1<?xml version="1.0" encoding="utf-8"?>
2<!--
3/* //device/apps/common/AndroidManifest.xml
4**
5** Copyright 2006, The Android Open Source Project
6**
7** Licensed under the Apache License, Version 2.0 (the "License");
8** you may not use this file except in compliance with the License.
9** You may obtain a copy of the License at
10**
11**     http://www.apache.org/licenses/LICENSE-2.0
12**
13** Unless required by applicable law or agreed to in writing, software
14** distributed under the License is distributed on an "AS IS" BASIS,
15** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16** See the License for the specific language governing permissions and
17** limitations under the License.
18*/
19-->
20<manifest xmlns:android="http://schemas.android.com/apk/res/android"
21    package="android" coreApp="true" android:sharedUserId="android.uid.system"
22    android:sharedUserLabel="@string/android_system_label">
23
24    <!-- ================================================ -->
25    <!-- Special broadcasts that only the system can send -->
26    <!-- ================================================ -->
27    <eat-comment />
28
29    <protected-broadcast android:name="android.intent.action.SCREEN_OFF" />
30    <protected-broadcast android:name="android.intent.action.SCREEN_ON" />
31    <protected-broadcast android:name="android.intent.action.USER_PRESENT" />
32    <protected-broadcast android:name="android.intent.action.TIME_SET" />
33    <protected-broadcast android:name="android.intent.action.TIME_TICK" />
34    <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" />
35    <protected-broadcast android:name="android.intent.action.DATE_CHANGED" />
36    <protected-broadcast android:name="android.intent.action.PRE_BOOT_COMPLETED" />
37    <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" />
38    <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" />
39    <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" />
40    <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" />
41    <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" />
42    <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" />
43    <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" />
44    <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" />
45    <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" />
46    <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" />
47    <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" />
48    <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" />
49    <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" />
50    <protected-broadcast android:name="android.intent.action.PACKAGES_SUSPENDED" />
51    <protected-broadcast android:name="android.intent.action.PACKAGES_UNSUSPENDED" />
52    <protected-broadcast android:name="android.intent.action.ACTION_PREFERRED_ACTIVITY_CHANGED" />
53    <protected-broadcast android:name="android.intent.action.UID_REMOVED" />
54    <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" />
55    <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" />
56    <protected-broadcast android:name="android.intent.action.SPLIT_CONFIGURATION_CHANGED" />
57    <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" />
58    <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" />
59    <protected-broadcast android:name="android.intent.action.BATTERY_LEVEL_CHANGED" />
60    <protected-broadcast android:name="android.intent.action.BATTERY_LOW" />
61    <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" />
62    <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" />
63    <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" />
64    <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" />
65    <protected-broadcast android:name="android.intent.action.CHARGING" />
66    <protected-broadcast android:name="android.intent.action.DISCHARGING" />
67    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" />
68    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" />
69    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" />
70    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" />
71    <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" />
72    <protected-broadcast android:name="android.intent.action.REBOOT" />
73    <protected-broadcast android:name="android.intent.action.DOCK_EVENT" />
74    <protected-broadcast android:name="android.intent.action.THERMAL_EVENT" />
75    <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" />
76    <protected-broadcast android:name="android.intent.action.USER_ADDED" />
77    <protected-broadcast android:name="android.intent.action.USER_REMOVED" />
78    <protected-broadcast android:name="android.intent.action.USER_STARTING" />
79    <protected-broadcast android:name="android.intent.action.USER_STARTED" />
80    <protected-broadcast android:name="android.intent.action.USER_STOPPING" />
81    <protected-broadcast android:name="android.intent.action.USER_STOPPED" />
82    <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" />
83    <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" />
84    <protected-broadcast android:name="android.intent.action.USER_SWITCHED" />
85    <protected-broadcast android:name="android.intent.action.USER_INITIALIZE" />
86    <protected-broadcast android:name="android.intent.action.INTENT_FILTER_NEEDS_VERIFICATION" />
87    <protected-broadcast android:name="android.intent.action.OVERLAY_ADDED" />
88    <protected-broadcast android:name="android.intent.action.OVERLAY_CHANGED" />
89    <protected-broadcast android:name="android.intent.action.OVERLAY_REMOVED" />
90    <protected-broadcast android:name="android.intent.action.OVERLAY_PRIORITY_CHANGED" />
91    <protected-broadcast android:name="android.intent.action.USER_ACTIVITY_NOTIFICATION" />
92    <protected-broadcast android:name="android.intent.action.MY_PACKAGE_SUSPENDED" />
93    <protected-broadcast android:name="android.intent.action.MY_PACKAGE_UNSUSPENDED" />
94
95    <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED" />
96    <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGING" />
97    <protected-broadcast android:name="android.os.action.DEVICE_IDLE_MODE_CHANGED" />
98    <protected-broadcast android:name="android.os.action.POWER_SAVE_WHITELIST_CHANGED" />
99    <protected-broadcast android:name="android.os.action.POWER_SAVE_TEMP_WHITELIST_CHANGED" />
100    <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED_INTERNAL" />
101
102    <!-- @deprecated This is rarely used and will be phased out soon. -->
103    <protected-broadcast android:name="android.os.action.SCREEN_BRIGHTNESS_BOOST_CHANGED" />
104
105    <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" />
106    <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" />
107    <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" />
108    <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" />
109    <protected-broadcast android:name="android.app.action.NEXT_ALARM_CLOCK_CHANGED" />
110
111    <protected-broadcast android:name="android.app.action.BUGREPORT_SHARING_DECLINED" />
112    <protected-broadcast android:name="android.app.action.BUGREPORT_FAILED" />
113    <protected-broadcast android:name="android.app.action.BUGREPORT_SHARE" />
114    <protected-broadcast android:name="android.app.action.SHOW_DEVICE_MONITORING_DIALOG" />
115
116    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" />
117    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" />
118    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" />
119    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" />
120    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_HOST_RESTORED" />
121    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_RESTORED" />
122
123    <protected-broadcast android:name="android.os.action.SETTING_RESTORED" />
124
125    <protected-broadcast android:name="android.app.backup.intent.RUN" />
126    <protected-broadcast android:name="android.app.backup.intent.CLEAR" />
127    <protected-broadcast android:name="android.app.backup.intent.INIT" />
128
129    <protected-broadcast android:name="android.bluetooth.intent.DISCOVERABLE_TIMEOUT" />
130    <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" />
131    <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" />
132    <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" />
133    <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" />
134    <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" />
135    <protected-broadcast android:name="android.bluetooth.adapter.action.BLUETOOTH_ADDRESS_CHANGED" />
136    <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" />
137    <protected-broadcast android:name="android.bluetooth.device.action.UUID" />
138    <protected-broadcast android:name="android.bluetooth.device.action.MAS_INSTANCE" />
139    <protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" />
140    <protected-broadcast android:name="android.bluetooth.device.action.FOUND" />
141    <protected-broadcast android:name="android.bluetooth.device.action.DISAPPEARED" />
142    <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" />
143    <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" />
144    <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" />
145    <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" />
146    <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" />
147    <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" />
148    <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" />
149    <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" />
150    <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" />
151    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" />
152    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" />
153    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" />
154    <protected-broadcast android:name="android.bluetooth.device.action.SDP_RECORD" />
155    <protected-broadcast android:name="android.bluetooth.device.action.BATTERY_LEVEL_CHANGED" />
156    <protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" />
157    <protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" />
158    <protected-broadcast
159        android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" />
160    <protected-broadcast
161        android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" />
162    <protected-broadcast
163        android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" />
164    <protected-broadcast
165        android:name="android.bluetooth.headset.action.HF_INDICATORS_VALUE_CHANGED" />
166    <protected-broadcast
167        android:name="android.bluetooth.headset.profile.action.ACTIVE_DEVICE_CHANGED" />
168    <protected-broadcast
169        android:name="android.bluetooth.headsetclient.profile.action.CONNECTION_STATE_CHANGED" />
170    <protected-broadcast
171        android:name="android.bluetooth.headsetclient.profile.action.AUDIO_STATE_CHANGED" />
172    <protected-broadcast
173        android:name="android.bluetooth.headsetclient.profile.action.AG_EVENT" />
174    <protected-broadcast
175        android:name="android.bluetooth.headsetclient.profile.action.AG_CALL_CHANGED" />
176    <protected-broadcast
177        android:name="android.bluetooth.headsetclient.profile.action.RESULT" />
178    <protected-broadcast
179        android:name="android.bluetooth.headsetclient.profile.action.LAST_VTAG" />
180    <protected-broadcast
181        android:name="android.bluetooth.hearingaid.profile.action.CONNECTION_STATE_CHANGED" />
182    <protected-broadcast
183        android:name="android.bluetooth.hearingaid.profile.action.PLAYING_STATE_CHANGED" />
184    <protected-broadcast
185        android:name="android.bluetooth.hearingaid.profile.action.ACTIVE_DEVICE_CHANGED" />
186    <protected-broadcast
187        android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" />
188    <protected-broadcast
189        android:name="android.bluetooth.a2dp.profile.action.ACTIVE_DEVICE_CHANGED" />
190    <protected-broadcast
191        android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" />
192    <protected-broadcast
193        android:name="android.bluetooth.a2dp.profile.action.CODEC_CONFIG_CHANGED" />
194    <protected-broadcast
195        android:name="android.bluetooth.a2dp-sink.profile.action.CONNECTION_STATE_CHANGED" />
196    <protected-broadcast
197        android:name="android.bluetooth.a2dp-sink.profile.action.PLAYING_STATE_CHANGED" />
198    <protected-broadcast
199        android:name="android.bluetooth.a2dp-sink.profile.action.AUDIO_CONFIG_CHANGED" />
200    <protected-broadcast
201        android:name="android.bluetooth.avrcp-controller.profile.action.BROWSE_CONNECTION_STATE_CHANGED" />
202    <protected-broadcast
203        android:name="android.bluetooth.avrcp-controller.profile.action.CONNECTION_STATE_CHANGED" />
204    <protected-broadcast
205        android:name="android.bluetooth.avrcp-controller.profile.action.FOLDER_LIST" />
206    <protected-broadcast
207        android:name="android.bluetooth.avrcp-controller.profile.action.TRACK_EVENT" />
208    <protected-broadcast
209        android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" />
210    <protected-broadcast
211        android:name="android.bluetooth.input.profile.action.IDLE_TIME_CHANGED" />
212    <protected-broadcast
213        android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" />
214    <protected-broadcast
215        android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" />
216    <protected-broadcast
217        android:name="android.bluetooth.hiddevice.profile.action.CONNECTION_STATE_CHANGED" />
218    <protected-broadcast
219        android:name="android.bluetooth.map.profile.action.CONNECTION_STATE_CHANGED" />
220    <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.CONNECTION_STATE_CHANGED" />
221    <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_RECEIVED" />
222    <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_SENT_SUCCESSFULLY" />
223    <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_DELIVERED_SUCCESSFULLY" />
224    <protected-broadcast
225        android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_SENT" />
226    <protected-broadcast
227        android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_DELIVERY" />
228    <protected-broadcast
229        android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" />
230    <protected-broadcast android:name="android.bluetooth.pbap.profile.action.CONNECTION_STATE_CHANGED" />
231    <protected-broadcast android:name="android.bluetooth.pbapclient.profile.action.CONNECTION_STATE_CHANGED" />
232    <protected-broadcast android:name="android.bluetooth.sap.profile.action.CONNECTION_STATE_CHANGED" />
233    <protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" />
234    <protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" />
235    <protected-broadcast android:name="android.btopp.intent.action.LIST" />
236    <protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" />
237    <protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" />
238    <protected-broadcast android:name="android.btopp.intent.action.CONFIRM" />
239    <protected-broadcast android:name="android.btopp.intent.action.HIDE" />
240    <protected-broadcast android:name="android.btopp.intent.action.RETRY" />
241    <protected-broadcast android:name="android.btopp.intent.action.OPEN" />
242    <protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" />
243    <protected-broadcast android:name="android.btopp.intent.action.TRANSFER_COMPLETE" />
244    <protected-broadcast android:name="android.btopp.intent.action.ACCEPT" />
245    <protected-broadcast android:name="android.btopp.intent.action.DECLINE" />
246    <protected-broadcast android:name="com.android.bluetooth.gatt.REFRESH_BATCHED_SCAN" />
247    <protected-broadcast android:name="com.android.bluetooth.pbap.authchall" />
248    <protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" />
249    <protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" />
250    <protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" />
251    <protected-broadcast android:name="com.android.bluetooth.sap.USER_CONFIRM_TIMEOUT" />
252    <protected-broadcast android:name="com.android.bluetooth.sap.action.DISCONNECT_ACTION" />
253
254    <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" />
255
256    <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" />
257    <protected-broadcast android:name="android.hardware.usb.action.USB_PORT_CHANGED" />
258    <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" />
259    <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_DETACHED" />
260    <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" />
261    <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" />
262
263    <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" />
264    <protected-broadcast android:name="android.media.action.HDMI_AUDIO_PLUG" />
265
266    <protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" />
267    <protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" />
268    <protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" />
269    <protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" />
270    <protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" />
271    <protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" />
272    <protected-broadcast android:name="android.media.MASTER_MONO_CHANGED_ACTION" />
273    <protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" />
274    <protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" />
275
276    <protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" />
277    <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" />
278    <protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" />
279    <protected-broadcast android:name="android.intent.action.MEDIA_NOFS" />
280    <protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" />
281    <protected-broadcast android:name="android.intent.action.MEDIA_SHARED" />
282    <protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" />
283    <protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" />
284    <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" />
285    <protected-broadcast android:name="android.intent.action.MEDIA_EJECT" />
286
287    <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL" />
288    <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" />
289    <!-- @deprecated.  Only {@link android.net.ConnectivityManager.CONNECTIVITY_ACTION} is sent. -->
290    <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" />
291    <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" />
292    <protected-broadcast android:name="android.net.conn.RESTRICT_BACKGROUND_CHANGED" />
293    <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" />
294    <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" />
295
296    <protected-broadcast android:name="android.net.nsd.STATE_CHANGED" />
297
298    <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" />
299    <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" />
300    <protected-broadcast android:name="com.android.nfc.action.LLCP_UP" />
301    <protected-broadcast android:name="com.android.nfc.action.LLCP_DOWN" />
302    <protected-broadcast android:name="com.android.nfc.cardemulation.action.CLOSE_TAP_DIALOG" />
303    <protected-broadcast android:name="com.android.nfc.handover.action.ALLOW_CONNECT" />
304    <protected-broadcast android:name="com.android.nfc.handover.action.DENY_CONNECT" />
305    <protected-broadcast android:name="com.android.nfc.handover.action.TIMEOUT_CONNECT" />
306    <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" />
307    <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" />
308    <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" />
309    <!-- For NFC to BT handover -->
310    <protected-broadcast android:name="android.btopp.intent.action.WHITELIST_DEVICE" />
311    <protected-broadcast android:name="android.btopp.intent.action.STOP_HANDOVER_TRANSFER" />
312    <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND" />
313    <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND_MULTIPLE" />
314    <protected-broadcast android:name="com.android.nfc.handover.action.CANCEL_HANDOVER_TRANSFER" />
315
316    <protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" />
317    <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" />
318
319    <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" />
320
321    <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" />
322    <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" />
323    <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" />
324
325    <protected-broadcast android:name="com.android.server.stats.action.TRIGGER_COLLECTION" />
326
327    <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" />
328    <protected-broadcast android:name="com.android.server.WifiManager.action.START_PNO" />
329    <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" />
330    <protected-broadcast android:name="com.android.server.WifiManager.action.DEVICE_IDLE" />
331    <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_ACCEPTED" />
332    <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_DECLINED" />
333    <protected-broadcast android:name="com.android.internal.action.EUICC_FACTORY_RESET" />
334    <protected-broadcast android:name="com.android.server.usb.ACTION_OPEN_IN_APPS" />
335    <protected-broadcast android:name="com.android.server.am.DELETE_DUMPHEAP" />
336    <protected-broadcast android:name="com.android.server.net.action.SNOOZE_WARNING" />
337    <protected-broadcast android:name="com.android.server.net.action.SNOOZE_RAPID" />
338    <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.USER_DISMISSED_NOTIFICATION" />
339    <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.CONNECT_TO_NETWORK" />
340    <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.PICK_WIFI_NETWORK" />
341    <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.PICK_NETWORK_AFTER_FAILURE" />
342    <protected-broadcast android:name="com.android.server.wifi.wakeup.DISMISS_NOTIFICATION" />
343    <protected-broadcast android:name="com.android.server.wifi.wakeup.OPEN_WIFI_PREFERENCES" />
344    <protected-broadcast android:name="com.android.server.wifi.wakeup.OPEN_WIFI_SETTINGS" />
345    <protected-broadcast android:name="com.android.server.wifi.wakeup.TURN_OFF_WIFI_WAKE" />
346    <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" />
347    <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" />
348    <protected-broadcast android:name="android.net.wifi.WIFI_CREDENTIAL_CHANGED" />
349    <protected-broadcast android:name="android.net.wifi.WIFI_SCAN_AVAILABLE" />
350    <protected-broadcast android:name="android.net.wifi.aware.action.WIFI_AWARE_STATE_CHANGED" />
351    <protected-broadcast android:name="android.net.wifi.rtt.action.WIFI_RTT_STATE_CHANGED" />
352    <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" />
353    <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" />
354    <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" />
355    <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" />
356    <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" />
357    <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_DEAUTH_IMMINENT" />
358    <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_ICON" />
359    <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_OSU_PROVIDERS_LIST" />
360    <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_SUBSCRIPTION_REMEDIATION" />
361    <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" />
362    <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" />
363    <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" />
364    <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" />
365    <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" />
366    <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" />
367    <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" />
368    <protected-broadcast android:name="android.net.wifi.p2p.PERSISTENT_GROUPS_CHANGED" />
369    <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" />
370    <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" />
371    <protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" />
372    <protected-broadcast
373            android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" />
374    <protected-broadcast android:name="android.net.scoring.SCORE_NETWORKS" />
375    <protected-broadcast android:name="android.net.scoring.SCORER_CHANGED" />
376    <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" />
377    <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" />
378    <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" />
379    <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" />
380    <protected-broadcast android:name="android.intent.action.APPLICATION_RESTRICTIONS_CHANGED" />
381
382    <!-- Legacy -->
383    <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" />
384    <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" />
385
386    <protected-broadcast android:name="com.android.server.ACTION_TRIGGER_IDLE" />
387
388    <protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" />
389
390    <protected-broadcast android:name="android.intent.action.PHONE_STATE" />
391
392    <protected-broadcast android:name="android.intent.action.SUB_DEFAULT_CHANGED" />
393
394    <protected-broadcast android:name="android.location.GPS_ENABLED_CHANGE" />
395    <protected-broadcast android:name="android.location.PROVIDERS_CHANGED" />
396    <protected-broadcast android:name="android.location.MODE_CHANGED" />
397    <protected-broadcast android:name="android.location.GPS_FIX_CHANGE" />
398    <protected-broadcast android:name="android.net.proxy.PAC_REFRESH" />
399
400    <protected-broadcast android:name="android.telecom.action.DEFAULT_DIALER_CHANGED" />
401    <protected-broadcast android:name="android.provider.action.DEFAULT_SMS_PACKAGE_CHANGED" />
402    <protected-broadcast android:name="android.intent.action.CONTENT_CHANGED" />
403    <protected-broadcast android:name="android.provider.Telephony.MMS_DOWNLOADED" />
404
405    <protected-broadcast
406        android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" />
407
408    <!-- Defined in RestrictionsManager -->
409    <protected-broadcast
410        android:name="android.intent.action.PERMISSION_RESPONSE_RECEIVED" />
411    <!-- Defined in RestrictionsManager -->
412
413    <protected-broadcast android:name="android.intent.action.REQUEST_PERMISSION" />
414    <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_STARTED" />
415    <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
416    <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_PROGRESS" />
417    <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
418
419    <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_DATA_SUBSCRIPTION_CHANGED" />
420    <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_VOICE_SUBSCRIPTION_CHANGED" />
421    <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_CONTENT_CHANGE" />
422    <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_RECORD_UPDATED" />
423
424    <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_DONE" />
425    <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_FAILED" />
426
427    <protected-broadcast android:name="android.internal.policy.action.BURN_IN_PROTECTION" />
428    <protected-broadcast android:name="android.app.action.SYSTEM_UPDATE_POLICY_CHANGED" />
429    <protected-broadcast android:name="android.app.action.DEVICE_OWNER_CHANGED" />
430    <protected-broadcast android:name="android.app.action.MANAGED_USER_CREATED" />
431
432    <!-- Added in N -->
433    <protected-broadcast android:name="android.intent.action.ANR" />
434    <protected-broadcast android:name="android.intent.action.CALL" />
435    <protected-broadcast android:name="android.intent.action.CALL_PRIVILEGED" />
436    <protected-broadcast android:name="android.intent.action.DROPBOX_ENTRY_ADDED" />
437    <protected-broadcast android:name="android.intent.action.INPUT_METHOD_CHANGED" />
438    <protected-broadcast android:name="android.intent.action.internal_sim_state_changed" />
439    <protected-broadcast android:name="android.intent.action.LOCKED_BOOT_COMPLETED" />
440    <protected-broadcast android:name="android.intent.action.PRECISE_CALL_STATE" />
441    <protected-broadcast android:name="android.intent.action.PRECISE_DATA_CONNECTION_STATE_CHANGED" />
442    <protected-broadcast android:name="android.intent.action.SUBSCRIPTION_PHONE_STATE" />
443    <protected-broadcast android:name="android.intent.action.USER_INFO_CHANGED" />
444    <protected-broadcast android:name="android.intent.action.USER_UNLOCKED" />
445    <protected-broadcast android:name="android.intent.action.WALLPAPER_CHANGED" />
446
447    <protected-broadcast android:name="android.app.action.DEVICE_POLICY_MANAGER_STATE_CHANGED" />
448    <protected-broadcast android:name="android.app.action.CHOOSE_PRIVATE_KEY_ALIAS" />
449    <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLED" />
450    <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLE_REQUESTED" />
451    <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_ENABLED" />
452    <protected-broadcast android:name="android.app.action.LOCK_TASK_ENTERING" />
453    <protected-broadcast android:name="android.app.action.LOCK_TASK_EXITING" />
454    <protected-broadcast android:name="android.app.action.NOTIFY_PENDING_SYSTEM_UPDATE" />
455    <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_CHANGED" />
456    <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_EXPIRING" />
457    <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_FAILED" />
458    <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_SUCCEEDED" />
459    <protected-broadcast android:name="com.android.server.ACTION_EXPIRED_PASSWORD_NOTIFICATION" />
460
461    <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_ADDED" />
462    <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNLOCKED" />
463    <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_REMOVED" />
464
465    <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_STATE_CHANGED" />
466    <protected-broadcast android:name="com.android.bluetooth.map.USER_CONFIRM_TIMEOUT" />
467    <protected-broadcast android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_SENT" />
468    <protected-broadcast android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_DELIVERY" />
469    <protected-broadcast android:name="android.content.jobscheduler.JOB_DELAY_EXPIRED" />
470    <protected-broadcast android:name="android.content.syncmanager.SYNC_ALARM" />
471    <protected-broadcast android:name="android.media.INTERNAL_RINGER_MODE_CHANGED_ACTION" />
472    <protected-broadcast android:name="android.media.STREAM_DEVICES_CHANGED_ACTION" />
473    <protected-broadcast android:name="android.media.STREAM_MUTE_CHANGED_ACTION" />
474    <protected-broadcast android:name="android.net.sip.SIP_SERVICE_UP" />
475    <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" />
476    <protected-broadcast android:name="android.os.action.CHARGING" />
477    <protected-broadcast android:name="android.os.action.DISCHARGING" />
478    <protected-broadcast android:name="android.search.action.SEARCHABLES_CHANGED" />
479    <protected-broadcast android:name="android.security.STORAGE_CHANGED" />
480    <protected-broadcast android:name="android.security.action.TRUST_STORE_CHANGED" />
481    <protected-broadcast android:name="android.security.action.KEYCHAIN_CHANGED" />
482    <protected-broadcast android:name="android.security.action.KEY_ACCESS_CHANGED" />
483    <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_REGISTERED" />
484    <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_UNREGISTERED" />
485    <protected-broadcast android:name="android.telecom.action.SHOW_MISSED_CALLS_NOTIFICATION" />
486    <protected-broadcast android:name="android.telephony.action.CARRIER_CONFIG_CHANGED" />
487    <protected-broadcast android:name="android.telephony.action.DEFAULT_SUBSCRIPTION_CHANGED" />
488    <protected-broadcast android:name="android.telephony.action.DEFAULT_SMS_SUBSCRIPTION_CHANGED" />
489    <protected-broadcast android:name="android.telephony.action.SHOW_VOICEMAIL_NOTIFICATION" />
490    <protected-broadcast android:name="android.telephony.action.SUBSCRIPTION_PLANS_CHANGED" />
491
492    <protected-broadcast android:name="com.android.bluetooth.btservice.action.ALARM_WAKEUP" />
493    <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_POLL" />
494    <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_UPDATED" />
495    <protected-broadcast android:name="com.android.server.NetworkTimeUpdateService.action.POLL" />
496    <protected-broadcast android:name="com.android.server.telecom.intent.action.CALLS_ADD_ENTRY" />
497    <protected-broadcast android:name="com.android.settings.location.MODE_CHANGING" />
498    <protected-broadcast android:name="com.android.settings.bluetooth.ACTION_DISMISS_PAIRING" />
499
500    <protected-broadcast android:name="NotificationManagerService.TIMEOUT" />
501    <protected-broadcast android:name="ScheduleConditionProvider.EVALUATE" />
502    <protected-broadcast android:name="EventConditionProvider.EVALUATE" />
503    <protected-broadcast android:name="SnoozeHelper.EVALUATE" />
504    <protected-broadcast android:name="wifi_scan_available" />
505
506    <protected-broadcast android:name="action.cne.started" />
507    <protected-broadcast android:name="android.content.jobscheduler.JOB_DEADLINE_EXPIRED" />
508    <protected-broadcast android:name="android.intent.action.ACTION_UNSOL_RESPONSE_OEM_HOOK_RAW" />
509    <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_SUPL" />
510    <protected-broadcast android:name="android.os.action.LIGHT_DEVICE_IDLE_MODE_CHANGED" />
511    <protected-broadcast android:name="android.os.storage.action.VOLUME_STATE_CHANGED" />
512    <protected-broadcast android:name="android.os.storage.action.DISK_SCANNED" />
513    <protected-broadcast android:name="com.android.server.action.UPDATE_TWILIGHT_STATE" />
514    <protected-broadcast android:name="com.android.server.action.RESET_TWILIGHT_AUTO" />
515    <protected-broadcast android:name="com.android.server.device_idle.STEP_IDLE_STATE" />
516    <protected-broadcast android:name="com.android.server.device_idle.STEP_LIGHT_IDLE_STATE" />
517    <protected-broadcast android:name="com.android.server.Wifi.action.TOGGLE_PNO" />
518    <protected-broadcast android:name="intent.action.ACTION_RF_BAND_INFO" />
519    <protected-broadcast android:name="android.intent.action.MEDIA_RESOURCE_GRANTED" />
520    <protected-broadcast android:name="android.app.action.NETWORK_LOGS_AVAILABLE" />
521    <protected-broadcast android:name="android.app.action.SECURITY_LOGS_AVAILABLE" />
522
523    <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED" />
524    <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED_INTERNAL" />
525    <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_CHANGED" />
526    <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_ACCESS_GRANTED_CHANGED" />
527    <protected-broadcast android:name="android.os.action.ACTION_EFFECTS_SUPPRESSOR_CHANGED" />
528    <protected-broadcast android:name="android.app.action.NOTIFICATION_CHANNEL_BLOCK_STATE_CHANGED" />
529    <protected-broadcast android:name="android.app.action.NOTIFICATION_CHANNEL_GROUP_BLOCK_STATE_CHANGED" />
530    <protected-broadcast android:name="android.app.action.APP_BLOCK_STATE_CHANGED" />
531
532    <protected-broadcast android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS" />
533    <protected-broadcast android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS" />
534
535    <protected-broadcast android:name="android.intent.action.DYNAMIC_SENSOR_CHANGED" />
536
537    <protected-broadcast android:name="android.intent.action.ACTION_RADIO_OFF" />
538
539    <protected-broadcast android:name="android.accounts.LOGIN_ACCOUNTS_CHANGED" />
540    <protected-broadcast android:name="android.accounts.action.ACCOUNT_REMOVED" />
541    <protected-broadcast android:name="android.accounts.action.VISIBLE_ACCOUNTS_CHANGED" />
542
543    <protected-broadcast android:name="com.android.sync.SYNC_CONN_STATUS_CHANGED" />
544
545    <protected-broadcast android:name="com.android.phone.SIP_INCOMING_CALL" />
546    <protected-broadcast android:name="com.android.phone.SIP_ADD_PHONE" />
547    <protected-broadcast android:name="com.android.phone.SIP_REMOVE_PHONE" />
548    <protected-broadcast android:name="com.android.phone.SIP_CALL_OPTION_CHANGED" />
549
550    <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_CONNECTED" />
551    <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_DISCONNECTED" />
552
553    <protected-broadcast android:name="android.bluetooth.input.profile.action.HANDSHAKE" />
554    <protected-broadcast android:name="android.bluetooth.input.profile.action.REPORT" />
555
556    <protected-broadcast android:name="android.intent.action.TWILIGHT_CHANGED" />
557
558    <protected-broadcast android:name="com.android.server.fingerprint.ACTION_LOCKOUT_RESET" />
559    <protected-broadcast android:name="android.net.wifi.PASSPOINT_ICON_RECEIVED" />
560    <protected-broadcast android:name="com.android.server.notification.CountdownConditionProvider" />
561
562    <protected-broadcast android:name="com.android.internal.location.ALARM_WAKEUP" />
563    <protected-broadcast android:name="com.android.internal.location.ALARM_TIMEOUT" />
564    <protected-broadcast android:name="android.intent.action.GLOBAL_BUTTON" />
565
566    <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_AVAILABLE" />
567    <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNAVAILABLE" />
568    <protected-broadcast android:name="com.android.server.pm.DISABLE_QUIET_MODE_AFTER_UNLOCK" />
569
570    <protected-broadcast android:name="com.android.server.retaildemo.ACTION_RESET_DEMO" />
571
572    <protected-broadcast android:name="android.intent.action.DEVICE_LOCKED_CHANGED" />
573
574    <!-- Added in O -->
575    <protected-broadcast android:name="android.app.action.APPLICATION_DELEGATION_SCOPES_CHANGED" />
576    <protected-broadcast android:name="com.android.server.wm.ACTION_REVOKE_SYSTEM_ALERT_WINDOW_PERMISSION" />
577    <protected-broadcast android:name="android.media.tv.action.PARENTAL_CONTROLS_ENABLED_CHANGED" />
578
579    <protected-broadcast android:name="android.content.pm.action.SESSION_COMMITTED" />
580    <protected-broadcast android:name="android.os.action.USER_RESTRICTIONS_CHANGED" />
581    <protected-broadcast android:name="android.media.tv.action.PREVIEW_PROGRAM_ADDED_TO_WATCH_NEXT" />
582    <protected-broadcast android:name="android.media.tv.action.PREVIEW_PROGRAM_BROWSABLE_DISABLED" />
583    <protected-broadcast android:name="android.media.tv.action.WATCH_NEXT_PROGRAM_BROWSABLE_DISABLED" />
584    <protected-broadcast android:name="android.media.tv.action.CHANNEL_BROWSABLE_REQUESTED" />
585    <protected-broadcast android:name="com.android.server.InputMethodManagerService.SHOW_INPUT_METHOD_PICKER" />
586
587    <!-- Time zone rules update intents fired by the system server -->
588    <protected-broadcast android:name="com.android.intent.action.timezone.RULES_UPDATE_OPERATION" />
589    <protected-broadcast android:name="com.android.intent.action.timezone.TRIGGER_RULES_UPDATE_CHECK" />
590
591    <!-- Made protected in P (was introduced in JB-MR2) -->
592    <protected-broadcast android:name="android.intent.action.GET_RESTRICTION_ENTRIES" />
593    <protected-broadcast android:name="android.telephony.euicc.action.OTA_STATUS_CHANGED" />
594
595    <!-- Added in P -->
596    <protected-broadcast android:name="android.app.action.PROFILE_OWNER_CHANGED" />
597    <protected-broadcast android:name="android.app.action.TRANSFER_OWNERSHIP_COMPLETE" />
598    <protected-broadcast android:name="android.app.action.AFFILIATED_PROFILE_TRANSFER_OWNERSHIP_COMPLETE" />
599    <protected-broadcast android:name="android.app.action.DATA_SHARING_RESTRICTION_CHANGED" />
600    <protected-broadcast android:name="android.app.action.STATSD_STARTED" />
601
602    <!-- For IdleController -->
603    <protected-broadcast android:name="android.intent.action.DOCK_IDLE" />
604    <protected-broadcast android:name="android.intent.action.DOCK_ACTIVE" />
605
606    <!-- ====================================================================== -->
607    <!--                          RUNTIME PERMISSIONS                           -->
608    <!-- ====================================================================== -->
609    <eat-comment />
610
611    <!-- ====================================================================== -->
612    <!-- Permissions for accessing user's contacts including personal profile   -->
613    <!-- ====================================================================== -->
614    <eat-comment />
615
616    <!-- Used for runtime permissions related to contacts and profiles on this
617        device. -->
618    <permission-group android:name="android.permission-group.CONTACTS"
619        android:icon="@drawable/perm_group_contacts"
620        android:label="@string/permgrouplab_contacts"
621        android:description="@string/permgroupdesc_contacts"
622        android:request="@string/permgrouprequest_contacts"
623        android:priority="100" />
624
625    <!-- Allows an application to read the user's contacts data.
626        <p>Protection level: dangerous
627    -->
628    <permission android:name="android.permission.READ_CONTACTS"
629        android:permissionGroup="android.permission-group.CONTACTS"
630        android:label="@string/permlab_readContacts"
631        android:description="@string/permdesc_readContacts"
632        android:protectionLevel="dangerous" />
633
634    <!-- Allows an application to write the user's contacts data.
635         <p>Protection level: dangerous
636    -->
637    <permission android:name="android.permission.WRITE_CONTACTS"
638        android:permissionGroup="android.permission-group.CONTACTS"
639        android:label="@string/permlab_writeContacts"
640        android:description="@string/permdesc_writeContacts"
641        android:protectionLevel="dangerous" />
642
643    <!-- ====================================================================== -->
644    <!-- Permissions for accessing user's calendar                              -->
645    <!-- ====================================================================== -->
646    <eat-comment />
647
648    <!-- Used for runtime permissions related to user's calendar. -->
649    <permission-group android:name="android.permission-group.CALENDAR"
650        android:icon="@drawable/perm_group_calendar"
651        android:label="@string/permgrouplab_calendar"
652        android:description="@string/permgroupdesc_calendar"
653        android:request="@string/permgrouprequest_calendar"
654        android:priority="200" />
655
656    <!-- Allows an application to read the user's calendar data.
657         <p>Protection level: dangerous
658    -->
659    <permission android:name="android.permission.READ_CALENDAR"
660        android:permissionGroup="android.permission-group.CALENDAR"
661        android:label="@string/permlab_readCalendar"
662        android:description="@string/permdesc_readCalendar"
663        android:protectionLevel="dangerous" />
664
665    <!-- Allows an application to write the user's calendar data.
666         <p>Protection level: dangerous
667    -->
668    <permission android:name="android.permission.WRITE_CALENDAR"
669        android:permissionGroup="android.permission-group.CALENDAR"
670        android:label="@string/permlab_writeCalendar"
671        android:description="@string/permdesc_writeCalendar"
672        android:protectionLevel="dangerous" />
673
674    <!-- ====================================================================== -->
675    <!-- Permissions for accessing and modifying user's SMS messages            -->
676    <!-- ====================================================================== -->
677    <eat-comment />
678
679    <!-- Used for runtime permissions related to user's SMS messages. -->
680    <permission-group android:name="android.permission-group.SMS"
681        android:icon="@drawable/perm_group_sms"
682        android:label="@string/permgrouplab_sms"
683        android:description="@string/permgroupdesc_sms"
684        android:request="@string/permgrouprequest_sms"
685        android:priority="300" />
686
687    <!-- Allows an application to send SMS messages.
688         <p>Protection level: dangerous
689    -->
690    <permission android:name="android.permission.SEND_SMS"
691        android:permissionGroup="android.permission-group.SMS"
692        android:label="@string/permlab_sendSms"
693        android:description="@string/permdesc_sendSms"
694        android:permissionFlags="costsMoney"
695        android:protectionLevel="dangerous" />
696
697    <!-- Allows an application to receive SMS messages.
698         <p>Protection level: dangerous
699    -->
700    <permission android:name="android.permission.RECEIVE_SMS"
701        android:permissionGroup="android.permission-group.SMS"
702        android:label="@string/permlab_receiveSms"
703        android:description="@string/permdesc_receiveSms"
704        android:protectionLevel="dangerous"/>
705
706    <!-- Allows an application to read SMS messages.
707         <p>Protection level: dangerous
708    -->
709    <permission android:name="android.permission.READ_SMS"
710        android:permissionGroup="android.permission-group.SMS"
711        android:label="@string/permlab_readSms"
712        android:description="@string/permdesc_readSms"
713        android:protectionLevel="dangerous" />
714
715    <!-- Allows an application to receive WAP push messages.
716         <p>Protection level: dangerous
717    -->
718    <permission android:name="android.permission.RECEIVE_WAP_PUSH"
719        android:permissionGroup="android.permission-group.SMS"
720        android:label="@string/permlab_receiveWapPush"
721        android:description="@string/permdesc_receiveWapPush"
722        android:protectionLevel="dangerous" />
723
724    <!-- Allows an application to monitor incoming MMS messages.
725        <p>Protection level: dangerous
726    -->
727    <permission android:name="android.permission.RECEIVE_MMS"
728        android:permissionGroup="android.permission-group.SMS"
729        android:label="@string/permlab_receiveMms"
730        android:description="@string/permdesc_receiveMms"
731        android:protectionLevel="dangerous" />
732
733    <!-- Allows an application to read previously received cell broadcast
734         messages and to register a content observer to get notifications when
735         a cell broadcast has been received and added to the database. For
736         emergency alerts, the database is updated immediately after the
737         alert dialog and notification sound/vibration/speech are presented.
738         The "read" column is then updated after the user dismisses the alert.
739         This enables supplementary emergency assistance apps to start loading
740         additional emergency information (if Internet access is available)
741         when the alert is first received, and to delay presenting the info
742         to the user until after the initial alert dialog is dismissed.
743         <p>Protection level: dangerous
744         @hide Pending API council approval -->
745    <permission android:name="android.permission.READ_CELL_BROADCASTS"
746        android:permissionGroup="android.permission-group.SMS"
747        android:label="@string/permlab_readCellBroadcasts"
748        android:description="@string/permdesc_readCellBroadcasts"
749        android:protectionLevel="dangerous" />
750
751    <!-- ====================================================================== -->
752    <!-- Permissions for accessing external storage                             -->
753    <!-- ====================================================================== -->
754    <eat-comment />
755
756    <!-- Used for runtime permissions related to the shared external storage. -->
757    <permission-group android:name="android.permission-group.STORAGE"
758        android:icon="@drawable/perm_group_storage"
759        android:label="@string/permgrouplab_storage"
760        android:description="@string/permgroupdesc_storage"
761        android:request="@string/permgrouprequest_storage"
762        android:priority="900" />
763
764    <!-- Allows an application to read from external storage.
765     <p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly
766     granted this permission.</p>
767     <p>This permission is enforced starting in API level 19.  Before API level 19, this
768     permission is not enforced and all apps still have access to read from external storage.
769     You can test your app with the permission enforced by enabling <em>Protect USB
770     storage</em> under Developer options in the Settings app on a device running Android 4.1 or
771     higher.</p>
772     <p>Also starting in API level 19, this permission is <em>not</em> required to
773     read/write files in your application-specific directories returned by
774     {@link android.content.Context#getExternalFilesDir} and
775     {@link android.content.Context#getExternalCacheDir}.
776     <p class="note"><strong>Note:</strong> If <em>both</em> your <a
777     href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
778     minSdkVersion}</a> and <a
779     href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
780     targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
781     grants your app this permission. If you don't need this permission, be sure your <a
782     href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
783     targetSdkVersion}</a> is 4 or higher.
784     <p>Protection level: dangerous
785     -->
786    <permission android:name="android.permission.READ_EXTERNAL_STORAGE"
787        android:permissionGroup="android.permission-group.STORAGE"
788        android:label="@string/permlab_sdcardRead"
789        android:description="@string/permdesc_sdcardRead"
790        android:protectionLevel="dangerous" />
791
792    <!-- Allows an application to write to external storage.
793         <p class="note"><strong>Note:</strong> If <em>both</em> your <a
794         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
795         minSdkVersion}</a> and <a
796         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
797         targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
798         grants your app this permission. If you don't need this permission, be sure your <a
799         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
800         targetSdkVersion}</a> is 4 or higher.
801         <p>Starting in API level 19, this permission is <em>not</em> required to
802         read/write files in your application-specific directories returned by
803         {@link android.content.Context#getExternalFilesDir} and
804         {@link android.content.Context#getExternalCacheDir}.
805         <p>Protection level: dangerous
806    -->
807    <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE"
808        android:permissionGroup="android.permission-group.STORAGE"
809        android:label="@string/permlab_sdcardWrite"
810        android:description="@string/permdesc_sdcardWrite"
811        android:protectionLevel="dangerous" />
812
813    <!-- ====================================================================== -->
814    <!-- Permissions for accessing the device location                          -->
815    <!-- ====================================================================== -->
816    <eat-comment />
817
818    <!-- Used for permissions that allow accessing the device location. -->
819    <permission-group android:name="android.permission-group.LOCATION"
820        android:icon="@drawable/perm_group_location"
821        android:label="@string/permgrouplab_location"
822        android:description="@string/permgroupdesc_location"
823        android:request="@string/permgrouprequest_location"
824        android:priority="400" />
825
826    <!-- Allows an app to access precise location.
827         Alternatively, you might want {@link #ACCESS_COARSE_LOCATION}.
828         <p>Protection level: dangerous
829    -->
830    <permission android:name="android.permission.ACCESS_FINE_LOCATION"
831        android:permissionGroup="android.permission-group.LOCATION"
832        android:label="@string/permlab_accessFineLocation"
833        android:description="@string/permdesc_accessFineLocation"
834        android:protectionLevel="dangerous|instant" />
835
836    <!-- Allows an app to access approximate location.
837         Alternatively, you might want {@link #ACCESS_FINE_LOCATION}.
838         <p>Protection level: dangerous
839    -->
840    <permission android:name="android.permission.ACCESS_COARSE_LOCATION"
841        android:permissionGroup="android.permission-group.LOCATION"
842        android:label="@string/permlab_accessCoarseLocation"
843        android:description="@string/permdesc_accessCoarseLocation"
844        android:protectionLevel="dangerous|instant" />
845
846    <!-- ====================================================================== -->
847    <!-- Permissions for accessing the call log                                 -->
848    <!-- ====================================================================== -->
849    <eat-comment />
850
851    <!-- Used for permissions that are associated telephony features. -->
852    <permission-group android:name="android.permission-group.CALL_LOG"
853        android:icon="@drawable/perm_group_call_log"
854        android:label="@string/permgrouplab_calllog"
855        android:description="@string/permgroupdesc_calllog"
856        android:request="@string/permgrouprequest_calllog"
857        android:priority="450" />
858
859    <!-- Allows an application to access the IMS call service: making and
860         modifying a call
861        <p>Protection level: signature|privileged
862        @hide
863    -->
864    <permission android:name="android.permission.ACCESS_IMS_CALL_SERVICE"
865        android:label="@string/permlab_accessImsCallService"
866        android:description="@string/permdesc_accessImsCallService"
867        android:protectionLevel="signature|privileged" />
868
869    <!-- Allows an application to read the user's call log.
870         <p class="note"><strong>Note:</strong> If your app uses the
871         {@link #READ_CONTACTS} permission and <em>both</em> your <a
872         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
873         minSdkVersion}</a> and <a
874         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
875         targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
876         grants your app this permission. If you don't need this permission, be sure your <a
877         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
878         targetSdkVersion}</a> is 16 or higher.</p>
879         <p>Protection level: dangerous
880    -->
881    <permission android:name="android.permission.READ_CALL_LOG"
882        android:permissionGroup="android.permission-group.CALL_LOG"
883        android:label="@string/permlab_readCallLog"
884        android:description="@string/permdesc_readCallLog"
885        android:protectionLevel="dangerous" />
886
887    <!-- Allows an application to write (but not read) the user's
888         call log data.
889         <p class="note"><strong>Note:</strong> If your app uses the
890         {@link #WRITE_CONTACTS} permission and <em>both</em> your <a
891         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
892         minSdkVersion}</a> and <a
893         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
894         targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
895         grants your app this permission. If you don't need this permission, be sure your <a
896         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
897         targetSdkVersion}</a> is 16 or higher.</p>
898         <p>Protection level: dangerous
899    -->
900    <permission android:name="android.permission.WRITE_CALL_LOG"
901        android:permissionGroup="android.permission-group.CALL_LOG"
902        android:label="@string/permlab_writeCallLog"
903        android:description="@string/permdesc_writeCallLog"
904        android:protectionLevel="dangerous" />
905
906    <!-- Allows an application to see the number being dialed during an outgoing
907         call with the option to redirect the call to a different number or
908         abort the call altogether.
909         <p>Protection level: dangerous
910    -->
911    <permission android:name="android.permission.PROCESS_OUTGOING_CALLS"
912        android:permissionGroup="android.permission-group.CALL_LOG"
913        android:label="@string/permlab_processOutgoingCalls"
914        android:description="@string/permdesc_processOutgoingCalls"
915        android:protectionLevel="dangerous" />
916
917    <!-- ====================================================================== -->
918    <!-- Permissions for accessing the device telephony                         -->
919    <!-- ====================================================================== -->
920    <eat-comment />
921
922    <!-- Used for permissions that are associated telephony features. -->
923    <permission-group android:name="android.permission-group.PHONE"
924        android:icon="@drawable/perm_group_phone_calls"
925        android:label="@string/permgrouplab_phone"
926        android:description="@string/permgroupdesc_phone"
927        android:request="@string/permgrouprequest_phone"
928        android:priority="500" />
929
930    <!-- Allows read only access to phone state, including the phone number of the device,
931         current cellular network information, the status of any ongoing calls, and a list of any
932         {@link android.telecom.PhoneAccount}s registered on the device.
933         <p class="note"><strong>Note:</strong> If <em>both</em> your <a
934         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
935         minSdkVersion}</a> and <a
936         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
937         targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
938         grants your app this permission. If you don't need this permission, be sure your <a
939         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
940         targetSdkVersion}</a> is 4 or higher.
941         <p>Protection level: dangerous
942    -->
943    <permission android:name="android.permission.READ_PHONE_STATE"
944        android:permissionGroup="android.permission-group.PHONE"
945        android:label="@string/permlab_readPhoneState"
946        android:description="@string/permdesc_readPhoneState"
947        android:protectionLevel="dangerous" />
948
949    <!-- Allows read access to the device's phone number(s). This is a subset of the capabilities
950         granted by {@link #READ_PHONE_STATE} but is exposed to instant applications.
951         <p>Protection level: dangerous-->
952    <permission android:name="android.permission.READ_PHONE_NUMBERS"
953        android:permissionGroup="android.permission-group.PHONE"
954        android:label="@string/permlab_readPhoneNumbers"
955        android:description="@string/permdesc_readPhoneNumbers"
956        android:protectionLevel="dangerous|instant" />
957
958    <!-- Allows an application to initiate a phone call without going through
959        the Dialer user interface for the user to confirm the call.
960        <p>Protection level: dangerous
961    -->
962    <permission android:name="android.permission.CALL_PHONE"
963        android:permissionGroup="android.permission-group.PHONE"
964        android:permissionFlags="costsMoney"
965        android:label="@string/permlab_callPhone"
966        android:description="@string/permdesc_callPhone"
967        android:protectionLevel="dangerous" />
968
969    <!-- Allows an application to add voicemails into the system.
970         <p>Protection level: dangerous
971    -->
972    <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL"
973        android:permissionGroup="android.permission-group.PHONE"
974        android:label="@string/permlab_addVoicemail"
975        android:description="@string/permdesc_addVoicemail"
976        android:protectionLevel="dangerous" />
977
978    <!-- Allows an application to use SIP service.
979         <p>Protection level: dangerous
980    -->
981    <permission android:name="android.permission.USE_SIP"
982        android:permissionGroup="android.permission-group.PHONE"
983        android:description="@string/permdesc_use_sip"
984        android:label="@string/permlab_use_sip"
985        android:protectionLevel="dangerous"/>
986
987    <!-- Allows the app to answer an incoming phone call.
988         <p>Protection level: dangerous
989    -->
990    <permission android:name="android.permission.ANSWER_PHONE_CALLS"
991        android:permissionGroup="android.permission-group.PHONE"
992        android:label="@string/permlab_answerPhoneCalls"
993        android:description="@string/permdesc_answerPhoneCalls"
994        android:protectionLevel="dangerous|runtime" />
995
996    <!-- Allows a calling application which manages it own calls through the self-managed
997         {@link android.telecom.ConnectionService} APIs.  See
998         {@link android.telecom.PhoneAccount#CAPABILITY_SELF_MANAGED for more information on the
999         self-managed ConnectionService APIs.
1000         <p>Protection level: normal
1001    -->
1002    <permission android:name="android.permission.MANAGE_OWN_CALLS"
1003                android:label="@string/permlab_manageOwnCalls"
1004                android:description="@string/permdesc_manageOwnCalls"
1005                android:protectionLevel="normal" />
1006
1007    <!-- Allows a calling app to continue a call which was started in another app.  An example is a
1008         video calling app that wants to continue a voice call on the user's mobile network.<p>
1009         When the handover of a call from one app to another takes place, there are two devices
1010         which are involved in the handover; the initiating and receiving devices.  The initiating
1011         device is where the request to handover the call was started, and the receiving device is
1012         where the handover request is confirmed by the other party.<p>
1013         This permission protects access to the
1014         {@link android.telecom.TelecomManager#acceptHandover(Uri, int, PhoneAccountHandle)} which
1015         the receiving side of the handover uses to accept a handover.
1016         <p>Protection level: dangerous
1017    -->
1018    <permission android:name="android.permission.ACCEPT_HANDOVER"
1019                android:permissionGroup="android.permission-group.PHONE"
1020                android.label="@string/permlab_acceptHandover"
1021                android:description="@string/permdesc_acceptHandovers"
1022                android:protectionLevel="dangerous" />
1023
1024    <!-- ====================================================================== -->
1025    <!-- Permissions for accessing the device microphone                        -->
1026    <!-- ====================================================================== -->
1027    <eat-comment />
1028
1029    <!-- Used for permissions that are associated with accessing
1030         microphone audio from the device. Note that phone calls also capture audio
1031         but are in a separate (more visible) permission group. -->
1032    <permission-group android:name="android.permission-group.MICROPHONE"
1033        android:icon="@drawable/perm_group_microphone"
1034        android:label="@string/permgrouplab_microphone"
1035        android:description="@string/permgroupdesc_microphone"
1036        android:request="@string/permgrouprequest_microphone"
1037        android:priority="600" />
1038
1039    <!-- Allows an application to record audio.
1040         <p>Protection level: dangerous
1041    -->
1042    <permission android:name="android.permission.RECORD_AUDIO"
1043        android:permissionGroup="android.permission-group.MICROPHONE"
1044        android:label="@string/permlab_recordAudio"
1045        android:description="@string/permdesc_recordAudio"
1046        android:protectionLevel="dangerous|instant"/>
1047
1048    <!-- ====================================================================== -->
1049    <!-- Permissions for accessing the UCE Service                              -->
1050    <!-- ====================================================================== -->
1051
1052    <!-- @hide Allows an application to Access UCE-Presence.
1053         <p>Protection level: signature|privileged
1054    -->
1055    <permission android:name="android.permission.ACCESS_UCE_PRESENCE_SERVICE"
1056        android:permissionGroup="android.permission-group.PHONE"
1057        android:protectionLevel="signature|privileged"/>
1058
1059    <!-- @hide Allows an application to Access UCE-OPTIONS.
1060         <p>Protection level: signature|privileged
1061    -->
1062    <permission android:name="android.permission.ACCESS_UCE_OPTIONS_SERVICE"
1063        android:permissionGroup="android.permission-group.PHONE"
1064        android:protectionLevel="signature|privileged"/>
1065
1066
1067
1068    <!-- ====================================================================== -->
1069    <!-- Permissions for accessing the device camera                            -->
1070    <!-- ====================================================================== -->
1071    <eat-comment />
1072
1073    <!-- Used for permissions that are associated with accessing
1074     camera or capturing images/video from the device. -->
1075    <permission-group android:name="android.permission-group.CAMERA"
1076        android:icon="@drawable/perm_group_camera"
1077        android:label="@string/permgrouplab_camera"
1078        android:description="@string/permgroupdesc_camera"
1079        android:request="@string/permgrouprequest_camera"
1080        android:priority="700" />
1081
1082    <!-- Required to be able to access the camera device.
1083         <p>This will automatically enforce the <a
1084         href="{@docRoot}guide/topics/manifest/uses-feature-element.html">
1085         <uses-feature>}</a> manifest element for <em>all</em> camera features.
1086         If you do not require all camera features or can properly operate if a camera
1087         is not available, then you must modify your manifest as appropriate in order to
1088         install on devices that don't support all camera features.</p>
1089         <p>Protection level: dangerous
1090    -->
1091    <permission android:name="android.permission.CAMERA"
1092        android:permissionGroup="android.permission-group.CAMERA"
1093        android:label="@string/permlab_camera"
1094        android:description="@string/permdesc_camera"
1095        android:protectionLevel="dangerous|instant" />
1096
1097
1098    <!-- ====================================================================== -->
1099    <!-- Permissions for accessing the device sensors                           -->
1100    <!-- ====================================================================== -->
1101    <eat-comment />
1102
1103    <!-- Used for permissions that are associated with accessing
1104         body or environmental sensors. -->
1105    <permission-group android:name="android.permission-group.SENSORS"
1106        android:icon="@drawable/perm_group_sensors"
1107        android:label="@string/permgrouplab_sensors"
1108        android:description="@string/permgroupdesc_sensors"
1109        android:request="@string/permgrouprequest_sensors"
1110        android:priority="800" />
1111
1112    <!-- Allows an application to access data from sensors that the user uses to
1113         measure what is happening inside his/her body, such as heart rate.
1114         <p>Protection level: dangerous -->
1115    <permission android:name="android.permission.BODY_SENSORS"
1116        android:permissionGroup="android.permission-group.SENSORS"
1117        android:label="@string/permlab_bodySensors"
1118        android:description="@string/permdesc_bodySensors"
1119        android:protectionLevel="dangerous" />
1120
1121    <!-- Allows an app to use fingerprint hardware.
1122         <p>Protection level: normal
1123         @deprecated Applications should request {@link
1124         android.Manifest.permission#USE_BIOMETRIC} instead
1125    -->
1126    <permission android:name="android.permission.USE_FINGERPRINT"
1127        android:permissionGroup="android.permission-group.SENSORS"
1128        android:label="@string/permlab_useFingerprint"
1129        android:description="@string/permdesc_useFingerprint"
1130        android:protectionLevel="normal" />
1131
1132    <!-- Allows an app to use device supported biometric modalities.
1133         <p>Protection level: normal
1134    -->
1135    <permission android:name="android.permission.USE_BIOMETRIC"
1136        android:permissionGroup="android.permission-group.SENSORS"
1137        android:label="@string/permlab_useBiometric"
1138        android:description="@string/permdesc_useBiometric"
1139        android:protectionLevel="normal" />
1140
1141    <!-- ====================================================================== -->
1142    <!-- REMOVED PERMISSIONS                                                    -->
1143    <!-- ====================================================================== -->
1144
1145    <!-- @hide We need to keep this around for backwards compatibility -->
1146    <permission android:name="android.permission.READ_PROFILE"
1147        android:protectionLevel="normal"
1148        android:permissionFlags="removed"/>
1149
1150    <!-- @hide We need to keep this around for backwards compatibility -->
1151    <permission android:name="android.permission.WRITE_PROFILE"
1152        android:protectionLevel="normal"
1153        android:permissionFlags="removed"/>
1154
1155    <!-- @hide We need to keep this around for backwards compatibility -->
1156    <permission android:name="android.permission.READ_SOCIAL_STREAM"
1157        android:protectionLevel="normal"
1158        android:permissionFlags="removed"/>
1159
1160    <!-- @hide We need to keep this around for backwards compatibility -->
1161    <permission android:name="android.permission.WRITE_SOCIAL_STREAM"
1162        android:protectionLevel="normal"
1163        android:permissionFlags="removed"/>
1164
1165    <!-- @hide We need to keep this around for backwards compatibility -->
1166    <permission android:name="android.permission.READ_USER_DICTIONARY"
1167        android:protectionLevel="normal"
1168        android:permissionFlags="removed"/>
1169
1170    <!-- @hide We need to keep this around for backwards compatibility -->
1171    <permission android:name="android.permission.WRITE_USER_DICTIONARY"
1172        android:protectionLevel="normal"
1173        android:permissionFlags="removed"/>
1174
1175    <!-- @hide We need to keep this around for backwards compatibility -->
1176    <permission android:name="android.permission.WRITE_SMS"
1177        android:protectionLevel="normal"
1178        android:permissionFlags="removed"/>
1179
1180    <!-- @hide We need to keep this around for backwards compatibility -->
1181    <permission android:name="com.android.browser.permission.READ_HISTORY_BOOKMARKS"
1182        android:protectionLevel="normal"
1183        android:permissionFlags="removed"/>
1184
1185    <!-- @hide We need to keep this around for backwards compatibility -->
1186    <permission android:name="com.android.browser.permission.WRITE_HISTORY_BOOKMARKS"
1187        android:protectionLevel="normal"
1188        android:permissionFlags="removed"/>
1189
1190    <!-- @hide We need to keep this around for backwards compatibility -->
1191    <permission android:name="android.permission.AUTHENTICATE_ACCOUNTS"
1192        android:protectionLevel="normal"
1193        android:permissionFlags="removed"/>
1194
1195    <!-- @hide We need to keep this around for backwards compatibility -->
1196    <permission android:name="android.permission.MANAGE_ACCOUNTS"
1197        android:protectionLevel="normal"
1198        android:permissionFlags="removed"/>
1199
1200    <!-- @hide We need to keep this around for backwards compatibility -->
1201    <permission android:name="android.permission.USE_CREDENTIALS"
1202        android:protectionLevel="normal"
1203        android:permissionFlags="removed"/>
1204
1205    <!-- @hide We need to keep this around for backwards compatibility -->
1206    <permission android:name="android.permission.SUBSCRIBED_FEEDS_READ"
1207        android:protectionLevel="normal"
1208        android:permissionFlags="removed"/>
1209
1210    <!-- @hide We need to keep this around for backwards compatibility -->
1211    <permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE"
1212        android:protectionLevel="normal"
1213        android:permissionFlags="removed"/>
1214
1215    <!-- @hide We need to keep this around for backwards compatibility -->
1216    <permission android:name="android.permission.FLASHLIGHT"
1217        android:protectionLevel="normal"
1218        android:permissionFlags="removed"/>
1219
1220    <!-- ====================================================================== -->
1221    <!-- INSTALL PERMISSIONS                                                    -->
1222    <!-- ====================================================================== -->
1223
1224    <!-- ================================== -->
1225    <!-- Permissions for accessing messages -->
1226    <!-- ================================== -->
1227    <eat-comment />
1228
1229    <!-- @SystemApi Allows an application (Phone) to send a request to other applications
1230         to handle the respond-via-message action during incoming calls.
1231         <p>Not for use by third-party applications. -->
1232    <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE"
1233        android:protectionLevel="signature|privileged" />
1234
1235    <!-- @SystemApi Allows an application to send SMS to premium shortcodes without user permission.
1236         <p>Not for use by third-party applications.
1237         @hide -->
1238    <permission android:name="android.permission.SEND_SMS_NO_CONFIRMATION"
1239        android:protectionLevel="signature|privileged" />
1240
1241    <!-- Allows an application to filter carrier specific sms.
1242         @hide -->
1243    <permission android:name="android.permission.CARRIER_FILTER_SMS"
1244        android:protectionLevel="signature|privileged" />
1245
1246    <!-- @SystemApi Allows an application to receive emergency cell broadcast messages,
1247         to record or display them to the user.
1248         <p>Not for use by third-party applications.
1249         @hide -->
1250    <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST"
1251        android:protectionLevel="signature|privileged" />
1252
1253    <!-- Allows an application to monitor incoming Bluetooth MAP messages, to record
1254         or perform processing on them. -->
1255    <!-- @hide -->
1256    <permission android:name="android.permission.RECEIVE_BLUETOOTH_MAP"
1257        android:protectionLevel="signature|privileged" />
1258
1259    <!-- @SystemApi @hide Allows an application to execute contacts directory search.
1260         This should only be used by ContactsProvider.
1261         <p>Not for use by third-party applications. -->
1262    <permission android:name="android.permission.BIND_DIRECTORY_SEARCH"
1263        android:protectionLevel="signature|privileged" />
1264
1265    <!-- @SystemApi @hide Allows an application to modify cell broadcasts through the content provider.
1266         <p>Not for use by third-party applications. -->
1267    <permission android:name="android.permission.MODIFY_CELL_BROADCASTS"
1268                android:protectionLevel="signature|privileged" />
1269
1270    <!-- =============================================================== -->
1271    <!-- Permissions for setting the device alarm                        -->
1272    <!-- =============================================================== -->
1273    <eat-comment />
1274
1275    <!-- Allows an application to broadcast an Intent to set an alarm for the user.
1276         <p>Protection level: normal
1277    -->
1278    <permission android:name="com.android.alarm.permission.SET_ALARM"
1279        android:label="@string/permlab_setAlarm"
1280        android:description="@string/permdesc_setAlarm"
1281        android:protectionLevel="normal" />
1282
1283    <!-- =============================================================== -->
1284    <!-- Permissions for accessing the user voicemail                    -->
1285    <!-- =============================================================== -->
1286    <eat-comment />
1287
1288    <!-- Allows an application to modify and remove existing voicemails in the system.
1289        <p>Protection level: signature|privileged
1290    -->
1291    <permission android:name="com.android.voicemail.permission.WRITE_VOICEMAIL"
1292        android:protectionLevel="signature|privileged" />
1293
1294    <!-- Allows an application to read voicemails in the system.
1295         <p>Protection level: signature|privileged
1296    -->
1297    <permission android:name="com.android.voicemail.permission.READ_VOICEMAIL"
1298        android:protectionLevel="signature|privileged" />
1299
1300    <!-- ======================================= -->
1301    <!-- Permissions for accessing location info -->
1302    <!-- ======================================= -->
1303    <eat-comment />
1304
1305    <!-- Allows an application to access extra location provider commands.
1306         <p>Protection level: normal
1307    -->
1308    <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS"
1309        android:label="@string/permlab_accessLocationExtraCommands"
1310        android:description="@string/permdesc_accessLocationExtraCommands"
1311        android:protectionLevel="normal" />
1312
1313    <!-- @SystemApi Allows an application to install a location provider into the Location Manager.
1314    <p>Not for use by third-party applications. -->
1315    <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER"
1316        android:protectionLevel="signature|privileged" />
1317
1318    <!-- @SystemApi @hide Allows HDMI-CEC service to access device and configuration files.
1319         This should only be used by HDMI-CEC service.
1320    -->
1321    <permission android:name="android.permission.HDMI_CEC"
1322        android:protectionLevel="signature|privileged" />
1323
1324    <!-- @SystemApi Allows an application to use location features in hardware,
1325         such as the geofencing api.
1326         <p>Not for use by third-party applications. -->
1327    <permission android:name="android.permission.LOCATION_HARDWARE"
1328        android:protectionLevel="signature|privileged" />
1329    <uses-permission android:name="android.permission.LOCATION_HARDWARE"/>
1330
1331    <!-- @SystemApi Allows an application to create mock location providers for testing.
1332         <p>Protection level: signature
1333         @hide
1334    -->
1335    <permission android:name="android.permission.ACCESS_MOCK_LOCATION"
1336        android:protectionLevel="signature" />
1337
1338    <!-- ======================================= -->
1339    <!-- Permissions for accessing networks -->
1340    <!-- ======================================= -->
1341    <eat-comment />
1342
1343    <!-- Allows applications to open network sockets.
1344         <p>Protection level: normal
1345    -->
1346    <permission android:name="android.permission.INTERNET"
1347        android:description="@string/permdesc_createNetworkSockets"
1348        android:label="@string/permlab_createNetworkSockets"
1349        android:protectionLevel="normal|instant" />
1350
1351    <!-- Allows applications to access information about networks.
1352         <p>Protection level: normal
1353    -->
1354    <permission android:name="android.permission.ACCESS_NETWORK_STATE"
1355        android:description="@string/permdesc_accessNetworkState"
1356        android:label="@string/permlab_accessNetworkState"
1357        android:protectionLevel="normal|instant" />
1358
1359    <!-- Allows applications to access information about Wi-Fi networks.
1360         <p>Protection level: normal
1361    -->
1362    <permission android:name="android.permission.ACCESS_WIFI_STATE"
1363        android:description="@string/permdesc_accessWifiState"
1364        android:label="@string/permlab_accessWifiState"
1365        android:protectionLevel="normal" />
1366
1367    <!-- Allows applications to change Wi-Fi connectivity state.
1368         <p>Protection level: normal
1369    -->
1370    <permission android:name="android.permission.CHANGE_WIFI_STATE"
1371        android:description="@string/permdesc_changeWifiState"
1372        android:label="@string/permlab_changeWifiState"
1373        android:protectionLevel="normal" />
1374
1375    <!-- @SystemApi @hide Allows apps to create and manage IPsec tunnels.
1376         <p>Only granted to applications that are currently bound by the
1377         system for creating and managing IPsec-based interfaces.
1378    -->
1379    <permission android:name="android.permission.MANAGE_IPSEC_TUNNELS"
1380        android:protectionLevel="signature|appop" />
1381
1382    <!-- @SystemApi @hide Allows applications to read Wi-Fi credential.
1383         <p>Not for use by third-party applications. -->
1384    <permission android:name="android.permission.READ_WIFI_CREDENTIAL"
1385        android:protectionLevel="signature|privileged" />
1386
1387    <!-- @SystemApi @hide Allows applications to change tether state and run
1388         tether carrier provisioning.
1389         <p>Not for use by third-party applications. -->
1390    <permission android:name="android.permission.TETHER_PRIVILEGED"
1391        android:protectionLevel="signature|privileged" />
1392
1393    <!-- @SystemApi @hide Allow system apps to receive broadcast
1394         when a wifi network credential is changed.
1395         <p>Not for use by third-party applications. -->
1396    <permission android:name="android.permission.RECEIVE_WIFI_CREDENTIAL_CHANGE"
1397        android:protectionLevel="signature|privileged" />
1398
1399    <!-- @SystemApi @hide Allows an application to modify any wifi configuration, even if created
1400     by another application. Once reconfigured the original creator cannot make any further
1401     modifications.
1402     <p>Not for use by third-party applications. -->
1403    <permission android:name="android.permission.OVERRIDE_WIFI_CONFIG"
1404        android:protectionLevel="signature|privileged" />
1405
1406    <!-- @hide -->
1407    <permission android:name="android.permission.ACCESS_WIMAX_STATE"
1408        android:description="@string/permdesc_accessWimaxState"
1409        android:label="@string/permlab_accessWimaxState"
1410        android:protectionLevel="normal" />
1411
1412    <!-- @hide -->
1413    <permission android:name="android.permission.CHANGE_WIMAX_STATE"
1414        android:description="@string/permdesc_changeWimaxState"
1415        android:label="@string/permlab_changeWimaxState"
1416        android:protectionLevel="normal" />
1417
1418    <!-- Allows applications to act as network scorers. @hide @SystemApi-->
1419    <permission android:name="android.permission.SCORE_NETWORKS"
1420        android:protectionLevel="signature|privileged" />
1421
1422    <!-- Allows applications to request network
1423         recommendations and scores from the NetworkScoreService.
1424         <p>Not for use by third-party applications. @hide -->
1425    <permission android:name="android.permission.REQUEST_NETWORK_SCORES"
1426        android:protectionLevel="signature|setup" />
1427
1428    <!-- Allows network stack services (Connectivity and Wifi) to coordinate
1429         <p>Not for use by third-party or privileged applications.
1430         @hide This should only be used by Connectivity and Wifi Services.
1431    -->
1432    <permission android:name="android.permission.NETWORK_STACK"
1433        android:protectionLevel="signature" />
1434
1435    <!-- Allows Settings and SystemUI to call methods in Networking services
1436         <p>Not for use by third-party or privileged applications.
1437         @hide This should only be used by Settings and SystemUI.
1438    -->
1439    <permission android:name="android.permission.NETWORK_SETTINGS"
1440        android:protectionLevel="signature" />
1441
1442    <!-- Allows SetupWizard to call methods in Networking services
1443         <p>Not for use by any other third-party or privileged applications.
1444         @hide This should only be used by SetupWizard.
1445    -->
1446    <permission android:name="android.permission.NETWORK_SETUP_WIZARD"
1447        android:protectionLevel="signature|setup" />
1448
1449    <!-- #SystemApi @hide Allows applications to access information about LoWPAN interfaces.
1450         <p>Not for use by third-party applications. -->
1451    <permission android:name="android.permission.ACCESS_LOWPAN_STATE"
1452        android:protectionLevel="signature|privileged" />
1453
1454    <!-- #SystemApi @hide Allows applications to change LoWPAN connectivity state.
1455         <p>Not for use by third-party applications. -->
1456    <permission android:name="android.permission.CHANGE_LOWPAN_STATE"
1457        android:protectionLevel="signature|privileged" />
1458
1459    <!-- #SystemApi @hide Allows applications to read LoWPAN credential.
1460         <p>Not for use by third-party applications. -->
1461    <permission android:name="android.permission.READ_LOWPAN_CREDENTIAL"
1462        android:protectionLevel="signature|privileged" />
1463
1464    <!-- #SystemApi @hide Allows a service to register or unregister
1465         new LoWPAN interfaces.
1466         <p>Not for use by third-party applications. -->
1467    <permission android:name="android.permission.MANAGE_LOWPAN_INTERFACES"
1468        android:protectionLevel="signature|privileged" />
1469
1470    <!-- @hide Allows internal management of Wi-Fi connectivity state when on
1471         permission review mode.
1472         <p>Not for use by third-party applications. -->
1473    <permission android:name="android.permission.MANAGE_WIFI_WHEN_PERMISSION_REVIEW_REQUIRED"
1474        android:protectionLevel="signature" />
1475
1476    <!-- #SystemApi @hide Allows an app to bypass Private DNS.
1477         <p>Not for use by third-party applications.
1478         TODO: publish as system API in next API release. -->
1479    <permission android:name="android.permission.NETWORK_BYPASS_PRIVATE_DNS"
1480        android:protectionLevel="signature" />
1481
1482    <!-- ======================================= -->
1483    <!-- Permissions for short range, peripheral networks -->
1484    <!-- ======================================= -->
1485    <eat-comment />
1486
1487    <!-- Allows applications to connect to paired bluetooth devices.
1488         <p>Protection level: normal
1489    -->
1490    <permission android:name="android.permission.BLUETOOTH"
1491        android:description="@string/permdesc_bluetooth"
1492        android:label="@string/permlab_bluetooth"
1493        android:protectionLevel="normal" />
1494
1495    <!-- @SystemApi Allows an application to suspend other apps, which will prevent the user
1496         from using them until they are unsuspended.
1497         @hide
1498    -->
1499    <permission android:name="android.permission.SUSPEND_APPS"
1500        android:protectionLevel="signature|privileged" />
1501
1502    <!-- Allows applications to discover and pair bluetooth devices.
1503         <p>Protection level: normal
1504    -->
1505    <permission android:name="android.permission.BLUETOOTH_ADMIN"
1506        android:description="@string/permdesc_bluetoothAdmin"
1507        android:label="@string/permlab_bluetoothAdmin"
1508        android:protectionLevel="normal" />
1509
1510    <!-- @SystemApi Allows applications to pair bluetooth devices without user interaction, and to
1511         allow or disallow phonebook access or message access.
1512         This is not available to third party applications. -->
1513    <permission android:name="android.permission.BLUETOOTH_PRIVILEGED"
1514        android:protectionLevel="signature|privileged" />
1515
1516    <!-- Control access to email providers exclusively for Bluetooth
1517         @hide
1518    -->
1519    <permission android:name="android.permission.BLUETOOTH_MAP"
1520        android:protectionLevel="signature" />
1521
1522    <!-- Allows bluetooth stack to access files
1523         @hide This should only be used by Bluetooth apk.
1524    -->
1525    <permission android:name="android.permission.BLUETOOTH_STACK"
1526        android:protectionLevel="signature" />
1527
1528    <!-- Allows applications to perform I/O operations over NFC.
1529         <p>Protection level: normal
1530    -->
1531    <permission android:name="android.permission.NFC"
1532        android:description="@string/permdesc_nfc"
1533        android:label="@string/permlab_nfc"
1534        android:protectionLevel="normal" />
1535
1536    <!-- Allows applications to receive NFC transaction events.
1537         <p>Protection level: normal
1538    -->
1539    <permission android:name="android.permission.NFC_TRANSACTION_EVENT"
1540        android:protectionLevel="normal" />
1541
1542    <!-- @SystemApi Allows an internal user to use privileged ConnectivityManager APIs.
1543         @hide -->
1544    <permission android:name="android.permission.CONNECTIVITY_INTERNAL"
1545        android:protectionLevel="signature|privileged" />
1546
1547    <!-- @SystemApi Allows an internal user to use restricted Networks.
1548         @hide -->
1549    <permission android:name="android.permission.CONNECTIVITY_USE_RESTRICTED_NETWORKS"
1550        android:protectionLevel="signature|privileged" />
1551
1552    <!-- Allows a system application to access hardware packet offload capabilities.
1553         @hide -->
1554    <permission android:name="android.permission.PACKET_KEEPALIVE_OFFLOAD"
1555        android:protectionLevel="signature|privileged" />
1556
1557    <!-- @SystemApi
1558         @hide -->
1559    <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE"
1560        android:protectionLevel="signature|privileged" />
1561
1562    <!-- @SystemApi Allows access to the loop radio (Android@Home mesh network) device.
1563         @hide -->
1564    <permission android:name="android.permission.LOOP_RADIO"
1565        android:protectionLevel="signature|privileged" />
1566
1567    <!-- Allows sending and receiving handover transfer status from Wifi and Bluetooth
1568         @hide -->
1569    <permission android:name="android.permission.NFC_HANDOVER_STATUS"
1570        android:protectionLevel="signature|privileged" />
1571
1572    <!-- @hide Allows internal management of Bluetooth state when on permission review mode.
1573         <p>Not for use by third-party applications. -->
1574    <permission android:name="android.permission.MANAGE_BLUETOOTH_WHEN_PERMISSION_REVIEW_REQUIRED"
1575        android:protectionLevel="signature" />
1576
1577    <!-- ================================== -->
1578    <!-- Permissions for accessing accounts -->
1579    <!-- ================================== -->
1580    <eat-comment />
1581
1582    <!-- Allows access to the list of accounts in the Accounts Service.
1583
1584    <p class="note"><strong>Note:</strong> Beginning with Android 6.0 (API level
1585    23), if an app shares the signature of the authenticator that manages an
1586    account, it does not need <code>"GET_ACCOUNTS"</code> permission to read
1587    information about that account. On Android 5.1 and lower, all apps need
1588    <code>"GET_ACCOUNTS"</code> permission to read information about any
1589    account.</p>
1590
1591    <p>Protection level: dangerous
1592    -->
1593    <permission android:name="android.permission.GET_ACCOUNTS"
1594        android:permissionGroup="android.permission-group.CONTACTS"
1595        android:protectionLevel="dangerous"
1596        android:description="@string/permdesc_getAccounts"
1597        android:label="@string/permlab_getAccounts" />
1598    <uses-permission android:name="android.permission.GET_ACCOUNTS"/>
1599
1600    <!-- @SystemApi Allows applications to call into AccountAuthenticators.
1601    <p>Not for use by third-party applications. -->
1602    <permission android:name="android.permission.ACCOUNT_MANAGER"
1603        android:protectionLevel="signature" />
1604
1605    <!-- ================================== -->
1606    <!-- Permissions for accessing hardware that may effect battery life-->
1607    <!-- ================================== -->
1608    <eat-comment />
1609
1610    <!-- Allows applications to enter Wi-Fi Multicast mode.
1611         <p>Protection level: normal
1612    -->
1613    <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE"
1614        android:description="@string/permdesc_changeWifiMulticastState"
1615        android:label="@string/permlab_changeWifiMulticastState"
1616        android:protectionLevel="normal" />
1617
1618    <!-- Allows access to the vibrator.
1619         <p>Protection level: normal
1620    -->
1621    <permission android:name="android.permission.VIBRATE"
1622        android:label="@string/permlab_vibrate"
1623        android:description="@string/permdesc_vibrate"
1624        android:protectionLevel="normal|instant" />
1625
1626    <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen
1627         from dimming.
1628         <p>Protection level: normal
1629    -->
1630    <permission android:name="android.permission.WAKE_LOCK"
1631        android:label="@string/permlab_wakeLock"
1632        android:description="@string/permdesc_wakeLock"
1633        android:protectionLevel="normal|instant" />
1634
1635    <!-- Allows using the device's IR transmitter, if available.
1636         <p>Protection level: normal
1637    -->
1638    <permission android:name="android.permission.TRANSMIT_IR"
1639        android:label="@string/permlab_transmitIr"
1640        android:description="@string/permdesc_transmitIr"
1641        android:protectionLevel="normal" />
1642
1643    <!-- ==================================================== -->
1644    <!-- Permissions related to changing audio settings   -->
1645    <!-- ==================================================== -->
1646    <eat-comment />
1647
1648    <!-- Allows an application to modify global audio settings.
1649         <p>Protection level: normal
1650    -->
1651    <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS"
1652        android:label="@string/permlab_modifyAudioSettings"
1653        android:description="@string/permdesc_modifyAudioSettings"
1654        android:protectionLevel="normal" />
1655
1656    <!-- ================================== -->
1657    <!-- Permissions for accessing hardware -->
1658    <!-- ================================== -->
1659    <eat-comment />
1660
1661    <!-- @SystemApi Allows an application to manage preferences and permissions for USB devices
1662         @hide -->
1663    <permission android:name="android.permission.MANAGE_USB"
1664        android:protectionLevel="signature|privileged" />
1665
1666    <!-- @SystemApi Allows an application to access the MTP USB kernel driver.
1667         For use only by the device side MTP implementation.
1668         @hide -->
1669    <permission android:name="android.permission.ACCESS_MTP"
1670        android:protectionLevel="signature|privileged" />
1671
1672    <!-- @SystemApi Allows access to hardware peripherals.  Intended only for hardware testing.
1673         <p>Not for use by third-party applications.
1674         @hide
1675    -->
1676    <permission android:name="android.permission.HARDWARE_TEST"
1677        android:protectionLevel="signature" />
1678
1679    <!-- @SystemApi Allows access to Broadcast Radio
1680         @hide This is not a third-party API (intended for system apps).-->
1681    <permission android:name="android.permission.ACCESS_BROADCAST_RADIO"
1682        android:protectionLevel="signature|privileged" />
1683
1684    <!-- @deprecated @SystemApi Allows access to FM
1685         @hide This is not a third-party API (intended for system apps).-->
1686    <permission android:name="android.permission.ACCESS_FM_RADIO"
1687        android:protectionLevel="signature|privileged" />
1688
1689    <!-- Allows access to configure network interfaces, configure/use IPSec, etc.
1690         @hide -->
1691    <permission android:name="android.permission.NET_ADMIN"
1692        android:protectionLevel="signature" />
1693
1694    <!-- Allows registration for remote audio playback. @hide -->
1695    <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK"
1696        android:protectionLevel="signature" />
1697
1698    <!-- @SystemApi Allows TvInputService to access underlying TV input hardware such as
1699         built-in tuners and HDMI-in's.
1700         @hide This should only be used by OEM's TvInputService's.
1701    -->
1702    <permission android:name="android.permission.TV_INPUT_HARDWARE"
1703        android:protectionLevel="signature|privileged" />
1704
1705    <!-- @SystemApi Allows to capture a frame of TV input hardware such as
1706         built-in tuners and HDMI-in's.
1707         @hide <p>Not for use by third-party applications.
1708    -->
1709    <permission android:name="android.permission.CAPTURE_TV_INPUT"
1710        android:protectionLevel="signature|privileged" />
1711
1712    <!-- @hide Allows TvInputService to access DVB device.
1713   <p>Not for use by third-party applications. -->
1714    <permission android:name="android.permission.DVB_DEVICE"
1715        android:protectionLevel="signature|privileged" />
1716
1717    <!-- @SystemApi Allows reading and enabling/disabling the OEM unlock allowed by carrier state
1718         @hide <p>Not for use by third-party applications. -->
1719    <permission android:name="android.permission.MANAGE_CARRIER_OEM_UNLOCK_STATE"
1720        android:protectionLevel="signature|privileged" />
1721
1722    <!-- @SystemApi Allows reading and enabling/disabling the OEM unlock allowed by user state
1723         @hide <p>Not for use by third-party applications. -->
1724    <permission android:name="android.permission.MANAGE_USER_OEM_UNLOCK_STATE"
1725        android:protectionLevel="signature|privileged" />
1726
1727    <!-- @SystemApi Allows reading the OEM unlock state
1728         @hide <p>Not for use by third-party applications. -->
1729    <permission android:name="android.permission.READ_OEM_UNLOCK_STATE"
1730        android:protectionLevel="signature|privileged" />
1731
1732    <!-- @hide Allows enabling/disabling OEM unlock
1733   <p>Not for use by third-party applications. -->
1734    <permission android:name="android.permission.OEM_UNLOCK_STATE"
1735        android:protectionLevel="signature" />
1736
1737    <!-- @hide Allows querying state of PersistentDataBlock
1738   <p>Not for use by third-party applications. -->
1739    <permission android:name="android.permission.ACCESS_PDB_STATE"
1740        android:protectionLevel="signature" />
1741
1742    <!-- Allows testing if a passwords is forbidden by the admins.
1743         @hide <p>Not for use by third-party applications. -->
1744    <permission android:name="android.permission.TEST_BLACKLISTED_PASSWORD"
1745        android:protectionLevel="signature" />
1746
1747    <!-- @hide Allows system update service to notify device owner about pending updates.
1748   <p>Not for use by third-party applications. -->
1749    <permission android:name="android.permission.NOTIFY_PENDING_SYSTEM_UPDATE"
1750        android:protectionLevel="signature|privileged" />
1751
1752    <!-- =========================================== -->
1753    <!-- Permissions associated with camera and image capture -->
1754    <!-- =========================================== -->
1755    <eat-comment />
1756
1757    <!-- @SystemApi Allows disabling the transmit-indicator LED that is normally on when
1758         a camera is in use by an application.
1759         @hide -->
1760    <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED"
1761        android:protectionLevel="signature|privileged" />
1762
1763    <!-- Allows sending the camera service notifications about system-wide events.
1764        @hide -->
1765    <permission android:name="android.permission.CAMERA_SEND_SYSTEM_EVENTS"
1766        android:protectionLevel="signature|privileged" />
1767
1768    <!-- =========================================== -->
1769    <!-- Permissions associated with telephony state -->
1770    <!-- =========================================== -->
1771    <eat-comment />
1772
1773    <!-- @SystemApi Allows modification of the telephony state - power on, mmi, etc.
1774         Does not include placing calls.
1775         <p>Not for use by third-party applications. -->
1776    <permission android:name="android.permission.MODIFY_PHONE_STATE"
1777        android:protectionLevel="signature|privileged" />
1778
1779    <!-- Allows read only access to precise phone state.
1780         @hide Pending API council approval -->
1781    <permission android:name="android.permission.READ_PRECISE_PHONE_STATE"
1782        android:protectionLevel="signature|privileged" />
1783
1784    <!-- @SystemApi Allows read access to privileged phone state.
1785         @hide Used internally. -->
1786    <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE"
1787        android:protectionLevel="signature|privileged" />
1788
1789    <!-- @SystemApi Protects the ability to register any PhoneAccount with
1790         PhoneAccount#CAPABILITY_SIM_SUBSCRIPTION. This capability indicates that the PhoneAccount
1791         corresponds to a device SIM.
1792         @hide -->
1793    <permission android:name="android.permission.REGISTER_SIM_SUBSCRIPTION"
1794        android:protectionLevel="signature|privileged" />
1795
1796    <!-- @SystemApi Protects the ability to register any PhoneAccount with
1797         PhoneAccount#CAPABILITY_CALL_PROVIDER.
1798         @hide -->
1799    <permission android:name="android.permission.REGISTER_CALL_PROVIDER"
1800        android:protectionLevel="signature|privileged" />
1801
1802    <!-- @SystemApi Protects the ability to register any PhoneAccount with
1803         PhoneAccount#CAPABILITY_CONNECTION_MANAGER
1804         @hide -->
1805    <permission android:name="android.permission.REGISTER_CONNECTION_MANAGER"
1806        android:protectionLevel="signature|privileged" />
1807
1808    <!-- Must be required by a {@link android.telecom.InCallService},
1809         to ensure that only the system can bind to it.
1810         <p>Protection level: signature|privileged
1811    -->
1812    <permission android:name="android.permission.BIND_INCALL_SERVICE"
1813        android:protectionLevel="signature|privileged" />
1814
1815    <!-- Must be required by a link {@link android.telephony.VisualVoicemailService} to ensure that
1816         only the system can bind to it.
1817         <p>Protection level: signature|privileged
1818    -->
1819    <permission
1820      android:name="android.permission.BIND_VISUAL_VOICEMAIL_SERVICE"
1821      android:protectionLevel="signature|privileged"/>
1822
1823    <!-- Must be required by a {@link android.telecom.CallScreeningService},
1824         to ensure that only the system can bind to it.
1825         <p>Protection level: signature|privileged
1826    -->
1827    <permission android:name="android.permission.BIND_SCREENING_SERVICE"
1828        android:protectionLevel="signature|privileged" />
1829
1830    <!-- Must be required by a {@link android.telecom.ConnectionService},
1831         to ensure that only the system can bind to it.
1832         @deprecated {@link android.telecom.ConnectionService}s should require
1833                 android.permission.BIND_TELECOM_CONNECTION_SERVICE instead.
1834         @SystemApi
1835         @hide -->
1836    <permission android:name="android.permission.BIND_CONNECTION_SERVICE"
1837        android:protectionLevel="signature|privileged" />
1838
1839    <!-- Must be required by a {@link android.telecom.ConnectionService},
1840         to ensure that only the system can bind to it.
1841         <p>Protection level: signature|privileged
1842    -->
1843    <permission android:name="android.permission.BIND_TELECOM_CONNECTION_SERVICE"
1844        android:protectionLevel="signature|privileged" />
1845
1846    <!-- @SystemApi Allows an application to control the in-call experience.
1847         @hide -->
1848    <permission android:name="android.permission.CONTROL_INCALL_EXPERIENCE"
1849        android:protectionLevel="signature|privileged" />
1850
1851    <!-- Allows an application to receive STK related commands.
1852         @hide -->
1853    <permission android:name="android.permission.RECEIVE_STK_COMMANDS"
1854        android:protectionLevel="signature|privileged" />
1855
1856      <!-- Allows an application to send EMBMS download intents to apps
1857           @hide -->
1858    <permission android:name="android.permission.SEND_EMBMS_INTENTS"
1859        android:protectionLevel="signature|privileged" />
1860
1861
1862    <!-- Allows internal management of the sensor framework
1863         @hide -->
1864    <permission android:name="android.permission.MANAGE_SENSORS"
1865        android:protectionLevel="signature" />
1866
1867    <!-- Must be required by an ImsService to ensure that only the
1868         system can bind to it.
1869         <p>Protection level: signature|privileged|vendorPrivileged
1870         @SystemApi
1871         @hide
1872    -->
1873    <permission android:name="android.permission.BIND_IMS_SERVICE"
1874        android:protectionLevel="signature|privileged|vendorPrivileged" />
1875
1876    <!-- Must be required by a telephony data service to ensure that only the
1877         system can bind to it.
1878         <p>Protection level: signature
1879         @SystemApi
1880         @hide
1881    -->
1882    <permission android:name="android.permission.BIND_TELEPHONY_DATA_SERVICE"
1883        android:protectionLevel="signature" />
1884
1885    <!-- Must be required by a NetworkService to ensure that only the
1886         system can bind to it.
1887         <p>Protection level: signature
1888         @SystemApi
1889         @hide
1890    -->
1891    <permission android:name="android.permission.BIND_TELEPHONY_NETWORK_SERVICE"
1892                android:protectionLevel="signature" />
1893
1894    <!-- @SystemApi Allows an application to manage embedded subscriptions (those on a eUICC)
1895         through EuiccManager APIs.
1896         <p>Protection level: signature|privileged|development
1897         @hide
1898    -->
1899    <permission android:name="android.permission.WRITE_EMBEDDED_SUBSCRIPTIONS"
1900                android:protectionLevel="signature|privileged|development" />
1901
1902    <!-- @SystemApi Must be required by an EuiccService to ensure that only the system can bind to
1903         it.
1904         <p>Protection level: signature
1905         @hide
1906    -->
1907    <permission android:name="android.permission.BIND_EUICC_SERVICE"
1908                android:protectionLevel="signature" />
1909
1910    <!-- ================================== -->
1911    <!-- Permissions for sdcard interaction -->
1912    <!-- ================================== -->
1913    <eat-comment />
1914
1915    <!-- @SystemApi Allows an application to write to internal media storage
1916         @hide  -->
1917    <permission android:name="android.permission.WRITE_MEDIA_STORAGE"
1918        android:protectionLevel="signature|privileged" />
1919
1920    <!-- Allows an application to manage access to documents, usually as part
1921         of a document picker.
1922         <p>This permission should <em>only</em> be requested by the platform
1923         document management app.  This permission cannot be granted to
1924         third-party apps.
1925         <p>Protection level: signature
1926    -->
1927    <permission android:name="android.permission.MANAGE_DOCUMENTS"
1928        android:protectionLevel="signature" />
1929
1930    <!-- @hide Allows an application to cache content.
1931         <p>Not for use by third-party applications.
1932         <p>Protection level: signature
1933    -->
1934    <permission android:name="android.permission.CACHE_CONTENT"
1935        android:protectionLevel="signature" />
1936
1937    <!-- @SystemApi @hide
1938         Allows an application to aggressively allocate disk space.
1939         <p>Not for use by third-party applications.
1940    -->
1941    <permission android:name="android.permission.ALLOCATE_AGGRESSIVE"
1942        android:protectionLevel="signature|privileged" />
1943
1944    <!-- @SystemApi @hide
1945         Allows an application to use reserved disk space.
1946         <p>Not for use by third-party applications.  Should only be requested by
1947         apps that provide core system functionality, to ensure system stability
1948         when disk is otherwise completely full.
1949    -->
1950    <permission android:name="android.permission.USE_RESERVED_DISK"
1951        android:protectionLevel="signature|privileged" />
1952
1953    <!-- ================================== -->
1954    <!-- Permissions for screenlock         -->
1955    <!-- ================================== -->
1956    <eat-comment />
1957
1958    <!-- Allows applications to disable the keyguard if it is not secure.
1959         <p>Protection level: normal
1960    -->
1961    <permission android:name="android.permission.DISABLE_KEYGUARD"
1962        android:description="@string/permdesc_disableKeyguard"
1963        android:label="@string/permlab_disableKeyguard"
1964        android:protectionLevel="normal" />
1965
1966    <!-- ================================== -->
1967    <!-- Permissions to access other installed applications  -->
1968    <!-- ================================== -->
1969    <eat-comment />
1970
1971    <!-- @deprecated No longer enforced. -->
1972    <permission android:name="android.permission.GET_TASKS"
1973        android:label="@string/permlab_getTasks"
1974        android:description="@string/permdesc_getTasks"
1975        android:protectionLevel="normal" />
1976
1977    <!-- New version of GET_TASKS that apps can request, since GET_TASKS doesn't really
1978         give access to task information.  We need this new one because there are
1979         many existing apps that use add libraries and such that have validation
1980         code to ensure the app has requested the GET_TASKS permission by seeing
1981         if it has been granted the permission...  if it hasn't, it kills the app
1982         with a message about being upset.  So we need to have it continue to look
1983         like the app is getting that permission, even though it will never be
1984         checked, and new privileged apps can now request this one for real access.
1985         @hide
1986         @SystemApi -->
1987    <permission android:name="android.permission.REAL_GET_TASKS"
1988        android:protectionLevel="signature|privileged" />
1989
1990    <!-- Allows an application to start a task from a ActivityManager#RecentTaskInfo.
1991         @hide -->
1992    <permission android:name="android.permission.START_TASKS_FROM_RECENTS"
1993        android:protectionLevel="signature|privileged" />
1994
1995    <!-- @SystemApi @hide Allows an application to call APIs that allow it to do interactions
1996         across the users on the device, using singleton services and
1997         user-targeted broadcasts.  This permission is not available to
1998         third party applications. -->
1999    <permission android:name="android.permission.INTERACT_ACROSS_USERS"
2000        android:protectionLevel="signature|privileged|development" />
2001
2002    <!-- @SystemApi Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS}
2003         that removes restrictions on where broadcasts can be sent and allows other
2004         types of interactions
2005         @hide -->
2006    <permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL"
2007        android:protectionLevel="signature|installer" />
2008
2009    <!-- @SystemApi @hide Allows an application to call APIs that allow it to query and manage
2010         users on the device. This permission is not available to
2011         third party applications. -->
2012    <permission android:name="android.permission.MANAGE_USERS"
2013        android:protectionLevel="signature|privileged" />
2014
2015    <!-- @hide Allows an application to create, remove users and get the list of
2016         users on the device. Applications holding this permission can only create restricted,
2017         guest, managed, demo, and ephemeral users. For creating other kind of users,
2018         {@link android.Manifest.permission#MANAGE_USERS} is needed.
2019         This permission is not available to third party applications. -->
2020    <permission android:name="android.permission.CREATE_USERS"
2021        android:protectionLevel="signature" />
2022
2023    <!-- @hide Allows an application to set the profile owners and the device owner.
2024         This permission is not available to third party applications.-->
2025    <permission android:name="android.permission.MANAGE_PROFILE_AND_DEVICE_OWNERS"
2026        android:protectionLevel="signature"
2027        android:label="@string/permlab_manageProfileAndDeviceOwners"
2028        android:description="@string/permdesc_manageProfileAndDeviceOwners" />
2029
2030    <!-- Allows an application to get full detailed information about
2031         recently running tasks, with full fidelity to the real state.
2032         @hide -->
2033    <permission android:name="android.permission.GET_DETAILED_TASKS"
2034        android:protectionLevel="signature" />
2035
2036    <!-- Allows an application to change the Z-order of tasks.
2037         <p>Protection level: normal
2038    -->
2039    <permission android:name="android.permission.REORDER_TASKS"
2040        android:label="@string/permlab_reorderTasks"
2041        android:description="@string/permdesc_reorderTasks"
2042        android:protectionLevel="normal" />
2043
2044    <!-- @hide Allows an application to change to remove/kill tasks -->
2045    <permission android:name="android.permission.REMOVE_TASKS"
2046        android:protectionLevel="signature" />
2047
2048    <!-- @SystemApi @TestApi @hide Allows an application to create/manage/remove stacks -->
2049    <permission android:name="android.permission.MANAGE_ACTIVITY_STACKS"
2050        android:protectionLevel="signature|privileged|development" />
2051
2052    <!-- @SystemApi @TestApi @hide Allows an application to embed other activities -->
2053    <permission android:name="android.permission.ACTIVITY_EMBEDDING"
2054                android:protectionLevel="signature|privileged|development" />
2055
2056    <!-- Allows an application to start any activity, regardless of permission
2057         protection or exported state.
2058         @hide -->
2059    <permission android:name="android.permission.START_ANY_ACTIVITY"
2060        android:protectionLevel="signature" />
2061
2062    <!-- @SystemApi Must be required by activities that handle the intent action
2063         {@link Intent#ACTION_SEND_SHOW_SUSPENDED_APP_DETAILS}. This is for use by apps that
2064         hold {@link Manifest.permission#SUSPEND_APPS} to interact with the system.
2065         <p>Not for use by third-party applications.
2066         @hide -->
2067    <permission android:name="android.permission.SEND_SHOW_SUSPENDED_APP_DETAILS"
2068                android:protectionLevel="signature" />
2069    <uses-permission android:name="android.permission.SEND_SHOW_SUSPENDED_APP_DETAILS" />
2070
2071    <!-- @deprecated The {@link android.app.ActivityManager#restartPackage}
2072        API is no longer supported. -->
2073    <permission android:name="android.permission.RESTART_PACKAGES"
2074        android:label="@string/permlab_killBackgroundProcesses"
2075        android:description="@string/permdesc_killBackgroundProcesses"
2076        android:protectionLevel="normal" />
2077
2078    <!-- Allows an application to call
2079        {@link android.app.ActivityManager#killBackgroundProcesses}.
2080         <p>Protection level: normal
2081    -->
2082    <permission android:name="android.permission.KILL_BACKGROUND_PROCESSES"
2083        android:label="@string/permlab_killBackgroundProcesses"
2084        android:description="@string/permdesc_killBackgroundProcesses"
2085        android:protectionLevel="normal" />
2086
2087    <!-- @SystemApi @hide Allows an application to query process states and current
2088         OOM adjustment scores.
2089         <p>Not for use by third-party applications. -->
2090    <permission android:name="android.permission.GET_PROCESS_STATE_AND_OOM_SCORE"
2091        android:protectionLevel="signature|privileged|development" />
2092
2093    <!-- Allows use of PendingIntent.getIntent().
2094         @hide -->
2095    <permission android:name="android.permission.GET_INTENT_SENDER_INTENT"
2096        android:protectionLevel="signature" />
2097
2098    <!-- ================================== -->
2099    <!-- Permissions affecting the display of other applications  -->
2100    <!-- ================================== -->
2101    <eat-comment />
2102
2103    <!-- Allows an app to create windows using the type
2104         {@link android.view.WindowManager.LayoutParams#TYPE_APPLICATION_OVERLAY},
2105         shown on top of all other apps.  Very few apps
2106         should use this permission; these windows are intended for
2107         system-level interaction with the user.
2108
2109         <p class="note"><strong>Note:</strong> If the app
2110         targets API level 23 or higher, the app user must explicitly grant
2111         this permission to the app through a permission management screen. The app requests
2112         the user's approval by sending an intent with action
2113         {@link android.provider.Settings#ACTION_MANAGE_OVERLAY_PERMISSION}.
2114         The app can check whether it has this authorization by calling
2115         {@link android.provider.Settings#canDrawOverlays
2116         Settings.canDrawOverlays()}.
2117         <p>Protection level: signature -->
2118    <permission android:name="android.permission.SYSTEM_ALERT_WINDOW"
2119        android:label="@string/permlab_systemAlertWindow"
2120        android:description="@string/permdesc_systemAlertWindow"
2121        android:protectionLevel="signature|preinstalled|appop|pre23|development" />
2122
2123    <!-- @deprecated Use {@link android.Manifest.permission#REQUEST_COMPANION_RUN_IN_BACKGROUND}
2124         @hide
2125    -->
2126    <permission android:name="android.permission.RUN_IN_BACKGROUND"
2127        android:label="@string/permlab_runInBackground"
2128        android:description="@string/permdesc_runInBackground"
2129        android:protectionLevel="signature" />
2130
2131    <!-- @deprecated Use
2132        {@link android.Manifest.permission#REQUEST_COMPANION_USE_DATA_IN_BACKGROUND}
2133         @hide
2134    -->
2135    <permission android:name="android.permission.USE_DATA_IN_BACKGROUND"
2136        android:label="@string/permlab_useDataInBackground"
2137        android:description="@string/permdesc_useDataInBackground"
2138        android:protectionLevel="signature" />
2139
2140    <!-- @hide Allows an application to set display offsets for the screen.
2141         This permission is not available to third party applications. -->
2142    <permission android:name="android.permission.SET_DISPLAY_OFFSET"
2143        android:protectionLevel="signature|privileged" />
2144
2145    <!-- Allows a companion app to run in the background.
2146         <p>Protection level: normal
2147    -->
2148    <permission android:name="android.permission.REQUEST_COMPANION_RUN_IN_BACKGROUND"
2149                android:label="@string/permlab_runInBackground"
2150                android:description="@string/permdesc_runInBackground"
2151                android:protectionLevel="normal" />
2152
2153    <!-- Allows a companion app to use data in the background.
2154         <p>Protection level: normal
2155    -->
2156    <permission android:name="android.permission.REQUEST_COMPANION_USE_DATA_IN_BACKGROUND"
2157                android:label="@string/permlab_useDataInBackground"
2158                android:description="@string/permdesc_useDataInBackground"
2159                android:protectionLevel="normal" />
2160
2161
2162    <!-- ================================== -->
2163    <!-- Permissions affecting the system wallpaper -->
2164    <!-- ================================== -->
2165    <eat-comment />
2166
2167    <!-- Allows applications to set the wallpaper.
2168         <p>Protection level: normal
2169     -->
2170    <permission android:name="android.permission.SET_WALLPAPER"
2171        android:label="@string/permlab_setWallpaper"
2172        android:description="@string/permdesc_setWallpaper"
2173        android:protectionLevel="normal" />
2174
2175    <!-- Allows applications to set the wallpaper hints.
2176         <p>Protection level: normal
2177    -->
2178    <permission android:name="android.permission.SET_WALLPAPER_HINTS"
2179        android:label="@string/permlab_setWallpaperHints"
2180        android:description="@string/permdesc_setWallpaperHints"
2181        android:protectionLevel="normal" />
2182
2183    <!-- Allow the app to read the system wallpaper image without
2184        holding the READ_EXTERNAL_STORAGE permission.
2185        <p>Not for use by third-party applications.
2186        @hide
2187        @SystemApi
2188    -->
2189    <permission android:name="android.permission.READ_WALLPAPER_INTERNAL"
2190        android:protectionLevel="signature|privileged" />
2191
2192    <!-- ============================================ -->
2193    <!-- Permissions for changing the system clock -->
2194    <!-- ============================================ -->
2195    <eat-comment />
2196
2197    <!-- @SystemApi Allows applications to set the system time.
2198    <p>Not for use by third-party applications. -->
2199    <permission android:name="android.permission.SET_TIME"
2200        android:protectionLevel="signature|privileged" />
2201
2202    <!-- Allows applications to set the system time zone.
2203         <p>Not for use by third-party applications.
2204    -->
2205    <permission android:name="android.permission.SET_TIME_ZONE"
2206        android:label="@string/permlab_setTimeZone"
2207        android:description="@string/permdesc_setTimeZone"
2208        android:protectionLevel="signature|privileged" />
2209
2210    <!-- ==================================================== -->
2211    <!-- Permissions related to changing status bar   -->
2212    <!-- ==================================================== -->
2213    <eat-comment />
2214
2215    <!-- Allows an application to expand or collapse the status bar.
2216         <p>Protection level: normal
2217    -->
2218    <permission android:name="android.permission.EXPAND_STATUS_BAR"
2219        android:label="@string/permlab_expandStatusBar"
2220        android:description="@string/permdesc_expandStatusBar"
2221        android:protectionLevel="normal" />
2222
2223    <!-- ============================================================== -->
2224    <!-- Permissions related to adding/removing shortcuts from Launcher -->
2225    <!-- ============================================================== -->
2226    <eat-comment />
2227
2228    <!-- Allows an application to install a shortcut in Launcher.
2229         <p>In Android O (API level 26) and higher, the <code>INSTALL_SHORTCUT</code> broadcast no
2230         longer has any effect on your app because it's a private, implicit
2231         broadcast. Instead, you should create an app shortcut by using the
2232         {@link android.content.pm.ShortcutManager#requestPinShortcut requestPinShortcut()}
2233         method from the {@link android.content.pm.ShortcutManager} class.
2234         <p>Protection level: normal
2235    -->
2236    <permission android:name="com.android.launcher.permission.INSTALL_SHORTCUT"
2237        android:label="@string/permlab_install_shortcut"
2238        android:description="@string/permdesc_install_shortcut"
2239        android:protectionLevel="normal"/>
2240
2241    <!--This permission is no longer supported.
2242    -->
2243    <permission android:name="com.android.launcher.permission.UNINSTALL_SHORTCUT"
2244        android:label="@string/permlab_uninstall_shortcut"
2245        android:description="@string/permdesc_uninstall_shortcut"
2246        android:protectionLevel="normal"/>
2247
2248    <!-- ==================================================== -->
2249    <!-- Permissions related to accessing sync settings   -->
2250    <!-- ==================================================== -->
2251    <eat-comment />
2252
2253    <!-- Allows applications to read the sync settings.
2254         <p>Protection level: normal
2255    -->
2256    <permission android:name="android.permission.READ_SYNC_SETTINGS"
2257        android:description="@string/permdesc_readSyncSettings"
2258        android:label="@string/permlab_readSyncSettings"
2259        android:protectionLevel="normal" />
2260
2261    <!-- Allows applications to write the sync settings.
2262         <p>Protection level: normal
2263    -->
2264    <permission android:name="android.permission.WRITE_SYNC_SETTINGS"
2265        android:description="@string/permdesc_writeSyncSettings"
2266        android:label="@string/permlab_writeSyncSettings"
2267        android:protectionLevel="normal" />
2268
2269    <!-- Allows applications to read the sync stats.
2270         <p>Protection level: normal
2271    -->
2272    <permission android:name="android.permission.READ_SYNC_STATS"
2273        android:description="@string/permdesc_readSyncStats"
2274        android:label="@string/permlab_readSyncStats"
2275        android:protectionLevel="normal" />
2276
2277    <!-- ============================================ -->
2278    <!-- Permissions for low-level system interaction -->
2279    <!-- ============================================ -->
2280    <eat-comment />
2281
2282    <!-- @SystemApi @hide Change the screen compatibility mode of applications -->
2283    <permission android:name="android.permission.SET_SCREEN_COMPATIBILITY"
2284        android:protectionLevel="signature" />
2285
2286    <!-- @SystemApi Allows an application to modify the current configuration, such
2287         as locale. -->
2288    <permission android:name="android.permission.CHANGE_CONFIGURATION"
2289        android:protectionLevel="signature|privileged|development" />
2290
2291    <!-- Allows an application to read or write the system settings.
2292
2293        <p class="note"><strong>Note:</strong> If the app targets API level 23
2294        or higher, the app user
2295        must explicitly grant this permission to the app through a permission management screen.
2296        The app requests the user's approval by sending an intent with action
2297        {@link android.provider.Settings#ACTION_MANAGE_WRITE_SETTINGS}. The app
2298        can check whether it has this authorization by calling {@link
2299        android.provider.Settings.System#canWrite Settings.System.canWrite()}.
2300
2301        <p>Protection level: signature
2302    -->
2303    <permission android:name="android.permission.WRITE_SETTINGS"
2304        android:label="@string/permlab_writeSettings"
2305        android:description="@string/permdesc_writeSettings"
2306        android:protectionLevel="signature|preinstalled|appop|pre23" />
2307
2308    <!-- @SystemApi Allows an application to modify the Google service map.
2309    <p>Not for use by third-party applications. -->
2310    <permission android:name="android.permission.WRITE_GSERVICES"
2311        android:protectionLevel="signature|privileged" />
2312
2313    <!-- @SystemApi Allows an application to call
2314        {@link android.app.ActivityManager#forceStopPackage}.
2315        @hide -->
2316    <permission android:name="android.permission.FORCE_STOP_PACKAGES"
2317        android:protectionLevel="signature|privileged" />
2318
2319    <!-- @SystemApi @hide Allows an application to retrieve the content of the active window
2320         An active window is the window that has fired an accessibility event. -->
2321    <permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT"
2322        android:protectionLevel="signature|privileged" />
2323
2324    <!-- @SystemApi Modify the global animation scaling factor.
2325    <p>Not for use by third-party applications. -->
2326    <permission android:name="android.permission.SET_ANIMATION_SCALE"
2327        android:protectionLevel="signature|privileged|development" />
2328
2329    <!-- @deprecated This functionality will be removed in the future; please do
2330         not use. Allow an application to make its activities persistent. -->
2331    <permission android:name="android.permission.PERSISTENT_ACTIVITY"
2332        android:label="@string/permlab_persistentActivity"
2333        android:description="@string/permdesc_persistentActivity"
2334        android:protectionLevel="normal" />
2335
2336    <!-- Allows an application to find out the space used by any package.
2337         <p>Protection level: normal
2338    -->
2339    <permission android:name="android.permission.GET_PACKAGE_SIZE"
2340        android:label="@string/permlab_getPackageSize"
2341        android:description="@string/permdesc_getPackageSize"
2342        android:protectionLevel="normal" />
2343
2344    <!-- @deprecated No longer useful, see
2345         {@link android.content.pm.PackageManager#addPackageToPreferred}
2346         for details. -->
2347    <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS"
2348        android:protectionLevel="signature|verifier" />
2349
2350    <!-- Allows an application to receive the
2351         {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is
2352         broadcast after the system finishes booting.  If you don't
2353         request this permission, you will not receive the broadcast at
2354         that time.  Though holding this permission does not have any
2355         security implications, it can have a negative impact on the
2356         user experience by increasing the amount of time it takes the
2357         system to start and allowing applications to have themselves
2358         running without the user being aware of them.  As such, you must
2359         explicitly declare your use of this facility to make that visible
2360         to the user.
2361         <p>Protection level: normal
2362    -->
2363    <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED"
2364        android:label="@string/permlab_receiveBootCompleted"
2365        android:description="@string/permdesc_receiveBootCompleted"
2366        android:protectionLevel="normal" />
2367
2368    <!-- Allows an application to broadcast sticky intents.  These are
2369         broadcasts whose data is held by the system after being finished,
2370         so that clients can quickly retrieve that data without having
2371         to wait for the next broadcast.
2372         <p>Protection level: normal
2373    -->
2374    <permission android:name="android.permission.BROADCAST_STICKY"
2375        android:label="@string/permlab_broadcastSticky"
2376        android:description="@string/permdesc_broadcastSticky"
2377        android:protectionLevel="normal" />
2378
2379    <!-- @SystemApi Allows mounting and unmounting file systems for removable storage.
2380    <p>Not for use by third-party applications.-->
2381    <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS"
2382        android:protectionLevel="signature|privileged" />
2383
2384    <!-- @SystemApi Allows formatting file systems for removable storage.
2385    <p>Not for use by third-party applications. -->
2386    <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS"
2387        android:protectionLevel="signature|privileged" />
2388
2389    <!-- @hide -->
2390    <permission android:name="android.permission.STORAGE_INTERNAL"
2391        android:protectionLevel="signature" />
2392
2393    <!-- Allows access to ASEC non-destructive API calls
2394         @hide  -->
2395    <permission android:name="android.permission.ASEC_ACCESS"
2396        android:protectionLevel="signature" />
2397
2398    <!-- Allows creation of ASEC volumes
2399         @hide  -->
2400    <permission android:name="android.permission.ASEC_CREATE"
2401        android:protectionLevel="signature" />
2402
2403    <!-- Allows destruction of ASEC volumes
2404         @hide  -->
2405    <permission android:name="android.permission.ASEC_DESTROY"
2406        android:protectionLevel="signature" />
2407
2408    <!-- Allows mount / unmount of ASEC volumes
2409         @hide  -->
2410    <permission android:name="android.permission.ASEC_MOUNT_UNMOUNT"
2411        android:protectionLevel="signature" />
2412
2413    <!-- Allows rename of ASEC volumes
2414         @hide  -->
2415    <permission android:name="android.permission.ASEC_RENAME"
2416        android:protectionLevel="signature" />
2417
2418    <!-- @SystemApi Allows applications to write the apn settings.
2419    <p>Not for use by third-party applications. -->
2420    <permission android:name="android.permission.WRITE_APN_SETTINGS"
2421        android:protectionLevel="signature|privileged" />
2422
2423    <!-- Allows applications to change network connectivity state.
2424         <p>Protection level: normal
2425    -->
2426    <permission android:name="android.permission.CHANGE_NETWORK_STATE"
2427        android:description="@string/permdesc_changeNetworkState"
2428        android:label="@string/permlab_changeNetworkState"
2429        android:protectionLevel="normal" />
2430
2431    <!-- Allows an application to clear the caches of all installed
2432         applications on the device.
2433         <p>Protection level: signature|privileged
2434    -->
2435    <permission android:name="android.permission.CLEAR_APP_CACHE"
2436        android:protectionLevel="signature|privileged" />
2437
2438    <!-- @SystemApi Allows an application to use any media decoder when decoding for playback
2439         @hide -->
2440    <permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK"
2441        android:protectionLevel="signature|privileged" />
2442
2443    <!-- @SystemApi Allows an application to install and/or uninstall CA certificates on
2444         behalf of the user.
2445         @hide -->
2446    <permission android:name="android.permission.MANAGE_CA_CERTIFICATES"
2447        android:protectionLevel="signature|privileged" />
2448
2449    <!-- @SystemApi Allows an application to do certain operations needed for
2450         interacting with the recovery (system update) system.
2451         @hide -->
2452    <permission android:name="android.permission.RECOVERY"
2453        android:protectionLevel="signature|privileged" />
2454
2455    <!-- @SystemApi Allows an application to read system update info.
2456         @hide -->
2457    <permission android:name="android.permission.READ_SYSTEM_UPDATE_INFO"
2458        android:protectionLevel="signature" />
2459
2460    <!-- Allows the system to bind to an application's task services
2461         @hide -->
2462    <permission android:name="android.permission.BIND_JOB_SERVICE"
2463        android:protectionLevel="signature" />
2464    <uses-permission android:name="android.permission.BIND_JOB_SERVICE"/>
2465
2466    <!-- Allows an application to initiate configuration updates
2467         <p>An application requesting this permission is responsible for
2468         verifying the source and integrity of any update before passing
2469         it off to the various individual installer components
2470         @hide -->
2471    <permission android:name="android.permission.UPDATE_CONFIG"
2472        android:protectionLevel="signature|privileged" />
2473
2474    <!-- Allows an application to query the current time zone rules state
2475         on device.
2476         @SystemApi @hide -->
2477    <permission android:name="android.permission.QUERY_TIME_ZONE_RULES"
2478                android:protectionLevel="signature|privileged" />
2479
2480    <!-- Allows a time zone rule updater application to request
2481         the system installs / uninstalls timezone rules.
2482         <p>An application requesting this permission is responsible for
2483         verifying the source and integrity of the update before passing
2484         it off to the installer components.
2485         @SystemApi @hide -->
2486    <permission android:name="android.permission.UPDATE_TIME_ZONE_RULES"
2487        android:protectionLevel="signature|privileged" />
2488
2489    <!-- Must be required by a time zone rule updater application,
2490         to ensure that only the system can trigger it.
2491         @hide -->
2492    <permission android:name="android.permission.TRIGGER_TIME_ZONE_RULES_CHECK"
2493        android:protectionLevel="signature" />
2494    <uses-permission android:name="android.permission.TRIGGER_TIME_ZONE_RULES_CHECK"/>
2495
2496    <!-- Allows the system to reset throttling in shortcut manager.
2497         @hide -->
2498    <permission android:name="android.permission.RESET_SHORTCUT_MANAGER_THROTTLING"
2499        android:protectionLevel="signature" />
2500
2501    <!-- Allows the system to bind to the discovered Network Recommendation Service.
2502         @SystemApi @hide -->
2503    <permission android:name="android.permission.BIND_NETWORK_RECOMMENDATION_SERVICE"
2504        android:protectionLevel="signature" />
2505    <uses-permission android:name="android.permission.BIND_NETWORK_RECOMMENDATION_SERVICE"/>
2506
2507    <!-- Allows an application to enable, disable and change priority of
2508         runtime resource overlays.
2509         @hide -->
2510    <permission android:name="android.permission.CHANGE_OVERLAY_PACKAGES"
2511        android:protectionLevel="signature|privileged" />
2512
2513    <!-- ========================================= -->
2514    <!-- Permissions for special development tools -->
2515    <!-- ========================================= -->
2516    <eat-comment />
2517
2518    <!-- @SystemApi Allows an application to read or write the secure system settings.
2519    <p>Not for use by third-party applications. -->
2520    <permission android:name="android.permission.WRITE_SECURE_SETTINGS"
2521        android:protectionLevel="signature|privileged|development" />
2522
2523    <!-- @SystemApi Allows an application to retrieve state dump information from system services.
2524    <p>Not for use by third-party applications. -->
2525    <permission android:name="android.permission.DUMP"
2526        android:protectionLevel="signature|privileged|development" />
2527
2528    <!-- @SystemApi Allows an application to read the low-level system log files.
2529    <p>Not for use by third-party applications, because
2530    Log entries can contain the user's private information. -->
2531    <permission android:name="android.permission.READ_LOGS"
2532        android:protectionLevel="signature|privileged|development" />
2533
2534    <!-- @SystemApi Configure an application for debugging.
2535    <p>Not for use by third-party applications. -->
2536    <permission android:name="android.permission.SET_DEBUG_APP"
2537        android:protectionLevel="signature|privileged|development" />
2538
2539    <!-- @SystemApi Allows an application to set the maximum number of (not needed)
2540         application processes that can be running.
2541         <p>Not for use by third-party applications. -->
2542    <permission android:name="android.permission.SET_PROCESS_LIMIT"
2543        android:protectionLevel="signature|privileged|development" />
2544
2545    <!-- @SystemApi Allows an application to control whether activities are immediately
2546         finished when put in the background.
2547         <p>Not for use by third-party applications. -->
2548    <permission android:name="android.permission.SET_ALWAYS_FINISH"
2549        android:protectionLevel="signature|privileged|development" />
2550
2551    <!-- @SystemApi Allow an application to request that a signal be sent to all persistent processes.
2552    <p>Not for use by third-party applications. -->
2553    <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES"
2554        android:protectionLevel="signature|privileged|development" />
2555
2556    <!-- ==================================== -->
2557    <!-- Private permissions                  -->
2558    <!-- ==================================== -->
2559    <eat-comment />
2560
2561    <!-- @SystemApi Allows access to the list of accounts in the Accounts Service. -->
2562    <permission android:name="android.permission.GET_ACCOUNTS_PRIVILEGED"
2563        android:protectionLevel="signature|privileged" />
2564
2565    <!-- Allows but does not guarantee access to user passwords at the conclusion of add account
2566    @hide -->
2567    <permission android:name="android.permission.GET_PASSWORD"
2568        android:protectionLevel="signature" />
2569
2570    <!-- @SystemApi Allows applications to RW to diagnostic resources.
2571    <p>Not for use by third-party applications. -->
2572    <permission android:name="android.permission.DIAGNOSTIC"
2573        android:protectionLevel="signature" />
2574
2575    <!-- @SystemApi Allows an application to open, close, or disable the status bar
2576         and its icons.
2577         <p>Not for use by third-party applications. -->
2578    <permission android:name="android.permission.STATUS_BAR"
2579        android:protectionLevel="signature|privileged" />
2580
2581    <!-- Allows an application to be the status bar.  Currently used only by SystemUI.apk
2582    @hide -->
2583    <permission android:name="android.permission.STATUS_BAR_SERVICE"
2584        android:protectionLevel="signature" />
2585
2586    <!-- Allows an application to bind to third party quick settings tiles.
2587         <p>Should only be requested by the System, should be required by
2588         TileService declarations.-->
2589    <permission android:name="android.permission.BIND_QUICK_SETTINGS_TILE"
2590        android:protectionLevel="signature" />
2591
2592    <!-- @SystemApi Allows an application to force a BACK operation on whatever is the
2593         top activity.
2594         <p>Not for use by third-party applications.
2595         @hide
2596    -->
2597    <permission android:name="android.permission.FORCE_BACK"
2598        android:protectionLevel="signature" />
2599
2600    <!-- @SystemApi Allows an application to update device statistics.
2601    <p>Not for use by third-party applications. -->
2602    <permission android:name="android.permission.UPDATE_DEVICE_STATS"
2603        android:protectionLevel="signature|privileged" />
2604
2605    <!-- @SystemApi @hide Allows an application to collect application operation statistics.
2606         Not for use by third party apps. -->
2607    <permission android:name="android.permission.GET_APP_OPS_STATS"
2608        android:protectionLevel="signature|privileged|development" />
2609
2610    <!-- @SystemApi Allows an application to update application operation statistics. Not for
2611         use by third party apps.
2612         @hide -->
2613    <permission android:name="android.permission.UPDATE_APP_OPS_STATS"
2614        android:protectionLevel="signature|privileged|installer" />
2615
2616    <!-- @SystemApi Allows an application to update the user app op restrictions.
2617         Not for use by third party apps.
2618         @hide -->
2619    <permission android:name="android.permission.MANAGE_APP_OPS_RESTRICTIONS"
2620        android:protectionLevel="signature|installer" />
2621
2622    <!-- Allows an application to update the user app op modes.
2623         Not for use by third party apps.
2624         @hide -->
2625    <permission android:name="android.permission.MANAGE_APP_OPS_MODES"
2626        android:protectionLevel="signature|installer|verifier" />
2627
2628    <!-- @SystemApi Allows an application to open windows that are for use by parts
2629         of the system user interface.
2630         <p>Not for use by third-party applications.
2631         @hide
2632    -->
2633    <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW"
2634        android:protectionLevel="signature" />
2635
2636    <!-- @SystemApi Allows an application to use
2637         {@link android.view.WindowManager.LayoutsParams#PRIVATE_FLAG_HIDE_NON_SYSTEM_OVERLAY_WINDOWS}
2638         to hide non-system-overlay windows.
2639         <p>Not for use by third-party applications.
2640         @hide
2641    -->
2642    <permission android:name="android.permission.HIDE_NON_SYSTEM_OVERLAY_WINDOWS"
2643                android:protectionLevel="signature|installer" />
2644
2645    <!-- @SystemApi Allows an application to manage (create, destroy,
2646         Z-order) application tokens in the window manager.
2647         <p>Not for use by third-party applications.
2648         @hide
2649    -->
2650    <permission android:name="android.permission.MANAGE_APP_TOKENS"
2651        android:protectionLevel="signature" />
2652
2653    <!-- Allows System UI to register listeners for events from Window Manager.
2654         @hide -->
2655    <permission android:name="android.permission.REGISTER_WINDOW_MANAGER_LISTENERS"
2656        android:protectionLevel="signature" />
2657
2658    <!-- @hide Allows the application to temporarily freeze the screen for a
2659         full-screen transition. -->
2660    <permission android:name="android.permission.FREEZE_SCREEN"
2661        android:protectionLevel="signature" />
2662
2663    <!-- @SystemApi Allows an application to inject user events (keys, touch, trackball)
2664         into the event stream and deliver them to ANY window.  Without this
2665         permission, you can only deliver events to windows in your own process.
2666         <p>Not for use by third-party applications.
2667         @hide
2668    -->
2669    <permission android:name="android.permission.INJECT_EVENTS"
2670        android:protectionLevel="signature" />
2671
2672    <!-- @hide Allows an application to register an input filter which filters the stream
2673         of user events (keys, touch, trackball) before they are dispatched to any window. -->
2674    <permission android:name="android.permission.FILTER_EVENTS"
2675        android:protectionLevel="signature" />
2676
2677    <!-- @hide Allows an application to retrieve the window token from the accessibility manager. -->
2678    <permission android:name="android.permission.RETRIEVE_WINDOW_TOKEN"
2679        android:protectionLevel="signature" />
2680
2681    <!-- @hide Allows an application to modify accessibility information from another app. -->
2682    <permission android:name="android.permission.MODIFY_ACCESSIBILITY_DATA"
2683                android:protectionLevel="signature" />
2684
2685    <!-- @hide Allows an application to change the accessibility volume. -->
2686    <permission android:name="android.permission.CHANGE_ACCESSIBILITY_VOLUME"
2687                android:protectionLevel="signature" />
2688
2689    <!-- @hide Allows an application to collect frame statistics -->
2690    <permission android:name="android.permission.FRAME_STATS"
2691         android:protectionLevel="signature" />
2692
2693    <!-- @hide Allows an application to temporary enable accessibility on the device. -->
2694    <permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY"
2695        android:protectionLevel="signature" />
2696
2697    <!-- @SystemApi Allows an application to watch and control how activities are
2698         started globally in the system.  Only for is in debugging
2699         (usually the monkey command).
2700         <p>Not for use by third-party applications.
2701         @hide
2702    -->
2703    <permission android:name="android.permission.SET_ACTIVITY_WATCHER"
2704        android:protectionLevel="signature" />
2705
2706    <!-- @SystemApi Allows an application to call the activity manager shutdown() API
2707         to put the higher-level system there into a shutdown state.
2708         @hide -->
2709    <permission android:name="android.permission.SHUTDOWN"
2710        android:protectionLevel="signature|privileged" />
2711
2712    <!-- @SystemApi Allows an application to tell the activity manager to temporarily
2713         stop application switches, putting it into a special mode that
2714         prevents applications from immediately switching away from some
2715         critical UI such as the home screen.
2716         @hide -->
2717    <permission android:name="android.permission.STOP_APP_SWITCHES"
2718        android:protectionLevel="signature|privileged" />
2719
2720    <!-- @SystemApi Allows an application to retrieve private information about
2721         the current top activity, such as any assist context it can provide.
2722         <p>Not for use by third-party applications.
2723         @hide
2724    -->
2725    <permission android:name="android.permission.GET_TOP_ACTIVITY_INFO"
2726        android:protectionLevel="signature" />
2727
2728    <!-- Allows an application to retrieve the current state of keys and
2729         switches.
2730         <p>Not for use by third-party applications.
2731         @deprecated The API that used this permission has been removed. -->
2732    <permission android:name="android.permission.READ_INPUT_STATE"
2733        android:protectionLevel="signature" />
2734
2735    <!-- Must be required by an {@link android.inputmethodservice.InputMethodService},
2736         to ensure that only the system can bind to it.
2737         <p>Protection level: signature
2738    -->
2739    <permission android:name="android.permission.BIND_INPUT_METHOD"
2740        android:protectionLevel="signature" />
2741
2742    <!-- Must be required by an {@link android.media.midi.MidiDeviceService},
2743         to ensure that only the system can bind to it.
2744         <p>Protection level: signature
2745    -->
2746    <permission android:name="android.permission.BIND_MIDI_DEVICE_SERVICE"
2747        android:protectionLevel="signature" />
2748
2749    <!-- Must be required by an {@link android.accessibilityservice.AccessibilityService},
2750         to ensure that only the system can bind to it.
2751         <p>Protection level: signature
2752    -->
2753    <permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE"
2754        android:protectionLevel="signature" />
2755
2756    <!-- Must be required by a {@link android.printservice.PrintService},
2757         to ensure that only the system can bind to it.
2758         <p>Protection level: signature
2759    -->
2760    <permission android:name="android.permission.BIND_PRINT_SERVICE"
2761        android:protectionLevel="signature" />
2762
2763    <!-- Must be required by a {@link android.printservice.recommendation.RecommendationService},
2764     to ensure that only the system can bind to it.
2765     @hide
2766     @SystemApi
2767     <p>Protection level: signature
2768    -->
2769    <permission android:name="android.permission.BIND_PRINT_RECOMMENDATION_SERVICE"
2770            android:protectionLevel="signature" />
2771
2772    <!-- Allows applications to get the installed and enabled print services.
2773         @hide
2774         @SystemApi
2775         <p>Protection level: signature|preinstalled
2776    -->
2777    <permission android:name="android.permission.READ_PRINT_SERVICES"
2778        android:protectionLevel="signature|preinstalled" />
2779
2780    <!-- Allows applications to get the currently recommended print services for printers.
2781         @hide
2782         @SystemApi
2783         <p>Protection level: signature|preinstalled
2784    -->
2785    <permission android:name="android.permission.READ_PRINT_SERVICE_RECOMMENDATIONS"
2786        android:protectionLevel="signature|preinstalled" />
2787
2788    <!-- Must be required by a {@link android.nfc.cardemulation.HostApduService}
2789         or {@link android.nfc.cardemulation.OffHostApduService} to ensure that only
2790         the system can bind to it.
2791         <p>Protection level: signature
2792    -->
2793    <permission android:name="android.permission.BIND_NFC_SERVICE"
2794        android:protectionLevel="signature" />
2795
2796    <!-- Must be required by the PrintSpooler to ensure that only the system can bind to it.
2797         @hide -->
2798    <permission android:name="android.permission.BIND_PRINT_SPOOLER_SERVICE"
2799        android:protectionLevel="signature" />
2800
2801    <!-- Must be required by the CompanionDeviceManager to ensure that only the system can bind to it.
2802         @hide -->
2803    <permission android:name="android.permission.BIND_COMPANION_DEVICE_MANAGER_SERVICE"
2804        android:protectionLevel="signature" />
2805
2806    <!-- @SystemApi Must be required by the RuntimePermissionPresenterService to ensure
2807         that only the system can bind to it.
2808         @hide -->
2809    <permission android:name="android.permission.BIND_RUNTIME_PERMISSION_PRESENTER_SERVICE"
2810        android:protectionLevel="signature" />
2811
2812    <!-- Must be required by a TextService (e.g. SpellCheckerService)
2813         to ensure that only the system can bind to it.
2814         <p>Protection level: signature
2815    -->
2816    <permission android:name="android.permission.BIND_TEXT_SERVICE"
2817        android:protectionLevel="signature" />
2818
2819    <!-- Must be required by a {@link android.net.VpnService},
2820         to ensure that only the system can bind to it.
2821         <p>Protection level: signature
2822    -->
2823    <permission android:name="android.permission.BIND_VPN_SERVICE"
2824        android:protectionLevel="signature" />
2825
2826    <!-- Must be required by a {@link android.service.wallpaper.WallpaperService},
2827         to ensure that only the system can bind to it.
2828         <p>Protection level: signature|privileged
2829    -->
2830    <permission android:name="android.permission.BIND_WALLPAPER"
2831        android:protectionLevel="signature|privileged" />
2832
2833    <!-- Must be required by a {@link android.service.voice.VoiceInteractionService},
2834         to ensure that only the system can bind to it.
2835         <p>Protection level: signature
2836    -->
2837    <permission android:name="android.permission.BIND_VOICE_INTERACTION"
2838        android:protectionLevel="signature" />
2839
2840    <!-- Must be required by a {@link android.service.autofill.AutofillService},
2841         to ensure that only the system can bind to it.
2842         <p>Protection level: signature
2843    -->
2844    <permission android:name="android.permission.BIND_AUTOFILL_SERVICE"
2845        android:protectionLevel="signature" />
2846
2847   <!-- Alternative version of android.permission.BIND_AUTOFILL_FIELD_CLASSIFICATION_SERVICE.
2848        This permission was renamed during the O previews but it was supported on the final O
2849        release, so we need to carry it over.
2850        <p>Protection level: signature
2851        @hide
2852    -->
2853    <permission android:name="android.permission.BIND_AUTOFILL"
2854        android:protectionLevel="signature" />
2855
2856    <!-- Must be required by an {@link android.service.autofill.AutofillFieldClassificationService}
2857         to ensure that only the system can bind to it.
2858         @hide This is not a third-party API (intended for OEMs and system apps).
2859    -->
2860    <permission android:name="android.permission.BIND_AUTOFILL_FIELD_CLASSIFICATION_SERVICE"
2861                android:protectionLevel="signature" />
2862
2863    <!-- Must be required by a android.service.textclassifier.TextClassifierService,
2864         to ensure that only the system can bind to it.
2865         @SystemApi @hide This is not a third-party API (intended for OEMs and system apps).
2866         <p>Protection level: signature
2867    -->
2868    <permission android:name="android.permission.BIND_TEXTCLASSIFIER_SERVICE"
2869                android:protectionLevel="signature" />
2870
2871    <!-- Must be required by hotword enrollment application,
2872         to ensure that only the system can interact with it.
2873         @hide <p>Not for use by third-party applications.</p> -->
2874    <permission android:name="android.permission.MANAGE_VOICE_KEYPHRASES"
2875        android:protectionLevel="signature|privileged" />
2876
2877    <!-- Must be required by a {@link com.android.media.remotedisplay.RemoteDisplayProvider},
2878         to ensure that only the system can bind to it.
2879         @hide -->
2880    <permission android:name="android.permission.BIND_REMOTE_DISPLAY"
2881        android:protectionLevel="signature" />
2882
2883    <!-- Must be required by a {@link android.media.tv.TvInputService}
2884         to ensure that only the system can bind to it.
2885         <p>Protection level: signature|privileged
2886    -->
2887    <permission android:name="android.permission.BIND_TV_INPUT"
2888        android:protectionLevel="signature|privileged" />
2889
2890    <!-- @SystemApi
2891         Must be required by a {@link com.android.media.tv.remoteprovider.TvRemoteProvider}
2892         to ensure that only the system can bind to it.
2893         <p>Protection level: signature|privileged
2894         <p>Not for use by third-party applications. </p>
2895         @hide  -->
2896    <permission android:name="android.permission.BIND_TV_REMOTE_SERVICE"
2897        android:protectionLevel="signature|privileged" />
2898
2899    <!-- @SystemApi
2900         Must be required for a virtual remote controller for TV.
2901         <p>Protection level: signature|privileged
2902         <p>Not for use by third-party applications. </p>
2903         @hide  -->
2904    <permission android:name="android.permission.TV_VIRTUAL_REMOTE_CONTROLLER"
2905        android:protectionLevel="signature|privileged" />
2906
2907    <!-- Allows an application to change HDMI CEC active source.
2908         <p>Not for use by third-party applications.
2909         @hide -->
2910    <permission android:name="android.permission.CHANGE_HDMI_CEC_ACTIVE_SOURCE"
2911        android:protectionLevel="signature|privileged" />
2912
2913    <!-- @SystemApi Allows an application to modify parental controls
2914         <p>Not for use by third-party applications.
2915         @hide -->
2916    <permission android:name="android.permission.MODIFY_PARENTAL_CONTROLS"
2917        android:protectionLevel="signature|privileged" />
2918
2919    <!-- @SystemApi Allows an application to read TvContentRatingSystemInfo
2920         <p>Not for use by third-party applications.
2921         @hide -->
2922    <permission android:name="android.permission.READ_CONTENT_RATING_SYSTEMS"
2923        android:protectionLevel="signature|privileged" />
2924
2925    <!-- @SystemApi Allows an application to notify TV inputs by sending broadcasts.
2926         <p>Protection level: signature|privileged
2927         <p>Not for use by third-party applications.
2928         @hide -->
2929    <permission android:name="android.permission.NOTIFY_TV_INPUTS"
2930         android:protectionLevel="signature|privileged" />
2931
2932    <!-- Must be required by a {@link android.media.routing.MediaRouteService}
2933         to ensure that only the system can interact with it.
2934         @hide -->
2935    <permission android:name="android.permission.BIND_ROUTE_PROVIDER"
2936        android:protectionLevel="signature" />
2937
2938    <!-- Must be required by device administration receiver, to ensure that only the
2939         system can interact with it.
2940         <p>Protection level: signature
2941    -->
2942    <permission android:name="android.permission.BIND_DEVICE_ADMIN"
2943        android:protectionLevel="signature" />
2944
2945    <!-- @SystemApi Required to add or remove another application as a device admin.
2946         <p>Not for use by third-party applications.
2947         @hide -->
2948    <permission android:name="android.permission.MANAGE_DEVICE_ADMINS"
2949        android:protectionLevel="signature|privileged" />
2950
2951    <!-- @SystemApi Allows low-level access to setting the orientation (actually
2952         rotation) of the screen.
2953         <p>Not for use by third-party applications.
2954         @hide
2955    -->
2956    <permission android:name="android.permission.SET_ORIENTATION"
2957        android:protectionLevel="signature" />
2958
2959    <!-- @SystemApi Allows low-level access to setting the pointer speed.
2960         <p>Not for use by third-party applications.
2961         @hide
2962    -->
2963    <permission android:name="android.permission.SET_POINTER_SPEED"
2964        android:protectionLevel="signature" />
2965
2966    <!-- Allows low-level access to setting input device calibration.
2967         <p>Not for use by normal applications.
2968         @hide -->
2969    <permission android:name="android.permission.SET_INPUT_CALIBRATION"
2970        android:protectionLevel="signature" />
2971
2972    <!-- Allows low-level access to setting the keyboard layout.
2973         <p>Not for use by third-party applications.
2974         @hide -->
2975    <permission android:name="android.permission.SET_KEYBOARD_LAYOUT"
2976        android:protectionLevel="signature" />
2977
2978    <!-- Allows an application to query tablet mode state and monitor changes
2979         in it.
2980         <p>Not for use by third-party applications.
2981         @hide -->
2982    <permission android:name="android.permission.TABLET_MODE"
2983        android:protectionLevel="signature" />
2984
2985    <!-- Allows an application to request installing packages. Apps
2986         targeting APIs greater than 25 must hold this permission in
2987         order to use {@link android.content.Intent#ACTION_INSTALL_PACKAGE}.
2988         <p>Protection level: signature
2989    -->
2990    <permission android:name="android.permission.REQUEST_INSTALL_PACKAGES"
2991        android:label="@string/permlab_requestInstallPackages"
2992        android:description="@string/permdesc_requestInstallPackages"
2993        android:protectionLevel="signature|appop" />
2994
2995    <!-- Allows an application to request deleting packages. Apps
2996         targeting APIs {@link android.os.Build.VERSION_CODES#P} or greater must hold this
2997         permission in order to use {@link android.content.Intent#ACTION_UNINSTALL_PACKAGE} or
2998         {@link android.content.pm.PackageInstaller#uninstall}.
2999         <p>Protection level: normal
3000    -->
3001    <permission android:name="android.permission.REQUEST_DELETE_PACKAGES"
3002        android:label="@string/permlab_requestDeletePackages"
3003        android:description="@string/permdesc_requestDeletePackages"
3004        android:protectionLevel="normal" />
3005
3006    <!-- @SystemApi Allows an application to install packages.
3007    <p>Not for use by third-party applications. -->
3008    <permission android:name="android.permission.INSTALL_PACKAGES"
3009      android:protectionLevel="signature|privileged" />
3010
3011    <!-- @SystemApi Allows an application to install self updates. This is a limited version
3012         of {@link android.Manifest.permission#INSTALL_PACKAGES}.
3013        <p>Not for use by third-party applications.
3014        @hide
3015    -->
3016    <permission android:name="android.permission.INSTALL_SELF_UPDATES"
3017        android:protectionLevel="signature|privileged" />
3018
3019    <!-- @SystemApi Allows an application to install updates. This is a limited version
3020         of {@link android.Manifest.permission#INSTALL_PACKAGES}.
3021        <p>Not for use by third-party applications.
3022        @hide
3023    -->
3024    <permission android:name="android.permission.INSTALL_PACKAGE_UPDATES"
3025        android:protectionLevel="signature|privileged" />
3026
3027    <!-- @SystemApi Allows an application to clear user data.
3028         <p>Not for use by third-party applications
3029         @hide
3030    -->
3031    <permission android:name="android.permission.CLEAR_APP_USER_DATA"
3032        android:protectionLevel="signature|installer" />
3033
3034    <!-- @hide Allows an application to get the URI permissions
3035         granted to another application.
3036         <p>Not for use by third-party applications
3037    -->
3038    <permission android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS"
3039        android:protectionLevel="signature" />
3040
3041    <!-- @hide Allows an application to clear the URI permissions
3042         granted to another application.
3043         <p>Not for use by third-party applications
3044    -->
3045    <permission
3046        android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS"
3047        android:protectionLevel="signature" />
3048
3049    <!-- @hide
3050         Allows an application to change the status of Scoped Access Directory requests granted or
3051         rejected by the user.
3052         <p>This permission should <em>only</em> be requested by the platform
3053         settings app.  This permission cannot be granted to third-party apps.
3054         <p>Protection level: signature
3055    -->
3056    <permission
3057         android:name="android.permission.MANAGE_SCOPED_ACCESS_DIRECTORY_PERMISSIONS"
3058         android:protectionLevel="signature" />
3059
3060    <!-- @hide
3061         Allows an application to change the status of a persistable URI permission granted
3062         to another application.
3063         <p>This permission should <em>only</em> be requested by the platform
3064         settings app.  This permission cannot be granted to third-party apps.
3065         <p>Protection level: signature
3066    -->
3067    <permission android:name="android.permission.FORCE_PERSISTABLE_URI_PERMISSIONS"
3068        android:protectionLevel="signature" />
3069
3070    <!-- @SystemApi Old permission for deleting an app's cache files, no longer used,
3071         but signals for us to quietly ignore calls instead of throwing an exception. -->
3072    <permission android:name="android.permission.DELETE_CACHE_FILES"
3073        android:protectionLevel="signature|privileged" />
3074
3075    <!-- Allows an application to delete cache files.
3076         @hide -->
3077    <permission android:name="android.permission.INTERNAL_DELETE_CACHE_FILES"
3078        android:protectionLevel="signature" />
3079
3080    <!-- @SystemApi Allows an application to delete packages.
3081         <p>Not for use by third-party applications.
3082         <p>Starting in {@link android.os.Build.VERSION_CODES#N}, user confirmation is requested
3083         when the application deleting the package is not the same application that installed the
3084         package. -->
3085    <permission android:name="android.permission.DELETE_PACKAGES"
3086        android:protectionLevel="signature|privileged" />
3087
3088    <!-- @SystemApi Allows an application to move location of installed package.
3089         @hide -->
3090    <permission android:name="android.permission.MOVE_PACKAGE"
3091        android:protectionLevel="signature|privileged" />
3092
3093    <!-- @SystemApi Allows an application to change whether an application component (other than its own) is
3094         enabled or not.
3095         <p>Not for use by third-party applications. -->
3096    <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE"
3097        android:protectionLevel="signature|privileged" />
3098
3099    <!-- @SystemApi Allows an application to grant specific permissions.
3100         @hide -->
3101    <permission android:name="android.permission.GRANT_RUNTIME_PERMISSIONS"
3102        android:protectionLevel="signature|installer|verifier" />
3103
3104    <!-- @SystemApi Allows an app that has this permission and the permissions to install packages
3105         to request certain runtime permissions to be granted at installation.
3106         @hide -->
3107    <permission android:name="android.permission.INSTALL_GRANT_RUNTIME_PERMISSIONS"
3108        android:protectionLevel="signature|installer|verifier" />
3109
3110    <!-- @SystemApi Allows an application to revoke specific permissions.
3111        @hide -->
3112    <permission android:name="android.permission.REVOKE_RUNTIME_PERMISSIONS"
3113         android:protectionLevel="signature|installer|verifier" />
3114
3115    <!-- @hide Allows an application to observe permission changes. -->
3116    <permission android:name="android.permission.OBSERVE_GRANT_REVOKE_PERMISSIONS"
3117        android:protectionLevel="signature|privileged" />
3118
3119    <!-- @SystemApi Allows an application to use SurfaceFlinger's low level features.
3120         <p>Not for use by third-party applications.
3121         @hide
3122    -->
3123    <permission android:name="android.permission.ACCESS_SURFACE_FLINGER"
3124        android:protectionLevel="signature" />
3125
3126    <!-- @SystemApi Allows an application to take screen shots and more generally
3127         get access to the frame buffer data.
3128         <p>Not for use by third-party applications. -->
3129    <permission android:name="android.permission.READ_FRAME_BUFFER"
3130        android:protectionLevel="signature|privileged" />
3131
3132    <!-- Allows an application to use InputFlinger's low level features.
3133         @hide -->
3134    <permission android:name="android.permission.ACCESS_INPUT_FLINGER"
3135        android:protectionLevel="signature" />
3136
3137    <!-- Allows an application to disable/enable input devices.
3138         Could be used to prevent unwanted touch events
3139         on a touchscreen, for example during swimming or rain.
3140         @hide -->
3141    <permission android:name="android.permission.DISABLE_INPUT_DEVICE"
3142        android:protectionLevel="signature" />
3143
3144    <!-- Allows an application to configure and connect to Wifi displays
3145         @hide -->
3146    <permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY"
3147        android:protectionLevel="signature" />
3148
3149    <!-- Allows an application to control low-level features of Wifi displays
3150         such as opening an RTSP socket.  This permission should only be used
3151         by the display manager.
3152         @hide -->
3153    <permission android:name="android.permission.CONTROL_WIFI_DISPLAY"
3154        android:protectionLevel="signature" />
3155
3156    <!-- Allows an application to control the color modes set for displays system-wide.
3157         <p>Not for use by third-party applications.</p>
3158         @hide -->
3159    <permission android:name="android.permission.CONFIGURE_DISPLAY_COLOR_MODE"
3160        android:protectionLevel="signature" />
3161
3162    <!-- Allows an application to control the color saturation of the display.
3163         @hide
3164         @SystemApi -->
3165    <permission android:name="android.permission.CONTROL_DISPLAY_SATURATION"
3166        android:protectionLevel="signature|privileged" />
3167
3168    <!-- Allows an application to collect usage infomation about brightness slider changes.
3169         <p>Not for use by third-party applications.</p>
3170         @hide
3171         @SystemApi
3172         @TestApi -->
3173    <permission android:name="android.permission.BRIGHTNESS_SLIDER_USAGE"
3174        android:protectionLevel="signature|privileged|development" />
3175
3176    <!-- Allows an application to collect ambient light stats.
3177         <p>Not for use by third party applications.</p>
3178         @hide
3179         @SystemApi -->
3180    <permission android:name="android.permission.ACCESS_AMBIENT_LIGHT_STATS"
3181        android:protectionLevel="signature|privileged|development" />
3182
3183    <!-- Allows an application to modify the display brightness configuration
3184         @hide
3185         @SystemApi
3186         @TestApi -->
3187    <permission android:name="android.permission.CONFIGURE_DISPLAY_BRIGHTNESS"
3188        android:protectionLevel="signature|privileged|development" />
3189
3190    <!-- Allows an application to control the system's display brightness
3191         @hide -->
3192    <permission android:name="android.permission.CONTROL_DISPLAY_BRIGHTNESS"
3193        android:protectionLevel="signature" />
3194
3195    <!-- @SystemApi Allows an application to control VPN.
3196         <p>Not for use by third-party applications.</p>
3197         @hide -->
3198    <permission android:name="android.permission.CONTROL_VPN"
3199        android:protectionLevel="signature|privileged" />
3200    <uses-permission android:name="android.permission.CONTROL_VPN" />
3201
3202    <!-- @SystemApi Allows an application to capture audio output.
3203         <p>Not for use by third-party applications.</p> -->
3204    <permission android:name="android.permission.CAPTURE_AUDIO_OUTPUT"
3205        android:protectionLevel="signature|privileged" />
3206
3207    <!-- @SystemApi Allows an application to capture audio for hotword detection.
3208         <p>Not for use by third-party applications.</p>
3209         @hide -->
3210    <permission android:name="android.permission.CAPTURE_AUDIO_HOTWORD"
3211        android:protectionLevel="signature|privileged" />
3212
3213    <!-- @SystemApi Allows an application to modify audio routing and override policy decisions.
3214         <p>Not for use by third-party applications.</p>
3215         @hide -->
3216    <permission android:name="android.permission.MODIFY_AUDIO_ROUTING"
3217        android:protectionLevel="signature|privileged" />
3218
3219    <!-- @SystemApi Allows an application to capture video output.
3220         <p>Not for use by third-party applications.</p> -->
3221    <permission android:name="android.permission.CAPTURE_VIDEO_OUTPUT"
3222        android:protectionLevel="signature|privileged" />
3223
3224    <!-- @SystemApi Allows an application to capture secure video output.
3225         <p>Not for use by third-party applications.</p> -->
3226    <permission android:name="android.permission.CAPTURE_SECURE_VIDEO_OUTPUT"
3227        android:protectionLevel="signature|privileged" />
3228
3229    <!-- @SystemApi Allows an application to know what content is playing and control its playback.
3230         <p>Not for use by third-party applications due to privacy of media consumption</p>  -->
3231    <permission android:name="android.permission.MEDIA_CONTENT_CONTROL"
3232        android:protectionLevel="signature|privileged" />
3233
3234    <!-- @SystemApi @hide Allows an application to set the volume key long-press listener.
3235         <p>When it's set, the application will receive the volume key long-press event
3236         instead of changing volume.</p>
3237         <p>Not for use by third-party applications</p> -->
3238    <permission android:name="android.permission.SET_VOLUME_KEY_LONG_PRESS_LISTENER"
3239        android:protectionLevel="signature|privileged|development" />
3240
3241    <!-- @SystemApi @hide Allows an application to set media key event listener.
3242         <p>When it's set, the application will receive the media key event before
3243         any other media sessions. If the event is handled by the listener, other sessions
3244         cannot get the event.</p>
3245         <p>Not for use by third-party applications</p> -->
3246    <permission android:name="android.permission.SET_MEDIA_KEY_LISTENER"
3247        android:protectionLevel="signature|privileged|development" />
3248
3249    <!-- @SystemApi Required to be able to disable the device (very dangerous!).
3250         <p>Not for use by third-party applications.
3251         @hide
3252    -->
3253    <permission android:name="android.permission.BRICK"
3254        android:protectionLevel="signature" />
3255
3256    <!-- @SystemApi Required to be able to reboot the device.
3257    <p>Not for use by third-party applications. -->
3258    <permission android:name="android.permission.REBOOT"
3259        android:protectionLevel="signature|privileged" />
3260
3261   <!-- @SystemApi Allows low-level access to power management.
3262        <p>Not for use by third-party applications.
3263        @hide
3264    -->
3265   <permission android:name="android.permission.DEVICE_POWER"
3266        android:protectionLevel="signature" />
3267
3268   <!-- Allows access to the PowerManager.userActivity function.
3269   <p>Not for use by third-party applications. @hide @SystemApi -->
3270    <permission android:name="android.permission.USER_ACTIVITY"
3271        android:protectionLevel="signature|privileged" />
3272
3273   <!-- @hide Allows low-level access to tun tap driver -->
3274    <permission android:name="android.permission.NET_TUNNELING"
3275        android:protectionLevel="signature" />
3276
3277    <!-- Run as a manufacturer test application, running as the root user.
3278         Only available when the device is running in manufacturer test mode.
3279         <p>Not for use by third-party applications.
3280    -->
3281    <permission android:name="android.permission.FACTORY_TEST"
3282        android:protectionLevel="signature" />
3283
3284    <!-- Allows an application to broadcast a notification that an application
3285         package has been removed.
3286         <p>Not for use by third-party applications.
3287    -->
3288    <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED"
3289        android:protectionLevel="signature" />
3290
3291    <!-- Allows an application to broadcast an SMS receipt notification.
3292         <p>Not for use by third-party applications.
3293    -->
3294    <permission android:name="android.permission.BROADCAST_SMS"
3295        android:protectionLevel="signature" />
3296
3297    <!-- Allows an application to broadcast a WAP PUSH receipt notification.
3298         <p>Not for use by third-party applications.
3299    -->
3300    <permission android:name="android.permission.BROADCAST_WAP_PUSH"
3301        android:protectionLevel="signature" />
3302
3303    <!-- @SystemApi Allows an application to broadcast privileged networking requests.
3304         <p>Not for use by third-party applications.
3305         @hide
3306         @deprecated Use {@link android.Manifest.permission#REQUEST_NETWORK_SCORES} instead
3307    -->
3308    <permission android:name="android.permission.BROADCAST_NETWORK_PRIVILEGED"
3309        android:protectionLevel="signature|privileged" />
3310
3311    <!-- @SystemApi Not for use by third-party applications. -->
3312    <permission android:name="android.permission.MASTER_CLEAR"
3313        android:protectionLevel="signature|privileged" />
3314
3315    <!-- @SystemApi Allows an application to call any phone number, including emergency
3316         numbers, without going through the Dialer user interface for the user
3317         to confirm the call being placed.
3318         <p>Not for use by third-party applications. -->
3319    <permission android:name="android.permission.CALL_PRIVILEGED"
3320        android:protectionLevel="signature|privileged" />
3321
3322    <!-- @SystemApi Allows an application to perform CDMA OTA provisioning @hide -->
3323    <permission android:name="android.permission.PERFORM_CDMA_PROVISIONING"
3324        android:protectionLevel="signature|privileged" />
3325
3326    <!-- @SystemApi Allows an application to perform SIM Activation @hide -->
3327    <permission android:name="android.permission.PERFORM_SIM_ACTIVATION"
3328        android:protectionLevel="signature|privileged" />
3329
3330    <!-- @SystemApi Allows enabling/disabling location update notifications from
3331         the radio.
3332         <p>Not for use by third-party applications. -->
3333    <permission android:name="android.permission.CONTROL_LOCATION_UPDATES"
3334        android:protectionLevel="signature|privileged" />
3335
3336    <!-- @SystemApi Allows read/write access to the "properties" table in the checkin
3337         database, to change values that get uploaded.
3338         <p>Not for use by third-party applications. -->
3339    <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES"
3340        android:protectionLevel="signature|privileged" />
3341
3342    <!-- @SystemApi Allows an application to collect component usage
3343         statistics
3344         <p>Declaring the permission implies intention to use the API and the user of the
3345         device can grant permission through the Settings application. -->
3346    <permission android:name="android.permission.PACKAGE_USAGE_STATS"
3347        android:protectionLevel="signature|privileged|development|appop" />
3348    <uses-permission android:name="android.permission.PACKAGE_USAGE_STATS" />
3349
3350    <!-- @hide @SystemApi Allows an application to observe usage time of apps. The app can register
3351         for callbacks when apps reach a certain usage time limit, etc. -->
3352    <permission android:name="android.permission.OBSERVE_APP_USAGE"
3353        android:protectionLevel="signature|privileged" />
3354
3355    <!-- @hide @SystemApi Allows an application to change the app idle state of an app.
3356         <p>Not for use by third-party applications. -->
3357    <permission android:name="android.permission.CHANGE_APP_IDLE_STATE"
3358        android:protectionLevel="signature|privileged" />
3359
3360    <!-- @hide @SystemApi Allows an application to temporarily whitelist an inactive app to
3361         access the network and acquire wakelocks.
3362         <p>Not for use by third-party applications. -->
3363    <permission android:name="android.permission.CHANGE_DEVICE_IDLE_TEMP_WHITELIST"
3364        android:protectionLevel="signature|privileged" />
3365
3366    <!-- Permission an application must hold in order to use
3367         {@link android.provider.Settings#ACTION_REQUEST_IGNORE_BATTERY_OPTIMIZATIONS}.
3368         This is a normal permission: an app requesting it will always be granted the
3369         permission, without the user needing to approve or see it. -->
3370    <permission android:name="android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS"
3371        android:label="@string/permlab_requestIgnoreBatteryOptimizations"
3372        android:description="@string/permdesc_requestIgnoreBatteryOptimizations"
3373        android:protectionLevel="normal" />
3374
3375    <!-- @SystemApi Allows an application to collect battery statistics -->
3376    <permission android:name="android.permission.BATTERY_STATS"
3377        android:protectionLevel="signature|privileged|development" />
3378
3379    <!--Allows an application to manage statscompanion.
3380    <p>Not for use by third-party applications.
3381         @hide -->
3382    <permission android:name="android.permission.STATSCOMPANION"
3383        android:protectionLevel="signature" />
3384
3385    <!-- @SystemApi Allows an application to control the backup and restore process.
3386    <p>Not for use by third-party applications.
3387         @hide pending API council -->
3388    <permission android:name="android.permission.BACKUP"
3389        android:protectionLevel="signature|privileged" />
3390
3391    <!-- @SystemApi Allows application to manage
3392         {@link android.security.keystore.recovery.RecoveryController}.
3393         <p>Not for use by third-party applications.
3394         @hide -->
3395    <permission android:name="android.permission.RECOVER_KEYSTORE"
3396        android:protectionLevel="signature|privileged" />
3397
3398    <!-- Allows a package to launch the secure full-backup confirmation UI.
3399         ONLY the system process may hold this permission.
3400         @hide -->
3401    <permission android:name="android.permission.CONFIRM_FULL_BACKUP"
3402        android:protectionLevel="signature" />
3403
3404    <!-- @SystemApi Must be required by a {@link android.widget.RemoteViewsService},
3405         to ensure that only the system can bind to it. -->
3406    <permission android:name="android.permission.BIND_REMOTEVIEWS"
3407        android:protectionLevel="signature|privileged" />
3408
3409    <!-- @SystemApi Allows an application to tell the AppWidget service which application
3410         can access AppWidget's data.  The normal user flow is that a user
3411         picks an AppWidget to go into a particular host, thereby giving that
3412         host application access to the private data from the AppWidget app.
3413         An application that has this permission should honor that contract.
3414         <p>Not for use by third-party applications. -->
3415    <permission android:name="android.permission.BIND_APPWIDGET"
3416        android:protectionLevel="signature|privileged" />
3417
3418    <!-- @hide Allows sysui to manage user grants of slice permissions. -->
3419    <permission android:name="android.permission.MANAGE_SLICE_PERMISSIONS"
3420        android:protectionLevel="signature" />
3421
3422    <!-- @SystemApi Private permission, to restrict who can bring up a dialog to add a new
3423         keyguard widget
3424         @hide -->
3425    <permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET"
3426        android:protectionLevel="signature|privileged" />
3427
3428    <!-- @SystemApi Internal permission allowing an application to query/set which
3429         applications can bind AppWidgets.
3430         @hide -->
3431    <permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS"
3432        android:protectionLevel="signature|privileged" />
3433
3434    <!-- Allows applications to change the background data setting.
3435    <p>Not for use by third-party applications.
3436         @hide pending API council -->
3437    <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING"
3438        android:protectionLevel="signature" />
3439
3440    <!-- @SystemApi This permission can be used on content providers to allow the global
3441         search system to access their data.  Typically it used when the
3442         provider has some permissions protecting it (which global search
3443         would not be expected to hold), and added as a read-only permission
3444         to the path in the provider where global search queries are
3445         performed.  This permission can not be held by regular applications;
3446         it is used by applications to protect themselves from everyone else
3447         besides global search. -->
3448    <permission android:name="android.permission.GLOBAL_SEARCH"
3449        android:protectionLevel="signature|privileged" />
3450
3451    <!-- Internal permission protecting access to the global search
3452         system: ensures that only the system can access the provider
3453         to perform queries (since this otherwise provides unrestricted
3454         access to a variety of content providers), and to write the
3455         search statistics (to keep applications from gaming the source
3456         ranking).
3457         @hide -->
3458    <permission android:name="android.permission.GLOBAL_SEARCH_CONTROL"
3459        android:protectionLevel="signature" />
3460
3461    <!-- @SystemApi Internal permission to allows an application to read indexable data.
3462        @hide -->
3463    <permission android:name="android.permission.READ_SEARCH_INDEXABLES"
3464        android:protectionLevel="signature|privileged" />
3465
3466    <!-- @SystemApi Internal permission to allows an application to bind to suggestion service.
3467        @hide -->
3468    <permission android:name="android.permission.BIND_SETTINGS_SUGGESTIONS_SERVICE"
3469                android:protectionLevel="signature" />
3470
3471    <!-- @SystemApi Allows applications to set a live wallpaper.
3472         @hide XXX Change to signature once the picker is moved to its
3473         own apk as Ghod Intended. -->
3474    <permission android:name="android.permission.SET_WALLPAPER_COMPONENT"
3475        android:protectionLevel="signature|privileged" />
3476
3477    <!-- @SystemApi Allows applications to read dream settings and dream state.
3478         @hide -->
3479    <permission android:name="android.permission.READ_DREAM_STATE"
3480        android:protectionLevel="signature|privileged" />
3481
3482    <!-- @SystemApi Allows applications to write dream settings, and start or stop dreaming.
3483         @hide -->
3484    <permission android:name="android.permission.WRITE_DREAM_STATE"
3485        android:protectionLevel="signature|privileged" />
3486
3487    <!-- @SystemApi Allow an application to read and write the cache partition.
3488         @hide -->
3489    <permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM"
3490        android:protectionLevel="signature|privileged" />
3491
3492    <!-- Must be required by default container service so that only
3493         the system can bind to it and use it to copy
3494         protected data to secure containers or files
3495         accessible to the system.
3496         @hide -->
3497    <permission android:name="android.permission.COPY_PROTECTED_DATA"
3498        android:protectionLevel="signature" />
3499
3500    <!-- @SystemApi Internal permission protecting access to the encryption methods
3501        @hide
3502    -->
3503    <permission android:name="android.permission.CRYPT_KEEPER"
3504        android:protectionLevel="signature|privileged" />
3505
3506    <!-- @SystemApi Allows an application to read historical network usage for
3507         specific networks and applications. @hide -->
3508    <permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY"
3509        android:protectionLevel="signature|privileged" />
3510
3511    <!-- Allows an application to manage network policies (such as warning and disable
3512         limits) and to define application-specific rules. @hide -->
3513    <permission android:name="android.permission.MANAGE_NETWORK_POLICY"
3514        android:protectionLevel="signature" />
3515
3516    <!-- @SystemApi @hide @deprecated use UPDATE_DEVICE_STATS instead -->
3517    <permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING"
3518        android:protectionLevel="signature|privileged" />
3519
3520    <!-- @SystemApi @hide Allows an application to manage carrier subscription plans. -->
3521    <permission android:name="android.permission.MANAGE_SUBSCRIPTION_PLANS"
3522        android:protectionLevel="signature|privileged" />
3523
3524    <!-- C2DM permission.
3525         @hide Used internally.
3526     -->
3527    <permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"
3528          android:protectionLevel="signature" />
3529    <uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/>
3530
3531    <!-- @SystemApi @hide Package verifier needs to have this permission before the PackageManager will
3532         trust it to verify packages.
3533    -->
3534    <permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT"
3535        android:protectionLevel="signature|privileged" />
3536
3537    <!-- Must be required by package verifier receiver, to ensure that only the
3538         system can interact with it.
3539         @hide
3540    -->
3541    <permission android:name="android.permission.BIND_PACKAGE_VERIFIER"
3542        android:protectionLevel="signature" />
3543
3544    <!-- @SystemApi @hide Allows an application to mark other applications as harmful -->
3545    <permission android:name="android.permission.SET_HARMFUL_APP_WARNINGS"
3546        android:protectionLevel="signature|verifier" />
3547
3548    <!-- @SystemApi @hide Intent filter verifier needs to have this permission before the
3549         PackageManager will trust it to verify intent filters.
3550    -->
3551    <permission android:name="android.permission.INTENT_FILTER_VERIFICATION_AGENT"
3552        android:protectionLevel="signature|privileged" />
3553
3554    <!-- Must be required by intent filter verifier receiver, to ensure that only the
3555         system can interact with it.
3556         @hide
3557    -->
3558    <permission android:name="android.permission.BIND_INTENT_FILTER_VERIFIER"
3559        android:protectionLevel="signature" />
3560
3561    <!-- @SystemApi Allows applications to access serial ports via the SerialManager.
3562         @hide -->
3563    <permission android:name="android.permission.SERIAL_PORT"
3564        android:protectionLevel="signature|privileged" />
3565
3566    <!-- Allows the holder to access content providers from outside an ApplicationThread.
3567         This permission is enforced by the ActivityManagerService on the corresponding APIs,
3568         in particular ActivityManagerService#getContentProviderExternal(String) and
3569         ActivityManagerService#removeContentProviderExternal(String).
3570         @hide
3571    -->
3572    <permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY"
3573        android:protectionLevel="signature" />
3574
3575    <!-- @SystemApi Allows an application to hold an UpdateLock, recommending that a headless
3576         OTA reboot *not* occur while the lock is held.
3577         @hide -->
3578    <permission android:name="android.permission.UPDATE_LOCK"
3579        android:protectionLevel="signature|privileged" />
3580
3581    <!-- @SystemApi Allows an application to read the current set of notifications, including
3582         any metadata and intents attached.
3583         @hide -->
3584    <permission android:name="android.permission.ACCESS_NOTIFICATIONS"
3585        android:protectionLevel="signature|privileged|appop" />
3586
3587    <!-- Marker permission for applications that wish to access notification policy.
3588         <p>Protection level: normal
3589    -->
3590    <permission android:name="android.permission.ACCESS_NOTIFICATION_POLICY"
3591        android:description="@string/permdesc_access_notification_policy"
3592        android:label="@string/permlab_access_notification_policy"
3593        android:protectionLevel="normal" />
3594
3595    <!-- Allows modification of do not disturb rules and policies. Only allowed for system
3596        processes.
3597        @hide -->
3598    <permission android:name="android.permission.MANAGE_NOTIFICATIONS"
3599                android:protectionLevel="signature" />
3600
3601    <!-- Allows notifications to be colorized
3602         <p>Not for use by third-party applications. @hide -->
3603    <permission android:name="android.permission.USE_COLORIZED_NOTIFICATIONS"
3604                android:protectionLevel="signature|setup" />
3605
3606    <!-- Allows access to keyguard secure storage.  Only allowed for system processes.
3607        @hide -->
3608    <permission android:name="android.permission.ACCESS_KEYGUARD_SECURE_STORAGE"
3609        android:protectionLevel="signature" />
3610
3611    <!-- Allows managing (adding, removing) fingerprint templates. Reserved for the system. @hide -->
3612    <permission android:name="android.permission.MANAGE_FINGERPRINT"
3613        android:protectionLevel="signature|privileged" />
3614
3615    <!-- Allows an app to reset fingerprint attempt counter. Reserved for the system. @hide -->
3616    <permission android:name="android.permission.RESET_FINGERPRINT_LOCKOUT"
3617        android:protectionLevel="signature" />
3618
3619    <!-- Allows an application to control keyguard.  Only allowed for system processes.
3620        @hide -->
3621    <permission android:name="android.permission.CONTROL_KEYGUARD"
3622        android:protectionLevel="signature" />
3623
3624    <!-- Allows an application to listen to trust changes.  Only allowed for system processes.
3625        @hide -->
3626    <permission android:name="android.permission.TRUST_LISTENER"
3627        android:protectionLevel="signature" />
3628
3629    <!-- @SystemApi Allows an application to provide a trust agent.
3630         @hide For security reasons, this is a platform-only permission. -->
3631    <permission android:name="android.permission.PROVIDE_TRUST_AGENT"
3632        android:protectionLevel="signature|privileged" />
3633
3634    <!-- @SystemApi Allows an application to show a message
3635         on the keyguard when asking to dismiss it.
3636         @hide For security reasons, this is a platform-only permission. -->
3637    <permission android:name="android.permission.SHOW_KEYGUARD_MESSAGE"
3638        android:protectionLevel="signature|privileged" />
3639
3640    <!-- Allows an application to launch the trust agent settings activity.
3641        @hide -->
3642    <permission android:name="android.permission.LAUNCH_TRUST_AGENT_SETTINGS"
3643        android:protectionLevel="signature|privileged" />
3644
3645    <!-- @SystemApi Must be required by an {@link
3646        android.service.trust.TrustAgentService},
3647        to ensure that only the system can bind to it.
3648        @hide -->
3649    <permission android:name="android.permission.BIND_TRUST_AGENT"
3650        android:protectionLevel="signature" />
3651
3652    <!-- Must be required by an {@link
3653         android.service.notification.NotificationListenerService},
3654         to ensure that only the system can bind to it.
3655         <p>Protection level: signature
3656    -->
3657    <permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE"
3658        android:protectionLevel="signature" />
3659
3660    <!-- @SystemApi Must be required by an {@link
3661         android.service.notification.NotificationAssistantService} to ensure that only the system
3662         can bind to it.
3663         <p>Protection level: signature
3664         @hide
3665    -->
3666    <permission android:name="android.permission.BIND_NOTIFICATION_ASSISTANT_SERVICE"
3667        android:protectionLevel="signature" />
3668
3669    <!-- Must be required by a {@link
3670         android.service.chooser.ChooserTargetService}, to ensure that
3671         only the system can bind to it.
3672         <p>Protection level: signature
3673    -->
3674    <permission android:name="android.permission.BIND_CHOOSER_TARGET_SERVICE"
3675        android:protectionLevel="signature" />
3676
3677    <!-- @SystemApi Must be held by services that extend
3678         {@link android.service.resolver.ResolverRankerService}.
3679         <p>Protection level: signature|privileged
3680         @hide
3681    -->
3682    <permission android:name="android.permission.PROVIDE_RESOLVER_RANKER_SERVICE"
3683                android:protectionLevel="signature|privileged" />
3684
3685    <!-- @SystemApi Must be required by services that extend
3686         {@link android.service.resolver.ResolverRankerService}, to ensure that only the system can
3687         bind to them.
3688         <p>Protection level: signature
3689         @hide
3690    -->
3691    <permission android:name="android.permission.BIND_RESOLVER_RANKER_SERVICE"
3692        android:protectionLevel="signature" />
3693
3694    <!-- Must be required by a {@link
3695         android.service.notification.ConditionProviderService},
3696         to ensure that only the system can bind to it.
3697         <p>Protection level: signature
3698         -->
3699    <permission android:name="android.permission.BIND_CONDITION_PROVIDER_SERVICE"
3700        android:protectionLevel="signature" />
3701
3702    <!-- Must be required by an {@link android.service.dreams.DreamService},
3703         to ensure that only the system can bind to it.
3704         <p>Protection level: signature
3705    -->
3706    <permission android:name="android.permission.BIND_DREAM_SERVICE"
3707        android:protectionLevel="signature" />
3708
3709    <!-- Must be required by an {@link android.app.usage.CacheQuotaService} to ensure that only the
3710         system can bind to it.
3711         @hide This is not a third-party API (intended for OEMs and system apps).
3712    -->
3713    <permission android:name="android.permission.BIND_CACHE_QUOTA_SERVICE"
3714                android:protectionLevel="signature" />
3715
3716    <!-- @SystemApi Allows an application to call into a carrier setup flow. It is up to the
3717         carrier setup application to enforce that this permission is required
3718         @hide This is not a third-party API (intended for OEMs and system apps). -->
3719    <permission android:name="android.permission.INVOKE_CARRIER_SETUP"
3720        android:protectionLevel="signature|privileged" />
3721
3722    <!-- @SystemApi Allows an application to listen for network condition observations.
3723         @hide This is not a third-party API (intended for system apps). -->
3724    <permission android:name="android.permission.ACCESS_NETWORK_CONDITIONS"
3725        android:protectionLevel="signature|privileged" />
3726
3727    <!-- @SystemApi Allows an application to provision and access DRM certificates
3728         @hide This is not a third-party API (intended for system apps). -->
3729    <permission android:name="android.permission.ACCESS_DRM_CERTIFICATES"
3730        android:protectionLevel="signature|privileged" />
3731
3732    <!-- Api Allows an application to manage media projection sessions.
3733         @hide This is not a third-party API (intended for system apps). -->
3734    <permission android:name="android.permission.MANAGE_MEDIA_PROJECTION"
3735        android:protectionLevel="signature" />
3736
3737    <!-- @SystemApi Allows an application to read install sessions
3738         @hide This is not a third-party API (intended for system apps). -->
3739    <permission android:name="android.permission.READ_INSTALL_SESSIONS"
3740        android:label="@string/permlab_readInstallSessions"
3741        android:description="@string/permdesc_readInstallSessions"
3742        android:protectionLevel="normal"/>
3743
3744    <!-- @SystemApi Allows an application to remove DRM certificates
3745         @hide This is not a third-party API (intended for system apps). -->
3746    <permission android:name="android.permission.REMOVE_DRM_CERTIFICATES"
3747        android:protectionLevel="signature|privileged" />
3748
3749    <!-- @deprecated Use {@link android.Manifest.permission#BIND_CARRIER_SERVICES} instead -->
3750    <permission android:name="android.permission.BIND_CARRIER_MESSAGING_SERVICE"
3751        android:protectionLevel="signature|privileged" />
3752
3753    <!-- Allows an application to interact with the currently active
3754         {@link android.service.voice.VoiceInteractionService}.
3755         @hide -->
3756    <permission android:name="android.permission.ACCESS_VOICE_INTERACTION_SERVICE"
3757        android:protectionLevel="signature" />
3758
3759    <!-- The system process that is allowed to bind to services in carrier apps will
3760         have this permission. Carrier apps should use this permission to protect
3761         their services that only the system is allowed to bind to.
3762         <p>Protection level: signature|privileged
3763    -->
3764    <permission android:name="android.permission.BIND_CARRIER_SERVICES"
3765        android:label="@string/permlab_bindCarrierServices"
3766        android:description="@string/permdesc_bindCarrierServices"
3767        android:protectionLevel="signature|privileged" />
3768
3769    <!-- Allows an application to query whether DO_NOT_ASK_CREDENTIALS_ON_BOOT
3770         flag is set.
3771         @hide -->
3772    <permission android:name="android.permission.QUERY_DO_NOT_ASK_CREDENTIALS_ON_BOOT"
3773                android:protectionLevel="signature" />
3774
3775    <!-- @SystemApi Allows applications to kill UIDs.
3776        <p>Not for use by third-party applications.
3777         @hide -->
3778    <permission android:name="android.permission.KILL_UID"
3779                android:protectionLevel="signature|installer" />
3780
3781    <!-- @SystemApi Allows applications to read the local WiFi and Bluetooth MAC address.
3782        @hide -->
3783    <permission android:name="android.permission.LOCAL_MAC_ADDRESS"
3784                android:protectionLevel="signature|privileged" />
3785    <uses-permission android:name="android.permission.LOCAL_MAC_ADDRESS"/>
3786
3787    <!-- @SystemApi Allows access to MAC addresses of WiFi and Bluetooth peer devices.
3788        @hide -->
3789    <permission android:name="android.permission.PEERS_MAC_ADDRESS"
3790                android:protectionLevel="signature|setup" />
3791
3792    <!-- Allows the Nfc stack to dispatch Nfc messages to applications. Applications
3793        can use this permission to ensure incoming Nfc messages are from the Nfc stack
3794        and not simulated by another application.
3795        @hide -->
3796    <permission android:name="android.permission.DISPATCH_NFC_MESSAGE"
3797                android:protectionLevel="signature|privileged" />
3798
3799    <!-- @SystemApi Allows changing day / night mode when system is configured with
3800         config_lockDayNightMode set to true. If requesting app does not have permission,
3801         it will be ignored.
3802        @hide -->
3803    <permission android:name="android.permission.MODIFY_DAY_NIGHT_MODE"
3804                android:protectionLevel="signature|privileged" />
3805
3806    <!-- The system process is explicitly the only one allowed to launch the
3807         confirmation UI for full backup/restore -->
3808    <uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/>
3809
3810    <!-- Allows the holder to access and manage instant applications on the device.
3811    @hide -->
3812    <permission android:name="android.permission.ACCESS_INSTANT_APPS"
3813            android:protectionLevel="signature|installer|verifier" />
3814    <uses-permission android:name="android.permission.ACCESS_INSTANT_APPS"/>
3815
3816    <!-- Allows the holder to view the instant applications on the device.
3817    @hide -->
3818    <permission android:name="android.permission.VIEW_INSTANT_APPS"
3819                android:protectionLevel="signature|preinstalled" />
3820
3821    <!-- Allows the holder to manage whether the system can bind to services
3822         provided by instant apps. This permission is intended to protect
3823         test/development fucntionality and should be used only in such cases.
3824    @hide -->
3825    <permission android:name="android.permission.MANAGE_BIND_INSTANT_SERVICE"
3826                android:protectionLevel="signature" />
3827
3828    <!-- Allows receiving the usage of media resource e.g. video/audio codec and
3829         graphic memory.
3830         @hide -->
3831    <permission android:name="android.permission.RECEIVE_MEDIA_RESOURCE_USAGE"
3832                android:protectionLevel="signature|privileged" />
3833
3834    <!-- Must be required by system/priv apps when accessing the sound trigger
3835         APIs given by {@link SoundTriggerManager}.
3836         @hide
3837         @SystemApi -->
3838    <permission android:name="android.permission.MANAGE_SOUND_TRIGGER"
3839        android:protectionLevel="signature|privileged" />
3840
3841    <!-- Must be required by system/priv apps implementing sound trigger detection services
3842         @hide
3843         @SystemApi -->
3844    <permission android:name="android.permission.BIND_SOUND_TRIGGER_DETECTION_SERVICE"
3845        android:protectionLevel="signature" />
3846
3847    <!-- @SystemApi Allows trusted applications to dispatch managed provisioning message to Managed
3848         Provisioning app. If requesting app does not have permission, it will be ignored.
3849         @hide -->
3850    <permission android:name="android.permission.DISPATCH_PROVISIONING_MESSAGE"
3851                android:protectionLevel="signature|privileged" />
3852
3853    <!-- Allows the holder to read blocked numbers. See
3854         {@link android.provider.BlockedNumberContract}.
3855         @hide -->
3856    <permission android:name="android.permission.READ_BLOCKED_NUMBERS"
3857                android:protectionLevel="signature" />
3858
3859    <!-- Allows the holder to write blocked numbers. See
3860         {@link android.provider.BlockedNumberContract}.
3861         @hide -->
3862    <permission android:name="android.permission.WRITE_BLOCKED_NUMBERS"
3863                android:protectionLevel="signature" />
3864
3865    <!-- Must be required by an {@link android.service.vr.VrListenerService}, to ensure that only
3866         the system can bind to it.
3867         <p>Protection level: signature -->
3868    <permission android:name="android.permission.BIND_VR_LISTENER_SERVICE"
3869        android:protectionLevel="signature" />
3870
3871    <!-- Must be required by system apps when accessing restricted VR APIs.
3872         @hide
3873         @SystemApi
3874         <p>Protection level: signature -->
3875    <permission android:name="android.permission.RESTRICTED_VR_ACCESS"
3876        android:protectionLevel="signature|preinstalled" />
3877
3878    <!-- Required to make calls to {@link android.service.vr.IVrManager}.
3879         @hide -->
3880    <permission android:name="android.permission.ACCESS_VR_MANAGER"
3881            android:protectionLevel="signature" />
3882
3883    <!-- Required to access VR-Mode state and state change events via {android.app.VrStateCallback}
3884         @hide -->
3885    <permission android:name="android.permission.ACCESS_VR_STATE"
3886        android:protectionLevel="signature|preinstalled" />
3887
3888    <!-- Allows an application to whitelist tasks during lock task mode
3889         @hide <p>Not for use by third-party applications.</p> -->
3890    <permission android:name="android.permission.UPDATE_LOCK_TASK_PACKAGES"
3891        android:protectionLevel="signature|setup" />
3892
3893    <!-- @SystemApi Allows an application to replace the app name displayed alongside notifications
3894         in the N-release and later.
3895         @hide  <p>Not for use by third-party applications.</p> -->
3896    <permission android:name="android.permission.SUBSTITUTE_NOTIFICATION_APP_NAME"
3897                android:protectionLevel="signature|privileged" />
3898
3899    <!-- @SystemApi Allows an application to show notifications before the device is provisioned.
3900         @hide  <p>Not for use by third-party applications.</p> -->
3901    <permission android:name="android.permission.NOTIFICATION_DURING_SETUP"
3902                android:protectionLevel="signature|privileged" />
3903
3904    <!-- @SystemApi Allows an application to manage auto-fill sessions.
3905         @hide  <p>Not for use by third-party applications.</p> -->
3906    <permission android:name="android.permission.MANAGE_AUTO_FILL"
3907        android:protectionLevel="signature" />
3908
3909    <!-- Allows an app to set the theme overlay in /vendor/overlay
3910         being used.
3911         @hide  <p>Not for use by third-party applications.</p> -->
3912    <permission android:name="android.permission.MODIFY_THEME_OVERLAY"
3913                android:protectionLevel="signature" />
3914
3915    <!-- Allows an instant app to create foreground services. -->
3916    <permission android:name="android.permission.INSTANT_APP_FOREGROUND_SERVICE"
3917        android:protectionLevel="signature|development|instant|appop" />
3918
3919    <!-- Allows a regular application to use {@link android.app.Service#startForeground
3920         Service.startForeground}.
3921         <p>Protection level: normal
3922    -->
3923    <permission android:name="android.permission.FOREGROUND_SERVICE"
3924        android:description="@string/permdesc_foregroundService"
3925        android:label="@string/permlab_foregroundService"
3926        android:protectionLevel="normal|instant" />
3927
3928    <!-- @SystemApi Allows to access all app shortcuts.
3929         @hide -->
3930    <permission android:name="android.permission.ACCESS_SHORTCUTS"
3931        android:protectionLevel="signature|textClassifier" />
3932
3933    <!-- @SystemApi Allows unlimited calls to shortcut mutation APIs.
3934         @hide -->
3935    <permission android:name="android.permission.UNLIMITED_SHORTCUTS_API_CALLS"
3936        android:protectionLevel="signature|textClassifier" />
3937
3938    <!-- @SystemApi Allows an application to read the runtime profiles of other apps.
3939         @hide <p>Not for use by third-party applications. -->
3940    <permission android:name="android.permission.READ_RUNTIME_PROFILES"
3941                android:protectionLevel="signature|privileged" />
3942
3943    <!-- @hide Allows audio policy management. -->
3944    <permission android:name="android.permission.MANAGE_AUDIO_POLICY"
3945        android:protectionLevel="signature" />
3946
3947    <!-- @SystemApi Allows an application to turn on / off quiet mode.
3948         @hide <p>Not for use by third-party applications. -->
3949    <permission android:name="android.permission.MODIFY_QUIET_MODE"
3950                android:protectionLevel="signature|privileged" />
3951
3952    <!-- Allows internal management of the camera framework
3953         @hide -->
3954    <permission android:name="android.permission.MANAGE_CAMERA"
3955        android:protectionLevel="signature" />
3956
3957    <!-- Allows an application to control remote animations. See
3958         {@link ActivityOptions#makeRemoteAnimation}
3959         @hide <p>Not for use by third-party applications. -->
3960    <permission android:name="android.permission.CONTROL_REMOTE_APP_TRANSITION_ANIMATIONS"
3961        android:protectionLevel="signature|privileged" />
3962
3963    <!-- Allows an application to watch changes and/or active state of app ops.
3964         @hide <p>Not for use by third-party applications. -->
3965    <permission android:name="android.permission.WATCH_APPOPS"
3966        android:protectionLevel="signature" />
3967
3968    <!-- Allows an application to directly open the "Open by default" page inside a package's
3969         Details screen.
3970         @hide <p>Not for use by third-party applications. -->
3971    <permission android:name="android.permission.OPEN_APPLICATION_DETAILS_OPEN_BY_DEFAULT_PAGE"
3972                android:protectionLevel="signature" />
3973
3974    <!-- Allows hidden API checks to be disabled when starting a process.
3975         @hide <p>Not for use by third-party applications. -->
3976    <permission android:name="android.permission.DISABLE_HIDDEN_API_CHECKS"
3977                android:protectionLevel="signature" />
3978
3979    <application android:process="system"
3980                 android:persistent="true"
3981                 android:hasCode="false"
3982                 android:label="@string/android_system_label"
3983                 android:allowClearUserData="false"
3984                 android:backupAgent="com.android.server.backup.SystemBackupAgent"
3985                 android:killAfterRestore="false"
3986                 android:icon="@drawable/ic_launcher_android"
3987                 android:supportsRtl="true"
3988                 android:theme="@style/Theme.DeviceDefault.Light.DarkActionBar"
3989                 android:defaultToDeviceProtectedStorage="true"
3990                 android:directBootAware="true">
3991        <activity android:name="com.android.internal.app.ChooserActivity"
3992                android:theme="@style/Theme.DeviceDefault.Resolver"
3993                android:finishOnCloseSystemDialogs="true"
3994                android:excludeFromRecents="true"
3995                android:documentLaunchMode="never"
3996                android:relinquishTaskIdentity="true"
3997                android:configChanges="screenSize|smallestScreenSize|screenLayout|orientation|keyboard|keyboardHidden"
3998                android:process=":ui"
3999                android:visibleToInstantApps="true">
4000            <intent-filter>
4001                <action android:name="android.intent.action.CHOOSER" />
4002                <category android:name="android.intent.category.DEFAULT" />
4003                <category android:name="android.intent.category.VOICE" />
4004            </intent-filter>
4005        </activity>
4006        <activity android:name="com.android.internal.app.AccessibilityButtonChooserActivity"
4007                  android:exported="false"
4008                  android:theme="@style/Theme.DeviceDefault.Resolver"
4009                  android:finishOnCloseSystemDialogs="true"
4010                  android:excludeFromRecents="true"
4011                  android:documentLaunchMode="never"
4012                  android:relinquishTaskIdentity="true"
4013                  android:configChanges="screenSize|smallestScreenSize|screenLayout|orientation|keyboard|keyboardHidden"
4014                  android:process=":ui"
4015                  android:visibleToInstantApps="true">
4016            <intent-filter>
4017                <action android:name="com.android.internal.intent.action.CHOOSE_ACCESSIBILITY_BUTTON" />
4018                <category android:name="android.intent.category.DEFAULT" />
4019            </intent-filter>
4020        </activity>
4021        <activity android:name="com.android.internal.app.IntentForwarderActivity"
4022                android:finishOnCloseSystemDialogs="true"
4023                android:theme="@style/Theme.NoDisplay"
4024                android:excludeFromRecents="true"
4025                android:label="@string/user_owner_label"
4026                android:exported="true"
4027                android:visibleToInstantApps="true"
4028                >
4029        </activity>
4030        <activity-alias android:name="com.android.internal.app.ForwardIntentToParent"
4031                android:targetActivity="com.android.internal.app.IntentForwarderActivity"
4032                android:exported="true"
4033                android:label="@string/user_owner_label">
4034        </activity-alias>
4035        <activity-alias android:name="com.android.internal.app.ForwardIntentToManagedProfile"
4036                android:targetActivity="com.android.internal.app.IntentForwarderActivity"
4037                android:icon="@drawable/ic_corp_badge"
4038                android:exported="true"
4039                android:label="@string/managed_profile_label">
4040        </activity-alias>
4041        <activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity"
4042                android:theme="@style/Theme.DeviceDefault.Light.Dialog"
4043                android:label="@string/heavy_weight_switcher_title"
4044                android:finishOnCloseSystemDialogs="true"
4045                android:excludeFromRecents="true"
4046                android:process=":ui">
4047        </activity>
4048        <activity android:name="com.android.internal.app.PlatLogoActivity"
4049                android:theme="@style/Theme.Wallpaper.NoTitleBar.Fullscreen"
4050                android:configChanges="orientation|keyboardHidden"
4051                android:process=":ui">
4052        </activity>
4053        <activity android:name="com.android.internal.app.DisableCarModeActivity"
4054                android:theme="@style/Theme.NoDisplay"
4055                android:excludeFromRecents="true"
4056                android:process=":ui">
4057        </activity>
4058        <activity android:name="com.android.internal.app.DumpHeapActivity"
4059                android:theme="@style/Theme.Translucent.NoTitleBar"
4060                android:label="@string/dump_heap_title"
4061                android:finishOnCloseSystemDialogs="true"
4062                android:noHistory="true"
4063                android:excludeFromRecents="true"
4064                android:process=":ui">
4065        </activity>
4066        <provider android:name="com.android.server.am.DumpHeapProvider"
4067                android:authorities="com.android.server.heapdump"
4068                android:grantUriPermissions="true"
4069                android:multiprocess="false"
4070                android:singleUser="true" />
4071
4072        <activity android:name="android.accounts.ChooseAccountActivity"
4073                android:excludeFromRecents="true"
4074                android:exported="true"
4075                android:theme="@style/Theme.DeviceDefault.Light.Dialog"
4076                android:label="@string/choose_account_label"
4077                android:process=":ui"
4078                android:visibleToInstantApps="true">
4079        </activity>
4080
4081        <activity android:name="android.accounts.ChooseTypeAndAccountActivity"
4082                android:excludeFromRecents="true"
4083                android:exported="true"
4084                android:theme="@style/Theme.DeviceDefault.Light.Dialog"
4085                android:label="@string/choose_account_label"
4086                android:process=":ui"
4087                android:visibleToInstantApps="true">
4088        </activity>
4089
4090        <activity android:name="android.accounts.ChooseAccountTypeActivity"
4091                android:excludeFromRecents="true"
4092                android:theme="@style/Theme.DeviceDefault.Light.Dialog"
4093                android:label="@string/choose_account_label"
4094                android:process=":ui"
4095                android:visibleToInstantApps="true">
4096        </activity>
4097
4098        <activity android:name="android.accounts.CantAddAccountActivity"
4099                android:excludeFromRecents="true"
4100                android:exported="true"
4101                android:theme="@style/Theme.DeviceDefault.Light.Dialog.NoActionBar"
4102                android:process=":ui">
4103        </activity>
4104
4105        <activity android:name="android.accounts.GrantCredentialsPermissionActivity"
4106                android:excludeFromRecents="true"
4107                android:exported="true"
4108                android:theme="@style/Theme.DeviceDefault.Light.DialogWhenLarge"
4109                android:process=":ui"
4110                android:visibleToInstantApps="true">
4111        </activity>
4112
4113        <activity android:name="android.content.SyncActivityTooManyDeletes"
4114               android:theme="@style/Theme.DeviceDefault.Light.Dialog"
4115               android:label="@string/sync_too_many_deletes"
4116               android:process=":ui">
4117        </activity>
4118
4119        <activity android:name="com.android.internal.app.ShutdownActivity"
4120            android:permission="android.permission.SHUTDOWN"
4121            android:theme="@style/Theme.NoDisplay"
4122            android:excludeFromRecents="true">
4123            <intent-filter>
4124                <action android:name="com.android.internal.intent.action.REQUEST_SHUTDOWN" />
4125                <category android:name="android.intent.category.DEFAULT" />
4126            </intent-filter>
4127            <intent-filter>
4128                <action android:name="android.intent.action.REBOOT" />
4129                <category android:name="android.intent.category.DEFAULT" />
4130            </intent-filter>
4131        </activity>
4132
4133        <activity android:name="com.android.internal.app.NetInitiatedActivity"
4134                android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert"
4135                android:excludeFromRecents="true"
4136                android:process=":ui">
4137        </activity>
4138
4139        <activity android:name="com.android.internal.app.SystemUserHomeActivity"
4140                  android:enabled="false"
4141                  android:process=":ui"
4142                  android:systemUserOnly="true"
4143                  android:theme="@style/Theme.Translucent.NoTitleBar">
4144            <intent-filter android:priority="-100">
4145                <action android:name="android.intent.action.MAIN" />
4146                <category android:name="android.intent.category.HOME" />
4147            </intent-filter>
4148        </activity>
4149
4150        <!-- Activity to prompt user if it's ok to create a new user sandbox for a
4151             specified account. -->
4152        <activity android:name="com.android.internal.app.ConfirmUserCreationActivity"
4153                android:excludeFromRecents="true"
4154                android:process=":ui"
4155                android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert">
4156            <intent-filter android:priority="1000">
4157                <action android:name="android.os.action.CREATE_USER" />
4158                <category android:name="android.intent.category.DEFAULT" />
4159            </intent-filter>
4160        </activity>
4161
4162        <activity android:name="com.android.internal.app.SuspendedAppActivity"
4163                  android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert"
4164                  android:excludeFromRecents="true"
4165                  android:process=":ui">
4166        </activity>
4167
4168        <activity android:name="com.android.internal.app.UnlaunchableAppActivity"
4169                android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert"
4170                android:excludeFromRecents="true"
4171                android:process=":ui">
4172        </activity>
4173
4174        <activity android:name="com.android.settings.notification.NotificationAccessConfirmationActivity"
4175                  android:theme="@android:style/Theme.DeviceDefault.Light.Dialog.Alert"
4176                  android:excludeFromRecents="true">
4177        </activity>
4178
4179        <activity android:name="com.android.internal.app.HarmfulAppWarningActivity"
4180                  android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert"
4181                  android:excludeFromRecents="true"
4182                  android:process=":ui"
4183                  android:label="@string/harmful_app_warning_title"
4184                  android:exported="false">
4185        </activity>
4186
4187        <receiver android:name="com.android.server.BootReceiver"
4188                android:systemUserOnly="true">
4189            <intent-filter android:priority="1000">
4190                <action android:name="android.intent.action.BOOT_COMPLETED" />
4191            </intent-filter>
4192        </receiver>
4193
4194        <receiver android:name="com.android.server.updates.CertPinInstallReceiver"
4195                android:permission="android.permission.UPDATE_CONFIG">
4196            <intent-filter>
4197                <action android:name="android.intent.action.UPDATE_PINS" />
4198                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
4199            </intent-filter>
4200        </receiver>
4201
4202        <receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver"
4203                android:permission="android.permission.UPDATE_CONFIG">
4204            <intent-filter>
4205                <action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" />
4206                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
4207            </intent-filter>
4208        </receiver>
4209
4210        <receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver"
4211                android:permission="android.permission.UPDATE_CONFIG">
4212            <intent-filter>
4213                <action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" />
4214                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
4215            </intent-filter>
4216        </receiver>
4217
4218        <receiver android:name="com.android.server.updates.NetworkWatchlistInstallReceiver"
4219                  android:permission="android.permission.UPDATE_CONFIG">
4220            <intent-filter>
4221                <action android:name="android.intent.action.UPDATE_NETWORK_WATCHLIST" />
4222                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
4223            </intent-filter>
4224        </receiver>
4225
4226        <receiver android:name="com.android.server.updates.ApnDbInstallReceiver"
4227                android:permission="android.permission.UPDATE_CONFIG">
4228            <intent-filter>
4229                <action android:name="com.android.internal.intent.action.UPDATE_APN_DB" />
4230                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
4231            </intent-filter>
4232        </receiver>
4233
4234        <receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver"
4235                android:permission="android.permission.UPDATE_CONFIG">
4236            <intent-filter>
4237                <action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" />
4238                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
4239            </intent-filter>
4240        </receiver>
4241
4242        <receiver android:name="com.android.server.updates.CertificateTransparencyLogInstallReceiver"
4243                android:permission="android.permission.UPDATE_CONFIG">
4244            <intent-filter>
4245                <action android:name="android.intent.action.UPDATE_CT_LOGS" />
4246                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
4247            </intent-filter>
4248        </receiver>
4249
4250        <receiver android:name="com.android.server.updates.LangIdInstallReceiver"
4251                android:permission="android.permission.UPDATE_CONFIG">
4252            <intent-filter>
4253                <action android:name="android.intent.action.UPDATE_LANG_ID" />
4254                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
4255            </intent-filter>
4256        </receiver>
4257
4258        <receiver android:name="com.android.server.updates.SmartSelectionInstallReceiver"
4259                android:permission="android.permission.UPDATE_CONFIG">
4260            <intent-filter>
4261                <action android:name="android.intent.action.UPDATE_SMART_SELECTION" />
4262                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
4263            </intent-filter>
4264        </receiver>
4265
4266        <receiver android:name="com.android.server.updates.CarrierIdInstallReceiver"
4267                  android:permission="android.permission.UPDATE_CONFIG">
4268            <intent-filter>
4269                <action android:name="android.os.action.UPDATE_CARRIER_ID_DB" />
4270                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
4271            </intent-filter>
4272        </receiver>
4273
4274        <receiver android:name="com.android.server.MasterClearReceiver"
4275            android:permission="android.permission.MASTER_CLEAR">
4276            <intent-filter
4277                    android:priority="100" >
4278                <!-- For Checkin, Settings, etc.: action=FACTORY_RESET -->
4279                <action android:name="android.intent.action.FACTORY_RESET" />
4280                <!-- As above until all the references to the deprecated MASTER_CLEAR get updated to
4281                     FACTORY_RESET. -->
4282                <action android:name="android.intent.action.MASTER_CLEAR" />
4283
4284                <!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR -->
4285                <action android:name="com.google.android.c2dm.intent.RECEIVE" />
4286                <category android:name="android.intent.category.MASTER_CLEAR" />
4287            </intent-filter>
4288        </receiver>
4289
4290        <receiver android:name="com.android.server.stats.StatsCompanionService$AnomalyAlarmReceiver"
4291                  android:permission="android.permission.STATSCOMPANION"
4292                  android:exported="false">
4293        </receiver>
4294
4295        <receiver android:name="com.android.server.stats.StatsCompanionService$PullingAlarmReceiver"
4296                  android:permission="android.permission.STATSCOMPANION"
4297                  android:exported="false">
4298        </receiver>
4299
4300        <receiver android:name="com.android.server.stats.StatsCompanionService$PeriodicAlarmReceiver"
4301                  android:permission="android.permission.STATSCOMPANION"
4302                  android:exported="false">
4303        </receiver>
4304
4305        <service android:name="android.hardware.location.GeofenceHardwareService"
4306            android:permission="android.permission.LOCATION_HARDWARE"
4307            android:exported="false" />
4308
4309        <service android:name="com.android.internal.backup.LocalTransportService"
4310                android:permission="android.permission.CONFIRM_FULL_BACKUP"
4311                android:exported="false">
4312            <intent-filter>
4313                <action android:name="android.backup.TRANSPORT_HOST" />
4314            </intent-filter>
4315        </service>
4316
4317        <service android:name="com.android.server.MountServiceIdler"
4318                 android:exported="true"
4319                 android:permission="android.permission.BIND_JOB_SERVICE" >
4320        </service>
4321
4322        <service android:name="com.android.server.backup.FullBackupJob"
4323                 android:exported="true"
4324                 android:permission="android.permission.BIND_JOB_SERVICE" >
4325        </service>
4326
4327        <service android:name="com.android.server.backup.KeyValueBackupJob"
4328                 android:permission="android.permission.BIND_JOB_SERVICE" >
4329        </service>
4330
4331        <service android:name="com.android.server.content.SyncJobService"
4332                 android:permission="android.permission.BIND_JOB_SERVICE" >
4333        </service>
4334
4335        <service android:name="com.android.server.pm.BackgroundDexOptService"
4336                 android:exported="true"
4337                 android:permission="android.permission.BIND_JOB_SERVICE">
4338        </service>
4339
4340        <service android:name="com.android.server.PruneInstantAppsJobService"
4341                 android:permission="android.permission.BIND_JOB_SERVICE" >
4342        </service>
4343
4344        <service android:name="com.android.server.storage.DiskStatsLoggingService"
4345                 android:permission="android.permission.BIND_JOB_SERVICE" >
4346        </service>
4347
4348        <service android:name="com.android.server.PreloadsFileCacheExpirationJobService"
4349                 android:permission="android.permission.BIND_JOB_SERVICE" >
4350        </service>
4351
4352        <service android:name="com.android.server.camera.CameraStatsJobService"
4353                 android:permission="android.permission.BIND_JOB_SERVICE" >
4354        </service>
4355
4356        <service android:name="com.android.server.timezone.TimeZoneUpdateIdler"
4357                 android:permission="android.permission.BIND_JOB_SERVICE" >
4358        </service>
4359
4360        <service android:name="com.android.server.net.watchlist.ReportWatchlistJobService"
4361                 android:permission="android.permission.BIND_JOB_SERVICE" >
4362        </service>
4363
4364        <service android:name="com.android.server.display.BrightnessIdleJob"
4365                 android:permission="android.permission.BIND_JOB_SERVICE" >
4366        </service>
4367
4368        <service
4369                android:name="com.android.server.autofill.AutofillCompatAccessibilityService"
4370                android:permission="android.permission.BIND_ACCESSIBILITY_SERVICE"
4371                android:exported="true">
4372            <meta-data
4373                    android:name="android.accessibilityservice"
4374                    android:resource="@xml/autofill_compat_accessibility_service" />
4375        </service>
4376
4377</application>
4378
4379</manifest>
4380