allows an application to provide a trust agent. 2971 @hide For security reasons, this is a platform-only permission. --> 2972 <permission android:name="android.permission.PROVIDE_TRUST_AGENT" 2973 android:protectionLevel="signature|privileged" /> 2974 2975 <!-- Allows an application to launch the trust agent settings activity. 2976 @hide --> 2977 <permission android:name="android.permission.LAUNCH_TRUST_AGENT_SETTINGS" 2978 android:protectionLevel="signature|privileged" /> 2979 2980 <!-- @SystemApi Must be required by an {@link 2981 android.service.trust.TrustAgentService}, 2982 to ensure that only the system can bind to it. 2983 @hide --> 2984 <permission android:name="android.permission.BIND_TRUST_AGENT" 2985 android:protectionLevel="signature" /> 2986 2987 <!-- Must be required by an {@link 2988 android.service.notification.NotificationListenerService}, 2989 to ensure that only the system can bind to it. 2990 <p>Protection level: signature 2991 --> 2992 <permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE" 2993 android:protectionLevel="signature" /> 2994 2995 <!-- Must be required by an {@link 2996 android.service.notification.NotificationAssistantService to ensure that only the system 2997 can bind to it. 2998 <p>Protection level: signature 2999 --> 3000 <permission android:name="android.permission.BIND_NOTIFICATION_ASSISTANT_SERVICE" 3001 android:protectionLevel="signature" /> 3002 3003 <!-- Must be required by a {@link 3004 android.service.chooser.ChooserTargetService}, to ensure that 3005 only the system can bind to it. 3006 <p>Protection level: signature 3007 --> 3008 <permission android:name="android.permission.BIND_CHOOSER_TARGET_SERVICE" 3009 android:protectionLevel="signature" /> 3010 3011 <!-- Must be required by a {@link 3012 android.service.notification.ConditionProviderService}, 3013 to ensure that only the system can bind to it. 3014 <p>Protection level: signature 3015 --> 3016 <permission android:name="android.permission.BIND_CONDITION_PROVIDER_SERVICE" 3017 android:protectionLevel="signature" /> 3018 3019 <!-- Must be required by an {@link android.service.dreams.DreamService}, 3020 to ensure that only the system can bind to it. 3021 <p>Protection level: signature 3022 --> 3023 <permission android:name="android.permission.BIND_DREAM_SERVICE" 3024 android:protectionLevel="signature" /> 3025 3026 <!-- @SystemApi Allows an application to call into a carrier setup flow. It is up to the 3027 carrier setup application to enforce that this permission is required 3028 @hide This is not a third-party API (intended for OEMs and system apps). --> 3029 <permission android:name="android.permission.INVOKE_CARRIER_SETUP" 3030 android:protectionLevel="signature|privileged" /> 3031 3032 <!-- @SystemApi Allows an application to listen for network condition observations. 3033 @hide This is not a third-party API (intended for system apps). --> 3034 <permission android:name="android.permission.ACCESS_NETWORK_CONDITIONS" 3035 android:protectionLevel="signature|privileged" /> 3036 3037 <!-- @SystemApi Allows an application to provision and access DRM certificates 3038 @hide This is not a third-party API (intended for system apps). --> 3039 <permission android:name="android.permission.ACCESS_DRM_CERTIFICATES" 3040 android:protectionLevel="signature|privileged" /> 3041 3042 <!-- Api Allows an application to manage media projection sessions. 3043 @hide This is not a third-party API (intended for system apps). --> 3044 <permission android:name="android.permission.MANAGE_MEDIA_PROJECTION" 3045 android:protectionLevel="signature" /> 3046 3047 <!-- @SystemApi Allows an application to read install sessions 3048 @hide This is not a third-party API (intended for system apps). --> 3049 <permission android:name="android.permission.READ_INSTALL_SESSIONS" 3050 android:label="@string/permlab_readInstallSessions" 3051 android:description="@string/permdesc_readInstallSessions" 3052 android:protectionLevel="normal"/> 3053 3054 <!-- @SystemApi Allows an application to remove DRM certificates 3055 @hide This is not a third-party API (intended for system apps). --> 3056 <permission android:name="android.permission.REMOVE_DRM_CERTIFICATES" 3057 android:protectionLevel="signature|privileged" /> 3058 3059 <!-- @deprecated Use {@link android.Manifest.permission#BIND_CARRIER_SERVICES} instead --> 3060 <permission android:name="android.permission.BIND_CARRIER_MESSAGING_SERVICE" 3061 android:protectionLevel="signature|privileged" /> 3062 3063 <!-- Allows an application to interact with the currently active 3064 {@link android.service.voice.VoiceInteractionService}. 3065 @hide --> 3066 <permission android:name="android.permission.ACCESS_VOICE_INTERACTION_SERVICE" 3067 android:protectionLevel="signature" /> 3068 3069 <!-- The system process that is allowed to bind to services in carrier apps will 3070 have this permission. Carrier apps should use this permission to protect 3071 their services that only the system is allowed to bind to. 3072 <p>Protection level: system|signature 3073 --> 3074 <permission android:name="android.permission.BIND_CARRIER_SERVICES" 3075 android:label="@string/permlab_bindCarrierServices" 3076 android:description="@string/permdesc_bindCarrierServices" 3077 android:protectionLevel="signature|privileged" /> 3078 3079 <!-- Allows an application to query whether DO_NOT_ASK_CREDENTIALS_ON_BOOT 3080 flag is set. 3081 @hide --> 3082 <permission android:name="android.permission.QUERY_DO_NOT_ASK_CREDENTIALS_ON_BOOT" 3083 android:protectionLevel="signature" /> 3084 3085 <!-- @SystemApi Allows applications to kill UIDs. 3086 <p>Not for use by third-party applications. 3087 @hide --> 3088 <permission android:name="android.permission.KILL_UID" 3089 android:protectionLevel="signature|installer" /> 3090 3091 <!-- @SystemApi Allows applications to read the local WiFi and Bluetooth MAC address. 3092 @hide --> 3093 <permission android:name="android.permission.LOCAL_MAC_ADDRESS" 3094 android:protectionLevel="signature|privileged" /> 3095 3096 <!-- @SystemApi Allows access to MAC addresses of WiFi and Bluetooth peer devices. 3097 @hide --> 3098 <permission android:name="android.permission.PEERS_MAC_ADDRESS" 3099 android:protectionLevel="signature|setup" /> 3100 3101 <!-- Allows the Nfc stack to dispatch Nfc messages to applications. Applications 3102 can use this permission to ensure incoming Nfc messages are from the Nfc stack 3103 and not simulated by another application. 3104 @hide --> 3105 <permission android:name="android.permission.DISPATCH_NFC_MESSAGE" 3106 android:protectionLevel="signature|privileged" /> 3107 3108 <!-- @SystemApi Allows changing day / night mode when system is configured with 3109 config_lockDayNightMode set to true. If requesting app does not have permission, 3110 it will be ignored. 3111 @hide --> 3112 <permission android:name="android.permission.MODIFY_DAY_NIGHT_MODE" 3113 android:protectionLevel="signature|privileged" /> 3114 3115 <!-- The system process is explicitly the only one allowed to launch the 3116 confirmation UI for full backup/restore --> 3117 <uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/> 3118 3119 3120 <!-- Allows the holder to access the ephemeral applications on the device. 3121 @hide --> 3122 <permission android:name="android.permission.ACCESS_EPHEMERAL_APPS" 3123 android:protectionLevel="signature" /> 3124 3125 <!-- Allows receiving the usage of media resource e.g. video/audio codec and 3126 graphic memory. 3127 @hide --> 3128 <permission android:name="android.permission.RECEIVE_MEDIA_RESOURCE_USAGE" 3129 android:protectionLevel="signature|privileged" /> 3130 3131 <!-- Must be required by system/priv apps when accessing the sound trigger 3132 APIs given by {@link SoundTriggerManager}. 3133 @hide <p>Not for use by third-party applications.</p> --> 3134 <permission android:name="android.permission.MANAGE_SOUND_TRIGGER" 3135 android:protectionLevel="signature|privileged" /> 3136 3137 <!-- @SystemApi Allows trusted applications to dispatch managed provisioning message to Managed 3138 Provisioning app. If requesting app does not have permission, it will be ignored. 3139 @hide --> 3140 <permission android:name="android.permission.DISPATCH_PROVISIONING_MESSAGE" 3141 android:protectionLevel="signature|privileged" /> 3142 3143 <!-- Allows the holder to read blocked numbers. See 3144 {@link android.provider.BlockedNumberContract}. 3145 @hide --> 3146 <permission android:name="android.permission.READ_BLOCKED_NUMBERS" 3147 android:protectionLevel="signature" /> 3148 3149 <!-- Allows the holder to write blocked numbers. See 3150 {@link android.provider.BlockedNumberContract}. 3151 @hide --> 3152 <permission android:name="android.permission.WRITE_BLOCKED_NUMBERS" 3153 android:protectionLevel="signature" /> 3154 3155 <!-- Must be required by an {@link android.service.vr.VrListenerService}, to ensure that only 3156 the system can bind to it. 3157 <p>Protection level: signature --> 3158 <permission android:name="android.permission.BIND_VR_LISTENER_SERVICE" 3159 android:protectionLevel="signature" /> 3160 3161 <!-- Required to make calls to {@link android.service.vr.IVrManager}. 3162 @hide --> 3163 <permission android:name="android.permission.ACCESS_VR_MANAGER" 3164 android:protectionLevel="signature" /> 3165 3166 <!-- Allows an application to whitelist tasks during lock task mode 3167 @hide <p>Not for use by third-party applications.</p> --> 3168 <permission android:name="android.permission.UPDATE_LOCK_TASK_PACKAGES" 3169 android:protectionLevel="signature|setup" /> 3170 3171 <!-- @SystemApi Allows an application to replace the app name displayed alongside notifications 3172 in the N-release and later. 3173 @hide <p>Not for use by third-party applications.</p> --> 3174 <permission android:name="android.permission.SUBSTITUTE_NOTIFICATION_APP_NAME" 3175 android:protectionLevel="signature|privileged" /> 3176 3177 <!-- @SystemApi Allows an application to manage auto-fill sessions. 3178 @hide <p>Not for use by third-party applications.</p> --> 3179 <permission android:name="android.permission.MANAGE_AUTO_FILL" 3180 android:protectionLevel="signature" /> 3181 3182 <!-- Allows an app to set the theme overlay in /vendor/overlay 3183 being used. 3184 @hide <p>Not for use by third-party applications.</p> --> 3185 <permission android:name="android.permission.MODIFY_THEME_OVERLAY" 3186 android:protectionLevel="signature" /> 3187 3188 <application android:process="system" 3189 android:persistent="true" 3190 android:hasCode="false" 3191 android:label="@string/android_system_label" 3192 android:allowClearUserData="false" 3193 android:backupAgent="com.android.server.backup.SystemBackupAgent" 3194 android:killAfterRestore="false" 3195 android:icon="@drawable/ic_launcher_android" 3196 android:supportsRtl="true" 3197 android:theme="@style/Theme.DeviceDefault.Light.DarkActionBar" 3198 android:defaultToDeviceProtectedStorage="true" 3199 android:directBootAware="true"> 3200 <activity android:name="com.android.internal.app.ChooserActivity" 3201 android:theme="@style/Theme.DeviceDefault.Resolver" 3202 android:finishOnCloseSystemDialogs="true" 3203 android:excludeFromRecents="true" 3204 android:documentLaunchMode="never" 3205 android:relinquishTaskIdentity="true" 3206 android:configChanges="screenSize|smallestScreenSize|screenLayout|orientation|keyboard|keyboardHidden" 3207 android:process=":ui"> 3208 <intent-filter> 3209 <action android:name="android.intent.action.CHOOSER" /> 3210 <category android:name="android.intent.category.DEFAULT" /> 3211 <category android:name="android.intent.category.VOICE" /> 3212 </intent-filter> 3213 </activity> 3214 <activity android:name="com.android.internal.app.IntentForwarderActivity" 3215 android:finishOnCloseSystemDialogs="true" 3216 android:theme="@style/Theme.NoDisplay" 3217 android:excludeFromRecents="true" 3218 android:label="@string/user_owner_label" 3219 android:exported="true" 3220 > 3221 </activity> 3222 <activity-alias android:name="com.android.internal.app.ForwardIntentToParent" 3223 android:targetActivity="com.android.internal.app.IntentForwarderActivity" 3224 android:exported="true" 3225 android:label="@string/user_owner_label"> 3226 </activity-alias> 3227 <activity-alias android:name="com.android.internal.app.ForwardIntentToManagedProfile" 3228 android:targetActivity="com.android.internal.app.IntentForwarderActivity" 3229 android:icon="@drawable/ic_corp_icon" 3230 android:exported="true" 3231 android:label="@string/managed_profile_label"> 3232 </activity-alias> 3233 <activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity" 3234 android:theme="@style/Theme.DeviceDefault.Light.Dialog" 3235 android:label="@string/heavy_weight_switcher_title" 3236 android:finishOnCloseSystemDialogs="true" 3237 android:excludeFromRecents="true" 3238 android:process=":ui"> 3239 </activity> 3240 <activity android:name="com.android.internal.app.PlatLogoActivity" 3241 android:theme="@style/Theme.Wallpaper.NoTitleBar.Fullscreen" 3242 android:configChanges="orientation|keyboardHidden" 3243 android:process=":ui"> 3244 </activity> 3245 <activity android:name="com.android.internal.app.DisableCarModeActivity" 3246 android:theme="@style/Theme.NoDisplay" 3247 android:excludeFromRecents="true" 3248 android:process=":ui"> 3249 </activity> 3250 <activity android:name="com.android.internal.app.DumpHeapActivity" 3251 android:theme="@style/Theme.Translucent.NoTitleBar" 3252 android:label="@string/dump_heap_title" 3253 android:finishOnCloseSystemDialogs="true" 3254 android:noHistory="true" 3255 android:excludeFromRecents="true" 3256 android:process=":ui"> 3257 </activity> 3258 <provider android:name="com.android.server.am.DumpHeapProvider" 3259 android:authorities="com.android.server.heapdump" 3260 android:grantUriPermissions="true" 3261 android:multiprocess="false" 3262 android:singleUser="true" /> 3263 3264 <activity android:name="android.accounts.ChooseAccountActivity" 3265 android:excludeFromRecents="true" 3266 android:exported="true" 3267 android:theme="@style/Theme.DeviceDefault.Light.Dialog" 3268 android:label="@string/choose_account_label" 3269 android:process=":ui"> 3270 </activity> 3271 3272 <activity android:name="android.accounts.ChooseTypeAndAccountActivity" 3273 android:excludeFromRecents="true" 3274 android:exported="true" 3275 android:theme="@style/Theme.DeviceDefault.Light.Dialog" 3276 android:label="@string/choose_account_label" 3277 android:process=":ui"> 3278 </activity> 3279 3280 <activity android:name="android.accounts.ChooseAccountTypeActivity" 3281 android:excludeFromRecents="true" 3282 android:theme="@style/Theme.DeviceDefault.Light.Dialog" 3283 android:label="@string/choose_account_label" 3284 android:process=":ui"> 3285 </activity> 3286 3287 <activity android:name="android.accounts.CantAddAccountActivity" 3288 android:excludeFromRecents="true" 3289 android:exported="true" 3290 android:theme="@style/Theme.DeviceDefault.Light.Dialog.NoActionBar" 3291 android:process=":ui"> 3292 </activity> 3293 3294 <activity android:name="android.accounts.GrantCredentialsPermissionActivity" 3295 android:excludeFromRecents="true" 3296 android:exported="true" 3297 android:theme="@style/Theme.DeviceDefault.Light.DialogWhenLarge" 3298 android:process=":ui"> 3299 </activity> 3300 3301 <activity android:name="android.content.SyncActivityTooManyDeletes" 3302 android:theme="@style/Theme.DeviceDefault.Light.Dialog" 3303 android:label="@string/sync_too_many_deletes" 3304 android:process=":ui"> 3305 </activity> 3306 3307 <activity android:name="com.android.internal.app.ShutdownActivity" 3308 android:permission="android.permission.SHUTDOWN" 3309 android:theme="@style/Theme.NoDisplay" 3310 android:excludeFromRecents="true"> 3311 <intent-filter> 3312 <action android:name="android.intent.action.ACTION_REQUEST_SHUTDOWN" /> 3313 <category android:name="android.intent.category.DEFAULT" /> 3314 </intent-filter> 3315 <intent-filter> 3316 <action android:name="android.intent.action.REBOOT" /> 3317 <category android:name="android.intent.category.DEFAULT" /> 3318 </intent-filter> 3319 </activity> 3320 3321 <activity android:name="com.android.internal.app.NetInitiatedActivity" 3322 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert" 3323 android:excludeFromRecents="true" 3324 android:process=":ui"> 3325 </activity> 3326 3327 <activity android:name="com.android.internal.app.SystemUserHomeActivity" 3328 android:enabled="false" 3329 android:process=":ui" 3330 android:systemUserOnly="true" 3331 android:theme="@style/Theme.Translucent.NoTitleBar"> 3332 <intent-filter android:priority="-100"> 3333 <action android:name="android.intent.action.MAIN" /> 3334 <category android:name="android.intent.category.HOME" /> 3335 </intent-filter> 3336 </activity> 3337 3338 <!-- Activity to prompt user if it's ok to create a new user sandbox for a 3339 specified account. --> 3340 <activity android:name="com.android.internal.app.ConfirmUserCreationActivity" 3341 android:excludeFromRecents="true" 3342 android:process=":ui" 3343 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert"> 3344 <intent-filter android:priority="1000"> 3345 <action android:name="android.os.action.CREATE_USER" /> 3346 <category android:name="android.intent.category.DEFAULT" /> 3347 </intent-filter> 3348 </activity> 3349 3350 <activity android:name="com.android.internal.app.UnlaunchableAppActivity" 3351 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert" 3352 android:excludeFromRecents="true" 3353 android:process=":ui"> 3354 </activity> 3355 3356 <receiver android:name="com.android.server.BootReceiver" 3357 android:systemUserOnly="true"> 3358 <intent-filter android:priority="1000"> 3359 <action android:name="android.intent.action.BOOT_COMPLETED" /> 3360 </intent-filter> 3361 </receiver> 3362 3363 <receiver android:name="com.android.server.updates.CertPinInstallReceiver" 3364 android:permission="android.permission.UPDATE_CONFIG"> 3365 <intent-filter> 3366 <action android:name="android.intent.action.UPDATE_PINS" /> 3367 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3368 </intent-filter> 3369 </receiver> 3370 3371 <receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver" 3372 android:permission="android.permission.UPDATE_CONFIG"> 3373 <intent-filter> 3374 <action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" /> 3375 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3376 </intent-filter> 3377 </receiver> 3378 3379 <receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver" 3380 android:permission="android.permission.UPDATE_CONFIG"> 3381 <intent-filter> 3382 <action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" /> 3383 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3384 </intent-filter> 3385 </receiver> 3386 3387 <receiver android:name="com.android.server.updates.ApnDbInstallReceiver" 3388 android:permission="android.permission.UPDATE_CONFIG"> 3389 <intent-filter> 3390 <action android:name="android.intent.action.UPDATE_APN_DB" /> 3391 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3392 </intent-filter> 3393 </receiver> 3394 3395 <receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver" 3396 android:permission="android.permission.UPDATE_CONFIG"> 3397 <intent-filter> 3398 <action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" /> 3399 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3400 </intent-filter> 3401 </receiver> 3402 3403 <receiver android:name="com.android.server.updates.TzDataInstallReceiver" 3404 android:permission="android.permission.UPDATE_CONFIG"> 3405 <intent-filter> 3406 <action android:name="android.intent.action.UPDATE_TZDATA" /> 3407 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3408 </intent-filter> 3409 </receiver> 3410 3411 <receiver android:name="com.android.server.updates.CertificateTransparencyLogInstallReceiver" 3412 android:permission="android.permission.UPDATE_CONFIG"> 3413 <intent-filter> 3414 <action android:name="android.intent.action.UPDATE_CT_LOGS" /> 3415 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3416 </intent-filter> 3417 </receiver> 3418 3419 <receiver android:name="com.android.server.MasterClearReceiver" 3420 android:permission="android.permission.MASTER_CLEAR"> 3421 <intent-filter 3422 android:priority="100" > 3423 <!-- For Checkin, Settings, etc.: action=FACTORY_RESET --> 3424 <action android:name="android.intent.action.FACTORY_RESET" /> 3425 <!-- As above until all the references to the deprecated MASTER_CLEAR get updated to 3426 FACTORY_RESET. --> 3427 <action android:name="android.intent.action.MASTER_CLEAR" /> 3428 3429 <!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR --> 3430 <action android:name="com.google.android.c2dm.intent.RECEIVE" /> 3431 <category android:name="android.intent.category.MASTER_CLEAR" /> 3432 </intent-filter> 3433 </receiver> 3434 3435 <service android:name="android.hardware.location.GeofenceHardwareService" 3436 android:permission="android.permission.LOCATION_HARDWARE" 3437 android:exported="false" /> 3438 3439 <service android:name="com.android.internal.backup.LocalTransportService" 3440 android:permission="android.permission.CONFIRM_FULL_BACKUP" 3441 android:exported="false"> 3442 <intent-filter> 3443 <action android:name="android.backup.TRANSPORT_HOST" /> 3444 </intent-filter> 3445 </service> 3446 3447 <service android:name="com.android.server.MountServiceIdler" 3448 android:exported="true" 3449 android:permission="android.permission.BIND_JOB_SERVICE" > 3450 </service> 3451 3452 <service android:name="com.android.server.backup.FullBackupJob" 3453 android:exported="true" 3454 android:permission="android.permission.BIND_JOB_SERVICE" > 3455 </service> 3456 3457 <service android:name="com.android.server.backup.KeyValueBackupJob" 3458 android:permission="android.permission.BIND_JOB_SERVICE" > 3459 </service> 3460 3461 <service android:name="com.android.server.content.SyncJobService" 3462 android:permission="android.permission.BIND_JOB_SERVICE" > 3463 </service> 3464 3465 <service android:name="com.android.server.pm.BackgroundDexOptService" 3466 android:exported="true" 3467 android:permission="android.permission.BIND_JOB_SERVICE"> 3468 </service> 3469 3470 <service android:name="com.android.server.storage.DiskStatsLoggingService" 3471 android:permission="android.permission.BIND_JOB_SERVICE" > 3472 </service> 3473 3474 </application> 3475 3476</manifest> 3477