AndroidManifest.xml revision df0db7fe83bfab2926e098a5198f43be299d0632
1<?xml version="1.0" encoding="utf-8"?> 2<!-- 3/* //device/apps/common/AndroidManifest.xml 4** 5** Copyright 2006, The Android Open Source Project 6** 7** Licensed under the Apache License, Version 2.0 (the "License"); 8** you may not use this file except in compliance with the License. 9** You may obtain a copy of the License at 10** 11** http://www.apache.org/licenses/LICENSE-2.0 12** 13** Unless required by applicable law or agreed to in writing, software 14** distributed under the License is distributed on an "AS IS" BASIS, 15** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 16** See the License for the specific language governing permissions and 17** limitations under the License. 18*/ 19--> 20<manifest xmlns:android="http://schemas.android.com/apk/res/android" 21 package="android" coreApp="true" android:sharedUserId="android.uid.system" 22 android:sharedUserLabel="@string/android_system_label"> 23 24 <!-- ================================================ --> 25 <!-- Special broadcasts that only the system can send --> 26 <!-- ================================================ --> 27 <eat-comment /> 28 29 <protected-broadcast android:name="android.intent.action.SCREEN_OFF" /> 30 <protected-broadcast android:name="android.intent.action.SCREEN_ON" /> 31 <protected-broadcast android:name="android.intent.action.USER_PRESENT" /> 32 <protected-broadcast android:name="android.intent.action.TIME_SET" /> 33 <protected-broadcast android:name="android.intent.action.TIME_TICK" /> 34 <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" /> 35 <protected-broadcast android:name="android.intent.action.DATE_CHANGED" /> 36 <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" /> 37 <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" /> 38 <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" /> 39 <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" /> 40 <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" /> 41 <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" /> 42 <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" /> 43 <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" /> 44 <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" /> 45 <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" /> 46 <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" /> 47 <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" /> 48 <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" /> 49 <protected-broadcast android:name="android.intent.action.UID_REMOVED" /> 50 <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" /> 51 <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" /> 52 <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" /> 53 <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" /> 54 <protected-broadcast android:name="android.intent.action.BATTERY_LOW" /> 55 <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" /> 56 <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" /> 57 <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" /> 58 <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" /> 59 <protected-broadcast android:name="android.intent.action.CHARGING" /> 60 <protected-broadcast android:name="android.intent.action.DISCHARGING" /> 61 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" /> 62 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" /> 63 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" /> 64 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" /> 65 <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" /> 66 <protected-broadcast android:name="android.intent.action.REBOOT" /> 67 <protected-broadcast android:name="android.intent.action.DOCK_EVENT" /> 68 <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" /> 69 <protected-broadcast android:name="android.intent.action.USER_ADDED" /> 70 <protected-broadcast android:name="android.intent.action.USER_REMOVED" /> 71 <protected-broadcast android:name="android.intent.action.USER_STARTING" /> 72 <protected-broadcast android:name="android.intent.action.USER_STARTED" /> 73 <protected-broadcast android:name="android.intent.action.USER_STOPPING" /> 74 <protected-broadcast android:name="android.intent.action.USER_STOPPED" /> 75 <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" /> 76 <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" /> 77 <protected-broadcast android:name="android.intent.action.USER_SWITCHED" /> 78 <protected-broadcast android:name="android.intent.action.INTENT_FILTER_NEEDS_VERIFICATION" /> 79 80 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED" /> 81 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGING" /> 82 83 <protected-broadcast android:name="android.os.action.SCREEN_BRIGHTNESS_BOOST_CHANGED" /> 84 85 <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" /> 86 <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" /> 87 <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" /> 88 <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" /> 89 <protected-broadcast android:name="android.app.action.NEXT_ALARM_CLOCK_CHANGED" /> 90 <protected-broadcast android:name="android.app.action.SEND_DEVICE_INITIALIZER_STATUS" /> 91 92 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" /> 93 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" /> 94 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" /> 95 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" /> 96 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_HOST_RESTORED" /> 97 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_RESTORED" /> 98 99 <protected-broadcast android:name="android.os.action.SETTING_RESTORED" /> 100 101 <protected-broadcast android:name="android.backup.intent.RUN" /> 102 <protected-broadcast android:name="android.backup.intent.CLEAR" /> 103 <protected-broadcast android:name="android.backup.intent.INIT" /> 104 105 <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" /> 106 <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" /> 107 <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" /> 108 <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" /> 109 <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" /> 110 <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" /> 111 <protected-broadcast android:name="android.bluetooth.device.action.UUID" /> 112 <protected-broadcast android:name="android.bluetooth.device.action.MAS_INSTANCE" /> 113 <protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" /> 114 <protected-broadcast android:name="android.bluetooth.device.action.FOUND" /> 115 <protected-broadcast android:name="android.bluetooth.device.action.DISAPPEARED" /> 116 <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" /> 117 <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" /> 118 <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" /> 119 <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" /> 120 <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" /> 121 <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" /> 122 <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" /> 123 <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" /> 124 <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" /> 125 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" /> 126 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" /> 127 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" /> 128 <protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" /> 129 <protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" /> 130 <protected-broadcast 131 android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" /> 132 <protected-broadcast 133 android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" /> 134 <protected-broadcast 135 android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" /> 136 <protected-broadcast 137 android:name="android.bluetooth.headsetclient.profile.action.CONNECTION_STATE_CHANGED" /> 138 <protected-broadcast 139 android:name="android.bluetooth.headsetclient.profile.action.AUDIO_STATE_CHANGED" /> 140 <protected-broadcast 141 android:name="android.bluetooth.headsetclient.profile.action.AG_EVENT" /> 142 <protected-broadcast 143 android:name="android.bluetooth.headsetclient.profile.action.AG_CALL_CHANGED" /> 144 <protected-broadcast 145 android:name="android.bluetooth.headsetclient.profile.action.RESULT" /> 146 <protected-broadcast 147 android:name="android.bluetooth.headsetclient.profile.action.LAST_VTAG" /> 148 <protected-broadcast 149 android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" /> 150 <protected-broadcast 151 android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" /> 152 <protected-broadcast 153 android:name="android.bluetooth.a2dp-sink.profile.action.CONNECTION_STATE_CHANGED" /> 154 <protected-broadcast 155 android:name="android.bluetooth.a2dp-sink.profile.action.PLAYING_STATE_CHANGED" /> 156 <protected-broadcast 157 android:name="android.bluetooth.a2dp-sink.profile.action.AUDIO_CONFIG_CHANGED" /> 158 <protected-broadcast 159 android:name="android.bluetooth.avrcp-controller.profile.action.CONNECTION_STATE_CHANGED" /> 160 <protected-broadcast 161 android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" /> 162 <protected-broadcast 163 android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" /> 164 <protected-broadcast 165 android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" /> 166 <protected-broadcast 167 android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" /> 168 <protected-broadcast android:name="android.bluetooth.pbap.intent.action.PBAP_STATE_CHANGED" /> 169 <protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" /> 170 <protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" /> 171 <protected-broadcast android:name="android.btopp.intent.action.LIST" /> 172 <protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" /> 173 <protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" /> 174 <protected-broadcast android:name="android.btopp.intent.action.CONFIRM" /> 175 <protected-broadcast android:name="android.btopp.intent.action.HIDE" /> 176 <protected-broadcast android:name="android.btopp.intent.action.RETRY" /> 177 <protected-broadcast android:name="android.btopp.intent.action.OPEN" /> 178 <protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" /> 179 <protected-broadcast android:name="com.android.bluetooth.pbap.authchall" /> 180 <protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" /> 181 <protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" /> 182 <protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" /> 183 184 <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" /> 185 186 <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" /> 187 <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" /> 188 <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" /> 189 <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" /> 190 <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" /> 191 192 <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" /> 193 <protected-broadcast android:name="android.media.action.HDMI_AUDIO_PLUG" /> 194 195 <protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" /> 196 <protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" /> 197 <protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" /> 198 <protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" /> 199 <protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" /> 200 <protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" /> 201 <protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" /> 202 <protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" /> 203 204 <protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" /> 205 <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" /> 206 <protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" /> 207 <protected-broadcast android:name="android.intent.action.MEDIA_NOFS" /> 208 <protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" /> 209 <protected-broadcast android:name="android.intent.action.MEDIA_SHARED" /> 210 <protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" /> 211 <protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" /> 212 <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" /> 213 <protected-broadcast android:name="android.intent.action.MEDIA_EJECT" /> 214 215 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" /> 216 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" /> 217 <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" /> 218 <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" /> 219 <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" /> 220 221 <protected-broadcast android:name="android.net.nsd.STATE_CHANGED" /> 222 223 <protected-broadcast android:name="android.nfc.action.LLCP_LINK_STATE_CHANGED" /> 224 <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" /> 225 <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" /> 226 <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" /> 227 228 <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" /> 229 <protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" /> 230 <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" /> 231 232 <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" /> 233 234 <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" /> 235 <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" /> 236 <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" /> 237 <protected-broadcast android:name="android.intent.action.DATA_CONNECTION_CONNECTED_TO_PROVISIONING_APN" /> 238 239 <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" /> 240 <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" /> 241 <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" /> 242 <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" /> 243 <protected-broadcast android:name="android.net.wifi.WIFI_CREDENTIAL_CHANGED" /> 244 <protected-broadcast android:name="android.net.wifi.WIFI_SCAN_AVAILABLE" /> 245 <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" /> 246 <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" /> 247 <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" /> 248 <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" /> 249 <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" /> 250 <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" /> 251 <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" /> 252 <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" /> 253 <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" /> 254 <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" /> 255 <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" /> 256 <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" /> 257 <protected-broadcast android:name="android.net.wifi.p2p.PERSISTENT_GROUPS_CHANGED" /> 258 <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" /> 259 <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" /> 260 <protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" /> 261 <protected-broadcast 262 android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" /> 263 <protected-broadcast android:name="android.net.scoring.SCORE_NETWORKS" /> 264 <protected-broadcast android:name="android.net.scoring.SCORER_CHANGED" /> 265 <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" /> 266 <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" /> 267 <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" /> 268 <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" /> 269 <protected-broadcast android:name="android.intent.action.APPLICATION_RESTRICTIONS_CHANGED" /> 270 <protected-broadcast android:name="android.intent.action.BUGREPORT_FINISHED" /> 271 272 <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" /> 273 <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" /> 274 275 <protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" /> 276 277 <protected-broadcast android:name="android.intent.action.PHONE_STATE" /> 278 279 <protected-broadcast android:name="android.intent.action.SUB_DEFAULT_CHANGED" /> 280 281 <protected-broadcast android:name="android.location.GPS_ENABLED_CHANGE" /> 282 <protected-broadcast android:name="android.location.PROVIDERS_CHANGED" /> 283 <protected-broadcast android:name="android.location.MODE_CHANGED" /> 284 <protected-broadcast android:name="android.location.GPS_FIX_CHANGE" /> 285 <protected-broadcast android:name="android.net.proxy.PAC_REFRESH" /> 286 287 <protected-broadcast 288 android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" /> 289 290 <!-- Defined in RestrictionsManager --> 291 <protected-broadcast 292 android:name="android.intent.action.PERMISSION_RESPONSE_RECEIVED" /> 293 <!-- Defined in RestrictionsManager --> 294 295 <protected-broadcast android:name="android.intent.action.REQUEST_PERMISSION" /> 296 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_STARTED" /> 297 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" /> 298 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_PROGRESS" /> 299 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" /> 300 301 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_SUBSCRIPTION_CHANGED" /> 302 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_SMS_SUBSCRIPTION_CHANGED" /> 303 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_DATA_SUBSCRIPTION_CHANGED" /> 304 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_VOICE_SUBSCRIPTION_CHANGED" /> 305 <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_CONTENT_CHANGE" /> 306 <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_RECORD_UPDATED" /> 307 308 <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_DONE" /> 309 <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_FAILED" /> 310 311 <protected-broadcast android:name="android.internal.policy.action.BURN_IN_PROTECTION" /> 312 <protected-broadcast android:name="android.service.persistentdata.action.WIPE_IF_ALLOWED" /> 313 314 <protected-broadcast android:name="android.app.action.OTA_POLICY_CHANGED" /> 315 <!-- ====================================================================== --> 316 <!-- RUNTIME PERMISSIONS --> 317 <!-- ====================================================================== --> 318 <eat-comment /> 319 320 <!-- ====================================================================== --> 321 <!-- Permissions for accessing user's contacts including personal profile --> 322 <!-- ====================================================================== --> 323 <eat-comment /> 324 325 <!-- Used for runtime permissions related to user's contacts and profile. --> 326 <permission-group android:name="android.permission-group.CONTACTS" 327 android:icon="@drawable/perm_group_social_info" 328 android:label="@string/permgrouplab_contacts" 329 android:description="@string/permgroupdesc_contacts" 330 android:priority="100" /> 331 332 <!-- Allows an application to read the user's contacts data. --> 333 <permission android:name="android.permission.READ_CONTACTS" 334 android:permissionGroup="android.permission-group.CONTACTS" 335 android:label="@string/permlab_readContacts" 336 android:description="@string/permdesc_readContacts" 337 android:protectionLevel="dangerous" /> 338 339 <!-- Allows an application to write the user's contacts data. --> 340 <permission android:name="android.permission.WRITE_CONTACTS" 341 android:permissionGroup="android.permission-group.CONTACTS" 342 android:label="@string/permlab_writeContacts" 343 android:description="@string/permdesc_writeContacts" 344 android:protectionLevel="dangerous" /> 345 346 <!-- Allows an application to read the user's personal profile data. --> 347 <permission android:name="android.permission.READ_PROFILE" 348 android:permissionGroup="android.permission-group.CONTACTS" 349 android:label="@string/permlab_readProfile" 350 android:description="@string/permdesc_readProfile" 351 android:protectionLevel="dangerous" /> 352 353 <!-- Allows an application to write the user's personal profile data. --> 354 <permission android:name="android.permission.WRITE_PROFILE" 355 android:permissionGroup="android.permission-group.CONTACTS" 356 android:label="@string/permlab_writeProfile" 357 android:description="@string/permdesc_writeProfile" 358 android:protectionLevel="dangerous" /> 359 360 <!-- ====================================================================== --> 361 <!-- Permissions for accessing user's calendar --> 362 <!-- ====================================================================== --> 363 <eat-comment /> 364 365 <!-- Used for runtime permissions related to user's calendar. --> 366 <permission-group android:name="android.permission-group.CALENDAR" 367 android:icon="@drawable/perm_group_calendar" 368 android:label="@string/permgrouplab_calendar" 369 android:description="@string/permgroupdesc_calendar" 370 android:priority="200" /> 371 372 <!-- Allows an application to read the user's calendar data. --> 373 <permission android:name="android.permission.READ_CALENDAR" 374 android:permissionGroup="android.permission-group.CALENDAR" 375 android:label="@string/permlab_readCalendar" 376 android:description="@string/permdesc_readCalendar" 377 android:protectionLevel="dangerous" /> 378 379 <!-- Allows an application to write the user's calendar data. --> 380 <permission android:name="android.permission.WRITE_CALENDAR" 381 android:permissionGroup="android.permission-group.CALENDAR" 382 android:label="@string/permlab_writeCalendar" 383 android:description="@string/permdesc_writeCalendar" 384 android:protectionLevel="dangerous" /> 385 386 <!-- ====================================================================== --> 387 <!-- Permissions for accessing and modifying user's SMS messages --> 388 <!-- ====================================================================== --> 389 <eat-comment /> 390 391 <!-- Used for runtime permissions related to user's SMS messages. --> 392 <permission-group android:name="android.permission-group.SMS" 393 android:icon="@drawable/perm_group_messages" 394 android:label="@string/permgrouplab_sms" 395 android:description="@string/permgroupdesc_sms" 396 android:priority="300" /> 397 398 <!-- Allows an application to send SMS messages. --> 399 <permission android:name="android.permission.SEND_SMS" 400 android:permissionGroup="android.permission-group.SMS" 401 android:label="@string/permlab_sendSms" 402 android:description="@string/permdesc_sendSms" 403 android:permissionFlags="costsMoney" 404 android:protectionLevel="dangerous" /> 405 406 <!-- Allows an application to receive SMS messages. --> 407 <permission android:name="android.permission.RECEIVE_SMS" 408 android:permissionGroup="android.permission-group.SMS" 409 android:label="@string/permlab_receiveSms" 410 android:description="@string/permdesc_receiveSms" 411 android:protectionLevel="dangerous"/> 412 413 <!-- Allows an application to read SMS messages. --> 414 <permission android:name="android.permission.READ_SMS" 415 android:permissionGroup="android.permission-group.SMS" 416 android:label="@string/permlab_readSms" 417 android:description="@string/permdesc_readSms" 418 android:protectionLevel="dangerous" /> 419 420 <!-- Allows an application to write SMS messages. --> 421 <permission android:name="android.permission.WRITE_SMS" 422 android:permissionGroup="android.permission-group.SMS" 423 android:label="@string/permlab_writeSms" 424 android:description="@string/permdesc_writeSms" 425 android:protectionLevel="dangerous" /> 426 427 <!-- Allows an application to receive WAP push messages. --> 428 <permission android:name="android.permission.RECEIVE_WAP_PUSH" 429 android:permissionGroup="android.permission-group.SMS" 430 android:label="@string/permlab_receiveWapPush" 431 android:description="@string/permdesc_receiveWapPush" 432 android:protectionLevel="dangerous" /> 433 434 <!-- Allows an application to monitor incoming MMS messages. --> 435 <permission android:name="android.permission.RECEIVE_MMS" 436 android:permissionGroup="android.permission-group.SMS" 437 android:label="@string/permlab_receiveMms" 438 android:description="@string/permdesc_receiveMms" 439 android:protectionLevel="dangerous" /> 440 441 <!-- Allows an application to read previously received cell broadcast 442 messages and to register a content observer to get notifications when 443 a cell broadcast has been received and added to the database. For 444 emergency alerts, the database is updated immediately after the 445 alert dialog and notification sound/vibration/speech are presented. 446 The "read" column is then updated after the user dismisses the alert. 447 This enables supplementary emergency assistance apps to start loading 448 additional emergency information (if Internet access is available) 449 when the alert is first received, and to delay presenting the info 450 to the user until after the initial alert dialog is dismissed. 451 @hide Pending API council approval --> 452 <permission android:name="android.permission.READ_CELL_BROADCASTS" 453 android:permissionGroup="android.permission-group.SMS" 454 android:label="@string/permlab_readCellBroadcasts" 455 android:description="@string/permdesc_readCellBroadcasts" 456 android:protectionLevel="dangerous" /> 457 458 <!-- =============================================================== --> 459 <!-- Permissions for accessing social info --> 460 <!-- =============================================================== --> 461 <eat-comment /> 462 463 <!-- Used for permissions that provide access to the user's social connections, 464 such as contacts, call logs, social stream, etc. This includes 465 both reading and writing of this data (which should generally be 466 expressed as two distinct permissions). --> 467 468 <permission-group android:name="android.permission-group.SOCIAL_INFO" 469 android:label="@string/permgrouplab_socialInfo" 470 android:icon="@drawable/perm_group_social_info" 471 android:description="@string/permgroupdesc_socialInfo" 472 android:permissionGroupFlags="personalInfo" 473 android:priority="1200" /> 474 475 <!-- Allows an application to read from the user's social stream. 476 @deprecated This functionality will be unsupported in the future; cursors returned 477 will be empty. Please do not use. --> 478 <permission android:name="android.permission.READ_SOCIAL_STREAM" 479 android:permissionGroup="android.permission-group.SOCIAL_INFO" 480 android:protectionLevel="dangerous" 481 android:label="@string/permlab_readSocialStream" 482 android:description="@string/permdesc_readSocialStream" /> 483 484 <!-- Allows an application to write (but not read) the user's 485 social stream data. 486 @deprecated This functionality will be unsupported in the future; cursors returned 487 will be empty. Please do not use. --> 488 <permission android:name="android.permission.WRITE_SOCIAL_STREAM" 489 android:permissionGroup="android.permission-group.SOCIAL_INFO" 490 android:protectionLevel="dangerous" 491 android:label="@string/permlab_writeSocialStream" 492 android:description="@string/permdesc_writeSocialStream" /> 493 494 <!-- ====================================================================== --> 495 <!-- Permissions for accessing the device location --> 496 <!-- ====================================================================== --> 497 <eat-comment /> 498 499 <!-- Used for permissions that allow accessing the device location. --> 500 <permission-group android:name="android.permission-group.LOCATION" 501 android:icon="@drawable/perm_group_location" 502 android:label="@string/permgrouplab_location" 503 android:description="@string/permgroupdesc_location" 504 android:priority="400" /> 505 506 <!-- Allows an app to access precise location. --> 507 <permission android:name="android.permission.ACCESS_FINE_LOCATION" 508 android:permissionGroup="android.permission-group.LOCATION" 509 android:label="@string/permlab_accessFineLocation" 510 android:description="@string/permdesc_accessFineLocation" 511 android:protectionLevel="dangerous" /> 512 513 <!-- Allows an app to access approximate location. --> 514 <permission android:name="android.permission.ACCESS_COARSE_LOCATION" 515 android:permissionGroup="android.permission-group.LOCATION" 516 android:label="@string/permlab_accessCoarseLocation" 517 android:description="@string/permdesc_accessCoarseLocation" 518 android:protectionLevel="dangerous" /> 519 520 <!-- Allows an application to create mock location providers for testing. --> 521 <permission android:name="android.permission.ACCESS_MOCK_LOCATION" 522 android:permissionGroup="android.permission-group.LOCATION" 523 android:label="@string/permlab_accessMockLocation" 524 android:description="@string/permdesc_accessMockLocation" 525 android:protectionLevel="dangerous" /> 526 527 <!-- ====================================================================== --> 528 <!-- Permissions for accessing the device telephony --> 529 <!-- ====================================================================== --> 530 <eat-comment /> 531 532 <!-- Used for permissions that are associated telephony features. --> 533 <permission-group android:name="android.permission-group.PHONE" 534 android:icon="@drawable/perm_group_phone_calls" 535 android:label="@string/permgrouplab_phone" 536 android:description="@string/permgroupdesc_phone" 537 android:priority="500" /> 538 539 <!-- Allows read only access to phone state. 540 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 541 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 542 minSdkVersion}</a> and <a 543 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 544 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 545 grants your app this permission. If you don't need this permission, be sure your <a 546 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 547 targetSdkVersion}</a> is 4 or higher. --> 548 <permission android:name="android.permission.READ_PHONE_STATE" 549 android:permissionGroup="android.permission-group.PHONE" 550 android:label="@string/permlab_readPhoneState" 551 android:description="@string/permdesc_readPhoneState" 552 android:protectionLevel="dangerous" /> 553 554 <!-- Allows an application to initiate a phone call without going through 555 the Dialer user interface for the user to confirm the call. --> 556 <permission android:name="android.permission.CALL_PHONE" 557 android:permissionGroup="android.permission-group.PHONE" 558 android:permissionFlags="costsMoney" 559 android:label="@string/permlab_callPhone" 560 android:description="@string/permdesc_callPhone" 561 android:protectionLevel="dangerous" /> 562 563 <!-- Allows an application to read the user's call log. 564 <p class="note"><strong>Note:</strong> If your app uses the 565 {@link #READ_CONTACTS} permission and <em>both</em> your <a 566 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 567 minSdkVersion}</a> and <a 568 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 569 targetSdkVersion}</a> values are set to 15 or lower, the system implicitly 570 grants your app this permission. If you don't need this permission, be sure your <a 571 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 572 targetSdkVersion}</a> is 16 or higher.</p> --> 573 <permission android:name="android.permission.READ_CALL_LOG" 574 android:permissionGroup="android.permission-group.PHONE" 575 android:label="@string/permlab_readCallLog" 576 android:description="@string/permdesc_readCallLog" 577 android:protectionLevel="dangerous" /> 578 579 <!-- Allows an application to write (but not read) the user's 580 contacts data. 581 <p class="note"><strong>Note:</strong> If your app uses the 582 {@link #WRITE_CONTACTS} permission and <em>both</em> your <a 583 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 584 minSdkVersion}</a> and <a 585 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 586 targetSdkVersion}</a> values are set to 15 or lower, the system implicitly 587 grants your app this permission. If you don't need this permission, be sure your <a 588 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 589 targetSdkVersion}</a> is 16 or higher.</p> --> 590 <permission android:name="android.permission.WRITE_CALL_LOG" 591 android:permissionGroup="android.permission-group.PHONE" 592 android:label="@string/permlab_writeCallLog" 593 android:description="@string/permdesc_writeCallLog" 594 android:protectionLevel="dangerous" /> 595 596 <!-- Allows an application to add voicemails into the system. --> 597 <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL" 598 android:permissionGroup="android.permission-group.PHONE" 599 android:label="@string/permlab_addVoicemail" 600 android:description="@string/permdesc_addVoicemail" 601 android:protectionLevel="dangerous" /> 602 603 <!-- Allows an application to use SIP service. --> 604 <permission android:name="android.permission.USE_SIP" 605 android:permissionGroup="android.permission-group.PHONE" 606 android:description="@string/permdesc_use_sip" 607 android:label="@string/permlab_use_sip" 608 android:protectionLevel="dangerous"/> 609 610 <!-- Allows an application to see the number being dialed during an outgoing 611 call with the option to redirect the call to a different number or 612 abort the call altogether. --> 613 <permission android:name="android.permission.PROCESS_OUTGOING_CALLS" 614 android:permissionGroup="android.permission-group.PHONE" 615 android:label="@string/permlab_processOutgoingCalls" 616 android:description="@string/permdesc_processOutgoingCalls" 617 android:protectionLevel="dangerous" /> 618 619 <!-- ====================================================================== --> 620 <!-- Permissions for accessing the device microphone --> 621 <!-- ====================================================================== --> 622 <eat-comment /> 623 624 <!-- Used for permissions that are associated with accessing 625 microphone audio from the device. Note that phone calls also capture audio 626 but are in a separate (more visible) permission group. --> 627 <permission-group android:name="android.permission-group.MICROPHONE" 628 android:icon="@drawable/perm_group_microphone" 629 android:label="@string/permgrouplab_microphone" 630 android:description="@string/permgroupdesc_microphone" 631 android:priority="600" /> 632 633 <!-- Allows an application to record audio. --> 634 <permission android:name="android.permission.RECORD_AUDIO" 635 android:permissionGroup="android.permission-group.MICROPHONE" 636 android:label="@string/permlab_recordAudio" 637 android:description="@string/permdesc_recordAudio" 638 android:protectionLevel="dangerous"/> 639 640 <!-- ====================================================================== --> 641 <!-- Permissions for accessing the device camera --> 642 <!-- ====================================================================== --> 643 <eat-comment /> 644 645 <!-- Used for permissions that are associated with accessing 646 camera or capturing images/video from the device. --> 647 <permission-group android:name="android.permission-group.CAMERA" 648 android:icon="@drawable/perm_group_camera" 649 android:label="@string/permgrouplab_camera" 650 android:description="@string/permgroupdesc_camera" 651 android:priority="700" /> 652 653 <!-- Required to be able to access the camera device. 654 <p>This will automatically enforce the <a 655 href="{@docRoot}guide/topics/manifest/uses-feature-element.html">{@code 656 <uses-feature>}</a> manifest element for <em>all</em> camera features. 657 If you do not require all camera features or can properly operate if a camera 658 is not available, then you must modify your manifest as appropriate in order to 659 install on devices that don't support all camera features.</p> --> 660 <permission android:name="android.permission.CAMERA" 661 android:permissionGroup="android.permission-group.CAMERA" 662 android:label="@string/permlab_camera" 663 android:description="@string/permdesc_camera" 664 android:protectionLevel="dangerous" /> 665 666 667 <!-- ====================================================================== --> 668 <!-- Permissions for accessing the device sensors --> 669 <!-- ====================================================================== --> 670 <eat-comment /> 671 672 <!-- Used for permissions that are associated with accessing 673 camera or capturing images/video from the device. --> 674 <permission-group android:name="android.permission-group.SENSORS" 675 android:label="@string/permgrouplab_sensors" 676 android:description="@string/permgroupdesc_sensors" 677 android:priority="800" /> 678 679 <!-- Allows an application to access data from sensors that the user uses to 680 measure what is happening inside his/her body, such as heart rate. --> 681 <permission android:name="android.permission.BODY_SENSORS" 682 android:permissionGroup="android.permission-group.SENSORS" 683 android:label="@string/permlab_bodySensors" 684 android:description="@string/permdesc_bodySensors" 685 android:protectionLevel="dangerous" /> 686 687 <!-- Allows an app to use fingerprint hardware. --> 688 <permission android:name="android.permission.USE_FINGERPRINT" 689 android:label="@string/permlab_useFingerprint" 690 android:description="@string/permdesc_useFingerprint" 691 android:protectionLevel="dangerous" /> 692 693 <!-- ====================================================================== --> 694 <!-- INSTALLTIME PERMISSIONS --> 695 <!-- ====================================================================== --> 696 697 <!-- ================================== --> 698 <!-- Permissions for accessing messages --> 699 <!-- ================================== --> 700 <eat-comment /> 701 702 <!-- @SystemApi Allows an application (Phone) to send a request to other applications 703 to handle the respond-via-message action during incoming calls. 704 <p>Not for use by third-party applications. --> 705 <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE" 706 android:protectionLevel="signature|system" /> 707 708 <!-- Allows an application to filter carrier specific sms. 709 @hide --> 710 <permission android:name="android.permission.CARRIER_FILTER_SMS" 711 android:protectionLevel="signature|system" /> 712 713 <!-- @SystemApi Allows an application to receive emergency cell broadcast messages, 714 to record or display them to the user. 715 <p>Not for use by third-party applications. 716 @hide Pending API council approval --> 717 <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST" 718 android:protectionLevel="signature|system" /> 719 720 <!-- Allows an application to monitor incoming Bluetooth MAP messages, to record 721 or perform processing on them. --> 722 <!-- @hide --> 723 <permission android:name="android.permission.RECEIVE_BLUETOOTH_MAP" 724 android:protectionLevel="signature|system" /> 725 726 <!-- @SystemApi @hide Allows an application to execute contacts directory search. 727 This should only be used by ContactsProvider. 728 <p>Not for use by third-party applications. --> 729 <permission android:name="android.permission.BIND_DIRECTORY_SEARCH" 730 android:protectionLevel="signature|system" /> 731 732 <!-- =============================================================== --> 733 <!-- Permissions for accessing the user dictionary--> 734 <!-- =============================================================== --> 735 <eat-comment /> 736 737 738 <!-- =============================================================== --> 739 <!-- Permissions for accessing the user dictionary --> 740 <!-- =============================================================== --> 741 <eat-comment /> 742 743 <!-- Used for permissions that provide access to the user 744 calendar to create / view events.--> 745 <permission-group android:name="android.permission-group.USER_DICTIONARY" 746 android:label="@string/permgrouplab_dictionary" 747 android:icon="@drawable/perm_group_user_dictionary" 748 android:description="@string/permgroupdesc_dictionary" 749 android:permissionGroupFlags="personalInfo" 750 android:priority="1100" /> 751 752 <!-- Allows an application to read the user dictionary. This should 753 really only be required by an IME, or a dictionary editor like 754 the Settings app. --> 755 <permission android:name="android.permission.READ_USER_DICTIONARY" 756 android:permissionGroup="android.permission-group.USER_DICTIONARY" 757 android:label="@string/permlab_readDictionary" 758 android:description="@string/permdesc_readDictionary" 759 android:protectionLevel="dangerous"/> 760 761 <!-- Allows an application to write to the user dictionary. --> 762 <permission android:name="android.permission.WRITE_USER_DICTIONARY" 763 android:permissionGroup="android.permission-group.USER_DICTIONARY" 764 android:label="@string/permlab_writeDictionary" 765 android:description="@string/permdesc_writeDictionary" 766 android:protectionLevel="normal"/> 767 768 <!-- =============================================================== --> 769 <!-- Permissions for accessing the user bookmarks --> 770 <!-- =============================================================== --> 771 <eat-comment /> 772 773 <!-- Used for permissions that provide access to the user 774 bookmarks and browser history.--> 775 <permission-group android:name="android.permission-group.BOOKMARKS" 776 android:label="@string/permgrouplab_bookmarks" 777 android:icon="@drawable/perm_group_bookmarks" 778 android:description="@string/permgroupdesc_bookmarks" 779 android:permissionGroupFlags="personalInfo" 780 android:priority="1200" /> 781 782 <!-- Allows an application to read (but not write) the user's 783 browsing history and bookmarks. --> 784 <permission android:name="com.android.browser.permission.READ_HISTORY_BOOKMARKS" 785 android:permissionGroup="android.permission-group.BOOKMARKS" 786 android:label="@string/permlab_readHistoryBookmarks" 787 android:description="@string/permdesc_readHistoryBookmarks" 788 android:protectionLevel="dangerous" /> 789 790 <!-- Allows an application to write (but not read) the user's 791 browsing history and bookmarks. --> 792 <permission android:name="com.android.browser.permission.WRITE_HISTORY_BOOKMARKS" 793 android:permissionGroup="android.permission-group.BOOKMARKS" 794 android:label="@string/permlab_writeHistoryBookmarks" 795 android:description="@string/permdesc_writeHistoryBookmarks" 796 android:protectionLevel="dangerous" /> 797 798 <!-- =============================================================== --> 799 <!-- Permissions for setting the device alarm --> 800 <!-- =============================================================== --> 801 <eat-comment /> 802 803 <!-- Allows an application to broadcast an Intent to set an alarm for the user. --> 804 <permission android:name="com.android.alarm.permission.SET_ALARM" 805 android:label="@string/permlab_setAlarm" 806 android:description="@string/permdesc_setAlarm" 807 android:protectionLevel="normal" /> 808 809 <!-- =============================================================== --> 810 <!-- Permissions for accessing the user voicemail --> 811 <!-- =============================================================== --> 812 <eat-comment /> 813 814 <!-- Allows an application to modify and remove existing voicemails in the system --> 815 <permission android:name="com.android.voicemail.permission.WRITE_VOICEMAIL" 816 android:protectionLevel="system|signature" /> 817 818 <!-- Allows an application to read voicemails in the system. --> 819 <permission android:name="com.android.voicemail.permission.READ_VOICEMAIL" 820 android:protectionLevel="system|signature" /> 821 822 <!-- ======================================= --> 823 <!-- Permissions for accessing location info --> 824 <!-- ======================================= --> 825 <eat-comment /> 826 827 <!-- Allows an application to access extra location provider commands --> 828 <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS" 829 android:label="@string/permlab_accessLocationExtraCommands" 830 android:description="@string/permdesc_accessLocationExtraCommands" 831 android:protectionLevel="normal" /> 832 833 <!-- @SystemApi Allows an application to install a location provider into the Location Manager. 834 <p>Not for use by third-party applications. --> 835 <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER" 836 android:protectionLevel="signature|system" /> 837 838 <!-- @SystemApi @hide Allows HDMI-CEC service to access device and configuration files. 839 This should only be used by HDMI-CEC service. 840 --> 841 <permission android:name="android.permission.HDMI_CEC" 842 android:protectionLevel="signatureOrSystem" /> 843 844 <!-- @SystemApi Allows an application to use location features in hardware, 845 such as the geofencing api. 846 <p>Not for use by third-party applications. --> 847 <permission android:name="android.permission.LOCATION_HARDWARE" 848 android:protectionLevel="signature|system" /> 849 <uses-permission android:name="android.permission.LOCATION_HARDWARE"/> 850 851 <!-- ======================================= --> 852 <!-- Permissions for accessing networks --> 853 <!-- ======================================= --> 854 <eat-comment /> 855 856 <!-- Allows applications to open network sockets. --> 857 <permission android:name="android.permission.INTERNET" 858 android:description="@string/permdesc_createNetworkSockets" 859 android:label="@string/permlab_createNetworkSockets" 860 android:protectionLevel="dangerous" /> 861 862 <!-- Allows applications to access information about networks --> 863 <permission android:name="android.permission.ACCESS_NETWORK_STATE" 864 android:description="@string/permdesc_accessNetworkState" 865 android:label="@string/permlab_accessNetworkState" 866 android:protectionLevel="normal" /> 867 868 <!-- Allows applications to access information about Wi-Fi networks --> 869 <permission android:name="android.permission.ACCESS_WIFI_STATE" 870 android:description="@string/permdesc_accessWifiState" 871 android:label="@string/permlab_accessWifiState" 872 android:protectionLevel="normal" /> 873 874 <!-- Allows applications to change Wi-Fi connectivity state --> 875 <permission android:name="android.permission.CHANGE_WIFI_STATE" 876 android:description="@string/permdesc_changeWifiState" 877 android:label="@string/permlab_changeWifiState" 878 android:protectionLevel="dangerous" /> 879 880 <!-- @SystemApi @hide Allows applications to read Wi-Fi credential. 881 <p>Not for use by third-party applications. --> 882 <permission android:name="android.permission.READ_WIFI_CREDENTIAL" 883 android:protectionLevel="signature|system" /> 884 885 <!-- @SystemApi @hide Allow system apps to receive broadcast 886 when a wifi network credential is changed. 887 <p>Not for use by third-party applications. --> 888 <permission android:name="android.permission.RECEIVE_WIFI_CREDENTIAL_CHANGE" 889 android:protectionLevel="signature|system" /> 890 891 <!-- @SystemApi @hide Allows an application to modify any wifi configuration, even if created 892 by another application. Once reconfigured the original creator cannot make any further 893 modifications. 894 <p>Not for use by third-party applications. --> 895 <permission android:name="android.permission.OVERRIDE_WIFI_CONFIG" 896 android:protectionLevel="signature|system" /> 897 898 <!-- @hide --> 899 <permission android:name="android.permission.ACCESS_WIMAX_STATE" 900 android:description="@string/permdesc_accessWimaxState" 901 android:label="@string/permlab_accessWimaxState" 902 android:protectionLevel="normal" /> 903 904 <!-- @hide --> 905 <permission android:name="android.permission.CHANGE_WIMAX_STATE" 906 android:description="@string/permdesc_changeWimaxState" 907 android:label="@string/permlab_changeWimaxState" 908 android:protectionLevel="dangerous" /> 909 910 <!-- Allows applications to act as network scorers. @hide @SystemApi--> 911 <permission android:name="android.permission.SCORE_NETWORKS" 912 android:protectionLevel="signature|system" /> 913 914 <!-- ======================================= --> 915 <!-- Permissions for short range, peripheral networks --> 916 <!-- ======================================= --> 917 <eat-comment /> 918 919 <!-- Allows applications to connect to paired bluetooth devices --> 920 <permission android:name="android.permission.BLUETOOTH" 921 android:description="@string/permdesc_bluetooth" 922 android:label="@string/permlab_bluetooth" 923 android:protectionLevel="dangerous" /> 924 925 <!-- Allows applications to discover and pair bluetooth devices --> 926 <permission android:name="android.permission.BLUETOOTH_ADMIN" 927 android:description="@string/permdesc_bluetoothAdmin" 928 android:label="@string/permlab_bluetoothAdmin" 929 android:protectionLevel="dangerous" /> 930 931 <!-- @SystemApi Allows applications to pair bluetooth devices without user interaction, and to 932 allow or disallow phonebook access or message access. 933 This is not available to third party applications. --> 934 <permission android:name="android.permission.BLUETOOTH_PRIVILEGED" 935 android:protectionLevel="system|signature" /> 936 937 <!-- Control access to email providers exclusively for Bluetooth 938 @hide 939 --> 940 <permission android:name="android.permission.BLUETOOTH_MAP" 941 android:protectionLevel="signature" /> 942 943 <!-- Allows bluetooth stack to access files 944 @hide This should only be used by Bluetooth apk. 945 --> 946 <permission android:name="android.permission.BLUETOOTH_STACK" 947 android:protectionLevel="signature" /> 948 949 <!-- Allows applications to perform I/O operations over NFC --> 950 <permission android:name="android.permission.NFC" 951 android:description="@string/permdesc_nfc" 952 android:label="@string/permlab_nfc" 953 android:protectionLevel="dangerous" /> 954 955 <!-- @SystemApi Allows an internal user to use privileged ConnectivityManager APIs. 956 @hide --> 957 <permission android:name="android.permission.CONNECTIVITY_INTERNAL" 958 android:protectionLevel="signature|system" /> 959 960 <!-- @SystemApi 961 @hide --> 962 <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE" 963 android:protectionLevel="signature|system" /> 964 965 <!-- @SystemApi Allows access to the loop radio (Android@Home mesh network) device. 966 @hide --> 967 <permission android:name="android.permission.LOOP_RADIO" 968 android:protectionLevel="signature|system" /> 969 970 <!-- Allows sending and receiving handover transfer status from Wifi and Bluetooth 971 @hide --> 972 <permission android:name="android.permission.NFC_HANDOVER_STATUS" 973 android:protectionLevel="signature|system" /> 974 975 <!-- ================================== --> 976 <!-- Permissions for accessing accounts --> 977 <!-- ================================== --> 978 <eat-comment /> 979 980 <!-- Permissions for direct access to the accounts managed 981 by the Account Manager. --> 982 <permission-group android:name="android.permission-group.ACCOUNTS" 983 android:label="@string/permgrouplab_accounts" 984 android:icon="@drawable/perm_group_accounts" 985 android:description="@string/permgroupdesc_accounts" 986 android:permissionGroupFlags="personalInfo" 987 android:priority="1000" /> 988 989 <!-- Allows access to the list of accounts in the Accounts Service --> 990 <permission android:name="android.permission.GET_ACCOUNTS" 991 android:permissionGroup="android.permission-group.ACCOUNTS" 992 android:protectionLevel="normal" 993 android:description="@string/permdesc_getAccounts" 994 android:label="@string/permlab_getAccounts" /> 995 996 <!-- Allows an application to act as an AccountAuthenticator for 997 the AccountManager --> 998 <permission android:name="android.permission.AUTHENTICATE_ACCOUNTS" 999 android:permissionGroup="android.permission-group.ACCOUNTS" 1000 android:protectionLevel="dangerous" 1001 android:label="@string/permlab_authenticateAccounts" 1002 android:description="@string/permdesc_authenticateAccounts" /> 1003 1004 <!-- Allows an application to request authtokens from the AccountManager --> 1005 <permission android:name="android.permission.USE_CREDENTIALS" 1006 android:permissionGroup="android.permission-group.ACCOUNTS" 1007 android:protectionLevel="dangerous" 1008 android:label="@string/permlab_useCredentials" 1009 android:description="@string/permdesc_useCredentials" /> 1010 1011 <!-- Allows an application to manage the list of accounts in the AccountManager --> 1012 <permission android:name="android.permission.MANAGE_ACCOUNTS" 1013 android:permissionGroup="android.permission-group.ACCOUNTS" 1014 android:protectionLevel="dangerous" 1015 android:label="@string/permlab_manageAccounts" 1016 android:description="@string/permdesc_manageAccounts" /> 1017 1018 <!-- @SystemApi Allows applications to call into AccountAuthenticators. 1019 <p>Not for use by third-party applications. --> 1020 <permission android:name="android.permission.ACCOUNT_MANAGER" 1021 android:permissionGroup="android.permission-group.ACCOUNTS" 1022 android:protectionLevel="signature" /> 1023 1024 <!-- ================================== --> 1025 <!-- Permissions for accessing hardware that may effect battery life--> 1026 <!-- ================================== --> 1027 <eat-comment /> 1028 1029 <!-- Allows applications to enter Wi-Fi Multicast mode --> 1030 <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE" 1031 android:description="@string/permdesc_changeWifiMulticastState" 1032 android:label="@string/permlab_changeWifiMulticastState" 1033 android:protectionLevel="dangerous" /> 1034 1035 <!-- Allows access to the vibrator --> 1036 <permission android:name="android.permission.VIBRATE" 1037 android:label="@string/permlab_vibrate" 1038 android:description="@string/permdesc_vibrate" 1039 android:protectionLevel="normal" /> 1040 1041 <!-- Allows access to the flashlight --> 1042 <permission android:name="android.permission.FLASHLIGHT" 1043 android:label="@string/permlab_flashlight" 1044 android:description="@string/permdesc_flashlight" 1045 android:protectionLevel="normal" /> 1046 1047 <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen 1048 from dimming --> 1049 <permission android:name="android.permission.WAKE_LOCK" 1050 android:label="@string/permlab_wakeLock" 1051 android:description="@string/permdesc_wakeLock" 1052 android:protectionLevel="normal" /> 1053 1054 <!-- Allows using the device's IR transmitter, if available --> 1055 <permission android:name="android.permission.TRANSMIT_IR" 1056 android:label="@string/permlab_transmitIr" 1057 android:description="@string/permdesc_transmitIr" 1058 android:protectionLevel="normal" /> 1059 1060 <!-- ==================================================== --> 1061 <!-- Permissions related to changing audio settings --> 1062 <!-- ==================================================== --> 1063 <eat-comment /> 1064 1065 <!-- Allows an application to modify global audio settings --> 1066 <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS" 1067 android:label="@string/permlab_modifyAudioSettings" 1068 android:description="@string/permdesc_modifyAudioSettings" 1069 android:protectionLevel="normal" /> 1070 1071 <!-- ================================== --> 1072 <!-- Permissions for accessing hardware --> 1073 <!-- ================================== --> 1074 <eat-comment /> 1075 1076 <!-- @SystemApi Allows an application to manage preferences and permissions for USB devices 1077 @hide --> 1078 <permission android:name="android.permission.MANAGE_USB" 1079 android:protectionLevel="signature|system" /> 1080 1081 <!-- @SystemApi Allows an application to access the MTP USB kernel driver. 1082 For use only by the device side MTP implementation. 1083 @hide --> 1084 <permission android:name="android.permission.ACCESS_MTP" 1085 android:protectionLevel="signature|system" /> 1086 1087 <!-- Allows access to hardware peripherals. Intended only for hardware testing. 1088 <p>Not for use by third-party applications. --> 1089 <permission android:name="android.permission.HARDWARE_TEST" 1090 android:protectionLevel="signature" /> 1091 1092 <!-- @SystemApi Allows access to FM 1093 @hide This is not a third-party API (intended for system apps).--> 1094 <permission android:name="android.permission.ACCESS_FM_RADIO" 1095 android:protectionLevel="signature|system" /> 1096 1097 <!-- Allows access to configure network interfaces, configure/use IPSec, etc. 1098 @hide --> 1099 <permission android:name="android.permission.NET_ADMIN" 1100 android:protectionLevel="signature" /> 1101 1102 <!-- Allows registration for remote audio playback. @hide --> 1103 <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK" 1104 android:protectionLevel="signature" /> 1105 1106 <!-- @SystemApi Allows TvInputService to access underlying TV input hardware such as 1107 built-in tuners and HDMI-in's. 1108 @hide This should only be used by OEM's TvInputService's. 1109 --> 1110 <permission android:name="android.permission.TV_INPUT_HARDWARE" 1111 android:protectionLevel="signatureOrSystem" /> 1112 1113 <!-- @SystemApi Allows to capture a frame of TV input hardware such as 1114 built-in tuners and HDMI-in's. 1115 @hide <p>Not for use by third-party applications. 1116 --> 1117 <permission android:name="android.permission.CAPTURE_TV_INPUT" 1118 android:protectionLevel="signatureOrSystem" /> 1119 1120 <!-- @hide Allows enabling/disabling OEM unlock 1121 <p>Not for use by third-party applications. --> 1122 <permission android:name="android.permission.OEM_UNLOCK_STATE" 1123 android:protectionLevel="signature" /> 1124 1125 <!-- @hide Allows querying state of PersistentDataBlock 1126 <p>Not for use by third-party applications. --> 1127 <permission android:name="android.permission.ACCESS_PDB_STATE" 1128 android:protectionLevel="signature" /> 1129 1130 <!-- =========================================== --> 1131 <!-- Permissions associated with camera and image capture --> 1132 <!-- =========================================== --> 1133 <eat-comment /> 1134 1135 <!-- @SystemApi Allows disabling the transmit-indicator LED that is normally on when 1136 a camera is in use by an application. 1137 @hide --> 1138 <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED" 1139 android:protectionLevel="signature|system" /> 1140 1141 <!-- Allows sending the camera service notifications about system-wide events. 1142 @hide --> 1143 <permission android:name="android.permission.CAMERA_SEND_SYSTEM_EVENTS" 1144 android:protectionLevel="signature|system" /> 1145 1146 <!-- =========================================== --> 1147 <!-- Permissions associated with telephony state --> 1148 <!-- =========================================== --> 1149 <eat-comment /> 1150 1151 <!-- @SystemApi Allows modification of the telephony state - power on, mmi, etc. 1152 Does not include placing calls. 1153 <p>Not for use by third-party applications. --> 1154 <permission android:name="android.permission.MODIFY_PHONE_STATE" 1155 android:protectionLevel="signature|system" /> 1156 1157 <!-- Allows read only access to precise phone state. 1158 @hide Pending API council approval --> 1159 <permission android:name="android.permission.READ_PRECISE_PHONE_STATE" 1160 android:protectionLevel="signature|system" /> 1161 1162 <!-- @SystemApi Allows read access to privileged phone state. 1163 @hide Used internally. --> 1164 <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE" 1165 android:protectionLevel="signature|system" /> 1166 1167 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1168 PhoneAccount#CAPABILITY_SIM_SUBSCRIPTION. This capability indicates that the PhoneAccount 1169 corresponds to a device SIM. 1170 @hide --> 1171 <permission android:name="android.permission.REGISTER_SIM_SUBSCRIPTION" 1172 android:protectionLevel="system|signature" /> 1173 1174 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1175 PhoneAccount#CAPABILITY_CALL_PROVIDER. 1176 @hide --> 1177 <permission android:name="android.permission.REGISTER_CALL_PROVIDER" 1178 android:protectionLevel="system|signature" /> 1179 1180 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1181 PhoneAccount#CAPABILITY_CONNECTION_MANAGER 1182 @hide --> 1183 <permission android:name="android.permission.REGISTER_CONNECTION_MANAGER" 1184 android:protectionLevel="system|signature" /> 1185 1186 <!-- @SystemApi Allows an application to bind to InCallService implementations. 1187 @hide --> 1188 <permission android:name="android.permission.BIND_INCALL_SERVICE" 1189 android:protectionLevel="system|signature" /> 1190 1191 <!-- @SystemApi Allows an application to bind to ConnectionService implementations. 1192 @hide --> 1193 <permission android:name="android.permission.BIND_CONNECTION_SERVICE" 1194 android:protectionLevel="system|signature" /> 1195 1196 <!-- @SystemApi Allows an application to control the in-call experience. 1197 @hide --> 1198 <permission android:name="android.permission.CONTROL_INCALL_EXPERIENCE" 1199 android:protectionLevel="system|signature" /> 1200 1201 <!-- ================================== --> 1202 <!-- Permissions for sdcard interaction --> 1203 <!-- ================================== --> 1204 <eat-comment /> 1205 1206 <!-- Allows an application to read from external storage. 1207 <p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly 1208 granted this permission.</p> 1209 <p>This permission is enforced starting in API level 19. Before API level 19, this 1210 permission is not enforced and all apps still have access to read from external storage. 1211 You can test your app with the permission enforced by enabling <em>Protect USB 1212 storage</em> under Developer options in the Settings app on a device running Android 4.1 or 1213 higher.</p> 1214 <p>Also starting in API level 19, this permission is <em>not</em> required to 1215 read/write files in your application-specific directories returned by 1216 {@link android.content.Context#getExternalFilesDir} and 1217 {@link android.content.Context#getExternalCacheDir}. 1218 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 1219 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 1220 minSdkVersion}</a> and <a 1221 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 1222 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 1223 grants your app this permission. If you don't need this permission, be sure your <a 1224 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 1225 targetSdkVersion}</a> is 4 or higher.--> 1226 <permission android:name="android.permission.READ_EXTERNAL_STORAGE" 1227 android:label="@string/permlab_sdcardRead" 1228 android:description="@string/permdesc_sdcardRead" 1229 android:protectionLevel="normal" /> 1230 1231 <!-- Allows an application to write to external storage. 1232 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 1233 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 1234 minSdkVersion}</a> and <a 1235 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 1236 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 1237 grants your app this permission. If you don't need this permission, be sure your <a 1238 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 1239 targetSdkVersion}</a> is 4 or higher. 1240 <p>Starting in API level 19, this permission is <em>not</em> required to 1241 read/write files in your application-specific directories returned by 1242 {@link android.content.Context#getExternalFilesDir} and 1243 {@link android.content.Context#getExternalCacheDir}. --> 1244 <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE" 1245 android:label="@string/permlab_sdcardWrite" 1246 android:description="@string/permdesc_sdcardWrite" 1247 android:protectionLevel="normal" /> 1248 1249 <!-- @SystemApi Allows an application to write to internal media storage 1250 @hide --> 1251 <permission android:name="android.permission.WRITE_MEDIA_STORAGE" 1252 android:protectionLevel="signature|system" /> 1253 1254 <!-- Allows an application to manage access to documents, usually as part 1255 of a document picker. --> 1256 <permission android:name="android.permission.MANAGE_DOCUMENTS" 1257 android:protectionLevel="signature" /> 1258 1259 <!-- ================================== --> 1260 <!-- Permissions for screenlock --> 1261 <!-- ================================== --> 1262 <eat-comment /> 1263 1264 <!-- Allows applications to disable the keyguard if it is not secure. --> 1265 <permission android:name="android.permission.DISABLE_KEYGUARD" 1266 android:description="@string/permdesc_disableKeyguard" 1267 android:label="@string/permlab_disableKeyguard" 1268 android:protectionLevel="dangerous" /> 1269 1270 <!-- ================================== --> 1271 <!-- Permissions to access other installed applications --> 1272 <!-- ================================== --> 1273 <eat-comment /> 1274 1275 <!-- @deprecated No longer enforced. --> 1276 <permission android:name="android.permission.GET_TASKS" 1277 android:label="@string/permlab_getTasks" 1278 android:description="@string/permdesc_getTasks" 1279 android:protectionLevel="normal" /> 1280 1281 <!-- New version of GET_TASKS that apps can request, since GET_TASKS doesn't really 1282 give access to task information. We need this new one because there are 1283 many existing apps that use add libraries and such that have validation 1284 code to ensure the app has requested the GET_TASKS permission by seeing 1285 if it has been granted the permission... if it hasn't, it kills the app 1286 with a message about being upset. So we need to have it continue to look 1287 like the app is getting that permission, even though it will never be 1288 checked, and new privileged apps can now request this one for real access. 1289 @hide 1290 @SystemApi --> 1291 <permission android:name="android.permission.REAL_GET_TASKS" 1292 android:protectionLevel="signature|system" /> 1293 1294 <!-- Allows an application to start a task from a ActivityManager#RecentTaskInfo. 1295 @hide --> 1296 <permission android:name="android.permission.START_TASKS_FROM_RECENTS" 1297 android:protectionLevel="signature|system" /> 1298 1299 <!-- @SystemApi @hide Allows an application to call APIs that allow it to do interactions 1300 across the users on the device, using singleton services and 1301 user-targeted broadcasts. This permission is not available to 1302 third party applications. --> 1303 <permission android:name="android.permission.INTERACT_ACROSS_USERS" 1304 android:protectionLevel="signature|system|development" /> 1305 1306 <!-- @hide Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS} 1307 that removes restrictions on where broadcasts can be sent and allows other 1308 types of interactions. --> 1309 <permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL" 1310 android:protectionLevel="signature" /> 1311 1312 <!-- @SystemApi @hide Allows an application to call APIs that allow it to query and manage 1313 users on the device. This permission is not available to 1314 third party applications. --> 1315 <permission android:name="android.permission.MANAGE_USERS" 1316 android:protectionLevel="signature|system" /> 1317 1318 <!-- Allows an application to get full detailed information about 1319 recently running tasks, with full fidelity to the real state. 1320 @hide --> 1321 <permission android:name="android.permission.GET_DETAILED_TASKS" 1322 android:protectionLevel="signature" /> 1323 1324 <!-- Allows an application to change the Z-order of tasks --> 1325 <permission android:name="android.permission.REORDER_TASKS" 1326 android:label="@string/permlab_reorderTasks" 1327 android:description="@string/permdesc_reorderTasks" 1328 android:protectionLevel="normal" /> 1329 1330 <!-- @hide Allows an application to change to remove/kill tasks --> 1331 <permission android:name="android.permission.REMOVE_TASKS" 1332 android:protectionLevel="signature" /> 1333 1334 <!-- @SystemApi @hide Allows an application to create/manage/remove stacks --> 1335 <permission android:name="android.permission.MANAGE_ACTIVITY_STACKS" 1336 android:protectionLevel="signature|system" /> 1337 1338 <!-- Allows an application to start any activity, regardless of permission 1339 protection or exported state. 1340 @hide --> 1341 <permission android:name="android.permission.START_ANY_ACTIVITY" 1342 android:protectionLevel="signature" /> 1343 1344 <!-- @deprecated The {@link android.app.ActivityManager#restartPackage} 1345 API is no longer supported. --> 1346 <permission android:name="android.permission.RESTART_PACKAGES" 1347 android:label="@string/permlab_killBackgroundProcesses" 1348 android:description="@string/permdesc_killBackgroundProcesses" 1349 android:protectionLevel="normal" /> 1350 1351 <!-- Allows an application to call 1352 {@link android.app.ActivityManager#killBackgroundProcesses}. --> 1353 <permission android:name="android.permission.KILL_BACKGROUND_PROCESSES" 1354 android:label="@string/permlab_killBackgroundProcesses" 1355 android:description="@string/permdesc_killBackgroundProcesses" 1356 android:protectionLevel="normal" /> 1357 1358 <!-- ================================== --> 1359 <!-- Permissions affecting the display of other applications --> 1360 <!-- ================================== --> 1361 <eat-comment /> 1362 1363 <!-- Allows an application to open windows using the type 1364 {@link android.view.WindowManager.LayoutParams#TYPE_SYSTEM_ALERT}, 1365 shown on top of all other applications. Very few applications 1366 should use this permission; these windows are intended for 1367 system-level interaction with the user. --> 1368 <permission android:name="android.permission.SYSTEM_ALERT_WINDOW" 1369 android:label="@string/permlab_systemAlertWindow" 1370 android:description="@string/permdesc_systemAlertWindow" 1371 android:protectionLevel="dangerous" /> 1372 1373 <!-- ================================== --> 1374 <!-- Permissions affecting the system wallpaper --> 1375 <!-- ================================== --> 1376 <eat-comment /> 1377 1378 <!-- Allows applications to set the wallpaper --> 1379 <permission android:name="android.permission.SET_WALLPAPER" 1380 android:label="@string/permlab_setWallpaper" 1381 android:description="@string/permdesc_setWallpaper" 1382 android:protectionLevel="normal" /> 1383 1384 <!-- Allows applications to set the wallpaper hints --> 1385 <permission android:name="android.permission.SET_WALLPAPER_HINTS" 1386 android:label="@string/permlab_setWallpaperHints" 1387 android:description="@string/permdesc_setWallpaperHints" 1388 android:protectionLevel="normal" /> 1389 1390 <!-- ============================================ --> 1391 <!-- Permissions for changing the system clock --> 1392 <!-- ============================================ --> 1393 <eat-comment /> 1394 1395 <!-- @SystemApi Allows applications to set the system time. 1396 <p>Not for use by third-party applications. --> 1397 <permission android:name="android.permission.SET_TIME" 1398 android:protectionLevel="signature|system" /> 1399 1400 <!-- Allows applications to set the system time zone --> 1401 <permission android:name="android.permission.SET_TIME_ZONE" 1402 android:label="@string/permlab_setTimeZone" 1403 android:description="@string/permdesc_setTimeZone" 1404 android:protectionLevel="normal" /> 1405 1406 <!-- ==================================================== --> 1407 <!-- Permissions related to changing status bar --> 1408 <!-- ==================================================== --> 1409 <eat-comment /> 1410 1411 <!-- Allows an application to expand or collapse the status bar. --> 1412 <permission android:name="android.permission.EXPAND_STATUS_BAR" 1413 android:label="@string/permlab_expandStatusBar" 1414 android:description="@string/permdesc_expandStatusBar" 1415 android:protectionLevel="normal" /> 1416 1417 <!-- ============================================================== --> 1418 <!-- Permissions related to adding/removing shortcuts from Launcher --> 1419 <!-- ============================================================== --> 1420 <eat-comment /> 1421 1422 <!-- Allows an application to install a shortcut in Launcher --> 1423 <permission android:name="com.android.launcher.permission.INSTALL_SHORTCUT" 1424 android:label="@string/permlab_install_shortcut" 1425 android:description="@string/permdesc_install_shortcut" 1426 android:protectionLevel="dangerous"/> 1427 1428 <!-- Allows an application to uninstall a shortcut in Launcher --> 1429 <permission android:name="com.android.launcher.permission.UNINSTALL_SHORTCUT" 1430 android:label="@string/permlab_uninstall_shortcut" 1431 android:description="@string/permdesc_uninstall_shortcut" 1432 android:protectionLevel="dangerous"/> 1433 1434 <!-- ==================================================== --> 1435 <!-- Permissions related to accessing sync settings --> 1436 <!-- ==================================================== --> 1437 <eat-comment /> 1438 1439 <!-- Allows applications to read the sync settings --> 1440 <permission android:name="android.permission.READ_SYNC_SETTINGS" 1441 android:description="@string/permdesc_readSyncSettings" 1442 android:label="@string/permlab_readSyncSettings" 1443 android:protectionLevel="normal" /> 1444 1445 <!-- Allows applications to write the sync settings --> 1446 <permission android:name="android.permission.WRITE_SYNC_SETTINGS" 1447 android:description="@string/permdesc_writeSyncSettings" 1448 android:label="@string/permlab_writeSyncSettings" 1449 android:protectionLevel="normal" /> 1450 1451 <!-- Allows applications to read the sync stats --> 1452 <permission android:name="android.permission.READ_SYNC_STATS" 1453 android:description="@string/permdesc_readSyncStats" 1454 android:label="@string/permlab_readSyncStats" 1455 android:protectionLevel="normal" /> 1456 1457 1458 <!-- ============================================ --> 1459 <!-- Permissions for low-level system interaction --> 1460 <!-- ============================================ --> 1461 <eat-comment /> 1462 1463 <!-- @SystemApi @hide Change the screen compatibility mode of applications --> 1464 <permission android:name="android.permission.SET_SCREEN_COMPATIBILITY" 1465 android:protectionLevel="signature" /> 1466 1467 <!-- Allows an application to access all multi-user external storage @hide --> 1468 <permission android:name="android.permission.ACCESS_ALL_EXTERNAL_STORAGE" 1469 android:protectionLevel="signature" /> 1470 1471 <!-- @SystemApi Allows an application to modify the current configuration, such 1472 as locale. --> 1473 <permission android:name="android.permission.CHANGE_CONFIGURATION" 1474 android:protectionLevel="signature|system|development" /> 1475 1476 <!-- Allows an application to read or write the system settings. --> 1477 <permission android:name="android.permission.WRITE_SETTINGS" 1478 android:label="@string/permlab_writeSettings" 1479 android:description="@string/permdesc_writeSettings" 1480 android:protectionLevel="normal" /> 1481 1482 <!-- @SystemApi Allows an application to modify the Google service map. 1483 <p>Not for use by third-party applications. --> 1484 <permission android:name="android.permission.WRITE_GSERVICES" 1485 android:protectionLevel="signature|system" /> 1486 1487 <!-- @SystemApi Allows an application to call 1488 {@link android.app.ActivityManager#forceStopPackage}. 1489 @hide --> 1490 <permission android:name="android.permission.FORCE_STOP_PACKAGES" 1491 android:protectionLevel="signature|system" /> 1492 1493 <!-- @SystemApi @hide Allows an application to retrieve the content of the active window 1494 An active window is the window that has fired an accessibility event. --> 1495 <permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT" 1496 android:protectionLevel="signature|system" /> 1497 1498 <!-- @SystemApi Modify the global animation scaling factor. 1499 <p>Not for use by third-party applications. --> 1500 <permission android:name="android.permission.SET_ANIMATION_SCALE" 1501 android:protectionLevel="signature|system|development" /> 1502 1503 <!-- @deprecated This functionality will be removed in the future; please do 1504 not use. Allow an application to make its activities persistent. --> 1505 <permission android:name="android.permission.PERSISTENT_ACTIVITY" 1506 android:label="@string/permlab_persistentActivity" 1507 android:description="@string/permdesc_persistentActivity" 1508 android:protectionLevel="normal" /> 1509 1510 <!-- Allows an application to find out the space used by any package. --> 1511 <permission android:name="android.permission.GET_PACKAGE_SIZE" 1512 android:label="@string/permlab_getPackageSize" 1513 android:description="@string/permdesc_getPackageSize" 1514 android:protectionLevel="normal" /> 1515 1516 <!-- @deprecated No longer useful, see 1517 {@link android.content.pm.PackageManager#addPackageToPreferred} 1518 for details. --> 1519 <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS" 1520 android:protectionLevel="signature" /> 1521 1522 <!-- Allows an application to receive the 1523 {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is 1524 broadcast after the system finishes booting. If you don't 1525 request this permission, you will not receive the broadcast at 1526 that time. Though holding this permission does not have any 1527 security implications, it can have a negative impact on the 1528 user experience by increasing the amount of time it takes the 1529 system to start and allowing applications to have themselves 1530 running without the user being aware of them. As such, you must 1531 explicitly declare your use of this facility to make that visible 1532 to the user. --> 1533 <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED" 1534 android:label="@string/permlab_receiveBootCompleted" 1535 android:description="@string/permdesc_receiveBootCompleted" 1536 android:protectionLevel="normal" /> 1537 1538 <!-- Allows an application to broadcast sticky intents. These are 1539 broadcasts whose data is held by the system after being finished, 1540 so that clients can quickly retrieve that data without having 1541 to wait for the next broadcast. --> 1542 <permission android:name="android.permission.BROADCAST_STICKY" 1543 android:label="@string/permlab_broadcastSticky" 1544 android:description="@string/permdesc_broadcastSticky" 1545 android:protectionLevel="normal" /> 1546 1547 <!-- @SystemApi Allows mounting and unmounting file systems for removable storage. 1548 <p>Not for use by third-party applications.--> 1549 <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS" 1550 android:protectionLevel="system|signature" /> 1551 1552 <!-- @SystemApi Allows formatting file systems for removable storage. 1553 <p>Not for use by third-party applications. --> 1554 <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS" 1555 android:protectionLevel="system|signature" /> 1556 1557 <!-- Allows access to ASEC non-destructive API calls 1558 @hide --> 1559 <permission android:name="android.permission.ASEC_ACCESS" 1560 android:protectionLevel="signature" /> 1561 1562 <!-- Allows creation of ASEC volumes 1563 @hide --> 1564 <permission android:name="android.permission.ASEC_CREATE" 1565 android:protectionLevel="signature" /> 1566 1567 <!-- Allows destruction of ASEC volumes 1568 @hide --> 1569 <permission android:name="android.permission.ASEC_DESTROY" 1570 android:protectionLevel="signature" /> 1571 1572 <!-- Allows mount / unmount of ASEC volumes 1573 @hide --> 1574 <permission android:name="android.permission.ASEC_MOUNT_UNMOUNT" 1575 android:protectionLevel="signature" /> 1576 1577 <!-- Allows rename of ASEC volumes 1578 @hide --> 1579 <permission android:name="android.permission.ASEC_RENAME" 1580 android:protectionLevel="signature" /> 1581 1582 <!-- @SystemApi Allows applications to write the apn settings. 1583 <p>Not for use by third-party applications. --> 1584 <permission android:name="android.permission.WRITE_APN_SETTINGS" 1585 android:protectionLevel="signature|system" /> 1586 1587 <!-- Allows an application to allow access the subscribed feeds ContentProvider. 1588 @hide 1589 @removed 1590 --> 1591 <permission android:name="android.permission.SUBSCRIBED_FEEDS_READ" 1592 android:label="@string/permlab_subscribedFeedsRead" 1593 android:description="@string/permdesc_subscribedFeedsRead" 1594 android:protectionLevel="normal" /> 1595 1596 <!-- 1597 @hide 1598 @removed 1599 --> 1600 <permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE" 1601 android:label="@string/permlab_subscribedFeedsWrite" 1602 android:description="@string/permdesc_subscribedFeedsWrite" 1603 android:protectionLevel="dangerous" /> 1604 1605 <!-- Allows applications to change network connectivity state --> 1606 <permission android:name="android.permission.CHANGE_NETWORK_STATE" 1607 android:description="@string/permdesc_changeNetworkState" 1608 android:label="@string/permlab_changeNetworkState" 1609 android:protectionLevel="normal" /> 1610 1611 <!-- Allows an application to clear the caches of all installed 1612 applications on the device. --> 1613 <permission android:name="android.permission.CLEAR_APP_CACHE" 1614 android:protectionLevel="dangerous" /> 1615 1616 <!-- @SystemApi Allows an application to use any media decoder when decoding for playback 1617 @hide --> 1618 <permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK" 1619 android:protectionLevel="signature|system" /> 1620 1621 <!-- @SystemApi Allows an application to install and/or uninstall CA certificates on 1622 behalf of the user. 1623 @hide --> 1624 <permission android:name="android.permission.MANAGE_CA_CERTIFICATES" 1625 android:protectionLevel="signature|system" /> 1626 1627 <!-- @SystemApi Allows an application to do certain operations needed for 1628 interacting with the recovery (system update) system. 1629 @hide --> 1630 <permission android:name="android.permission.RECOVERY" 1631 android:protectionLevel="signature|system" /> 1632 1633 <!-- Allows the system to bind to an application's task services 1634 @hide --> 1635 <permission android:name="android.permission.BIND_JOB_SERVICE" 1636 android:protectionLevel="signature" /> 1637 <uses-permission android:name="android.permission.BIND_JOB_SERVICE"/> 1638 1639 <!-- Allows an application to initiate configuration updates 1640 <p>An application requesting this permission is responsible for 1641 verifying the source and integrity of any update before passing 1642 it off to the various individual installer components 1643 @hide --> 1644 <permission android:name="android.permission.UPDATE_CONFIG" 1645 android:protectionLevel="signature|system" /> 1646 1647 <!-- ========================================= --> 1648 <!-- Permissions for special development tools --> 1649 <!-- ========================================= --> 1650 <eat-comment /> 1651 1652 <!-- @SystemApi Allows an application to read or write the secure system settings. 1653 <p>Not for use by third-party applications. --> 1654 <permission android:name="android.permission.WRITE_SECURE_SETTINGS" 1655 android:protectionLevel="signature|system|development" /> 1656 1657 <!-- @SystemApi Allows an application to retrieve state dump information from system services. 1658 <p>Not for use by third-party applications. --> 1659 <permission android:name="android.permission.DUMP" 1660 android:protectionLevel="signature|system|development" /> 1661 1662 <!-- @SystemApi Allows an application to read the low-level system log files. 1663 <p>Not for use by third-party applications, because 1664 Log entries can contain the user's private information. --> 1665 <permission android:name="android.permission.READ_LOGS" 1666 android:protectionLevel="signature|system|development" /> 1667 1668 <!-- @SystemApi Configure an application for debugging. 1669 <p>Not for use by third-party applications. --> 1670 <permission android:name="android.permission.SET_DEBUG_APP" 1671 android:protectionLevel="signature|system|development" /> 1672 1673 <!-- @SystemApi Allows an application to set the maximum number of (not needed) 1674 application processes that can be running. 1675 <p>Not for use by third-party applications. --> 1676 <permission android:name="android.permission.SET_PROCESS_LIMIT" 1677 android:protectionLevel="signature|system|development" /> 1678 1679 <!-- @SystemApi Allows an application to control whether activities are immediately 1680 finished when put in the background. 1681 <p>Not for use by third-party applications. --> 1682 <permission android:name="android.permission.SET_ALWAYS_FINISH" 1683 android:protectionLevel="signature|system|development" /> 1684 1685 <!-- @SystemApi Allow an application to request that a signal be sent to all persistent processes. 1686 <p>Not for use by third-party applications. --> 1687 <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES" 1688 android:protectionLevel="signature|system|development" /> 1689 1690 <!-- ==================================== --> 1691 <!-- Private permissions --> 1692 <!-- ==================================== --> 1693 <eat-comment /> 1694 1695 <!-- @SystemApi Allows applications to RW to diagnostic resources. 1696 <p>Not for use by third-party applications. --> 1697 <permission android:name="android.permission.DIAGNOSTIC" 1698 android:protectionLevel="signature" /> 1699 1700 <!-- @SystemApi Allows an application to open, close, or disable the status bar 1701 and its icons. 1702 <p>Not for use by third-party applications. --> 1703 <permission android:name="android.permission.STATUS_BAR" 1704 android:protectionLevel="signature|system" /> 1705 1706 <!-- Allows an application to be the status bar. Currently used only by SystemUI.apk 1707 @hide --> 1708 <permission android:name="android.permission.STATUS_BAR_SERVICE" 1709 android:protectionLevel="signature" /> 1710 1711 <!-- Allows an application to force a BACK operation on whatever is the 1712 top activity. 1713 <p>Not for use by third-party applications. --> 1714 <permission android:name="android.permission.FORCE_BACK" 1715 android:protectionLevel="signature" /> 1716 1717 <!-- @SystemApi Allows an application to update device statistics. 1718 <p>Not for use by third-party applications. --> 1719 <permission android:name="android.permission.UPDATE_DEVICE_STATS" 1720 android:protectionLevel="signature|system" /> 1721 1722 <!-- @SystemApi @hide Allows an application to collect battery statistics --> 1723 <permission android:name="android.permission.GET_APP_OPS_STATS" 1724 android:protectionLevel="signature|system|development" /> 1725 1726 <!-- @SystemApi Allows an application to update application operation statistics. Not for 1727 use by third party apps. @hide --> 1728 <permission android:name="android.permission.UPDATE_APP_OPS_STATS" 1729 android:protectionLevel="signature|system" /> 1730 1731 <!-- Allows an application to open windows that are for use by parts 1732 of the system user interface. 1733 <p>Not for use by third-party applications. --> 1734 <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW" 1735 android:protectionLevel="signature" /> 1736 1737 <!-- Allows an application to manage (create, destroy, 1738 Z-order) application tokens in the window manager. 1739 <p>Not for use by third-party applications. --> 1740 <permission android:name="android.permission.MANAGE_APP_TOKENS" 1741 android:protectionLevel="signature" /> 1742 1743 <!-- @hide Allows the application to temporarily freeze the screen for a 1744 full-screen transition. --> 1745 <permission android:name="android.permission.FREEZE_SCREEN" 1746 android:protectionLevel="signature" /> 1747 1748 <!-- Allows an application to inject user events (keys, touch, trackball) 1749 into the event stream and deliver them to ANY window. Without this 1750 permission, you can only deliver events to windows in your own process. 1751 <p>Not for use by third-party applications. --> 1752 <permission android:name="android.permission.INJECT_EVENTS" 1753 android:protectionLevel="signature" /> 1754 1755 <!-- @hide Allows an application to register an input filter which filters the stream 1756 of user events (keys, touch, trackball) before they are dispatched to any window. --> 1757 <permission android:name="android.permission.FILTER_EVENTS" 1758 android:protectionLevel="signature" /> 1759 1760 <!-- @hide Allows an application to retrieve the window token from the accessibility manager. --> 1761 <permission android:name="android.permission.RETRIEVE_WINDOW_TOKEN" 1762 android:protectionLevel="signature" /> 1763 1764 <!-- @hide Allows an application to collect frame statistics --> 1765 <permission android:name="android.permission.FRAME_STATS" 1766 android:protectionLevel="signature" /> 1767 1768 <!-- @hide Allows an application to temporary enable accessibility on the device. --> 1769 <permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY" 1770 android:protectionLevel="signature" /> 1771 1772 <!-- Allows an application to watch and control how activities are 1773 started globally in the system. Only for is in debugging 1774 (usually the monkey command). 1775 <p>Not for use by third-party applications. --> 1776 <permission android:name="android.permission.SET_ACTIVITY_WATCHER" 1777 android:protectionLevel="signature" /> 1778 1779 <!-- @SystemApi Allows an application to call the activity manager shutdown() API 1780 to put the higher-level system there into a shutdown state. 1781 @hide --> 1782 <permission android:name="android.permission.SHUTDOWN" 1783 android:protectionLevel="signature|system" /> 1784 1785 <!-- @SystemApi Allows an application to tell the activity manager to temporarily 1786 stop application switches, putting it into a special mode that 1787 prevents applications from immediately switching away from some 1788 critical UI such as the home screen. 1789 @hide --> 1790 <permission android:name="android.permission.STOP_APP_SWITCHES" 1791 android:protectionLevel="signature|system" /> 1792 1793 <!-- Allows an application to retrieve private information about 1794 the current top activity, such as any assist context it can provide. 1795 <p>Not for use by third-party applications. --> 1796 <permission android:name="android.permission.GET_TOP_ACTIVITY_INFO" 1797 android:protectionLevel="signature" /> 1798 1799 <!-- Allows an application to retrieve the current state of keys and 1800 switches. 1801 <p>Not for use by third-party applications. 1802 @deprecated The API that used this permission has been removed. --> 1803 <permission android:name="android.permission.READ_INPUT_STATE" 1804 android:protectionLevel="signature" /> 1805 1806 <!-- Must be required by an {@link android.inputmethodservice.InputMethodService}, 1807 to ensure that only the system can bind to it. --> 1808 <permission android:name="android.permission.BIND_INPUT_METHOD" 1809 android:protectionLevel="signature" /> 1810 1811 <!-- Must be required by an {@link android.accessibilityservice.AccessibilityService}, 1812 to ensure that only the system can bind to it. --> 1813 <permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE" 1814 android:protectionLevel="signature" /> 1815 1816 <!-- Must be required by a {@link android.printservice.PrintService}, 1817 to ensure that only the system can bind to it. --> 1818 <permission android:name="android.permission.BIND_PRINT_SERVICE" 1819 android:protectionLevel="signature" /> 1820 1821 <!-- Must be required by a {@link android.nfc.cardemulation.HostApduService} 1822 or {@link android.nfc.cardemulation.OffHostApduService} to ensure that only 1823 the system can bind to it. --> 1824 <permission android:name="android.permission.BIND_NFC_SERVICE" 1825 android:protectionLevel="signature" /> 1826 1827 <!-- Must be required by the PrintSpooler to ensure that only the system can bind to it. 1828 @hide --> 1829 <permission android:name="android.permission.BIND_PRINT_SPOOLER_SERVICE" 1830 android:protectionLevel="signature" /> 1831 1832 <!-- Must be required by a TextService (e.g. SpellCheckerService) 1833 to ensure that only the system can bind to it. --> 1834 <permission android:name="android.permission.BIND_TEXT_SERVICE" 1835 android:protectionLevel="signature" /> 1836 1837 <!-- Must be required by a {@link android.net.VpnService}, 1838 to ensure that only the system can bind to it. --> 1839 <permission android:name="android.permission.BIND_VPN_SERVICE" 1840 android:protectionLevel="signature" /> 1841 1842 <!-- Must be required by a {@link android.service.wallpaper.WallpaperService}, 1843 to ensure that only the system can bind to it. --> 1844 <permission android:name="android.permission.BIND_WALLPAPER" 1845 android:protectionLevel="signature|system" /> 1846 1847 <!-- Must be required by a {@link android.service.voice.VoiceInteractionService}, 1848 to ensure that only the system can bind to it. --> 1849 <permission android:name="android.permission.BIND_VOICE_INTERACTION" 1850 android:protectionLevel="signature" /> 1851 1852 <!-- Must be required by hotword enrollment application, 1853 to ensure that only the system can interact with it. 1854 @hide <p>Not for use by third-party applications.</p> --> 1855 <permission android:name="android.permission.MANAGE_VOICE_KEYPHRASES" 1856 android:protectionLevel="signature|system" /> 1857 1858 <!-- Must be required by a {@link com.android.media.remotedisplay.RemoteDisplayProvider}, 1859 to ensure that only the system can bind to it. 1860 @hide --> 1861 <permission android:name="android.permission.BIND_REMOTE_DISPLAY" 1862 android:protectionLevel="signature" /> 1863 1864 <!-- Must be required by a {@link android.media.tv.TvInputService} 1865 to ensure that only the system can bind to it. --> 1866 <permission android:name="android.permission.BIND_TV_INPUT" 1867 android:protectionLevel="signature|system" /> 1868 1869 <!-- @SystemApi Allows an application to modify parental controls 1870 <p>Not for use by third-party applications. 1871 @hide --> 1872 <permission android:name="android.permission.MODIFY_PARENTAL_CONTROLS" 1873 android:protectionLevel="signature|system" /> 1874 1875 <!-- Must be required by a {@link android.media.routing.MediaRouteService} 1876 to ensure that only the system can interact with it. 1877 @hide --> 1878 <permission android:name="android.permission.BIND_ROUTE_PROVIDER" 1879 android:protectionLevel="signature" /> 1880 1881 <!-- Must be required by device administration receiver, to ensure that only the 1882 system can interact with it. --> 1883 <permission android:name="android.permission.BIND_DEVICE_ADMIN" 1884 android:protectionLevel="signature" /> 1885 1886 <!-- @SystemApi Required to add or remove another application as a device admin. 1887 <p>Not for use by third-party applications. 1888 @hide --> 1889 <permission android:name="android.permission.MANAGE_DEVICE_ADMINS" 1890 android:protectionLevel="signature|system" /> 1891 1892 <!-- Allows low-level access to setting the orientation (actually 1893 rotation) of the screen. 1894 <p>Not for use by third-party applications. --> 1895 <permission android:name="android.permission.SET_ORIENTATION" 1896 android:protectionLevel="signature" /> 1897 1898 <!-- Allows low-level access to setting the pointer speed. 1899 <p>Not for use by third-party applications. --> 1900 <permission android:name="android.permission.SET_POINTER_SPEED" 1901 android:protectionLevel="signature" /> 1902 1903 <!-- Allows low-level access to setting input device calibration. 1904 <p>Not for use by normal applications. 1905 @hide --> 1906 <permission android:name="android.permission.SET_INPUT_CALIBRATION" 1907 android:protectionLevel="signature" /> 1908 1909 <!-- Allows low-level access to setting the keyboard layout. 1910 <p>Not for use by third-party applications. 1911 @hide --> 1912 <permission android:name="android.permission.SET_KEYBOARD_LAYOUT" 1913 android:protectionLevel="signature" /> 1914 1915 <!-- @SystemApi Allows an application to install packages. 1916 <p>Not for use by third-party applications. --> 1917 <permission android:name="android.permission.INSTALL_PACKAGES" 1918 android:protectionLevel="signature|system" /> 1919 1920 <!-- Allows an application to clear user data. 1921 <p>Not for use by third-party applications. --> 1922 <permission android:name="android.permission.CLEAR_APP_USER_DATA" 1923 android:protectionLevel="signature" /> 1924 1925 <!-- @SystemApi Allows an application to delete cache files. 1926 <p>Not for use by third-party applications. --> 1927 <permission android:name="android.permission.DELETE_CACHE_FILES" 1928 android:protectionLevel="signature|system" /> 1929 1930 <!-- @SystemApi Allows an application to delete packages. 1931 <p>Not for use by third-party applications. --> 1932 <permission android:name="android.permission.DELETE_PACKAGES" 1933 android:protectionLevel="signature|system" /> 1934 1935 <!-- @SystemApi Allows an application to move location of installed package. 1936 @hide --> 1937 <permission android:name="android.permission.MOVE_PACKAGE" 1938 android:protectionLevel="signature|system" /> 1939 1940 <!-- @SystemApi Allows an application to change whether an application component (other than its own) is 1941 enabled or not. 1942 <p>Not for use by third-party applications. --> 1943 <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE" 1944 android:protectionLevel="signature|system" /> 1945 1946 <!-- @hide Allows an application to grant or revoke specific permissions. --> 1947 <permission android:name="android.permission.GRANT_REVOKE_PERMISSIONS" 1948 android:protectionLevel="signature" /> 1949 1950 <!-- Allows an application to use SurfaceFlinger's low level features. 1951 <p>Not for use by third-party applications. --> 1952 <permission android:name="android.permission.ACCESS_SURFACE_FLINGER" 1953 android:protectionLevel="signature" /> 1954 1955 <!-- @SystemApi Allows an application to take screen shots and more generally 1956 get access to the frame buffer data. 1957 <p>Not for use by third-party applications. --> 1958 <permission android:name="android.permission.READ_FRAME_BUFFER" 1959 android:protectionLevel="signature|system" /> 1960 1961 <!-- Allows an application to use InputFlinger's low level features. 1962 @hide --> 1963 <permission android:name="android.permission.ACCESS_INPUT_FLINGER" 1964 android:protectionLevel="signature" /> 1965 1966 <!-- Allows an application to configure and connect to Wifi displays 1967 @hide --> 1968 <permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY" 1969 android:protectionLevel="signature" /> 1970 1971 <!-- Allows an application to control low-level features of Wifi displays 1972 such as opening an RTSP socket. This permission should only be used 1973 by the display manager. 1974 @hide --> 1975 <permission android:name="android.permission.CONTROL_WIFI_DISPLAY" 1976 android:protectionLevel="signature" /> 1977 1978 <!-- @SystemApi Allows an application to control VPN. 1979 <p>Not for use by third-party applications.</p> 1980 @hide --> 1981 <permission android:name="android.permission.CONTROL_VPN" 1982 android:protectionLevel="signature|system" /> 1983 <uses-permission android:name="android.permission.CONTROL_VPN" /> 1984 1985 <!-- @SystemApi Allows an application to capture audio output. 1986 <p>Not for use by third-party applications.</p> --> 1987 <permission android:name="android.permission.CAPTURE_AUDIO_OUTPUT" 1988 android:protectionLevel="signature|system" /> 1989 1990 <!-- @SystemApi Allows an application to capture audio for hotword detection. 1991 <p>Not for use by third-party applications.</p> 1992 @hide --> 1993 <permission android:name="android.permission.CAPTURE_AUDIO_HOTWORD" 1994 android:protectionLevel="signature|system" /> 1995 1996 <!-- @SystemApi Allows an application to modify audio routing and override policy decisions. 1997 <p>Not for use by third-party applications.</p> 1998 @hide --> 1999 <permission android:name="android.permission.MODIFY_AUDIO_ROUTING" 2000 android:protectionLevel="signature|system" /> 2001 2002 <!-- @SystemApi Allows an application to capture video output. 2003 <p>Not for use by third-party applications.</p> --> 2004 <permission android:name="android.permission.CAPTURE_VIDEO_OUTPUT" 2005 android:protectionLevel="signature|system" /> 2006 2007 <!-- @SystemApi Allows an application to capture secure video output. 2008 <p>Not for use by third-party applications.</p> --> 2009 <permission android:name="android.permission.CAPTURE_SECURE_VIDEO_OUTPUT" 2010 android:protectionLevel="signature|system" /> 2011 2012 <!-- @SystemApi Allows an application to know what content is playing and control its playback. 2013 <p>Not for use by third-party applications due to privacy of media consumption</p> --> 2014 <permission android:name="android.permission.MEDIA_CONTENT_CONTROL" 2015 android:protectionLevel="signature|system" /> 2016 2017 <!-- Required to be able to disable the device (very dangerous!). 2018 <p>Not for use by third-party applications.. --> 2019 <permission android:name="android.permission.BRICK" 2020 android:protectionLevel="signature" /> 2021 2022 <!-- @SystemApi Required to be able to reboot the device. 2023 <p>Not for use by third-party applications. --> 2024 <permission android:name="android.permission.REBOOT" 2025 android:protectionLevel="signature|system" /> 2026 2027 <!-- Allows low-level access to power management. 2028 <p>Not for use by third-party applications. --> 2029 <permission android:name="android.permission.DEVICE_POWER" 2030 android:protectionLevel="signature" /> 2031 2032 <!-- Allows access to the PowerManager.userActivity function. 2033 <p>Not for use by third-party applications. @hide @SystemApi --> 2034 <permission android:name="android.permission.USER_ACTIVITY" 2035 android:protectionLevel="signature|system" /> 2036 2037 <!-- @hide Allows low-level access to tun tap driver --> 2038 <permission android:name="android.permission.NET_TUNNELING" 2039 android:protectionLevel="signature" /> 2040 2041 <!-- Run as a manufacturer test application, running as the root user. 2042 Only available when the device is running in manufacturer test mode. 2043 <p>Not for use by third-party applications. --> 2044 <permission android:name="android.permission.FACTORY_TEST" 2045 android:protectionLevel="signature" /> 2046 2047 <!-- Allows an application to broadcast a notification that an application 2048 package has been removed. 2049 <p>Not for use by third-party applications. --> 2050 <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED" 2051 android:protectionLevel="signature" /> 2052 2053 <!-- Allows an application to broadcast an SMS receipt notification. 2054 <p>Not for use by third-party applications. --> 2055 <permission android:name="android.permission.BROADCAST_SMS" 2056 android:protectionLevel="signature" /> 2057 2058 <!-- Allows an application to broadcast a WAP PUSH receipt notification. 2059 <p>Not for use by third-party applications. --> 2060 <permission android:name="android.permission.BROADCAST_WAP_PUSH" 2061 android:protectionLevel="signature" /> 2062 2063 <!-- @SystemApi Allows an application to broadcast privileged networking requests. 2064 <p>Not for use by third-party applications. @hide --> 2065 <permission android:name="android.permission.BROADCAST_NETWORK_PRIVILEGED" 2066 android:protectionLevel="signature|system" /> 2067 2068 <!-- @SystemApi Not for use by third-party applications. --> 2069 <permission android:name="android.permission.MASTER_CLEAR" 2070 android:protectionLevel="signature|system" /> 2071 2072 <!-- @SystemApi Allows an application to call any phone number, including emergency 2073 numbers, without going through the Dialer user interface for the user 2074 to confirm the call being placed. 2075 <p>Not for use by third-party applications. --> 2076 <permission android:name="android.permission.CALL_PRIVILEGED" 2077 android:protectionLevel="signature|system" /> 2078 2079 <!-- @SystemApi Allows an application to perform CDMA OTA provisioning @hide --> 2080 <permission android:name="android.permission.PERFORM_CDMA_PROVISIONING" 2081 android:protectionLevel="signature|system" /> 2082 2083 <!-- @SystemApi Allows an application to perform SIM Activation @hide --> 2084 <permission android:name="android.permission.PERFORM_SIM_ACTIVATION" 2085 android:protectionLevel="signature|system" /> 2086 2087 <!-- @SystemApi Allows enabling/disabling location update notifications from 2088 the radio. 2089 <p>Not for use by third-party applications. --> 2090 <permission android:name="android.permission.CONTROL_LOCATION_UPDATES" 2091 android:protectionLevel="signature|system" /> 2092 2093 <!-- @SystemApi Allows read/write access to the "properties" table in the checkin 2094 database, to change values that get uploaded. 2095 <p>Not for use by third-party applications. --> 2096 <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES" 2097 android:protectionLevel="signature|system" /> 2098 2099 <!-- @SystemApi Allows an application to collect component usage 2100 statistics 2101 <p>Not for use by third-party applications. --> 2102 <permission android:name="android.permission.PACKAGE_USAGE_STATS" 2103 android:protectionLevel="signature|development|appop" /> 2104 <uses-permission android:name="android.permission.PACKAGE_USAGE_STATS" /> 2105 2106 <!-- @SystemApi Allows an application to collect battery statistics --> 2107 <permission android:name="android.permission.BATTERY_STATS" 2108 android:protectionLevel="signature|system|development" /> 2109 2110 <!-- @SystemApi Allows an application to control the backup and restore process. 2111 <p>Not for use by third-party applications. 2112 @hide pending API council --> 2113 <permission android:name="android.permission.BACKUP" 2114 android:protectionLevel="signature|system" /> 2115 2116 <!-- Allows a package to launch the secure full-backup confirmation UI. 2117 ONLY the system process may hold this permission. 2118 @hide --> 2119 <permission android:name="android.permission.CONFIRM_FULL_BACKUP" 2120 android:protectionLevel="signature" /> 2121 2122 <!-- @SystemApi Must be required by a {@link android.widget.RemoteViewsService}, 2123 to ensure that only the system can bind to it. --> 2124 <permission android:name="android.permission.BIND_REMOTEVIEWS" 2125 android:protectionLevel="signature|system" /> 2126 2127 <!-- @SystemApi Allows an application to tell the AppWidget service which application 2128 can access AppWidget's data. The normal user flow is that a user 2129 picks an AppWidget to go into a particular host, thereby giving that 2130 host application access to the private data from the AppWidget app. 2131 An application that has this permission should honor that contract. 2132 <p>Not for use by third-party applications. --> 2133 <permission android:name="android.permission.BIND_APPWIDGET" 2134 android:protectionLevel="signature|system" /> 2135 2136 <!-- @SystemApi Private permission, to restrict who can bring up a dialog to add a new 2137 keyguard widget 2138 @hide --> 2139 <permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET" 2140 android:protectionLevel="signature|system" /> 2141 2142 <!-- @SystemApi Internal permission allowing an application to query/set which 2143 applications can bind AppWidgets. 2144 @hide --> 2145 <permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS" 2146 android:protectionLevel="signature|system" /> 2147 2148 <!-- Allows applications to change the background data setting. 2149 <p>Not for use by third-party applications. 2150 @hide pending API council --> 2151 <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING" 2152 android:protectionLevel="signature" /> 2153 2154 <!-- @SystemApi This permission can be used on content providers to allow the global 2155 search system to access their data. Typically it used when the 2156 provider has some permissions protecting it (which global search 2157 would not be expected to hold), and added as a read-only permission 2158 to the path in the provider where global search queries are 2159 performed. This permission can not be held by regular applications; 2160 it is used by applications to protect themselves from everyone else 2161 besides global search. --> 2162 <permission android:name="android.permission.GLOBAL_SEARCH" 2163 android:protectionLevel="signature|system" /> 2164 2165 <!-- Internal permission protecting access to the global search 2166 system: ensures that only the system can access the provider 2167 to perform queries (since this otherwise provides unrestricted 2168 access to a variety of content providers), and to write the 2169 search statistics (to keep applications from gaming the source 2170 ranking). 2171 @hide --> 2172 <permission android:name="android.permission.GLOBAL_SEARCH_CONTROL" 2173 android:protectionLevel="signature" /> 2174 2175 <!-- @SystemApi Internal permission to allows an application to read indexable data. 2176 @hide --> 2177 <permission android:name="android.permission.READ_SEARCH_INDEXABLES" 2178 android:protectionLevel="signature|system" /> 2179 2180 <!-- @SystemApi Allows applications to set a live wallpaper. 2181 @hide XXX Change to signature once the picker is moved to its 2182 own apk as Ghod Intended. --> 2183 <permission android:name="android.permission.SET_WALLPAPER_COMPONENT" 2184 android:protectionLevel="signature|system" /> 2185 2186 <!-- @SystemApi Allows applications to read dream settings and dream state. 2187 @hide --> 2188 <permission android:name="android.permission.READ_DREAM_STATE" 2189 android:protectionLevel="signature|system" /> 2190 2191 <!-- @SystemApi Allows applications to write dream settings, and start or stop dreaming. 2192 @hide --> 2193 <permission android:name="android.permission.WRITE_DREAM_STATE" 2194 android:protectionLevel="signature|system" /> 2195 2196 <!-- @SystemApi Allow an application to read and write the cache partition. 2197 @hide --> 2198 <permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM" 2199 android:protectionLevel="signature|system" /> 2200 2201 <!-- Must be required by default container service so that only 2202 the system can bind to it and use it to copy 2203 protected data to secure containers or files 2204 accessible to the system. 2205 @hide --> 2206 <permission android:name="android.permission.COPY_PROTECTED_DATA" 2207 android:protectionLevel="signature" /> 2208 2209 <!-- @SystemApi Internal permission protecting access to the encryption methods 2210 @hide 2211 --> 2212 <permission android:name="android.permission.CRYPT_KEEPER" 2213 android:protectionLevel="signature|system" /> 2214 2215 <!-- @SystemApi Allows an application to read historical network usage for 2216 specific networks and applications. @hide --> 2217 <permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY" 2218 android:protectionLevel="signature|system" /> 2219 2220 <!-- Allows an application to manage network policies (such as warning and disable 2221 limits) and to define application-specific rules. @hide --> 2222 <permission android:name="android.permission.MANAGE_NETWORK_POLICY" 2223 android:protectionLevel="signature" /> 2224 2225 <!-- @SystemApi Allows an application to account its network traffic against other UIDs. Used 2226 by system services like download manager and media server. Not for use by 2227 third party apps. @hide --> 2228 <permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING" 2229 android:protectionLevel="signature|system" /> 2230 2231 <!-- C2DM permission. 2232 @hide Used internally. 2233 --> 2234 <permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE" 2235 android:protectionLevel="signature" /> 2236 <uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/> 2237 2238 <!-- @SystemApi @hide Package verifier needs to have this permission before the PackageManager will 2239 trust it to verify packages. 2240 --> 2241 <permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT" 2242 android:protectionLevel="signature|system" /> 2243 2244 <!-- Must be required by package verifier receiver, to ensure that only the 2245 system can interact with it. 2246 @hide 2247 --> 2248 <permission android:name="android.permission.BIND_PACKAGE_VERIFIER" 2249 android:protectionLevel="signature" /> 2250 2251 <!-- @SystemApi @hide Intent filter verifier needs to have this permission before the 2252 PackageManager will trust it to verify intent filters. 2253 --> 2254 <permission android:name="android.permission.INTENT_FILTER_VERIFICATION_AGENT" 2255 android:protectionLevel="signature|system" /> 2256 2257 <!-- Must be required by intent filter verifier receiver, to ensure that only the 2258 system can interact with it. 2259 @hide 2260 --> 2261 <permission android:name="android.permission.BIND_INTENT_FILTER_VERIFIER" 2262 android:protectionLevel="signature" /> 2263 2264 <!-- @SystemApi Allows applications to access serial ports via the SerialManager. 2265 @hide --> 2266 <permission android:name="android.permission.SERIAL_PORT" 2267 android:protectionLevel="signature|system" /> 2268 2269 <!-- Allows the holder to access content providers from outside an ApplicationThread. 2270 This permission is enforced by the ActivityManagerService on the corresponding APIs, 2271 in particular ActivityManagerService#getContentProviderExternal(String) and 2272 ActivityManagerService#removeContentProviderExternal(String). 2273 @hide 2274 --> 2275 <permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY" 2276 android:protectionLevel="signature" /> 2277 2278 <!-- @SystemApi Allows an application to hold an UpdateLock, recommending that a headless 2279 OTA reboot *not* occur while the lock is held. 2280 @hide --> 2281 <permission android:name="android.permission.UPDATE_LOCK" 2282 android:protectionLevel="signatureOrSystem" /> 2283 2284 <!-- @SystemApi Allows an application to read the current set of notifications, including 2285 any metadata and intents attached. 2286 @hide --> 2287 <permission android:name="android.permission.ACCESS_NOTIFICATIONS" 2288 android:protectionLevel="signature|system" /> 2289 2290 <!-- Allows access to keyguard secure storage. Only allowed for system processes. 2291 @hide --> 2292 <permission android:name="android.permission.ACCESS_KEYGUARD_SECURE_STORAGE" 2293 android:protectionLevel="signature" /> 2294 2295 <!-- Allows managing (adding, removing) fingerprint templates. Reserved for the system. @hide --> 2296 <permission android:name="android.permission.MANAGE_FINGERPRINT" 2297 android:protectionLevel="signature" /> 2298 2299 <!-- Allows an application to control keyguard. Only allowed for system processes. 2300 @hide --> 2301 <permission android:name="android.permission.CONTROL_KEYGUARD" 2302 android:protectionLevel="signature" /> 2303 2304 <!-- Allows an application to listen to trust changes. Only allowed for system processes. 2305 @hide --> 2306 <permission android:name="android.permission.TRUST_LISTENER" 2307 android:protectionLevel="signature" /> 2308 2309 <!-- @SystemApi Allows an application to provide a trust agent. 2310 @hide For security reasons, this is a platform-only permission. --> 2311 <permission android:name="android.permission.PROVIDE_TRUST_AGENT" 2312 android:protectionLevel="signatureOrSystem" /> 2313 2314 <!-- Allows an application to launch the trust agent settings activity. 2315 @hide --> 2316 <permission android:name="android.permission.LAUNCH_TRUST_AGENT_SETTINGS" 2317 android:protectionLevel="signatureOrSystem" /> 2318 2319 <!-- @SystemApi Must be required by an {@link 2320 android.service.trust.TrustAgentService}, 2321 to ensure that only the system can bind to it. 2322 @hide --> 2323 <permission android:name="android.permission.BIND_TRUST_AGENT" 2324 android:protectionLevel="signature" /> 2325 2326 <!-- Must be required by an {@link 2327 android.service.notification.NotificationListenerService}, 2328 to ensure that only the system can bind to it. --> 2329 <permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE" 2330 android:protectionLevel="signature" /> 2331 2332 <!-- Must be required by a {@link 2333 android.service.chooser.ChooserTargetService}, to ensure that 2334 only the system can bind to it. --> 2335 <permission android:name="android.permission.BIND_CHOOSER_TARGET_SERVICE" 2336 android:protectionLevel="signature" /> 2337 2338 <!-- @SystemApi Must be required by a {@link 2339 android.service.notification.ConditionProviderService}, 2340 to ensure that only the system can bind to it. 2341 @hide --> 2342 <permission android:name="android.permission.BIND_CONDITION_PROVIDER_SERVICE" 2343 android:protectionLevel="signature" /> 2344 2345 <!-- Must be required by a {@link android.media.routing.MediaRouteService}, 2346 to ensure that only the system can bind to it. --> 2347 <permission android:name="android.permission.BIND_MEDIA_ROUTE_SERVICE" 2348 android:protectionLevel="signature" /> 2349 2350 <!-- Must be required by an {@link android.service.dreams.DreamService}, 2351 to ensure that only the system can bind to it. --> 2352 <permission android:name="android.permission.BIND_DREAM_SERVICE" 2353 android:protectionLevel="signature" /> 2354 2355 <!-- @SystemApi Allows an application to call into a carrier setup flow. It is up to the 2356 carrier setup application to enforce that this permission is required 2357 @hide This is not a third-party API (intended for OEMs and system apps). --> 2358 <permission android:name="android.permission.INVOKE_CARRIER_SETUP" 2359 android:protectionLevel="signature|system" /> 2360 2361 <!-- @SystemApi Allows an application to listen for network condition observations. 2362 @hide This is not a third-party API (intended for system apps). --> 2363 <permission android:name="android.permission.ACCESS_NETWORK_CONDITIONS" 2364 android:protectionLevel="signature|system" /> 2365 2366 <!-- @SystemApi Allows an application to provision and access DRM certificates 2367 @hide This is not a third-party API (intended for system apps). --> 2368 <permission android:name="android.permission.ACCESS_DRM_CERTIFICATES" 2369 android:protectionLevel="signature|system" /> 2370 2371 <!-- Api Allows an application to manage media projection sessions. 2372 @hide This is not a third-party API (intended for system apps). --> 2373 <permission android:name="android.permission.MANAGE_MEDIA_PROJECTION" 2374 android:protectionLevel="signature" /> 2375 2376 <!-- @SystemApi Allows an application to read install sessions 2377 @hide This is not a third-party API (intended for system apps). --> 2378 <permission android:name="android.permission.READ_INSTALL_SESSIONS" 2379 android:label="@string/permlab_readInstallSessions" 2380 android:description="@string/permdesc_readInstallSessions" 2381 android:protectionLevel="normal"/> 2382 2383 <!-- @SystemApi Allows an application to remove DRM certificates 2384 @hide This is not a third-party API (intended for system apps). --> 2385 <permission android:name="android.permission.REMOVE_DRM_CERTIFICATES" 2386 android:protectionLevel="signature|system" /> 2387 2388 <!-- Must be required by a {@link android.service.carrier.CarrierMessagingService}. 2389 Any service that filters for this intent must be a carrier privileged app. --> 2390 <permission android:name="android.permission.BIND_CARRIER_MESSAGING_SERVICE" 2391 android:protectionLevel="signature|system" /> 2392 2393 <!-- Allows an application to interact with the currently active 2394 {@link android.service.voice.VoiceInteractionService}. 2395 @hide --> 2396 <permission android:name="android.permission.ACCESS_VOICE_INTERACTION_SERVICE" 2397 android:protectionLevel="signature" /> 2398 2399 <!-- Allows an app that has this permission and a permissions to install packages 2400 to request all runtime permissions to be granted at installation. 2401 @hide --> 2402 <permission android:name="android.permission.INSTALL_GRANT_RUNTIME_PERMISSIONS" 2403 android:protectionLevel="signature" /> 2404 2405 <!-- Allows receiving status updates from a device initializer. 2406 @hide Not for use by third-party applications. --> 2407 <permission android:name="android.permission.RECEIVE_DEVICE_INITIALIZER_STATUS" 2408 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 2409 android:protectionLevel="signature" /> 2410 2411 <!-- The system process is explicitly the only one allowed to launch the 2412 confirmation UI for full backup/restore --> 2413 <uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/> 2414 2415 <application android:process="system" 2416 android:persistent="true" 2417 android:hasCode="false" 2418 android:label="@string/android_system_label" 2419 android:allowClearUserData="false" 2420 android:backupAgent="com.android.server.backup.SystemBackupAgent" 2421 android:killAfterRestore="false" 2422 android:icon="@drawable/ic_launcher_android" 2423 android:supportsRtl="true"> 2424 <activity android:name="com.android.internal.app.ChooserActivity" 2425 android:theme="@style/Theme.DeviceDefault.Resolver" 2426 android:finishOnCloseSystemDialogs="true" 2427 android:excludeFromRecents="true" 2428 android:documentLaunchMode="never" 2429 android:relinquishTaskIdentity="true" 2430 android:process=":ui"> 2431 <intent-filter> 2432 <action android:name="android.intent.action.CHOOSER" /> 2433 <category android:name="android.intent.category.DEFAULT" /> 2434 </intent-filter> 2435 </activity> 2436 <activity android:name="com.android.internal.app.IntentForwarderActivity" 2437 android:finishOnCloseSystemDialogs="true" 2438 android:theme="@style/Theme.NoDisplay" 2439 android:excludeFromRecents="true" 2440 android:label="@string/user_owner_label" 2441 android:exported="true" 2442 > 2443 </activity> 2444 <activity-alias android:name="com.android.internal.app.ForwardIntentToUserOwner" 2445 android:targetActivity="com.android.internal.app.IntentForwarderActivity" 2446 android:exported="true" 2447 android:label="@string/user_owner_label"> 2448 </activity-alias> 2449 <activity-alias android:name="com.android.internal.app.ForwardIntentToManagedProfile" 2450 android:targetActivity="com.android.internal.app.IntentForwarderActivity" 2451 android:icon="@drawable/ic_corp_icon" 2452 android:exported="true" 2453 android:label="@string/managed_profile_label"> 2454 </activity-alias> 2455 <activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity" 2456 android:theme="@style/Theme.Material.Light.Dialog" 2457 android:label="@string/heavy_weight_switcher_title" 2458 android:finishOnCloseSystemDialogs="true" 2459 android:excludeFromRecents="true" 2460 android:process=":ui"> 2461 </activity> 2462 <activity android:name="com.android.internal.app.PlatLogoActivity" 2463 android:theme="@style/Theme.Wallpaper.NoTitleBar.Fullscreen" 2464 android:configChanges="orientation|keyboardHidden" 2465 android:process=":ui"> 2466 </activity> 2467 <activity android:name="com.android.internal.app.DisableCarModeActivity" 2468 android:theme="@style/Theme.NoDisplay" 2469 android:excludeFromRecents="true" 2470 android:process=":ui"> 2471 </activity> 2472 <activity android:name="com.android.internal.app.DumpHeapActivity" 2473 android:theme="@style/Theme.Translucent.NoTitleBar" 2474 android:label="@string/dump_heap_title" 2475 android:finishOnCloseSystemDialogs="true" 2476 android:noHistory="true" 2477 android:excludeFromRecents="true" 2478 android:process=":ui"> 2479 </activity> 2480 <provider android:name="com.android.server.am.DumpHeapProvider" 2481 android:authorities="com.android.server.heapdump" 2482 android:grantUriPermissions="true" 2483 android:multiprocess="false" 2484 android:singleUser="true" /> 2485 2486 <activity android:name="android.accounts.ChooseAccountActivity" 2487 android:excludeFromRecents="true" 2488 android:exported="true" 2489 android:theme="@style/Theme.Material.Light.Dialog" 2490 android:label="@string/choose_account_label" 2491 android:process=":ui"> 2492 </activity> 2493 2494 <activity android:name="android.accounts.ChooseTypeAndAccountActivity" 2495 android:excludeFromRecents="true" 2496 android:exported="true" 2497 android:theme="@style/Theme.Material.Light.Dialog" 2498 android:label="@string/choose_account_label" 2499 android:process=":ui"> 2500 </activity> 2501 2502 <activity android:name="android.accounts.ChooseAccountTypeActivity" 2503 android:excludeFromRecents="true" 2504 android:theme="@style/Theme.Material.Light.Dialog" 2505 android:label="@string/choose_account_label" 2506 android:process=":ui"> 2507 </activity> 2508 2509 <activity android:name="android.accounts.CantAddAccountActivity" 2510 android:excludeFromRecents="true" 2511 android:exported="true" 2512 android:theme="@style/Theme.Material.Light.Dialog.NoActionBar" 2513 android:process=":ui"> 2514 </activity> 2515 2516 <activity android:name="android.accounts.GrantCredentialsPermissionActivity" 2517 android:excludeFromRecents="true" 2518 android:exported="true" 2519 android:theme="@style/Theme.Material.Light.DialogWhenLarge" 2520 android:process=":ui"> 2521 </activity> 2522 2523 <activity android:name="android.content.SyncActivityTooManyDeletes" 2524 android:theme="@style/Theme.Material.Light.Dialog" 2525 android:label="@string/sync_too_many_deletes" 2526 android:process=":ui"> 2527 </activity> 2528 2529 <activity android:name="com.android.internal.app.ShutdownActivity" 2530 android:permission="android.permission.SHUTDOWN" 2531 android:theme="@style/Theme.NoDisplay" 2532 android:excludeFromRecents="true"> 2533 <intent-filter> 2534 <action android:name="android.intent.action.ACTION_REQUEST_SHUTDOWN" /> 2535 <category android:name="android.intent.category.DEFAULT" /> 2536 </intent-filter> 2537 <intent-filter> 2538 <action android:name="android.intent.action.REBOOT" /> 2539 <category android:name="android.intent.category.DEFAULT" /> 2540 </intent-filter> 2541 </activity> 2542 2543 <activity android:name="com.android.internal.app.NetInitiatedActivity" 2544 android:theme="@style/Theme.Material.Light.Dialog.Alert" 2545 android:excludeFromRecents="true" 2546 android:process=":ui"> 2547 </activity> 2548 2549 <activity android:name="com.android.internal.app.RestrictionsPinActivity" 2550 android:theme="@style/Theme.Material.Light.Dialog.Alert" 2551 android:excludeFromRecents="true" 2552 android:windowSoftInputMode="adjustPan" 2553 android:process=":ui"> 2554 <intent-filter android:priority="100"> 2555 <action android:name="android.intent.action.RESTRICTIONS_CHALLENGE" /> 2556 <category android:name="android.intent.category.DEFAULT" /> 2557 </intent-filter> 2558 </activity> 2559 2560 <receiver android:name="com.android.server.BootReceiver" 2561 android:primaryUserOnly="true"> 2562 <intent-filter android:priority="1000"> 2563 <action android:name="android.intent.action.BOOT_COMPLETED" /> 2564 </intent-filter> 2565 </receiver> 2566 2567 <receiver android:name="com.android.server.updates.CertPinInstallReceiver" 2568 android:permission="android.permission.UPDATE_CONFIG"> 2569 <intent-filter> 2570 <action android:name="android.intent.action.UPDATE_PINS" /> 2571 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 2572 </intent-filter> 2573 </receiver> 2574 2575 <receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver" 2576 android:permission="android.permission.UPDATE_CONFIG"> 2577 <intent-filter> 2578 <action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" /> 2579 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 2580 </intent-filter> 2581 </receiver> 2582 2583 <receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver" 2584 android:permission="android.permission.UPDATE_CONFIG"> 2585 <intent-filter> 2586 <action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" /> 2587 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 2588 </intent-filter> 2589 </receiver> 2590 2591 <receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver" 2592 android:permission="android.permission.UPDATE_CONFIG"> 2593 <intent-filter> 2594 <action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" /> 2595 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 2596 </intent-filter> 2597 </receiver> 2598 2599 <receiver android:name="com.android.server.updates.TzDataInstallReceiver" 2600 android:permission="android.permission.UPDATE_CONFIG"> 2601 <intent-filter> 2602 <action android:name="android.intent.action.UPDATE_TZDATA" /> 2603 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 2604 </intent-filter> 2605 </receiver> 2606 2607 <receiver android:name="com.android.server.updates.SELinuxPolicyInstallReceiver" 2608 android:permission="android.permission.UPDATE_CONFIG"> 2609 <intent-filter> 2610 <action android:name="android.intent.action.UPDATE_SEPOLICY" /> 2611 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 2612 </intent-filter> 2613 </receiver> 2614 2615 <receiver android:name="com.android.server.MasterClearReceiver" 2616 android:permission="android.permission.MASTER_CLEAR"> 2617 <intent-filter 2618 android:priority="100" > 2619 <!-- For Checkin, Settings, etc.: action=MASTER_CLEAR --> 2620 <action android:name="android.intent.action.MASTER_CLEAR" /> 2621 2622 <!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR --> 2623 <action android:name="com.google.android.c2dm.intent.RECEIVE" /> 2624 <category android:name="android.intent.category.MASTER_CLEAR" /> 2625 </intent-filter> 2626 </receiver> 2627 2628 <service android:name="com.android.internal.os.storage.ExternalStorageFormatter" 2629 android:permission="android.permission.MASTER_CLEAR" 2630 android:exported="true" /> 2631 2632 <service android:name="android.hardware.location.GeofenceHardwareService" 2633 android:permission="android.permission.LOCATION_HARDWARE" 2634 android:exported="false" /> 2635 2636 <service android:name="com.android.internal.backup.LocalTransportService" 2637 android:permission="android.permission.CONFIRM_FULL_BACKUP" 2638 android:exported="false"> 2639 <intent-filter> 2640 <action android:name="android.backup.TRANSPORT_HOST" /> 2641 </intent-filter> 2642 </service> 2643 2644 <service android:name="com.android.server.MountServiceIdler" 2645 android:exported="true" 2646 android:permission="android.permission.BIND_JOB_SERVICE" > 2647 </service> 2648 2649 <service android:name="com.android.server.backup.FullBackupJob" 2650 android:exported="true" 2651 android:permission="android.permission.BIND_JOB_SERVICE" > 2652 </service> 2653 2654 <service android:name="com.android.server.backup.KeyValueBackupJob" 2655 android:permission="android.permission.BIND_JOB_SERVICE" > 2656 </service> 2657 2658 <service 2659 android:name="com.android.server.pm.BackgroundDexOptService" 2660 android:exported="true" 2661 android:permission="android.permission.BIND_JOB_SERVICE"> 2662 </service> 2663 2664 </application> 2665 2666</manifest> 2667