AndroidManifest.xml revision 66d7588078fbdbdadf646577dce6b3821976d25c
1<?xml version="1.0" encoding="utf-8"?>
2<!--
3/* //device/apps/common/AndroidManifest.xml
4**
5** Copyright 2006, The Android Open Source Project
6**
7** Licensed under the Apache License, Version 2.0 (the "License");
8** you may not use this file except in compliance with the License.
9** You may obtain a copy of the License at
10**
11**     http://www.apache.org/licenses/LICENSE-2.0
12**
13** Unless required by applicable law or agreed to in writing, software
14** distributed under the License is distributed on an "AS IS" BASIS,
15** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16** See the License for the specific language governing permissions and
17** limitations under the License.
18*/
19-->
20<manifest xmlns:android="http://schemas.android.com/apk/res/android"
21    package="android" coreApp="true" android:sharedUserId="android.uid.system"
22    android:sharedUserLabel="@string/android_system_label">
23
24    <!-- ================================================ -->
25    <!-- Special broadcasts that only the system can send -->
26    <!-- ================================================ -->
27    <eat-comment />
28
29    <protected-broadcast android:name="android.intent.action.SCREEN_OFF" />
30    <protected-broadcast android:name="android.intent.action.SCREEN_ON" />
31    <protected-broadcast android:name="android.intent.action.USER_PRESENT" />
32    <protected-broadcast android:name="android.intent.action.TIME_SET" />
33    <protected-broadcast android:name="android.intent.action.TIME_TICK" />
34    <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" />
35    <protected-broadcast android:name="android.intent.action.DATE_CHANGED" />
36    <protected-broadcast android:name="android.intent.action.PRE_BOOT_COMPLETED" />
37    <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" />
38    <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" />
39    <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" />
40    <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" />
41    <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" />
42    <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" />
43    <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" />
44    <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" />
45    <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" />
46    <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" />
47    <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" />
48    <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" />
49    <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" />
50    <protected-broadcast android:name="android.intent.action.PACKAGES_SUSPENDED" />
51    <protected-broadcast android:name="android.intent.action.PACKAGES_UNSUSPENDED" />
52    <protected-broadcast android:name="android.intent.action.UID_REMOVED" />
53    <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" />
54    <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" />
55    <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" />
56    <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" />
57    <protected-broadcast android:name="android.intent.action.BATTERY_LOW" />
58    <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" />
59    <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" />
60    <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" />
61    <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" />
62    <protected-broadcast android:name="android.intent.action.CHARGING" />
63    <protected-broadcast android:name="android.intent.action.DISCHARGING" />
64    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" />
65    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" />
66    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" />
67    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" />
68    <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" />
69    <protected-broadcast android:name="android.intent.action.REBOOT" />
70    <protected-broadcast android:name="android.intent.action.DOCK_EVENT" />
71    <protected-broadcast android:name="android.intent.action.THERMAL_EVENT" />
72    <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" />
73    <protected-broadcast android:name="android.intent.action.USER_ADDED" />
74    <protected-broadcast android:name="android.intent.action.USER_REMOVED" />
75    <protected-broadcast android:name="android.intent.action.USER_STARTING" />
76    <protected-broadcast android:name="android.intent.action.USER_STARTED" />
77    <protected-broadcast android:name="android.intent.action.USER_STOPPING" />
78    <protected-broadcast android:name="android.intent.action.USER_STOPPED" />
79    <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" />
80    <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" />
81    <protected-broadcast android:name="android.intent.action.USER_SWITCHED" />
82    <protected-broadcast android:name="android.intent.action.USER_INITIALIZE" />
83    <protected-broadcast android:name="android.intent.action.INTENT_FILTER_NEEDS_VERIFICATION" />
84
85    <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED" />
86    <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGING" />
87    <protected-broadcast android:name="android.os.action.DEVICE_IDLE_MODE_CHANGED" />
88    <protected-broadcast android:name="android.os.action.POWER_SAVE_WHITELIST_CHANGED" />
89    <protected-broadcast android:name="android.os.action.POWER_SAVE_TEMP_WHITELIST_CHANGED" />
90
91    <protected-broadcast android:name="android.os.action.SCREEN_BRIGHTNESS_BOOST_CHANGED" />
92
93    <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" />
94    <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" />
95    <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" />
96    <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" />
97    <protected-broadcast android:name="android.app.action.NEXT_ALARM_CLOCK_CHANGED" />
98
99    <protected-broadcast android:name="android.app.action.BUGREPORT_SHARING_DECLINED" />
100    <protected-broadcast android:name="android.app.action.BUGREPORT_FAILED" />
101    <protected-broadcast android:name="android.app.action.BUGREPORT_SHARE" />
102
103    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" />
104    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" />
105    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" />
106    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" />
107    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_HOST_RESTORED" />
108    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_RESTORED" />
109
110    <protected-broadcast android:name="android.os.action.SETTING_RESTORED" />
111
112    <protected-broadcast android:name="android.app.backup.intent.RUN" />
113    <protected-broadcast android:name="android.app.backup.intent.CLEAR" />
114    <protected-broadcast android:name="android.app.backup.intent.INIT" />
115
116    <protected-broadcast android:name="android.bluetooth.intent.DISCOVERABLE_TIMEOUT" />
117    <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" />
118    <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" />
119    <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" />
120    <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" />
121    <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" />
122    <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" />
123    <protected-broadcast android:name="android.bluetooth.device.action.UUID" />
124    <protected-broadcast android:name="android.bluetooth.device.action.MAS_INSTANCE" />
125    <protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" />
126    <protected-broadcast android:name="android.bluetooth.device.action.FOUND" />
127    <protected-broadcast android:name="android.bluetooth.device.action.DISAPPEARED" />
128    <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" />
129    <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" />
130    <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" />
131    <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" />
132    <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" />
133    <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" />
134    <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" />
135    <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" />
136    <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" />
137    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" />
138    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" />
139    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" />
140    <protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" />
141    <protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" />
142    <protected-broadcast
143        android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" />
144    <protected-broadcast
145        android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" />
146    <protected-broadcast
147        android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" />
148    <protected-broadcast
149        android:name="android.bluetooth.headsetclient.profile.action.CONNECTION_STATE_CHANGED" />
150    <protected-broadcast
151        android:name="android.bluetooth.headsetclient.profile.action.AUDIO_STATE_CHANGED" />
152    <protected-broadcast
153        android:name="android.bluetooth.headsetclient.profile.action.AG_EVENT" />
154    <protected-broadcast
155        android:name="android.bluetooth.headsetclient.profile.action.AG_CALL_CHANGED" />
156    <protected-broadcast
157        android:name="android.bluetooth.headsetclient.profile.action.RESULT" />
158    <protected-broadcast
159        android:name="android.bluetooth.headsetclient.profile.action.LAST_VTAG" />
160    <protected-broadcast
161        android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" />
162    <protected-broadcast
163        android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" />
164    <protected-broadcast
165        android:name="android.bluetooth.a2dp-sink.profile.action.CONNECTION_STATE_CHANGED" />
166    <protected-broadcast
167        android:name="android.bluetooth.a2dp-sink.profile.action.PLAYING_STATE_CHANGED" />
168    <protected-broadcast
169        android:name="android.bluetooth.a2dp-sink.profile.action.AUDIO_CONFIG_CHANGED" />
170   <protected-broadcast
171        android:name="android.bluetooth.avrcp-controller.profile.action.CONNECTION_STATE_CHANGED" />
172    <protected-broadcast
173        android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" />
174    <protected-broadcast
175        android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" />
176    <protected-broadcast
177        android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" />
178    <protected-broadcast
179        android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" />
180    <protected-broadcast android:name="android.bluetooth.pbap.intent.action.PBAP_STATE_CHANGED" />
181    <protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" />
182    <protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" />
183    <protected-broadcast android:name="android.btopp.intent.action.LIST" />
184    <protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" />
185    <protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" />
186    <protected-broadcast android:name="android.btopp.intent.action.CONFIRM" />
187    <protected-broadcast android:name="android.btopp.intent.action.HIDE" />
188    <protected-broadcast android:name="android.btopp.intent.action.RETRY" />
189    <protected-broadcast android:name="android.btopp.intent.action.OPEN" />
190    <protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" />
191    <protected-broadcast android:name="com.android.bluetooth.pbap.authchall" />
192    <protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" />
193    <protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" />
194    <protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" />
195
196    <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" />
197
198    <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" />
199    <protected-broadcast android:name="android.hardware.usb.action.USB_PORT_CHANGED" />
200    <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" />
201    <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_DETACHED" />
202    <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" />
203    <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" />
204
205    <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" />
206    <protected-broadcast android:name="android.media.action.HDMI_AUDIO_PLUG" />
207
208    <protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" />
209    <protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" />
210    <protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" />
211    <protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" />
212    <protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" />
213    <protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" />
214    <protected-broadcast android:name="android.media.MASTER_MONO_CHANGED_ACTION" />
215    <protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" />
216    <protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" />
217
218    <protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" />
219    <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" />
220    <protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" />
221    <protected-broadcast android:name="android.intent.action.MEDIA_NOFS" />
222    <protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" />
223    <protected-broadcast android:name="android.intent.action.MEDIA_SHARED" />
224    <protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" />
225    <protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" />
226    <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" />
227    <protected-broadcast android:name="android.intent.action.MEDIA_EJECT" />
228
229    <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL" />
230    <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" />
231    <!-- @deprecated.  Only {@link android.net.ConnectivityManager.CONNECTIVITY_ACTION} is sent. -->
232    <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" />
233    <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" />
234    <protected-broadcast android:name="android.net.conn.RESTRICT_BACKGROUND_CHANGED" />
235    <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" />
236    <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" />
237
238    <protected-broadcast android:name="android.net.nsd.STATE_CHANGED" />
239
240    <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" />
241    <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" />
242    <protected-broadcast android:name="com.android.nfc.action.LLCP_UP" />
243    <protected-broadcast android:name="com.android.nfc.action.LLCP_DOWN" />
244    <protected-broadcast android:name="com.android.nfc.cardemulation.action.CLOSE_TAP_DIALOG" />
245    <protected-broadcast android:name="com.android.nfc.handover.action.ALLOW_CONNECT" />
246    <protected-broadcast android:name="com.android.nfc.handover.action.DENY_CONNECT" />
247    <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" />
248    <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" />
249    <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" />
250    <!-- For NFC to BT handover -->
251    <protected-broadcast android:name="android.btopp.intent.action.WHITELIST_DEVICE" />
252    <protected-broadcast android:name="android.btopp.intent.action.STOP_HANDOVER_TRANSFER" />
253    <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND" />
254    <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND_MULTIPLE" />
255
256    <protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" />
257    <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" />
258
259    <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" />
260
261    <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" />
262    <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" />
263    <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" />
264
265    <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" />
266    <protected-broadcast android:name="com.android.server.WifiManager.action.START_PNO" />
267    <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" />
268    <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_ACCEPTED" />
269    <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_DECLINED" />
270    <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" />
271    <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" />
272    <protected-broadcast android:name="android.net.wifi.WIFI_CREDENTIAL_CHANGED" />
273    <protected-broadcast android:name="android.net.wifi.WIFI_SCAN_AVAILABLE" />
274    <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" />
275    <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" />
276    <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" />
277    <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" />
278    <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" />
279    <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" />
280    <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" />
281    <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" />
282    <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" />
283    <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" />
284    <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" />
285    <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" />
286    <protected-broadcast android:name="android.net.wifi.p2p.PERSISTENT_GROUPS_CHANGED" />
287    <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" />
288    <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" />
289    <protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" />
290    <protected-broadcast
291            android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" />
292    <protected-broadcast android:name="android.net.scoring.SCORE_NETWORKS" />
293    <protected-broadcast android:name="android.net.scoring.SCORER_CHANGED" />
294    <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" />
295    <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" />
296    <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" />
297    <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" />
298    <protected-broadcast android:name="android.intent.action.APPLICATION_RESTRICTIONS_CHANGED" />
299
300    <!-- Legacy -->
301    <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" />
302    <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" />
303
304    <protected-broadcast android:name="com.android.server.task.controllers.IdleController.ACTION_TRIGGER_IDLE" />
305
306    <protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" />
307
308    <protected-broadcast android:name="android.intent.action.PHONE_STATE" />
309
310    <protected-broadcast android:name="android.intent.action.SUB_DEFAULT_CHANGED" />
311
312    <protected-broadcast android:name="android.location.GPS_ENABLED_CHANGE" />
313    <protected-broadcast android:name="android.location.PROVIDERS_CHANGED" />
314    <protected-broadcast android:name="android.location.MODE_CHANGED" />
315    <protected-broadcast android:name="android.location.GPS_FIX_CHANGE" />
316    <protected-broadcast android:name="android.net.proxy.PAC_REFRESH" />
317
318    <protected-broadcast android:name="android.telecom.action.DEFAULT_DIALER_CHANGED" />
319
320    <protected-broadcast
321        android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" />
322
323    <!-- Defined in RestrictionsManager -->
324    <protected-broadcast
325        android:name="android.intent.action.PERMISSION_RESPONSE_RECEIVED" />
326    <!-- Defined in RestrictionsManager -->
327
328    <protected-broadcast android:name="android.intent.action.REQUEST_PERMISSION" />
329    <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_STARTED" />
330    <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
331    <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_PROGRESS" />
332    <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
333
334    <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_SUBSCRIPTION_CHANGED" />
335    <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_SMS_SUBSCRIPTION_CHANGED" />
336    <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_DATA_SUBSCRIPTION_CHANGED" />
337    <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_VOICE_SUBSCRIPTION_CHANGED" />
338    <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_CONTENT_CHANGE" />
339    <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_RECORD_UPDATED" />
340
341    <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_DONE" />
342    <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_FAILED" />
343
344    <protected-broadcast android:name="android.internal.policy.action.BURN_IN_PROTECTION" />
345    <protected-broadcast android:name="android.app.action.SYSTEM_UPDATE_POLICY_CHANGED" />
346    <protected-broadcast android:name="android.app.action.DEVICE_OWNER_CHANGED" />
347
348    <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_AVAILABILITY_CHANGED" />
349
350    <!-- Added in N -->
351    <protected-broadcast android:name="android.intent.action.ANR" />
352    <protected-broadcast android:name="android.intent.action.CALL" />
353    <protected-broadcast android:name="android.intent.action.DROPBOX_ENTRY_ADDED" />
354    <protected-broadcast android:name="android.intent.action.INPUT_METHOD_CHANGED" />
355    <protected-broadcast android:name="android.intent.action.internal_sim_state_changed" />
356    <protected-broadcast android:name="android.intent.action.LOCKED_BOOT_COMPLETED" />
357    <protected-broadcast android:name="android.intent.action.PRECISE_CALL_STATE" />
358    <protected-broadcast android:name="android.intent.action.PRECISE_DATA_CONNECTION_STATE_CHANGED" />
359    <protected-broadcast android:name="android.intent.action.SUBSCRIPTION_PHONE_STATE" />
360    <protected-broadcast android:name="android.intent.action.USER_INFO_CHANGED" />
361    <protected-broadcast android:name="android.intent.action.USER_UNLOCKED" />
362    <protected-broadcast android:name="android.intent.action.WALLPAPER_CHANGED" />
363
364    <protected-broadcast android:name="android.app.action.DEVICE_POLICY_MANAGER_STATE_CHANGED" />
365    <protected-broadcast android:name="android.app.action.CHOOSE_PRIVATE_KEY_ALIAS" />
366    <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLED" />
367    <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLE_REQUESTED" />
368    <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_ENABLED" />
369    <protected-broadcast android:name="android.app.action.LOCK_TASK_ENTERING" />
370    <protected-broadcast android:name="android.app.action.LOCK_TASK_EXITING" />
371    <protected-broadcast android:name="android.app.action.NOTIFY_PENDING_SYSTEM_UPDATE" />
372    <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_CHANGED" />
373    <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_EXPIRING" />
374    <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_FAILED" />
375    <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_SUCCEEDED" />
376    <protected-broadcast android:name="com.android.server.ACTION_EXPIRED_PASSWORD_NOTIFICATION" />
377    <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_ADDED" />
378
379    <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_STATE_CHANGED" />
380    <protected-broadcast android:name="android.content.jobscheduler.JOB_DELAY_EXPIRED" />
381    <protected-broadcast android:name="android.content.syncmanager.SYNC_ALARM" />
382    <protected-broadcast android:name="android.media.INTERNAL_RINGER_MODE_CHANGED_ACTION" />
383    <protected-broadcast android:name="android.media.STREAM_DEVICES_CHANGED_ACTION" />
384    <protected-broadcast android:name="android.media.STREAM_MUTE_CHANGED_ACTION" />
385    <protected-broadcast android:name="android.net.sip.SIP_SERVICE_UP" />
386    <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" />
387    <protected-broadcast android:name="android.os.action.CHARGING" />
388    <protected-broadcast android:name="android.os.action.DISCHARGING" />
389    <protected-broadcast android:name="android.search.action.SEARCHABLES_CHANGED" />
390    <protected-broadcast android:name="android.security.STORAGE_CHANGED" />
391    <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_REGISTERED" />
392    <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_UNREGISTERED" />
393    <protected-broadcast android:name="android.telecom.action.SHOW_MISSED_CALLS_NOTIFICATION" />
394    <protected-broadcast android:name="android.telephony.action.CARRIER_CONFIG_CHANGED" />
395
396    <protected-broadcast android:name="com.android.bluetooth.btservice.action.ALARM_WAKEUP" />
397    <protected-broadcast android:name="com.android.ims.IMS_SERVICE_UP" />
398    <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_POLL" />
399    <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_UPDATED" />
400    <protected-broadcast android:name="com.android.server.NetworkTimeUpdateService.action.POLL" />
401    <protected-broadcast android:name="com.android.server.telecom.intent.action.CALLS_ADD_ENTRY" />
402    <protected-broadcast android:name="com.android.settings.location.MODE_CHANGING" />
403
404    <protected-broadcast android:name="ScheduleConditionProvider.EVALUATE" />
405    <protected-broadcast android:name="EventConditionProvider.EVALUATE" />
406    <protected-broadcast android:name="wifi_scan_available" />
407
408    <protected-broadcast android:name="action.cne.started" />
409    <protected-broadcast android:name="android.content.jobscheduler.JOB_DEADLINE_EXPIRED" />
410    <protected-broadcast android:name="android.intent.action.ACTION_UNSOL_RESPONSE_OEM_HOOK_RAW" />
411    <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_SUPL" />
412    <protected-broadcast android:name="android.os.action.ACTION_EFFECTS_SUPPRESSOR_CHANGED" />
413    <protected-broadcast android:name="android.os.action.LIGHT_DEVICE_IDLE_MODE_CHANGED" />
414    <protected-broadcast android:name="android.os.storage.action.VOLUME_STATE_CHANGED" />
415    <protected-broadcast android:name="com.android.server.action.UPDATE_TWILIGHT_STATE" />
416    <protected-broadcast android:name="com.android.server.device_idle.STEP_IDLE_STATE" />
417    <protected-broadcast android:name="com.android.server.device_idle.STEP_LIGHT_IDLE_STATE" />
418    <protected-broadcast android:name="com.android.server.Wifi.action.TOGGLE_PNO" />
419    <protected-broadcast android:name="intent.action.ACTION_RF_BAND_INFO" />
420    <protected-broadcast android:name="android.intent.action.MEDIA_RESOURCE_GRANTED" />
421    <protected-broadcast android:name="android.app.action.SECURITY_LOGS_AVAILABLE" />
422
423    <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED" />
424    <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED_INTERNAL" />
425    <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_CHANGED" />
426    <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_ACCESS_GRANTED_CHANGED" />
427    <protected-broadcast android:name="android.os.action.ACTION_EFFECTS_SUPPRESSOR_CHANGED" />
428
429    <protected-broadcast android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS" />
430    <protected-broadcast android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS" />
431
432    <protected-broadcast android:name="android.intent.action.DYNAMIC_SENSOR_CHANGED" />
433
434    <protected-broadcast android:name="android.intent.action.ACTION_RADIO_OFF" />
435    <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNLOCKED" />
436
437    <protected-broadcast android:name="android.accounts.LOGIN_ACCOUNTS_CHANGED" />
438    <protected-broadcast android:name="com.android.sync.SYNC_CONN_STATUS_CHANGED" />
439
440    <protected-broadcast android:name="com.android.phone.SIP_INCOMING_CALL" />
441    <protected-broadcast android:name="com.android.phone.SIP_ADD_PHONE" />
442    <protected-broadcast android:name="com.android.phone.SIP_REMOVE_PHONE" />
443    <protected-broadcast android:name="com.android.phone.SIP_CALL_OPTION_CHANGED" />
444
445    <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_CONNECTED" />
446    <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_DISCONNECTED" />
447
448    <protected-broadcast android:name="android.bluetooth.input.profile.action.HANDSHAKE" />
449    <protected-broadcast android:name="android.bluetooth.input.profile.action.REPORT" />
450
451    <protected-broadcast android:name="android.intent.action.TWILIGHT_CHANGED" />
452
453    <!-- ====================================================================== -->
454    <!--                          RUNTIME PERMISSIONS                           -->
455    <!-- ====================================================================== -->
456    <eat-comment />
457
458    <!-- ====================================================================== -->
459    <!-- Permissions for accessing user's contacts including personal profile   -->
460    <!-- ====================================================================== -->
461    <eat-comment />
462
463    <!-- Used for runtime permissions related to user's contacts and profile. -->
464    <permission-group android:name="android.permission-group.CONTACTS"
465        android:icon="@drawable/perm_group_contacts"
466        android:label="@string/permgrouplab_contacts"
467        android:description="@string/permgroupdesc_contacts"
468        android:priority="100" />
469
470    <!-- Allows an application to read the user's contacts data.
471        <p>Protection level: dangerous
472    -->
473    <permission android:name="android.permission.READ_CONTACTS"
474        android:permissionGroup="android.permission-group.CONTACTS"
475        android:label="@string/permlab_readContacts"
476        android:description="@string/permdesc_readContacts"
477        android:protectionLevel="dangerous" />
478
479    <!-- Allows an application to write the user's contacts data.
480         <p>Protection level: dangerous
481    -->
482    <permission android:name="android.permission.WRITE_CONTACTS"
483        android:permissionGroup="android.permission-group.CONTACTS"
484        android:label="@string/permlab_writeContacts"
485        android:description="@string/permdesc_writeContacts"
486        android:protectionLevel="dangerous" />
487
488    <!-- ====================================================================== -->
489    <!-- Permissions for accessing user's calendar                              -->
490    <!-- ====================================================================== -->
491    <eat-comment />
492
493    <!-- Used for runtime permissions related to user's calendar. -->
494    <permission-group android:name="android.permission-group.CALENDAR"
495        android:icon="@drawable/perm_group_calendar"
496        android:label="@string/permgrouplab_calendar"
497        android:description="@string/permgroupdesc_calendar"
498        android:priority="200" />
499
500    <!-- Allows an application to read the user's calendar data.
501         <p>Protection level: dangerous
502    -->
503    <permission android:name="android.permission.READ_CALENDAR"
504        android:permissionGroup="android.permission-group.CALENDAR"
505        android:label="@string/permlab_readCalendar"
506        android:description="@string/permdesc_readCalendar"
507        android:protectionLevel="dangerous" />
508
509    <!-- Allows an application to write the user's calendar data.
510         <p>Protection level: dangerous
511    -->
512    <permission android:name="android.permission.WRITE_CALENDAR"
513        android:permissionGroup="android.permission-group.CALENDAR"
514        android:label="@string/permlab_writeCalendar"
515        android:description="@string/permdesc_writeCalendar"
516        android:protectionLevel="dangerous" />
517
518    <!-- ====================================================================== -->
519    <!-- Permissions for accessing and modifying user's SMS messages            -->
520    <!-- ====================================================================== -->
521    <eat-comment />
522
523    <!-- Used for runtime permissions related to user's SMS messages. -->
524    <permission-group android:name="android.permission-group.SMS"
525        android:icon="@drawable/perm_group_sms"
526        android:label="@string/permgrouplab_sms"
527        android:description="@string/permgroupdesc_sms"
528        android:priority="300" />
529
530    <!-- Allows an application to send SMS messages.
531         <p>Protection level: dangerous
532    -->
533    <permission android:name="android.permission.SEND_SMS"
534        android:permissionGroup="android.permission-group.SMS"
535        android:label="@string/permlab_sendSms"
536        android:description="@string/permdesc_sendSms"
537        android:permissionFlags="costsMoney"
538        android:protectionLevel="dangerous" />
539
540    <!-- Allows an application to receive SMS messages.
541         <p>Protection level: dangerous
542    -->
543    <permission android:name="android.permission.RECEIVE_SMS"
544        android:permissionGroup="android.permission-group.SMS"
545        android:label="@string/permlab_receiveSms"
546        android:description="@string/permdesc_receiveSms"
547        android:protectionLevel="dangerous"/>
548
549    <!-- Allows an application to read SMS messages.
550         <p>Protection level: dangerous
551    -->
552    <permission android:name="android.permission.READ_SMS"
553        android:permissionGroup="android.permission-group.SMS"
554        android:label="@string/permlab_readSms"
555        android:description="@string/permdesc_readSms"
556        android:protectionLevel="dangerous" />
557
558    <!-- Allows an application to receive WAP push messages.
559         <p>Protection level: dangerous
560    -->
561    <permission android:name="android.permission.RECEIVE_WAP_PUSH"
562        android:permissionGroup="android.permission-group.SMS"
563        android:label="@string/permlab_receiveWapPush"
564        android:description="@string/permdesc_receiveWapPush"
565        android:protectionLevel="dangerous" />
566
567    <!-- Allows an application to monitor incoming MMS messages.
568        <p>Protection level: dangerous
569    -->
570    <permission android:name="android.permission.RECEIVE_MMS"
571        android:permissionGroup="android.permission-group.SMS"
572        android:label="@string/permlab_receiveMms"
573        android:description="@string/permdesc_receiveMms"
574        android:protectionLevel="dangerous" />
575
576    <!-- Allows an application to read previously received cell broadcast
577         messages and to register a content observer to get notifications when
578         a cell broadcast has been received and added to the database. For
579         emergency alerts, the database is updated immediately after the
580         alert dialog and notification sound/vibration/speech are presented.
581         The "read" column is then updated after the user dismisses the alert.
582         This enables supplementary emergency assistance apps to start loading
583         additional emergency information (if Internet access is available)
584         when the alert is first received, and to delay presenting the info
585         to the user until after the initial alert dialog is dismissed.
586         <p>Protection level: dangerous
587         @hide Pending API council approval -->
588    <permission android:name="android.permission.READ_CELL_BROADCASTS"
589        android:permissionGroup="android.permission-group.SMS"
590        android:label="@string/permlab_readCellBroadcasts"
591        android:description="@string/permdesc_readCellBroadcasts"
592        android:protectionLevel="dangerous" />
593
594    <!-- ====================================================================== -->
595    <!-- Permissions for accessing external storage                             -->
596    <!-- ====================================================================== -->
597    <eat-comment />
598
599    <!-- Used for runtime permissions related to the shared external storage. -->
600    <permission-group android:name="android.permission-group.STORAGE"
601        android:icon="@drawable/perm_group_storage"
602        android:label="@string/permgrouplab_storage"
603        android:description="@string/permgroupdesc_storage"
604        android:priority="900" />
605
606    <!-- Allows an application to read from external storage.
607     <p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly
608     granted this permission.</p>
609     <p>This permission is enforced starting in API level 19.  Before API level 19, this
610     permission is not enforced and all apps still have access to read from external storage.
611     You can test your app with the permission enforced by enabling <em>Protect USB
612     storage</em> under Developer options in the Settings app on a device running Android 4.1 or
613     higher.</p>
614     <p>Also starting in API level 19, this permission is <em>not</em> required to
615     read/write files in your application-specific directories returned by
616     {@link android.content.Context#getExternalFilesDir} and
617     {@link android.content.Context#getExternalCacheDir}.
618     <p class="note"><strong>Note:</strong> If <em>both</em> your <a
619     href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
620     minSdkVersion}</a> and <a
621     href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
622     targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
623     grants your app this permission. If you don't need this permission, be sure your <a
624     href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
625     targetSdkVersion}</a> is 4 or higher.
626     <p>Protection level: dangerous
627     -->
628    <permission android:name="android.permission.READ_EXTERNAL_STORAGE"
629        android:permissionGroup="android.permission-group.STORAGE"
630        android:label="@string/permlab_sdcardRead"
631        android:description="@string/permdesc_sdcardRead"
632        android:protectionLevel="dangerous" />
633
634    <!-- Allows an application to write to external storage.
635         <p class="note"><strong>Note:</strong> If <em>both</em> your <a
636         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
637         minSdkVersion}</a> and <a
638         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
639         targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
640         grants your app this permission. If you don't need this permission, be sure your <a
641         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
642         targetSdkVersion}</a> is 4 or higher.
643         <p>Starting in API level 19, this permission is <em>not</em> required to
644         read/write files in your application-specific directories returned by
645         {@link android.content.Context#getExternalFilesDir} and
646         {@link android.content.Context#getExternalCacheDir}.
647         <p>Protection level: dangerous
648    -->
649    <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE"
650        android:permissionGroup="android.permission-group.STORAGE"
651        android:label="@string/permlab_sdcardWrite"
652        android:description="@string/permdesc_sdcardWrite"
653        android:protectionLevel="dangerous" />
654
655    <!-- ====================================================================== -->
656    <!-- Permissions for accessing the device location                          -->
657    <!-- ====================================================================== -->
658    <eat-comment />
659
660    <!-- Used for permissions that allow accessing the device location. -->
661    <permission-group android:name="android.permission-group.LOCATION"
662        android:icon="@drawable/perm_group_location"
663        android:label="@string/permgrouplab_location"
664        android:description="@string/permgroupdesc_location"
665        android:priority="400" />
666
667    <!-- Allows an app to access precise location.
668         <p>Protection level: dangerous
669    -->
670    <permission android:name="android.permission.ACCESS_FINE_LOCATION"
671        android:permissionGroup="android.permission-group.LOCATION"
672        android:label="@string/permlab_accessFineLocation"
673        android:description="@string/permdesc_accessFineLocation"
674        android:protectionLevel="dangerous" />
675
676    <!-- Allows an app to access approximate location.
677         <p>Protection level: dangerous
678    -->
679    <permission android:name="android.permission.ACCESS_COARSE_LOCATION"
680        android:permissionGroup="android.permission-group.LOCATION"
681        android:label="@string/permlab_accessCoarseLocation"
682        android:description="@string/permdesc_accessCoarseLocation"
683        android:protectionLevel="dangerous" />
684
685    <!-- ====================================================================== -->
686    <!-- Permissions for accessing the device telephony                         -->
687    <!-- ====================================================================== -->
688    <eat-comment />
689
690    <!-- Used for permissions that are associated telephony features. -->
691    <permission-group android:name="android.permission-group.PHONE"
692        android:icon="@drawable/perm_group_phone_calls"
693        android:label="@string/permgrouplab_phone"
694        android:description="@string/permgroupdesc_phone"
695        android:priority="500" />
696
697    <!-- Allows read only access to phone state.
698         <p class="note"><strong>Note:</strong> If <em>both</em> your <a
699         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
700         minSdkVersion}</a> and <a
701         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
702         targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
703         grants your app this permission. If you don't need this permission, be sure your <a
704         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
705         targetSdkVersion}</a> is 4 or higher.
706         <p>Protection level: dangerous
707    -->
708    <permission android:name="android.permission.READ_PHONE_STATE"
709        android:permissionGroup="android.permission-group.PHONE"
710        android:label="@string/permlab_readPhoneState"
711        android:description="@string/permdesc_readPhoneState"
712        android:protectionLevel="dangerous" />
713
714    <!-- Allows an application to initiate a phone call without going through
715        the Dialer user interface for the user to confirm the call.
716        <p>Protection level: dangerous
717    -->
718    <permission android:name="android.permission.CALL_PHONE"
719        android:permissionGroup="android.permission-group.PHONE"
720        android:permissionFlags="costsMoney"
721        android:label="@string/permlab_callPhone"
722        android:description="@string/permdesc_callPhone"
723        android:protectionLevel="dangerous" />
724
725    <!-- Allows an application to access the IMS call service: making and
726         modifying a call
727        <p>Protection level: signature|privileged
728        @hide
729    -->
730    <permission android:name="android.permission.ACCESS_IMS_CALL_SERVICE"
731        android:permissionGroup="android.permission-group.PHONE"
732        android:label="@string/permlab_accessImsCallService"
733        android:description="@string/permdesc_accessImsCallService"
734        android:protectionLevel="signature|privileged" />
735
736    <!-- Allows an application to read the user's call log.
737         <p class="note"><strong>Note:</strong> If your app uses the
738         {@link #READ_CONTACTS} permission and <em>both</em> your <a
739         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
740         minSdkVersion}</a> and <a
741         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
742         targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
743         grants your app this permission. If you don't need this permission, be sure your <a
744         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
745         targetSdkVersion}</a> is 16 or higher.</p>
746         <p>Protection level: dangerous
747    -->
748    <permission android:name="android.permission.READ_CALL_LOG"
749        android:permissionGroup="android.permission-group.PHONE"
750        android:label="@string/permlab_readCallLog"
751        android:description="@string/permdesc_readCallLog"
752        android:protectionLevel="dangerous" />
753
754    <!-- Allows an application to write (but not read) the user's
755         call log data.
756         <p class="note"><strong>Note:</strong> If your app uses the
757         {@link #WRITE_CONTACTS} permission and <em>both</em> your <a
758         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
759         minSdkVersion}</a> and <a
760         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
761         targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
762         grants your app this permission. If you don't need this permission, be sure your <a
763         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
764         targetSdkVersion}</a> is 16 or higher.</p>
765         <p>Protection level: dangerous
766    -->
767    <permission android:name="android.permission.WRITE_CALL_LOG"
768        android:permissionGroup="android.permission-group.PHONE"
769        android:label="@string/permlab_writeCallLog"
770        android:description="@string/permdesc_writeCallLog"
771        android:protectionLevel="dangerous" />
772
773    <!-- Allows an application to add voicemails into the system.
774         <p>Protection level: dangerous
775    -->
776    <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL"
777        android:permissionGroup="android.permission-group.PHONE"
778        android:label="@string/permlab_addVoicemail"
779        android:description="@string/permdesc_addVoicemail"
780        android:protectionLevel="dangerous" />
781
782    <!-- Allows an application to use SIP service.
783         <p>Protection level: dangerous
784    -->
785    <permission android:name="android.permission.USE_SIP"
786        android:permissionGroup="android.permission-group.PHONE"
787        android:description="@string/permdesc_use_sip"
788        android:label="@string/permlab_use_sip"
789        android:protectionLevel="dangerous"/>
790
791    <!-- Allows an application to see the number being dialed during an outgoing
792         call with the option to redirect the call to a different number or
793         abort the call altogether.
794         <p>Protection level: dangerous
795    -->
796    <permission android:name="android.permission.PROCESS_OUTGOING_CALLS"
797        android:permissionGroup="android.permission-group.PHONE"
798        android:label="@string/permlab_processOutgoingCalls"
799        android:description="@string/permdesc_processOutgoingCalls"
800        android:protectionLevel="dangerous" />
801
802    <!-- ====================================================================== -->
803    <!-- Permissions for accessing the device microphone                        -->
804    <!-- ====================================================================== -->
805    <eat-comment />
806
807    <!-- Used for permissions that are associated with accessing
808         microphone audio from the device. Note that phone calls also capture audio
809         but are in a separate (more visible) permission group. -->
810    <permission-group android:name="android.permission-group.MICROPHONE"
811        android:icon="@drawable/perm_group_microphone"
812        android:label="@string/permgrouplab_microphone"
813        android:description="@string/permgroupdesc_microphone"
814        android:priority="600" />
815
816    <!-- Allows an application to record audio.
817         <p>Protection level: dangerous
818    -->
819    <permission android:name="android.permission.RECORD_AUDIO"
820        android:permissionGroup="android.permission-group.MICROPHONE"
821        android:label="@string/permlab_recordAudio"
822        android:description="@string/permdesc_recordAudio"
823        android:protectionLevel="dangerous"/>
824
825    <!-- ====================================================================== -->
826    <!-- Permissions for accessing the device camera                            -->
827    <!-- ====================================================================== -->
828    <eat-comment />
829
830    <!-- Used for permissions that are associated with accessing
831     camera or capturing images/video from the device. -->
832    <permission-group android:name="android.permission-group.CAMERA"
833        android:icon="@drawable/perm_group_camera"
834        android:label="@string/permgrouplab_camera"
835        android:description="@string/permgroupdesc_camera"
836        android:priority="700" />
837
838    <!-- Required to be able to access the camera device.
839         <p>This will automatically enforce the <a
840         href="{@docRoot}guide/topics/manifest/uses-feature-element.html">
841         <uses-feature>}</a> manifest element for <em>all</em> camera features.
842         If you do not require all camera features or can properly operate if a camera
843         is not available, then you must modify your manifest as appropriate in order to
844         install on devices that don't support all camera features.</p>
845         <p>Protection level: dangerous
846    -->
847    <permission android:name="android.permission.CAMERA"
848        android:permissionGroup="android.permission-group.CAMERA"
849        android:label="@string/permlab_camera"
850        android:description="@string/permdesc_camera"
851        android:protectionLevel="dangerous" />
852
853
854    <!-- ====================================================================== -->
855    <!-- Permissions for accessing the device sensors                           -->
856    <!-- ====================================================================== -->
857    <eat-comment />
858
859    <!-- Used for permissions that are associated with accessing
860         camera or capturing images/video from the device. -->
861    <permission-group android:name="android.permission-group.SENSORS"
862        android:icon="@drawable/perm_group_sensors"
863        android:label="@string/permgrouplab_sensors"
864        android:description="@string/permgroupdesc_sensors"
865        android:priority="800" />
866
867    <!-- Allows an application to access data from sensors that the user uses to
868         measure what is happening inside his/her body, such as heart rate.
869         <p>Protection level: dangerous -->
870    <permission android:name="android.permission.BODY_SENSORS"
871        android:permissionGroup="android.permission-group.SENSORS"
872        android:label="@string/permlab_bodySensors"
873        android:description="@string/permdesc_bodySensors"
874        android:protectionLevel="dangerous" />
875
876    <!-- Allows an app to use fingerprint hardware.
877         <p>Protection level: normal
878    -->
879    <permission android:name="android.permission.USE_FINGERPRINT"
880        android:permissionGroup="android.permission-group.SENSORS"
881        android:label="@string/permlab_useFingerprint"
882        android:description="@string/permdesc_useFingerprint"
883        android:protectionLevel="normal" />
884
885    <!-- ====================================================================== -->
886    <!-- REMOVED PERMISSIONS                                                    -->
887    <!-- ====================================================================== -->
888
889    <!-- @hide We need to keep this around for backwards compatibility -->
890    <permission android:name="android.permission.READ_PROFILE"
891        android:protectionLevel="normal"
892        android:permissionFlags="hidden"/>
893
894    <!-- @hide We need to keep this around for backwards compatibility -->
895    <permission android:name="android.permission.WRITE_PROFILE"
896        android:protectionLevel="normal"
897        android:permissionFlags="hidden"/>
898
899    <!-- @hide We need to keep this around for backwards compatibility -->
900    <permission android:name="android.permission.READ_SOCIAL_STREAM"
901        android:protectionLevel="normal"
902        android:permissionFlags="hidden"/>
903
904    <!-- @hide We need to keep this around for backwards compatibility -->
905    <permission android:name="android.permission.WRITE_SOCIAL_STREAM"
906        android:protectionLevel="normal"
907        android:permissionFlags="hidden"/>
908
909    <!-- @hide We need to keep this around for backwards compatibility -->
910    <permission android:name="android.permission.READ_USER_DICTIONARY"
911        android:protectionLevel="normal"
912        android:permissionFlags="hidden"/>
913
914    <!-- @hide We need to keep this around for backwards compatibility -->
915    <permission android:name="android.permission.WRITE_USER_DICTIONARY"
916        android:protectionLevel="normal"
917        android:permissionFlags="hidden"/>
918
919    <!-- @hide We need to keep this around for backwards compatibility -->
920    <permission android:name="android.permission.WRITE_SMS"
921        android:protectionLevel="normal"
922        android:permissionFlags="hidden"/>
923
924    <!-- @hide We need to keep this around for backwards compatibility -->
925    <permission android:name="com.android.browser.permission.READ_HISTORY_BOOKMARKS"
926        android:protectionLevel="normal"
927        android:permissionFlags="hidden"/>
928
929    <!-- @hide We need to keep this around for backwards compatibility -->
930    <permission android:name="com.android.browser.permission.WRITE_HISTORY_BOOKMARKS"
931        android:protectionLevel="normal"
932        android:permissionFlags="hidden"/>
933
934    <!-- @hide We need to keep this around for backwards compatibility -->
935    <permission android:name="android.permission.AUTHENTICATE_ACCOUNTS"
936        android:protectionLevel="normal"
937        android:permissionFlags="hidden"/>
938
939    <!-- @hide We need to keep this around for backwards compatibility -->
940    <permission android:name="android.permission.MANAGE_ACCOUNTS"
941        android:protectionLevel="normal"
942        android:permissionFlags="hidden"/>
943
944    <!-- @hide We need to keep this around for backwards compatibility -->
945    <permission android:name="android.permission.USE_CREDENTIALS"
946        android:protectionLevel="normal"
947        android:permissionFlags="hidden"/>
948
949    <!-- @hide We need to keep this around for backwards compatibility -->
950    <permission android:name="android.permission.SUBSCRIBED_FEEDS_READ"
951        android:protectionLevel="normal"
952        android:permissionFlags="hidden"/>
953
954    <!-- @hide We need to keep this around for backwards compatibility -->
955    <permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE"
956        android:protectionLevel="normal"
957        android:permissionFlags="hidden"/>
958
959    <!-- @hide We need to keep this around for backwards compatibility -->
960    <permission android:name="android.permission.FLASHLIGHT"
961        android:protectionLevel="normal"
962        android:permissionFlags="hidden"/>
963
964    <!-- ====================================================================== -->
965    <!-- INSTALL PERMISSIONS                                                    -->
966    <!-- ====================================================================== -->
967
968`   <!-- =========================================== -->
969    <!-- Permissions for accessing contact metadata -->
970    <!-- =========================================== -->
971    <eat-comment />
972
973    <!-- @SystemApi Allows an application to read/write contact metadata.
974         <p>Not for use by third-party applications. -->
975    <permission android:name="android.permission.READ_WRITE_CONTACT_METADATA"
976        android:protectionLevel="signature|system" />
977
978    <!-- ================================== -->
979    <!-- Permissions for accessing messages -->
980    <!-- ================================== -->
981    <eat-comment />
982
983    <!-- @SystemApi Allows an application (Phone) to send a request to other applications
984         to handle the respond-via-message action during incoming calls.
985         <p>Not for use by third-party applications. -->
986    <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE"
987        android:protectionLevel="signature|privileged" />
988
989    <!-- Allows an application to filter carrier specific sms.
990         @hide -->
991    <permission android:name="android.permission.CARRIER_FILTER_SMS"
992        android:protectionLevel="signature|privileged" />
993
994    <!-- @SystemApi Allows an application to receive emergency cell broadcast messages,
995         to record or display them to the user.
996         <p>Not for use by third-party applications. -->
997    <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST"
998        android:protectionLevel="signature|privileged" />
999
1000    <!-- Allows an application to monitor incoming Bluetooth MAP messages, to record
1001         or perform processing on them. -->
1002    <!-- @hide -->
1003    <permission android:name="android.permission.RECEIVE_BLUETOOTH_MAP"
1004        android:protectionLevel="signature|privileged" />
1005
1006    <!-- @SystemApi @hide Allows an application to execute contacts directory search.
1007         This should only be used by ContactsProvider.
1008         <p>Not for use by third-party applications. -->
1009    <permission android:name="android.permission.BIND_DIRECTORY_SEARCH"
1010        android:protectionLevel="signature|privileged" />
1011
1012    <!-- @SystemApi @hide Allows an application to modify cell broadcasts through the content provider.
1013         <p>Not for use by third-party applications. -->
1014    <permission android:name="android.permission.MODIFY_CELL_BROADCASTS"
1015                android:protectionLevel="signature|privileged" />
1016
1017    <!-- =============================================================== -->
1018    <!-- Permissions for setting the device alarm                        -->
1019    <!-- =============================================================== -->
1020    <eat-comment />
1021
1022    <!-- Allows an application to broadcast an Intent to set an alarm for the user.
1023         <p>Protection level: normal
1024    -->
1025    <permission android:name="com.android.alarm.permission.SET_ALARM"
1026        android:label="@string/permlab_setAlarm"
1027        android:description="@string/permdesc_setAlarm"
1028        android:protectionLevel="normal" />
1029
1030    <!-- =============================================================== -->
1031    <!-- Permissions for accessing the user voicemail                    -->
1032    <!-- =============================================================== -->
1033    <eat-comment />
1034
1035    <!-- Allows an application to modify and remove existing voicemails in the system
1036        <p>Protection level: signature|privileged
1037    -->
1038    <permission android:name="com.android.voicemail.permission.WRITE_VOICEMAIL"
1039        android:protectionLevel="signature|privileged" />
1040
1041    <!-- Allows an application to read voicemails in the system.
1042         <p>Protection level: signature|privileged
1043    -->
1044    <permission android:name="com.android.voicemail.permission.READ_VOICEMAIL"
1045        android:protectionLevel="signature|privileged" />
1046
1047    <!-- ======================================= -->
1048    <!-- Permissions for accessing location info -->
1049    <!-- ======================================= -->
1050    <eat-comment />
1051
1052    <!-- Allows an application to access extra location provider commands
1053         <p>Protection level: normal
1054    -->
1055    <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS"
1056        android:label="@string/permlab_accessLocationExtraCommands"
1057        android:description="@string/permdesc_accessLocationExtraCommands"
1058        android:protectionLevel="normal" />
1059
1060    <!-- @SystemApi Allows an application to install a location provider into the Location Manager.
1061    <p>Not for use by third-party applications. -->
1062    <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER"
1063        android:protectionLevel="signature|privileged" />
1064
1065    <!-- @SystemApi @hide Allows HDMI-CEC service to access device and configuration files.
1066         This should only be used by HDMI-CEC service.
1067    -->
1068    <permission android:name="android.permission.HDMI_CEC"
1069        android:protectionLevel="signature|privileged" />
1070
1071    <!-- @SystemApi Allows an application to use location features in hardware,
1072         such as the geofencing api.
1073         <p>Not for use by third-party applications. -->
1074    <permission android:name="android.permission.LOCATION_HARDWARE"
1075        android:protectionLevel="signature|privileged" />
1076    <uses-permission android:name="android.permission.LOCATION_HARDWARE"/>
1077
1078    <!-- @SystemApi Allows an application to create mock location providers for testing.
1079         <p>Protection level: signature
1080         @hide
1081    -->
1082    <permission android:name="android.permission.ACCESS_MOCK_LOCATION"
1083        android:protectionLevel="signature" />
1084
1085    <!-- ======================================= -->
1086    <!-- Permissions for accessing networks -->
1087    <!-- ======================================= -->
1088    <eat-comment />
1089
1090    <!-- Allows applications to open network sockets.
1091         <p>Protection level: normal
1092    -->
1093    <permission android:name="android.permission.INTERNET"
1094        android:description="@string/permdesc_createNetworkSockets"
1095        android:label="@string/permlab_createNetworkSockets"
1096        android:protectionLevel="normal" />
1097
1098    <!-- Allows applications to access information about networks
1099         <p>Protection level: normal
1100    -->
1101    <permission android:name="android.permission.ACCESS_NETWORK_STATE"
1102        android:description="@string/permdesc_accessNetworkState"
1103        android:label="@string/permlab_accessNetworkState"
1104        android:protectionLevel="normal" />
1105
1106    <!-- Allows applications to access information about Wi-Fi networks.
1107         <p>Protection level: normal
1108    -->
1109    <permission android:name="android.permission.ACCESS_WIFI_STATE"
1110        android:description="@string/permdesc_accessWifiState"
1111        android:label="@string/permlab_accessWifiState"
1112        android:protectionLevel="normal" />
1113
1114    <!-- Allows applications to change Wi-Fi connectivity state.
1115         <p>Protection level: normal
1116    -->
1117    <permission android:name="android.permission.CHANGE_WIFI_STATE"
1118        android:description="@string/permdesc_changeWifiState"
1119        android:label="@string/permlab_changeWifiState"
1120        android:protectionLevel="normal" />
1121
1122    <!-- @SystemApi @hide Allows applications to read Wi-Fi credential.
1123         <p>Not for use by third-party applications. -->
1124    <permission android:name="android.permission.READ_WIFI_CREDENTIAL"
1125        android:protectionLevel="signature|privileged" />
1126
1127    <!-- @SystemApi @hide Allows applications to change tether state and run
1128         tether carrier provisioning.
1129         <p>Not for use by third-party applications. -->
1130    <permission android:name="android.permission.TETHER_PRIVILEGED"
1131        android:protectionLevel="signature|privileged" />
1132
1133    <!-- @SystemApi @hide Allow system apps to receive broadcast
1134         when a wifi network credential is changed.
1135         <p>Not for use by third-party applications. -->
1136    <permission android:name="android.permission.RECEIVE_WIFI_CREDENTIAL_CHANGE"
1137        android:protectionLevel="signature|privileged" />
1138
1139    <!-- @SystemApi @hide Allows an application to modify any wifi configuration, even if created
1140     by another application. Once reconfigured the original creator cannot make any further
1141     modifications.
1142     <p>Not for use by third-party applications. -->
1143    <permission android:name="android.permission.OVERRIDE_WIFI_CONFIG"
1144        android:protectionLevel="signature|privileged" />
1145
1146    <!-- @hide -->
1147    <permission android:name="android.permission.ACCESS_WIMAX_STATE"
1148        android:description="@string/permdesc_accessWimaxState"
1149        android:label="@string/permlab_accessWimaxState"
1150        android:protectionLevel="normal" />
1151
1152    <!-- @hide -->
1153    <permission android:name="android.permission.CHANGE_WIMAX_STATE"
1154        android:description="@string/permdesc_changeWimaxState"
1155        android:label="@string/permlab_changeWimaxState"
1156        android:protectionLevel="normal" />
1157
1158    <!-- Allows applications to act as network scorers. @hide @SystemApi-->
1159    <permission android:name="android.permission.SCORE_NETWORKS"
1160        android:protectionLevel="signature|privileged" />
1161
1162    <!-- ======================================= -->
1163    <!-- Permissions for short range, peripheral networks -->
1164    <!-- ======================================= -->
1165    <eat-comment />
1166
1167    <!-- Allows applications to connect to paired bluetooth devices.
1168         <p>Protection level: normal
1169    -->
1170    <permission android:name="android.permission.BLUETOOTH"
1171        android:description="@string/permdesc_bluetooth"
1172        android:label="@string/permlab_bluetooth"
1173        android:protectionLevel="normal" />
1174
1175    <!-- Allows applications to discover and pair bluetooth devices.
1176         <p>Protection level: normal
1177    -->
1178    <permission android:name="android.permission.BLUETOOTH_ADMIN"
1179        android:description="@string/permdesc_bluetoothAdmin"
1180        android:label="@string/permlab_bluetoothAdmin"
1181        android:protectionLevel="normal" />
1182
1183    <!-- @SystemApi Allows applications to pair bluetooth devices without user interaction, and to
1184         allow or disallow phonebook access or message access.
1185         This is not available to third party applications. -->
1186    <permission android:name="android.permission.BLUETOOTH_PRIVILEGED"
1187        android:protectionLevel="signature|privileged" />
1188
1189    <!-- Control access to email providers exclusively for Bluetooth
1190         @hide
1191    -->
1192    <permission android:name="android.permission.BLUETOOTH_MAP"
1193        android:protectionLevel="signature" />
1194
1195    <!-- Allows bluetooth stack to access files
1196         @hide This should only be used by Bluetooth apk.
1197    -->
1198    <permission android:name="android.permission.BLUETOOTH_STACK"
1199        android:protectionLevel="signature" />
1200
1201    <!-- Allows applications to perform I/O operations over NFC.
1202         <p>Protection level: normal
1203    -->
1204    <permission android:name="android.permission.NFC"
1205        android:description="@string/permdesc_nfc"
1206        android:label="@string/permlab_nfc"
1207        android:protectionLevel="normal" />
1208
1209    <!-- @SystemApi Allows an internal user to use privileged ConnectivityManager APIs.
1210         @hide -->
1211    <permission android:name="android.permission.CONNECTIVITY_INTERNAL"
1212        android:protectionLevel="signature|privileged" />
1213
1214    <!-- Allows a system application to access hardware packet offload capabilities.
1215         @hide -->
1216    <permission android:name="android.permission.PACKET_KEEPALIVE_OFFLOAD"
1217        android:protectionLevel="signature|privileged" />
1218
1219    <!-- @SystemApi
1220         @hide -->
1221    <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE"
1222        android:protectionLevel="signature|privileged" />
1223
1224    <!-- @SystemApi Allows access to the loop radio (Android@Home mesh network) device.
1225         @hide -->
1226    <permission android:name="android.permission.LOOP_RADIO"
1227        android:protectionLevel="signature|privileged" />
1228
1229    <!-- Allows sending and receiving handover transfer status from Wifi and Bluetooth
1230         @hide -->
1231    <permission android:name="android.permission.NFC_HANDOVER_STATUS"
1232        android:protectionLevel="signature|privileged" />
1233
1234    <!-- ================================== -->
1235    <!-- Permissions for accessing accounts -->
1236    <!-- ================================== -->
1237    <eat-comment />
1238
1239    <!-- Allows access to the list of accounts in the Accounts Service.
1240        <p>Protection level: normal
1241    -->
1242    <permission android:name="android.permission.GET_ACCOUNTS"
1243        android:permissionGroup="android.permission-group.CONTACTS"
1244        android:protectionLevel="dangerous"
1245        android:description="@string/permdesc_getAccounts"
1246        android:label="@string/permlab_getAccounts" />
1247
1248    <!-- @SystemApi Allows applications to call into AccountAuthenticators.
1249    <p>Not for use by third-party applications. -->
1250    <permission android:name="android.permission.ACCOUNT_MANAGER"
1251        android:protectionLevel="signature" />
1252
1253    <!-- ================================== -->
1254    <!-- Permissions for accessing hardware that may effect battery life-->
1255    <!-- ================================== -->
1256    <eat-comment />
1257
1258    <!-- Allows applications to enter Wi-Fi Multicast mode.
1259         <p>Protection level: normal
1260    -->
1261    <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE"
1262        android:description="@string/permdesc_changeWifiMulticastState"
1263        android:label="@string/permlab_changeWifiMulticastState"
1264        android:protectionLevel="normal" />
1265
1266    <!-- Allows access to the vibrator.
1267         <p>Protection level: normal
1268    -->
1269    <permission android:name="android.permission.VIBRATE"
1270        android:label="@string/permlab_vibrate"
1271        android:description="@string/permdesc_vibrate"
1272        android:protectionLevel="normal" />
1273
1274    <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen
1275         from dimming.
1276         <p>Protection level: normal
1277    -->
1278    <permission android:name="android.permission.WAKE_LOCK"
1279        android:label="@string/permlab_wakeLock"
1280        android:description="@string/permdesc_wakeLock"
1281        android:protectionLevel="normal" />
1282
1283    <!-- Allows using the device's IR transmitter, if available.
1284         <p>Protection level: normal
1285    -->
1286    <permission android:name="android.permission.TRANSMIT_IR"
1287        android:label="@string/permlab_transmitIr"
1288        android:description="@string/permdesc_transmitIr"
1289        android:protectionLevel="normal" />
1290
1291    <!-- ==================================================== -->
1292    <!-- Permissions related to changing audio settings   -->
1293    <!-- ==================================================== -->
1294    <eat-comment />
1295
1296    <!-- Allows an application to modify global audio settings.
1297         <p>Protection level: normal
1298    -->
1299    <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS"
1300        android:label="@string/permlab_modifyAudioSettings"
1301        android:description="@string/permdesc_modifyAudioSettings"
1302        android:protectionLevel="normal" />
1303
1304    <!-- ================================== -->
1305    <!-- Permissions for accessing hardware -->
1306    <!-- ================================== -->
1307    <eat-comment />
1308
1309    <!-- @SystemApi Allows an application to manage preferences and permissions for USB devices
1310         @hide -->
1311    <permission android:name="android.permission.MANAGE_USB"
1312        android:protectionLevel="signature|privileged" />
1313
1314    <!-- @SystemApi Allows an application to access the MTP USB kernel driver.
1315         For use only by the device side MTP implementation.
1316         @hide -->
1317    <permission android:name="android.permission.ACCESS_MTP"
1318        android:protectionLevel="signature|privileged" />
1319
1320    <!-- @SystemApi Allows access to hardware peripherals.  Intended only for hardware testing.
1321         <p>Not for use by third-party applications.
1322         @hide
1323    -->
1324    <permission android:name="android.permission.HARDWARE_TEST"
1325        android:protectionLevel="signature" />
1326
1327    <!-- @SystemApi Allows access to FM
1328         @hide This is not a third-party API (intended for system apps).-->
1329    <permission android:name="android.permission.ACCESS_FM_RADIO"
1330        android:protectionLevel="signature|privileged" />
1331
1332    <!-- Allows access to configure network interfaces, configure/use IPSec, etc.
1333         @hide -->
1334    <permission android:name="android.permission.NET_ADMIN"
1335        android:protectionLevel="signature" />
1336
1337    <!-- Allows registration for remote audio playback. @hide -->
1338    <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK"
1339        android:protectionLevel="signature" />
1340
1341    <!-- @SystemApi Allows TvInputService to access underlying TV input hardware such as
1342         built-in tuners and HDMI-in's.
1343         @hide This should only be used by OEM's TvInputService's.
1344    -->
1345    <permission android:name="android.permission.TV_INPUT_HARDWARE"
1346        android:protectionLevel="signature|privileged" />
1347
1348    <!-- @SystemApi Allows to capture a frame of TV input hardware such as
1349         built-in tuners and HDMI-in's.
1350         @hide <p>Not for use by third-party applications.
1351    -->
1352    <permission android:name="android.permission.CAPTURE_TV_INPUT"
1353        android:protectionLevel="signature|privileged" />
1354
1355    <!-- @hide Allows TvInputService to access DVB device.
1356   <p>Not for use by third-party applications. -->
1357    <permission android:name="android.permission.DVB_DEVICE"
1358        android:protectionLevel="signature|privileged" />
1359
1360    <!-- @hide Allows enabling/disabling OEM unlock
1361   <p>Not for use by third-party applications. -->
1362    <permission android:name="android.permission.OEM_UNLOCK_STATE"
1363        android:protectionLevel="signature" />
1364
1365    <!-- @hide Allows querying state of PersistentDataBlock
1366   <p>Not for use by third-party applications. -->
1367    <permission android:name="android.permission.ACCESS_PDB_STATE"
1368        android:protectionLevel="signature" />
1369
1370    <!-- @hide Allows system update service to notify device owner about pending updates.
1371   <p>Not for use by third-party applications. -->
1372    <permission android:name="android.permission.NOTIFY_PENDING_SYSTEM_UPDATE"
1373        android:protectionLevel="signature|privileged" />
1374
1375    <!-- =========================================== -->
1376    <!-- Permissions associated with camera and image capture -->
1377    <!-- =========================================== -->
1378    <eat-comment />
1379
1380    <!-- @SystemApi Allows disabling the transmit-indicator LED that is normally on when
1381         a camera is in use by an application.
1382         @hide -->
1383    <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED"
1384        android:protectionLevel="signature|privileged" />
1385
1386    <!-- Allows sending the camera service notifications about system-wide events.
1387        @hide -->
1388    <permission android:name="android.permission.CAMERA_SEND_SYSTEM_EVENTS"
1389        android:protectionLevel="signature|privileged" />
1390
1391    <!-- =========================================== -->
1392    <!-- Permissions associated with telephony state -->
1393    <!-- =========================================== -->
1394    <eat-comment />
1395
1396    <!-- @SystemApi Allows modification of the telephony state - power on, mmi, etc.
1397         Does not include placing calls.
1398         <p>Not for use by third-party applications. -->
1399    <permission android:name="android.permission.MODIFY_PHONE_STATE"
1400        android:protectionLevel="signature|privileged" />
1401
1402    <!-- Allows read only access to precise phone state.
1403         @hide Pending API council approval -->
1404    <permission android:name="android.permission.READ_PRECISE_PHONE_STATE"
1405        android:protectionLevel="signature|privileged" />
1406
1407    <!-- @SystemApi Allows read access to privileged phone state.
1408         @hide Used internally. -->
1409    <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE"
1410        android:protectionLevel="signature|privileged" />
1411
1412    <!-- @SystemApi Protects the ability to register any PhoneAccount with
1413         PhoneAccount#CAPABILITY_SIM_SUBSCRIPTION. This capability indicates that the PhoneAccount
1414         corresponds to a device SIM.
1415         @hide -->
1416    <permission android:name="android.permission.REGISTER_SIM_SUBSCRIPTION"
1417        android:protectionLevel="signature|privileged" />
1418
1419    <!-- @SystemApi Protects the ability to register any PhoneAccount with
1420         PhoneAccount#CAPABILITY_CALL_PROVIDER.
1421         @hide -->
1422    <permission android:name="android.permission.REGISTER_CALL_PROVIDER"
1423        android:protectionLevel="signature|privileged" />
1424
1425    <!-- @SystemApi Protects the ability to register any PhoneAccount with
1426         PhoneAccount#CAPABILITY_CONNECTION_MANAGER
1427         @hide -->
1428    <permission android:name="android.permission.REGISTER_CONNECTION_MANAGER"
1429        android:protectionLevel="signature|privileged" />
1430
1431    <!-- Must be required by a {@link android.telecom.InCallService},
1432         to ensure that only the system can bind to it.
1433         <p>Protection level: signature|privileged
1434    -->
1435    <permission android:name="android.permission.BIND_INCALL_SERVICE"
1436        android:protectionLevel="signature|privileged" />
1437
1438    <!-- Must be required by a {@link android.telecom.CallScreeningService},
1439         to ensure that only the system can bind to it.
1440         <p>Protection level: signature|privileged
1441    -->
1442    <permission android:name="android.permission.BIND_SCREENING_SERVICE"
1443        android:protectionLevel="signature|privileged" />
1444
1445    <!-- Must be required by a {@link android.telecom.ConnectionService},
1446         to ensure that only the system can bind to it.
1447         @deprecated {@link android.telecom.ConnectionService}s should require
1448                 android.permission.BIND_TELECOM_CONNECTION_SERVICE instead.
1449         @SystemApi
1450         @hide -->
1451    <permission android:name="android.permission.BIND_CONNECTION_SERVICE"
1452        android:protectionLevel="signature|privileged" />
1453
1454    <!-- Must be required by a {@link android.telecom.ConnectionService},
1455         to ensure that only the system can bind to it.
1456         <p>Protection level: signature|privileged
1457    -->
1458    <permission android:name="android.permission.BIND_TELECOM_CONNECTION_SERVICE"
1459        android:protectionLevel="signature|privileged" />
1460
1461    <!-- @SystemApi Allows an application to control the in-call experience.
1462         @hide -->
1463    <permission android:name="android.permission.CONTROL_INCALL_EXPERIENCE"
1464        android:protectionLevel="signature|privileged" />
1465
1466    <!-- Allows an application to receive STK related commands.
1467         @hide -->
1468    <permission android:name="android.permission.RECEIVE_STK_COMMANDS"
1469        android:protectionLevel="signature|privileged" />
1470
1471    <!-- ================================== -->
1472    <!-- Permissions for sdcard interaction -->
1473    <!-- ================================== -->
1474    <eat-comment />
1475
1476    <!-- @SystemApi Allows an application to write to internal media storage
1477         @hide  -->
1478    <permission android:name="android.permission.WRITE_MEDIA_STORAGE"
1479        android:protectionLevel="signature|privileged" />
1480
1481    <!-- Allows an application to manage access to documents, usually as part
1482         of a document picker.
1483         <p>Protection level: signature
1484    -->
1485    <permission android:name="android.permission.MANAGE_DOCUMENTS"
1486        android:protectionLevel="signature" />
1487
1488    <!-- ================================== -->
1489    <!-- Permissions for screenlock         -->
1490    <!-- ================================== -->
1491    <eat-comment />
1492
1493    <!-- Allows applications to disable the keyguard if it is not secure.
1494         <p>Protection level: normal
1495    -->
1496    <permission android:name="android.permission.DISABLE_KEYGUARD"
1497        android:description="@string/permdesc_disableKeyguard"
1498        android:label="@string/permlab_disableKeyguard"
1499        android:protectionLevel="normal" />
1500
1501    <!-- ================================== -->
1502    <!-- Permissions to access other installed applications  -->
1503    <!-- ================================== -->
1504    <eat-comment />
1505
1506    <!-- @deprecated No longer enforced. -->
1507    <permission android:name="android.permission.GET_TASKS"
1508        android:label="@string/permlab_getTasks"
1509        android:description="@string/permdesc_getTasks"
1510        android:protectionLevel="normal" />
1511
1512    <!-- New version of GET_TASKS that apps can request, since GET_TASKS doesn't really
1513         give access to task information.  We need this new one because there are
1514         many existing apps that use add libraries and such that have validation
1515         code to ensure the app has requested the GET_TASKS permission by seeing
1516         if it has been granted the permission...  if it hasn't, it kills the app
1517         with a message about being upset.  So we need to have it continue to look
1518         like the app is getting that permission, even though it will never be
1519         checked, and new privileged apps can now request this one for real access.
1520         @hide
1521         @SystemApi -->
1522    <permission android:name="android.permission.REAL_GET_TASKS"
1523        android:protectionLevel="signature|privileged" />
1524
1525    <!-- Allows an application to start a task from a ActivityManager#RecentTaskInfo.
1526         @hide -->
1527    <permission android:name="android.permission.START_TASKS_FROM_RECENTS"
1528        android:protectionLevel="signature|privileged" />
1529
1530    <!-- @SystemApi @hide Allows an application to call APIs that allow it to do interactions
1531         across the users on the device, using singleton services and
1532         user-targeted broadcasts.  This permission is not available to
1533         third party applications. -->
1534    <permission android:name="android.permission.INTERACT_ACROSS_USERS"
1535        android:protectionLevel="signature|privileged|development" />
1536
1537    <!-- @hide Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS}
1538         that removes restrictions on where broadcasts can be sent and allows other
1539         types of interactions. -->
1540    <permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL"
1541        android:protectionLevel="signature|installer" />
1542
1543    <!-- @SystemApi @hide Allows an application to call APIs that allow it to query and manage
1544         users on the device. This permission is not available to
1545         third party applications. -->
1546    <permission android:name="android.permission.MANAGE_USERS"
1547        android:protectionLevel="signature|privileged" />
1548
1549    <!-- @hide Allows an application to set the profile owners and the device owner.
1550         This permission is not available to third party applications.-->
1551    <permission android:name="android.permission.MANAGE_PROFILE_AND_DEVICE_OWNERS"
1552        android:protectionLevel="signature"
1553        android:label="@string/permlab_manageProfileAndDeviceOwners"
1554        android:description="@string/permdesc_manageProfileAndDeviceOwners" />
1555
1556    <!-- Allows an application to get full detailed information about
1557         recently running tasks, with full fidelity to the real state.
1558         @hide -->
1559    <permission android:name="android.permission.GET_DETAILED_TASKS"
1560        android:protectionLevel="signature" />
1561
1562    <!-- Allows an application to change the Z-order of tasks.
1563         <p>Protection level: normal
1564    -->
1565    <permission android:name="android.permission.REORDER_TASKS"
1566        android:label="@string/permlab_reorderTasks"
1567        android:description="@string/permdesc_reorderTasks"
1568        android:protectionLevel="normal" />
1569
1570    <!-- @hide Allows an application to change to remove/kill tasks -->
1571    <permission android:name="android.permission.REMOVE_TASKS"
1572        android:protectionLevel="signature" />
1573
1574    <!-- @SystemApi @hide Allows an application to create/manage/remove stacks -->
1575    <permission android:name="android.permission.MANAGE_ACTIVITY_STACKS"
1576        android:protectionLevel="signature|privileged" />
1577
1578    <!-- Allows an application to start any activity, regardless of permission
1579         protection or exported state.
1580         @hide -->
1581    <permission android:name="android.permission.START_ANY_ACTIVITY"
1582        android:protectionLevel="signature" />
1583
1584    <!-- @deprecated The {@link android.app.ActivityManager#restartPackage}
1585        API is no longer supported. -->
1586    <permission android:name="android.permission.RESTART_PACKAGES"
1587        android:label="@string/permlab_killBackgroundProcesses"
1588        android:description="@string/permdesc_killBackgroundProcesses"
1589        android:protectionLevel="normal" />
1590
1591    <!-- Allows an application to call
1592        {@link android.app.ActivityManager#killBackgroundProcesses}.
1593         <p>Protection level: normal
1594    -->
1595    <permission android:name="android.permission.KILL_BACKGROUND_PROCESSES"
1596        android:label="@string/permlab_killBackgroundProcesses"
1597        android:description="@string/permdesc_killBackgroundProcesses"
1598        android:protectionLevel="normal" />
1599
1600    <!-- @SystemApi @hide Allows an application to query process states and current
1601         OOM adjustment scores.
1602         <p>Not for use by third-party applications. -->
1603    <permission android:name="android.permission.GET_PROCESS_STATE_AND_OOM_SCORE"
1604        android:protectionLevel="signature|privileged|development" />
1605
1606    <!-- @SystemApi @hide Allows an application to retrieve a package's importance.
1607         This permission is not available to third party applications. -->
1608    <permission android:name="android.permission.GET_PACKAGE_IMPORTANCE"
1609        android:protectionLevel="signature|privileged" />
1610
1611    <!-- ================================== -->
1612    <!-- Permissions affecting the display of other applications  -->
1613    <!-- ================================== -->
1614    <eat-comment />
1615
1616    <!-- Allows an application to open windows using the type
1617         {@link android.view.WindowManager.LayoutParams#TYPE_SYSTEM_ALERT},
1618         shown on top of all other applications.  Very few applications
1619         should use this permission; these windows are intended for
1620         system-level interaction with the user. -->
1621    <permission android:name="android.permission.SYSTEM_ALERT_WINDOW"
1622        android:label="@string/permlab_systemAlertWindow"
1623        android:description="@string/permdesc_systemAlertWindow"
1624        android:protectionLevel="signature|preinstalled|appop|pre23|development" />
1625
1626    <!-- ================================== -->
1627    <!-- Permissions affecting the system wallpaper -->
1628    <!-- ================================== -->
1629    <eat-comment />
1630
1631    <!-- Allows applications to set the wallpaper.
1632         <p>Protection level: normal
1633     -->
1634    <permission android:name="android.permission.SET_WALLPAPER"
1635        android:label="@string/permlab_setWallpaper"
1636        android:description="@string/permdesc_setWallpaper"
1637        android:protectionLevel="normal" />
1638
1639    <!-- Allows applications to set the wallpaper hints.
1640         <p>Protection level: normal
1641    -->
1642    <permission android:name="android.permission.SET_WALLPAPER_HINTS"
1643        android:label="@string/permlab_setWallpaperHints"
1644        android:description="@string/permdesc_setWallpaperHints"
1645        android:protectionLevel="normal" />
1646
1647    <!-- ============================================ -->
1648    <!-- Permissions for changing the system clock -->
1649    <!-- ============================================ -->
1650    <eat-comment />
1651
1652    <!-- @SystemApi Allows applications to set the system time.
1653    <p>Not for use by third-party applications. -->
1654    <permission android:name="android.permission.SET_TIME"
1655        android:protectionLevel="signature|privileged" />
1656
1657    <!-- Allows applications to set the system time zone.
1658         <p>Protection level: normal
1659    -->
1660    <permission android:name="android.permission.SET_TIME_ZONE"
1661        android:label="@string/permlab_setTimeZone"
1662        android:description="@string/permdesc_setTimeZone"
1663        android:protectionLevel="normal" />
1664
1665    <!-- ==================================================== -->
1666    <!-- Permissions related to changing status bar   -->
1667    <!-- ==================================================== -->
1668    <eat-comment />
1669
1670    <!-- Allows an application to expand or collapse the status bar.
1671         <p>Protection level: normal
1672    -->
1673    <permission android:name="android.permission.EXPAND_STATUS_BAR"
1674        android:label="@string/permlab_expandStatusBar"
1675        android:description="@string/permdesc_expandStatusBar"
1676        android:protectionLevel="normal" />
1677
1678    <!-- ============================================================== -->
1679    <!-- Permissions related to adding/removing shortcuts from Launcher -->
1680    <!-- ============================================================== -->
1681    <eat-comment />
1682
1683    <!-- Allows an application to install a shortcut in Launcher.
1684         <p>Protection level: normal
1685    -->
1686    <permission android:name="com.android.launcher.permission.INSTALL_SHORTCUT"
1687        android:label="@string/permlab_install_shortcut"
1688        android:description="@string/permdesc_install_shortcut"
1689        android:protectionLevel="normal"/>
1690
1691    <!-- Allows an application to uninstall a shortcut in Launcher.
1692         <p>Protection level: normal
1693    -->
1694    <permission android:name="com.android.launcher.permission.UNINSTALL_SHORTCUT"
1695        android:label="@string/permlab_uninstall_shortcut"
1696        android:description="@string/permdesc_uninstall_shortcut"
1697        android:protectionLevel="normal"/>
1698
1699    <!-- ==================================================== -->
1700    <!-- Permissions related to accessing sync settings   -->
1701    <!-- ==================================================== -->
1702    <eat-comment />
1703
1704    <!-- Allows applications to read the sync settings.
1705         <p>Protection level: normal
1706    -->
1707    <permission android:name="android.permission.READ_SYNC_SETTINGS"
1708        android:description="@string/permdesc_readSyncSettings"
1709        android:label="@string/permlab_readSyncSettings"
1710        android:protectionLevel="normal" />
1711
1712    <!-- Allows applications to write the sync settings.
1713         <p>Protection level: normal
1714    -->
1715    <permission android:name="android.permission.WRITE_SYNC_SETTINGS"
1716        android:description="@string/permdesc_writeSyncSettings"
1717        android:label="@string/permlab_writeSyncSettings"
1718        android:protectionLevel="normal" />
1719
1720    <!-- Allows applications to read the sync stats.
1721         <p>Protection level: normal
1722    -->
1723    <permission android:name="android.permission.READ_SYNC_STATS"
1724        android:description="@string/permdesc_readSyncStats"
1725        android:label="@string/permlab_readSyncStats"
1726        android:protectionLevel="normal" />
1727
1728    <!-- ============================================ -->
1729    <!-- Permissions for low-level system interaction -->
1730    <!-- ============================================ -->
1731    <eat-comment />
1732
1733    <!-- @SystemApi @hide Change the screen compatibility mode of applications -->
1734    <permission android:name="android.permission.SET_SCREEN_COMPATIBILITY"
1735        android:protectionLevel="signature" />
1736
1737    <!-- @SystemApi Allows an application to modify the current configuration, such
1738         as locale. -->
1739    <permission android:name="android.permission.CHANGE_CONFIGURATION"
1740        android:protectionLevel="signature|privileged|development" />
1741
1742    <!-- Allows an application to read or write the system settings.
1743         <p>Protection level: signature
1744    -->
1745    <permission android:name="android.permission.WRITE_SETTINGS"
1746        android:label="@string/permlab_writeSettings"
1747        android:description="@string/permdesc_writeSettings"
1748        android:protectionLevel="signature|preinstalled|appop|pre23" />
1749
1750    <!-- @SystemApi Allows an application to modify the Google service map.
1751    <p>Not for use by third-party applications. -->
1752    <permission android:name="android.permission.WRITE_GSERVICES"
1753        android:protectionLevel="signature|privileged" />
1754
1755    <!-- @SystemApi Allows an application to call
1756        {@link android.app.ActivityManager#forceStopPackage}.
1757        @hide -->
1758    <permission android:name="android.permission.FORCE_STOP_PACKAGES"
1759        android:protectionLevel="signature|privileged" />
1760
1761    <!-- @SystemApi @hide Allows an application to retrieve the content of the active window
1762         An active window is the window that has fired an accessibility event. -->
1763    <permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT"
1764        android:protectionLevel="signature|privileged" />
1765
1766    <!-- @SystemApi Modify the global animation scaling factor.
1767    <p>Not for use by third-party applications. -->
1768    <permission android:name="android.permission.SET_ANIMATION_SCALE"
1769        android:protectionLevel="signature|privileged|development" />
1770
1771    <!-- @deprecated This functionality will be removed in the future; please do
1772         not use. Allow an application to make its activities persistent. -->
1773    <permission android:name="android.permission.PERSISTENT_ACTIVITY"
1774        android:label="@string/permlab_persistentActivity"
1775        android:description="@string/permdesc_persistentActivity"
1776        android:protectionLevel="normal" />
1777
1778    <!-- Allows an application to find out the space used by any package.
1779         <p>Protection level: normal
1780    -->
1781    <permission android:name="android.permission.GET_PACKAGE_SIZE"
1782        android:label="@string/permlab_getPackageSize"
1783        android:description="@string/permdesc_getPackageSize"
1784        android:protectionLevel="normal" />
1785
1786    <!-- @deprecated No longer useful, see
1787         {@link android.content.pm.PackageManager#addPackageToPreferred}
1788         for details. -->
1789    <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS"
1790        android:protectionLevel="signature" />
1791
1792    <!-- Allows an application to receive the
1793         {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is
1794         broadcast after the system finishes booting.  If you don't
1795         request this permission, you will not receive the broadcast at
1796         that time.  Though holding this permission does not have any
1797         security implications, it can have a negative impact on the
1798         user experience by increasing the amount of time it takes the
1799         system to start and allowing applications to have themselves
1800         running without the user being aware of them.  As such, you must
1801         explicitly declare your use of this facility to make that visible
1802         to the user.
1803         <p>Protection level: normal
1804    -->
1805    <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED"
1806        android:label="@string/permlab_receiveBootCompleted"
1807        android:description="@string/permdesc_receiveBootCompleted"
1808        android:protectionLevel="normal" />
1809
1810    <!-- Allows an application to broadcast sticky intents.  These are
1811         broadcasts whose data is held by the system after being finished,
1812         so that clients can quickly retrieve that data without having
1813         to wait for the next broadcast.
1814         <p>Protection level: normal
1815    -->
1816    <permission android:name="android.permission.BROADCAST_STICKY"
1817        android:label="@string/permlab_broadcastSticky"
1818        android:description="@string/permdesc_broadcastSticky"
1819        android:protectionLevel="normal" />
1820
1821    <!-- @SystemApi Allows mounting and unmounting file systems for removable storage.
1822    <p>Not for use by third-party applications.-->
1823    <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS"
1824        android:protectionLevel="signature|privileged" />
1825
1826    <!-- @SystemApi Allows formatting file systems for removable storage.
1827    <p>Not for use by third-party applications. -->
1828    <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS"
1829        android:protectionLevel="signature|privileged" />
1830
1831    <!-- @hide -->
1832    <permission android:name="android.permission.STORAGE_INTERNAL"
1833        android:protectionLevel="signature" />
1834
1835    <!-- Allows access to ASEC non-destructive API calls
1836         @hide  -->
1837    <permission android:name="android.permission.ASEC_ACCESS"
1838        android:protectionLevel="signature" />
1839
1840    <!-- Allows creation of ASEC volumes
1841         @hide  -->
1842    <permission android:name="android.permission.ASEC_CREATE"
1843        android:protectionLevel="signature" />
1844
1845    <!-- Allows destruction of ASEC volumes
1846         @hide  -->
1847    <permission android:name="android.permission.ASEC_DESTROY"
1848        android:protectionLevel="signature" />
1849
1850    <!-- Allows mount / unmount of ASEC volumes
1851         @hide  -->
1852    <permission android:name="android.permission.ASEC_MOUNT_UNMOUNT"
1853        android:protectionLevel="signature" />
1854
1855    <!-- Allows rename of ASEC volumes
1856         @hide  -->
1857    <permission android:name="android.permission.ASEC_RENAME"
1858        android:protectionLevel="signature" />
1859
1860    <!-- @SystemApi Allows applications to write the apn settings.
1861    <p>Not for use by third-party applications. -->
1862    <permission android:name="android.permission.WRITE_APN_SETTINGS"
1863        android:protectionLevel="signature|privileged" />
1864
1865    <!-- Allows applications to change network connectivity state.
1866         <p>Protection level: normal
1867    -->
1868    <permission android:name="android.permission.CHANGE_NETWORK_STATE"
1869        android:description="@string/permdesc_changeNetworkState"
1870        android:label="@string/permlab_changeNetworkState"
1871        android:protectionLevel="normal" />
1872
1873    <!-- Allows an application to clear the caches of all installed
1874         applications on the device.
1875         <p>Protection level: system|signature
1876    -->
1877    <permission android:name="android.permission.CLEAR_APP_CACHE"
1878        android:protectionLevel="signature|privileged" />
1879
1880    <!-- @SystemApi Allows an application to use any media decoder when decoding for playback
1881         @hide -->
1882    <permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK"
1883        android:protectionLevel="signature|privileged" />
1884
1885    <!-- @SystemApi Allows an application to install and/or uninstall CA certificates on
1886         behalf of the user.
1887         @hide -->
1888    <permission android:name="android.permission.MANAGE_CA_CERTIFICATES"
1889        android:protectionLevel="signature|privileged" />
1890
1891    <!-- @SystemApi Allows an application to do certain operations needed for
1892         interacting with the recovery (system update) system.
1893         @hide -->
1894    <permission android:name="android.permission.RECOVERY"
1895        android:protectionLevel="signature|privileged" />
1896
1897    <!-- Allows the system to bind to an application's task services
1898         @hide -->
1899    <permission android:name="android.permission.BIND_JOB_SERVICE"
1900        android:protectionLevel="signature" />
1901    <uses-permission android:name="android.permission.BIND_JOB_SERVICE"/>
1902
1903    <!-- Allows an application to initiate configuration updates
1904         <p>An application requesting this permission is responsible for
1905         verifying the source and integrity of any update before passing
1906         it off to the various individual installer components
1907         @hide -->
1908    <permission android:name="android.permission.UPDATE_CONFIG"
1909        android:protectionLevel="signature|privileged" />
1910
1911    <!-- ========================================= -->
1912    <!-- Permissions for special development tools -->
1913    <!-- ========================================= -->
1914    <eat-comment />
1915
1916    <!-- @SystemApi Allows an application to read or write the secure system settings.
1917    <p>Not for use by third-party applications. -->
1918    <permission android:name="android.permission.WRITE_SECURE_SETTINGS"
1919        android:protectionLevel="signature|privileged|development" />
1920
1921    <!-- @SystemApi Allows an application to retrieve state dump information from system services.
1922    <p>Not for use by third-party applications. -->
1923    <permission android:name="android.permission.DUMP"
1924        android:protectionLevel="signature|privileged|development" />
1925
1926    <!-- @SystemApi Allows an application to read the low-level system log files.
1927    <p>Not for use by third-party applications, because
1928    Log entries can contain the user's private information. -->
1929    <permission android:name="android.permission.READ_LOGS"
1930        android:protectionLevel="signature|privileged|development" />
1931
1932    <!-- @SystemApi Configure an application for debugging.
1933    <p>Not for use by third-party applications. -->
1934    <permission android:name="android.permission.SET_DEBUG_APP"
1935        android:protectionLevel="signature|privileged|development" />
1936
1937    <!-- @SystemApi Allows an application to set the maximum number of (not needed)
1938         application processes that can be running.
1939         <p>Not for use by third-party applications. -->
1940    <permission android:name="android.permission.SET_PROCESS_LIMIT"
1941        android:protectionLevel="signature|privileged|development" />
1942
1943    <!-- @SystemApi Allows an application to control whether activities are immediately
1944         finished when put in the background.
1945         <p>Not for use by third-party applications. -->
1946    <permission android:name="android.permission.SET_ALWAYS_FINISH"
1947        android:protectionLevel="signature|privileged|development" />
1948
1949    <!-- @SystemApi Allow an application to request that a signal be sent to all persistent processes.
1950    <p>Not for use by third-party applications. -->
1951    <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES"
1952        android:protectionLevel="signature|privileged|development" />
1953
1954    <!-- ==================================== -->
1955    <!-- Private permissions                  -->
1956    <!-- ==================================== -->
1957    <eat-comment />
1958
1959    <!-- @SystemApi Allows access to the list of accounts in the Accounts Service. -->
1960    <permission android:name="android.permission.GET_ACCOUNTS_PRIVILEGED"
1961        android:protectionLevel="signature|privileged" />
1962
1963    <!-- @SystemApi Allows applications to RW to diagnostic resources.
1964    <p>Not for use by third-party applications. -->
1965    <permission android:name="android.permission.DIAGNOSTIC"
1966        android:protectionLevel="signature" />
1967
1968    <!-- @SystemApi Allows an application to open, close, or disable the status bar
1969         and its icons.
1970         <p>Not for use by third-party applications. -->
1971    <permission android:name="android.permission.STATUS_BAR"
1972        android:protectionLevel="signature|privileged" />
1973
1974    <!-- Allows an application to be the status bar.  Currently used only by SystemUI.apk
1975    @hide -->
1976    <permission android:name="android.permission.STATUS_BAR_SERVICE"
1977        android:protectionLevel="signature" />
1978
1979    <!-- Allows an application to bind to third party quick settings tiles.
1980         <p>Should only be requested by the System, should be required by
1981         TileService declarations.-->
1982    <permission android:name="android.permission.BIND_QUICK_SETTINGS_TILE"
1983        android:protectionLevel="signature" />
1984
1985    <!-- @SystemApi Allows an application to force a BACK operation on whatever is the
1986         top activity.
1987         <p>Not for use by third-party applications.
1988         @hide
1989    -->
1990    <permission android:name="android.permission.FORCE_BACK"
1991        android:protectionLevel="signature" />
1992
1993    <!-- @SystemApi Allows an application to update device statistics.
1994    <p>Not for use by third-party applications. -->
1995    <permission android:name="android.permission.UPDATE_DEVICE_STATS"
1996        android:protectionLevel="signature|privileged" />
1997
1998    <!-- @SystemApi @hide Allows an application to collect battery statistics -->
1999    <permission android:name="android.permission.GET_APP_OPS_STATS"
2000        android:protectionLevel="signature|privileged|development" />
2001
2002    <!-- @SystemApi Allows an application to update application operation statistics. Not for
2003         use by third party apps. @hide -->
2004    <permission android:name="android.permission.UPDATE_APP_OPS_STATS"
2005        android:protectionLevel="signature|privileged|installer" />
2006
2007    <!-- Allows an application to update the user app op restrictions.
2008         Not for use by third party apps.
2009         @hide -->
2010    <permission android:name="android.permission.MANAGE_APP_OPS_RESTRICTIONS"
2011        android:protectionLevel="signature|installer" />
2012
2013    <!-- @SystemApi Allows an application to open windows that are for use by parts
2014         of the system user interface.
2015         <p>Not for use by third-party applications.
2016         @hide
2017    -->
2018    <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW"
2019        android:protectionLevel="signature" />
2020
2021    <!-- @SystemApi Allows an application to manage (create, destroy,
2022         Z-order) application tokens in the window manager.
2023         <p>Not for use by third-party applications.
2024         @hide
2025    -->
2026    <permission android:name="android.permission.MANAGE_APP_TOKENS"
2027        android:protectionLevel="signature" />
2028
2029    <!-- Allows System UI to register listeners for events from Window Manager.
2030         @hide -->
2031    <permission android:name="android.permission.REGISTER_WINDOW_MANAGER_LISTENERS"
2032        android:protectionLevel="signature" />
2033
2034    <!-- @hide Allows the application to temporarily freeze the screen for a
2035         full-screen transition. -->
2036    <permission android:name="android.permission.FREEZE_SCREEN"
2037        android:protectionLevel="signature" />
2038
2039    <!-- @SystemApi Allows an application to inject user events (keys, touch, trackball)
2040         into the event stream and deliver them to ANY window.  Without this
2041         permission, you can only deliver events to windows in your own process.
2042         <p>Not for use by third-party applications.
2043         @hide
2044    -->
2045    <permission android:name="android.permission.INJECT_EVENTS"
2046        android:protectionLevel="signature" />
2047
2048    <!-- @hide Allows an application to register an input filter which filters the stream
2049         of user events (keys, touch, trackball) before they are dispatched to any window. -->
2050    <permission android:name="android.permission.FILTER_EVENTS"
2051        android:protectionLevel="signature" />
2052
2053    <!-- @hide Allows an application to retrieve the window token from the accessibility manager. -->
2054    <permission android:name="android.permission.RETRIEVE_WINDOW_TOKEN"
2055        android:protectionLevel="signature" />
2056
2057    <!-- @hide Allows an application to collect frame statistics -->
2058    <permission android:name="android.permission.FRAME_STATS"
2059         android:protectionLevel="signature" />
2060
2061    <!-- @hide Allows an application to temporary enable accessibility on the device. -->
2062    <permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY"
2063        android:protectionLevel="signature" />
2064
2065    <!-- @SystemApi Allows an application to watch and control how activities are
2066         started globally in the system.  Only for is in debugging
2067         (usually the monkey command).
2068         <p>Not for use by third-party applications.
2069         @hide
2070    -->
2071    <permission android:name="android.permission.SET_ACTIVITY_WATCHER"
2072        android:protectionLevel="signature" />
2073
2074    <!-- @SystemApi Allows an application to call the activity manager shutdown() API
2075         to put the higher-level system there into a shutdown state.
2076         @hide -->
2077    <permission android:name="android.permission.SHUTDOWN"
2078        android:protectionLevel="signature|privileged" />
2079
2080    <!-- @SystemApi Allows an application to tell the activity manager to temporarily
2081         stop application switches, putting it into a special mode that
2082         prevents applications from immediately switching away from some
2083         critical UI such as the home screen.
2084         @hide -->
2085    <permission android:name="android.permission.STOP_APP_SWITCHES"
2086        android:protectionLevel="signature|privileged" />
2087
2088    <!-- @SystemApi Allows an application to retrieve private information about
2089         the current top activity, such as any assist context it can provide.
2090         <p>Not for use by third-party applications.
2091         @hide
2092    -->
2093    <permission android:name="android.permission.GET_TOP_ACTIVITY_INFO"
2094        android:protectionLevel="signature" />
2095
2096    <!-- Allows an application to retrieve the current state of keys and
2097         switches.
2098         <p>Not for use by third-party applications.
2099         @deprecated The API that used this permission has been removed. -->
2100    <permission android:name="android.permission.READ_INPUT_STATE"
2101        android:protectionLevel="signature" />
2102
2103    <!-- Must be required by an {@link android.inputmethodservice.InputMethodService},
2104         to ensure that only the system can bind to it.
2105         <p>Protection level: signature
2106    -->
2107    <permission android:name="android.permission.BIND_INPUT_METHOD"
2108        android:protectionLevel="signature" />
2109
2110    <!-- Must be required by an {@link android.media.midi.MidiDeviceService},
2111         to ensure that only the system can bind to it.
2112         <p>Protection level: signature
2113    -->
2114    <permission android:name="android.permission.BIND_MIDI_DEVICE_SERVICE"
2115        android:protectionLevel="signature" />
2116
2117    <!-- Must be required by an {@link android.accessibilityservice.AccessibilityService},
2118         to ensure that only the system can bind to it.
2119         <p>Protection level: signature
2120    -->
2121    <permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE"
2122        android:protectionLevel="signature" />
2123
2124    <!-- Must be required by a {@link android.printservice.PrintService},
2125         to ensure that only the system can bind to it.
2126         <p>Protection level: signature
2127    -->
2128    <permission android:name="android.permission.BIND_PRINT_SERVICE"
2129        android:protectionLevel="signature" />
2130
2131    <!-- Must be required by a {@link android.nfc.cardemulation.HostApduService}
2132         or {@link android.nfc.cardemulation.OffHostApduService} to ensure that only
2133         the system can bind to it.
2134         <p>Protection level: signature
2135    -->
2136    <permission android:name="android.permission.BIND_NFC_SERVICE"
2137        android:protectionLevel="signature" />
2138
2139    <!-- Must be required by the PrintSpooler to ensure that only the system can bind to it.
2140         @hide -->
2141    <permission android:name="android.permission.BIND_PRINT_SPOOLER_SERVICE"
2142        android:protectionLevel="signature" />
2143
2144    <!-- Must be required by a TextService (e.g. SpellCheckerService)
2145         to ensure that only the system can bind to it.
2146         <p>Protection level: signature
2147    -->
2148    <permission android:name="android.permission.BIND_TEXT_SERVICE"
2149        android:protectionLevel="signature" />
2150
2151    <!-- Must be required by a {@link android.net.VpnService},
2152         to ensure that only the system can bind to it.
2153         <p>Protection level: signature
2154    -->
2155    <permission android:name="android.permission.BIND_VPN_SERVICE"
2156        android:protectionLevel="signature" />
2157
2158    <!-- Must be required by a {@link android.service.wallpaper.WallpaperService},
2159         to ensure that only the system can bind to it.
2160         <p>Protection level: system|signature
2161    -->
2162    <permission android:name="android.permission.BIND_WALLPAPER"
2163        android:protectionLevel="signature|privileged" />
2164
2165    <!-- Must be required by a {@link android.service.voice.VoiceInteractionService},
2166         to ensure that only the system can bind to it.
2167         <p>Protection level: signature
2168    -->
2169    <permission android:name="android.permission.BIND_VOICE_INTERACTION"
2170        android:protectionLevel="signature" />
2171
2172    <!-- Must be required by hotword enrollment application,
2173         to ensure that only the system can interact with it.
2174         @hide <p>Not for use by third-party applications.</p> -->
2175    <permission android:name="android.permission.MANAGE_VOICE_KEYPHRASES"
2176        android:protectionLevel="signature|privileged" />
2177
2178    <!-- Must be required by a {@link com.android.media.remotedisplay.RemoteDisplayProvider},
2179         to ensure that only the system can bind to it.
2180         @hide -->
2181    <permission android:name="android.permission.BIND_REMOTE_DISPLAY"
2182        android:protectionLevel="signature" />
2183
2184    <!-- Must be required by a {@link android.media.tv.TvInputService}
2185         to ensure that only the system can bind to it.
2186         <p>Protection level: signature
2187    -->
2188    <permission android:name="android.permission.BIND_TV_INPUT"
2189        android:protectionLevel="signature|privileged" />
2190
2191    <!-- @SystemApi Allows an application to modify parental controls
2192         <p>Not for use by third-party applications.
2193         @hide -->
2194    <permission android:name="android.permission.MODIFY_PARENTAL_CONTROLS"
2195        android:protectionLevel="signature|privileged" />
2196
2197    <!-- Must be required by a {@link android.media.routing.MediaRouteService}
2198         to ensure that only the system can interact with it.
2199         @hide -->
2200    <permission android:name="android.permission.BIND_ROUTE_PROVIDER"
2201        android:protectionLevel="signature" />
2202
2203    <!-- Must be required by device administration receiver, to ensure that only the
2204         system can interact with it.
2205         <p>Protection level: signature
2206    -->
2207    <permission android:name="android.permission.BIND_DEVICE_ADMIN"
2208        android:protectionLevel="signature" />
2209
2210    <!-- @SystemApi Required to add or remove another application as a device admin.
2211         <p>Not for use by third-party applications.
2212         @hide -->
2213    <permission android:name="android.permission.MANAGE_DEVICE_ADMINS"
2214        android:protectionLevel="signature|privileged" />
2215
2216    <!-- @SystemApi Allows low-level access to setting the orientation (actually
2217         rotation) of the screen.
2218         <p>Not for use by third-party applications.
2219         @hide
2220    -->
2221    <permission android:name="android.permission.SET_ORIENTATION"
2222        android:protectionLevel="signature" />
2223
2224    <!-- @SystemApi Allows low-level access to setting the pointer speed.
2225         <p>Not for use by third-party applications.
2226         @hide
2227    -->
2228    <permission android:name="android.permission.SET_POINTER_SPEED"
2229        android:protectionLevel="signature" />
2230
2231    <!-- Allows low-level access to setting input device calibration.
2232         <p>Not for use by normal applications.
2233         @hide -->
2234    <permission android:name="android.permission.SET_INPUT_CALIBRATION"
2235        android:protectionLevel="signature" />
2236
2237    <!-- Allows low-level access to setting the keyboard layout.
2238         <p>Not for use by third-party applications.
2239         @hide -->
2240    <permission android:name="android.permission.SET_KEYBOARD_LAYOUT"
2241        android:protectionLevel="signature" />
2242
2243    <!-- Allows an application to query tablet mode state and monitor changes
2244         in it.
2245         <p>Not for use by third-party applications.
2246         @hide -->
2247    <permission android:name="android.permission.TABLET_MODE"
2248        android:protectionLevel="signature" />
2249
2250    <!-- Allows an application to request installing packages. Apps
2251         targeting APIs greater than 22 must hold this permission in
2252         order to use {@link android.content.Intent#ACTION_INSTALL_PACKAGE}.
2253         <p>Protection level: normal
2254    -->
2255    <permission android:name="android.permission.REQUEST_INSTALL_PACKAGES"
2256        android:label="@string/permlab_requestInstallPackages"
2257        android:description="@string/permdesc_requestInstallPackages"
2258        android:protectionLevel="normal" />
2259
2260    <!-- @SystemApi Allows an application to install packages.
2261    <p>Not for use by third-party applications. -->
2262    <permission android:name="android.permission.INSTALL_PACKAGES"
2263        android:protectionLevel="signature|privileged" />
2264
2265    <!-- @SystemApi Allows an application to clear user data.
2266         <p>Not for use by third-party applications
2267         @hide
2268    -->
2269    <permission android:name="android.permission.CLEAR_APP_USER_DATA"
2270        android:protectionLevel="signature|installer" />
2271
2272    <!-- @hide Allows an application to get the URI permissions
2273         granted to another application.
2274         <p>Not for use by third-party applications
2275    -->
2276    <permission android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS"
2277        android:protectionLevel="signature" />
2278
2279    <!-- @hide Allows an application to clear the URI permissions
2280         granted to another application.
2281         <p>Not for use by third-party applications
2282    -->
2283    <permission
2284        android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS"
2285        android:protectionLevel="signature" />
2286
2287    <!-- @SystemApi Allows an application to delete cache files.
2288    <p>Not for use by third-party applications. -->
2289    <permission android:name="android.permission.DELETE_CACHE_FILES"
2290        android:protectionLevel="signature|privileged" />
2291
2292    <!-- @SystemApi Allows an application to delete packages.
2293    <p>Not for use by third-party applications. -->
2294    <permission android:name="android.permission.DELETE_PACKAGES"
2295        android:protectionLevel="signature|privileged" />
2296
2297    <!-- @SystemApi Allows an application to move location of installed package.
2298         @hide -->
2299    <permission android:name="android.permission.MOVE_PACKAGE"
2300        android:protectionLevel="signature|privileged" />
2301
2302    <!-- @SystemApi Allows an application to change whether an application component (other than its own) is
2303         enabled or not.
2304         <p>Not for use by third-party applications. -->
2305    <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE"
2306        android:protectionLevel="signature|privileged" />
2307
2308    <!-- Allows an application to grant specific permissions.
2309         @hide -->
2310    <permission android:name="android.permission.GRANT_RUNTIME_PERMISSIONS"
2311        android:protectionLevel="signature|installer|verifier" />
2312
2313    <!-- Allows an app that has this permission and the permissions to install packages
2314         to request certain runtime permissions to be granted at installation.
2315         @hide
2316         @SystemApi -->
2317    <permission android:name="android.permission.INSTALL_GRANT_RUNTIME_PERMISSIONS"
2318        android:protectionLevel="signature|installer|verifier" />
2319
2320    <!-- Allows an application to revoke specific permissions.
2321        @hide
2322        @SystemApi -->
2323    <permission android:name="android.permission.REVOKE_RUNTIME_PERMISSIONS"
2324         android:protectionLevel="signature|installer|verifier" />
2325
2326    <!-- @hide Allows an application to observe permission changes. -->
2327    <permission android:name="android.permission.OBSERVE_GRANT_REVOKE_PERMISSIONS"
2328        android:protectionLevel="signature|privileged" />
2329
2330    <!-- @SystemApi Allows an application to use SurfaceFlinger's low level features.
2331         <p>Not for use by third-party applications.
2332         @hide
2333    -->
2334    <permission android:name="android.permission.ACCESS_SURFACE_FLINGER"
2335        android:protectionLevel="signature" />
2336
2337    <!-- @SystemApi Allows an application to take screen shots and more generally
2338         get access to the frame buffer data.
2339         <p>Not for use by third-party applications. -->
2340    <permission android:name="android.permission.READ_FRAME_BUFFER"
2341        android:protectionLevel="signature|privileged" />
2342
2343    <!-- Allows an application to use InputFlinger's low level features.
2344         @hide -->
2345    <permission android:name="android.permission.ACCESS_INPUT_FLINGER"
2346        android:protectionLevel="signature" />
2347
2348    <!-- Allows an application to configure and connect to Wifi displays
2349         @hide -->
2350    <permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY"
2351        android:protectionLevel="signature" />
2352
2353    <!-- Allows an application to control low-level features of Wifi displays
2354         such as opening an RTSP socket.  This permission should only be used
2355         by the display manager.
2356         @hide -->
2357    <permission android:name="android.permission.CONTROL_WIFI_DISPLAY"
2358        android:protectionLevel="signature" />
2359
2360    <!-- Allows an application to control the color transforms applied to
2361         displays system-wide.
2362         <p>Not for use by third-party applications.</p>
2363         @hide -->
2364    <permission android:name="android.permission.CONFIGURE_DISPLAY_COLOR_TRANSFORM"
2365        android:protectionLevel="signature" />
2366
2367    <!-- @SystemApi Allows an application to control VPN.
2368         <p>Not for use by third-party applications.</p>
2369         @hide -->
2370    <permission android:name="android.permission.CONTROL_VPN"
2371        android:protectionLevel="signature|privileged" />
2372    <uses-permission android:name="android.permission.CONTROL_VPN" />
2373
2374    <!-- @SystemApi Allows an application to capture audio output.
2375         <p>Not for use by third-party applications.</p> -->
2376    <permission android:name="android.permission.CAPTURE_AUDIO_OUTPUT"
2377        android:protectionLevel="signature|privileged" />
2378
2379    <!-- @SystemApi Allows an application to capture audio for hotword detection.
2380         <p>Not for use by third-party applications.</p>
2381         @hide -->
2382    <permission android:name="android.permission.CAPTURE_AUDIO_HOTWORD"
2383        android:protectionLevel="signature|privileged" />
2384
2385    <!-- @SystemApi Allows an application to modify audio routing and override policy decisions.
2386         <p>Not for use by third-party applications.</p>
2387         @hide -->
2388    <permission android:name="android.permission.MODIFY_AUDIO_ROUTING"
2389        android:protectionLevel="signature|privileged" />
2390
2391    <!-- @SystemApi Allows an application to capture video output.
2392         <p>Not for use by third-party applications.</p> -->
2393    <permission android:name="android.permission.CAPTURE_VIDEO_OUTPUT"
2394        android:protectionLevel="signature|privileged" />
2395
2396    <!-- @SystemApi Allows an application to capture secure video output.
2397         <p>Not for use by third-party applications.</p> -->
2398    <permission android:name="android.permission.CAPTURE_SECURE_VIDEO_OUTPUT"
2399        android:protectionLevel="signature|privileged" />
2400
2401    <!-- @SystemApi Allows an application to know what content is playing and control its playback.
2402         <p>Not for use by third-party applications due to privacy of media consumption</p>  -->
2403    <permission android:name="android.permission.MEDIA_CONTENT_CONTROL"
2404        android:protectionLevel="signature|privileged" />
2405
2406    <!-- @SystemApi Required to be able to disable the device (very dangerous!).
2407         <p>Not for use by third-party applications.
2408         @hide
2409    -->
2410    <permission android:name="android.permission.BRICK"
2411        android:protectionLevel="signature" />
2412
2413    <!-- @SystemApi Required to be able to reboot the device.
2414    <p>Not for use by third-party applications. -->
2415    <permission android:name="android.permission.REBOOT"
2416        android:protectionLevel="signature|privileged" />
2417
2418   <!-- @SystemApi Allows low-level access to power management.
2419        <p>Not for use by third-party applications.
2420        @hide
2421    -->
2422   <permission android:name="android.permission.DEVICE_POWER"
2423        android:protectionLevel="signature" />
2424
2425   <!-- Allows access to the PowerManager.userActivity function.
2426   <p>Not for use by third-party applications. @hide @SystemApi -->
2427    <permission android:name="android.permission.USER_ACTIVITY"
2428        android:protectionLevel="signature|privileged" />
2429
2430   <!-- @hide Allows low-level access to tun tap driver -->
2431    <permission android:name="android.permission.NET_TUNNELING"
2432        android:protectionLevel="signature" />
2433
2434    <!-- Run as a manufacturer test application, running as the root user.
2435         Only available when the device is running in manufacturer test mode.
2436         <p>Not for use by third-party applications.
2437    -->
2438    <permission android:name="android.permission.FACTORY_TEST"
2439        android:protectionLevel="signature" />
2440
2441    <!-- Allows an application to broadcast a notification that an application
2442         package has been removed.
2443         <p>Not for use by third-party applications.
2444    -->
2445    <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED"
2446        android:protectionLevel="signature" />
2447
2448    <!-- Allows an application to broadcast an SMS receipt notification.
2449         <p>Not for use by third-party applications.
2450    -->
2451    <permission android:name="android.permission.BROADCAST_SMS"
2452        android:protectionLevel="signature" />
2453
2454    <!-- Allows an application to broadcast a WAP PUSH receipt notification.
2455         <p>Not for use by third-party applications.
2456    -->
2457    <permission android:name="android.permission.BROADCAST_WAP_PUSH"
2458        android:protectionLevel="signature" />
2459
2460    <!-- @SystemApi Allows an application to broadcast privileged networking requests.
2461         <p>Not for use by third-party applications. @hide -->
2462    <permission android:name="android.permission.BROADCAST_NETWORK_PRIVILEGED"
2463        android:protectionLevel="signature|privileged" />
2464
2465    <!-- @SystemApi Not for use by third-party applications. -->
2466    <permission android:name="android.permission.MASTER_CLEAR"
2467        android:protectionLevel="signature|privileged" />
2468
2469    <!-- @SystemApi Allows an application to call any phone number, including emergency
2470         numbers, without going through the Dialer user interface for the user
2471         to confirm the call being placed.
2472         <p>Not for use by third-party applications. -->
2473    <permission android:name="android.permission.CALL_PRIVILEGED"
2474        android:protectionLevel="signature|privileged" />
2475
2476    <!-- @SystemApi Allows an application to perform CDMA OTA provisioning @hide -->
2477    <permission android:name="android.permission.PERFORM_CDMA_PROVISIONING"
2478        android:protectionLevel="signature|privileged" />
2479
2480    <!-- @SystemApi Allows an application to perform SIM Activation @hide -->
2481    <permission android:name="android.permission.PERFORM_SIM_ACTIVATION"
2482        android:protectionLevel="signature|privileged" />
2483
2484    <!-- @SystemApi Allows enabling/disabling location update notifications from
2485         the radio.
2486         <p>Not for use by third-party applications. -->
2487    <permission android:name="android.permission.CONTROL_LOCATION_UPDATES"
2488        android:protectionLevel="signature|privileged" />
2489
2490    <!-- @SystemApi Allows read/write access to the "properties" table in the checkin
2491         database, to change values that get uploaded.
2492         <p>Not for use by third-party applications. -->
2493    <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES"
2494        android:protectionLevel="signature|privileged" />
2495
2496    <!-- @SystemApi Allows an application to collect component usage
2497         statistics
2498         <p>Declaring the permission implies intention to use the API and the user of the
2499         device can grant permission through the Settings application. -->
2500    <permission android:name="android.permission.PACKAGE_USAGE_STATS"
2501        android:protectionLevel="signature|privileged|development|appop" />
2502    <uses-permission android:name="android.permission.PACKAGE_USAGE_STATS" />
2503
2504    <!-- @hide Allows an application to change the app idle state of an app.
2505         <p>Not for use by third-party applications. -->
2506    <permission android:name="android.permission.CHANGE_APP_IDLE_STATE"
2507        android:protectionLevel="signature" />
2508
2509    <!-- @hide @SystemApi Allows an application to temporarily whitelist an inactive app to
2510         access the network and acquire wakelocks.
2511         <p>Not for use by third-party applications. -->
2512    <permission android:name="android.permission.CHANGE_DEVICE_IDLE_TEMP_WHITELIST"
2513        android:protectionLevel="signature|privileged" />
2514
2515    <!-- Permission an application must hold in order to use
2516         {@link android.provider.Settings#ACTION_REQUEST_IGNORE_BATTERY_OPTIMIZATIONS}.
2517         This is a normal permission: an app requesting it will always be granted the
2518         permission, without the user needing to approve or see it. -->
2519    <permission android:name="android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS"
2520        android:protectionLevel="normal" />
2521
2522    <!-- @SystemApi Allows an application to collect battery statistics -->
2523    <permission android:name="android.permission.BATTERY_STATS"
2524        android:protectionLevel="signature|privileged|development" />
2525
2526    <!-- @SystemApi Allows an application to control the backup and restore process.
2527    <p>Not for use by third-party applications.
2528         @hide pending API council -->
2529    <permission android:name="android.permission.BACKUP"
2530        android:protectionLevel="signature|privileged" />
2531
2532    <!-- Allows a package to launch the secure full-backup confirmation UI.
2533         ONLY the system process may hold this permission.
2534         @hide -->
2535    <permission android:name="android.permission.CONFIRM_FULL_BACKUP"
2536        android:protectionLevel="signature" />
2537
2538    <!-- @SystemApi Must be required by a {@link android.widget.RemoteViewsService},
2539         to ensure that only the system can bind to it. -->
2540    <permission android:name="android.permission.BIND_REMOTEVIEWS"
2541        android:protectionLevel="signature|privileged" />
2542
2543    <!-- @SystemApi Allows an application to tell the AppWidget service which application
2544         can access AppWidget's data.  The normal user flow is that a user
2545         picks an AppWidget to go into a particular host, thereby giving that
2546         host application access to the private data from the AppWidget app.
2547         An application that has this permission should honor that contract.
2548         <p>Not for use by third-party applications. -->
2549    <permission android:name="android.permission.BIND_APPWIDGET"
2550        android:protectionLevel="signature|privileged" />
2551
2552    <!-- @SystemApi Private permission, to restrict who can bring up a dialog to add a new
2553         keyguard widget
2554         @hide -->
2555    <permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET"
2556        android:protectionLevel="signature|privileged" />
2557
2558    <!-- @SystemApi Internal permission allowing an application to query/set which
2559         applications can bind AppWidgets.
2560         @hide -->
2561    <permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS"
2562        android:protectionLevel="signature|privileged" />
2563
2564    <!-- Allows applications to change the background data setting.
2565    <p>Not for use by third-party applications.
2566         @hide pending API council -->
2567    <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING"
2568        android:protectionLevel="signature" />
2569
2570    <!-- @SystemApi This permission can be used on content providers to allow the global
2571         search system to access their data.  Typically it used when the
2572         provider has some permissions protecting it (which global search
2573         would not be expected to hold), and added as a read-only permission
2574         to the path in the provider where global search queries are
2575         performed.  This permission can not be held by regular applications;
2576         it is used by applications to protect themselves from everyone else
2577         besides global search. -->
2578    <permission android:name="android.permission.GLOBAL_SEARCH"
2579        android:protectionLevel="signature|privileged" />
2580
2581    <!-- Internal permission protecting access to the global search
2582         system: ensures that only the system can access the provider
2583         to perform queries (since this otherwise provides unrestricted
2584         access to a variety of content providers), and to write the
2585         search statistics (to keep applications from gaming the source
2586         ranking).
2587         @hide -->
2588    <permission android:name="android.permission.GLOBAL_SEARCH_CONTROL"
2589        android:protectionLevel="signature" />
2590
2591    <!-- @SystemApi Internal permission to allows an application to read indexable data.
2592        @hide -->
2593    <permission android:name="android.permission.READ_SEARCH_INDEXABLES"
2594        android:protectionLevel="signature|privileged" />
2595
2596    <!-- @SystemApi Allows applications to set a live wallpaper.
2597         @hide XXX Change to signature once the picker is moved to its
2598         own apk as Ghod Intended. -->
2599    <permission android:name="android.permission.SET_WALLPAPER_COMPONENT"
2600        android:protectionLevel="signature|privileged" />
2601
2602    <!-- @SystemApi Allows applications to read dream settings and dream state.
2603         @hide -->
2604    <permission android:name="android.permission.READ_DREAM_STATE"
2605        android:protectionLevel="signature|privileged" />
2606
2607    <!-- @SystemApi Allows applications to write dream settings, and start or stop dreaming.
2608         @hide -->
2609    <permission android:name="android.permission.WRITE_DREAM_STATE"
2610        android:protectionLevel="signature|privileged" />
2611
2612    <!-- @SystemApi Allow an application to read and write the cache partition.
2613         @hide -->
2614    <permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM"
2615        android:protectionLevel="signature|privileged" />
2616
2617    <!-- Must be required by default container service so that only
2618         the system can bind to it and use it to copy
2619         protected data to secure containers or files
2620         accessible to the system.
2621         @hide -->
2622    <permission android:name="android.permission.COPY_PROTECTED_DATA"
2623        android:protectionLevel="signature" />
2624
2625    <!-- @SystemApi Internal permission protecting access to the encryption methods
2626        @hide
2627    -->
2628    <permission android:name="android.permission.CRYPT_KEEPER"
2629        android:protectionLevel="signature|privileged" />
2630
2631    <!-- @SystemApi Allows an application to read historical network usage for
2632         specific networks and applications. @hide -->
2633    <permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY"
2634        android:protectionLevel="signature|privileged" />
2635
2636    <!-- Allows an application to manage network policies (such as warning and disable
2637         limits) and to define application-specific rules. @hide -->
2638    <permission android:name="android.permission.MANAGE_NETWORK_POLICY"
2639        android:protectionLevel="signature" />
2640
2641    <!-- @SystemApi Allows an application to account its network traffic against other UIDs. Used
2642         by system services like download manager and media server. Not for use by
2643         third party apps. @hide -->
2644    <permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING"
2645        android:protectionLevel="signature|privileged" />
2646
2647    <!-- C2DM permission.
2648         @hide Used internally.
2649     -->
2650    <permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"
2651          android:protectionLevel="signature" />
2652    <uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/>
2653
2654    <!-- @SystemApi @hide Package verifier needs to have this permission before the PackageManager will
2655         trust it to verify packages.
2656    -->
2657    <permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT"
2658        android:protectionLevel="signature|privileged" />
2659
2660    <!-- Must be required by package verifier receiver, to ensure that only the
2661         system can interact with it.
2662         @hide
2663    -->
2664    <permission android:name="android.permission.BIND_PACKAGE_VERIFIER"
2665        android:protectionLevel="signature" />
2666
2667    <!-- @SystemApi @hide Intent filter verifier needs to have this permission before the
2668         PackageManager will trust it to verify intent filters.
2669    -->
2670    <permission android:name="android.permission.INTENT_FILTER_VERIFICATION_AGENT"
2671        android:protectionLevel="signature|privileged" />
2672
2673    <!-- Must be required by intent filter verifier receiver, to ensure that only the
2674         system can interact with it.
2675         @hide
2676    -->
2677    <permission android:name="android.permission.BIND_INTENT_FILTER_VERIFIER"
2678        android:protectionLevel="signature" />
2679
2680    <!-- @SystemApi Allows applications to access serial ports via the SerialManager.
2681         @hide -->
2682    <permission android:name="android.permission.SERIAL_PORT"
2683        android:protectionLevel="signature|privileged" />
2684
2685    <!-- Allows the holder to access content providers from outside an ApplicationThread.
2686         This permission is enforced by the ActivityManagerService on the corresponding APIs,
2687         in particular ActivityManagerService#getContentProviderExternal(String) and
2688         ActivityManagerService#removeContentProviderExternal(String).
2689         @hide
2690    -->
2691    <permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY"
2692        android:protectionLevel="signature" />
2693
2694    <!-- @SystemApi Allows an application to hold an UpdateLock, recommending that a headless
2695         OTA reboot *not* occur while the lock is held.
2696         @hide -->
2697    <permission android:name="android.permission.UPDATE_LOCK"
2698        android:protectionLevel="signature|privileged" />
2699
2700    <!-- @SystemApi Allows an application to read the current set of notifications, including
2701         any metadata and intents attached.
2702         @hide -->
2703    <permission android:name="android.permission.ACCESS_NOTIFICATIONS"
2704        android:protectionLevel="signature|privileged" />
2705
2706    <!-- Marker permission for applications that wish to access notification policy.
2707         <p>Protection level: normal
2708    -->
2709    <permission android:name="android.permission.ACCESS_NOTIFICATION_POLICY"
2710        android:description="@string/permdesc_access_notification_policy"
2711        android:label="@string/permlab_access_notification_policy"
2712        android:protectionLevel="normal" />
2713
2714    <!-- Allows modification of do not disturb rules and policies. Only allowed for system
2715        processes.
2716        @hide -->
2717    <permission android:name="android.permission.MANAGE_NOTIFICATIONS"
2718                android:protectionLevel="signature" />
2719
2720    <!-- Allows access to keyguard secure storage.  Only allowed for system processes.
2721        @hide -->
2722    <permission android:name="android.permission.ACCESS_KEYGUARD_SECURE_STORAGE"
2723        android:protectionLevel="signature" />
2724
2725    <!-- Allows managing (adding, removing) fingerprint templates. Reserved for the system. @hide -->
2726    <permission android:name="android.permission.MANAGE_FINGERPRINT"
2727        android:protectionLevel="signature|privileged" />
2728
2729    <!-- Allows an app to reset fingerprint attempt counter. Reserved for the system. @hide -->
2730    <permission android:name="android.permission.RESET_FINGERPRINT_LOCKOUT"
2731        android:protectionLevel="signature" />
2732
2733    <!-- Allows an application to control keyguard.  Only allowed for system processes.
2734        @hide -->
2735    <permission android:name="android.permission.CONTROL_KEYGUARD"
2736        android:protectionLevel="signature" />
2737
2738    <!-- Allows an application to listen to trust changes.  Only allowed for system processes.
2739        @hide -->
2740    <permission android:name="android.permission.TRUST_LISTENER"
2741        android:protectionLevel="signature" />
2742
2743    <!-- @SystemApi Allows an application to provide a trust agent.
2744         @hide For security reasons, this is a platform-only permission. -->
2745    <permission android:name="android.permission.PROVIDE_TRUST_AGENT"
2746        android:protectionLevel="signature|privileged" />
2747
2748    <!-- Allows an application to launch the trust agent settings activity.
2749        @hide -->
2750    <permission android:name="android.permission.LAUNCH_TRUST_AGENT_SETTINGS"
2751        android:protectionLevel="signature|privileged" />
2752
2753    <!-- @SystemApi Must be required by an {@link
2754        android.service.trust.TrustAgentService},
2755        to ensure that only the system can bind to it.
2756        @hide -->
2757    <permission android:name="android.permission.BIND_TRUST_AGENT"
2758        android:protectionLevel="signature" />
2759
2760    <!-- Must be required by an {@link
2761         android.service.notification.NotificationListenerService},
2762         to ensure that only the system can bind to it.
2763         <p>Protection level: signature
2764    -->
2765    <permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE"
2766        android:protectionLevel="signature" />
2767
2768    <!-- Must be required by an {@link
2769         android.service.notification.NotificationAssistantService},
2770         to ensure that only the system can bind to it.
2771         <p>Protection level: signature
2772         @hide This is not a third-party API (intended for system apps). -->
2773    -->
2774    <permission android:name="android.permission.BIND_NOTIFICATION_ASSISTANT_SERVICE"
2775        android:protectionLevel="signature" />
2776
2777    <!-- Must be required by a {@link
2778         android.service.chooser.ChooserTargetService}, to ensure that
2779         only the system can bind to it.
2780         <p>Protection level: signature
2781    -->
2782    <permission android:name="android.permission.BIND_CHOOSER_TARGET_SERVICE"
2783        android:protectionLevel="signature" />
2784
2785    <!-- Must be required by a {@link
2786         android.service.notification.ConditionProviderService},
2787         to ensure that only the system can bind to it.
2788         <p>Protection level: signature
2789         -->
2790    <permission android:name="android.permission.BIND_CONDITION_PROVIDER_SERVICE"
2791        android:protectionLevel="signature" />
2792
2793    <!-- Must be required by an {@link android.service.dreams.DreamService},
2794         to ensure that only the system can bind to it.
2795         <p>Protection level: signature
2796    -->
2797    <permission android:name="android.permission.BIND_DREAM_SERVICE"
2798        android:protectionLevel="signature" />
2799
2800    <!-- @SystemApi Allows an application to call into a carrier setup flow. It is up to the
2801         carrier setup application to enforce that this permission is required
2802         @hide This is not a third-party API (intended for OEMs and system apps). -->
2803    <permission android:name="android.permission.INVOKE_CARRIER_SETUP"
2804        android:protectionLevel="signature|privileged" />
2805
2806    <!-- @SystemApi Allows an application to listen for network condition observations.
2807         @hide This is not a third-party API (intended for system apps). -->
2808    <permission android:name="android.permission.ACCESS_NETWORK_CONDITIONS"
2809        android:protectionLevel="signature|privileged" />
2810
2811    <!-- @SystemApi Allows an application to provision and access DRM certificates
2812         @hide This is not a third-party API (intended for system apps). -->
2813    <permission android:name="android.permission.ACCESS_DRM_CERTIFICATES"
2814        android:protectionLevel="signature|privileged" />
2815
2816    <!-- Api Allows an application to manage media projection sessions.
2817         @hide This is not a third-party API (intended for system apps). -->
2818    <permission android:name="android.permission.MANAGE_MEDIA_PROJECTION"
2819        android:protectionLevel="signature" />
2820
2821    <!-- @SystemApi Allows an application to read install sessions
2822         @hide This is not a third-party API (intended for system apps). -->
2823    <permission android:name="android.permission.READ_INSTALL_SESSIONS"
2824        android:label="@string/permlab_readInstallSessions"
2825        android:description="@string/permdesc_readInstallSessions"
2826        android:protectionLevel="normal"/>
2827
2828    <!-- @SystemApi Allows an application to remove DRM certificates
2829         @hide This is not a third-party API (intended for system apps). -->
2830    <permission android:name="android.permission.REMOVE_DRM_CERTIFICATES"
2831        android:protectionLevel="signature|privileged" />
2832
2833    <!-- @deprecated Use {@link android.Manifest.permission#BIND_CARRIER_SERVICES} instead -->
2834    <permission android:name="android.permission.BIND_CARRIER_MESSAGING_SERVICE"
2835        android:protectionLevel="signature|privileged" />
2836
2837    <!-- Allows an application to interact with the currently active
2838         {@link android.service.voice.VoiceInteractionService}.
2839         @hide -->
2840    <permission android:name="android.permission.ACCESS_VOICE_INTERACTION_SERVICE"
2841        android:protectionLevel="signature" />
2842
2843    <!-- The system process that is allowed to bind to services in carrier apps will
2844         have this permission. Carrier apps should use this permission to protect
2845         their services that only the system is allowed to bind to.
2846         <p>Protection level: system|signature
2847    -->
2848    <permission android:name="android.permission.BIND_CARRIER_SERVICES"
2849        android:label="@string/permlab_bindCarrierServices"
2850        android:description="@string/permdesc_bindCarrierServices"
2851        android:protectionLevel="signature|privileged" />
2852
2853    <!-- Allows an application to query whether DO_NOT_ASK_CREDENTIALS_ON_BOOT
2854         flag is set.
2855         @hide -->
2856    <permission android:name="android.permission.QUERY_DO_NOT_ASK_CREDENTIALS_ON_BOOT"
2857                android:protectionLevel="signature" />
2858
2859    <!-- Allows applications to kill UIDs.
2860        <p>Not for use by third-party applications.
2861         @hide -->
2862    <permission android:name="android.permission.KILL_UID"
2863                android:protectionLevel="signature|installer" />
2864
2865    <!-- @SystemApi Allows applications to read the local WiFi and Bluetooth MAC address.
2866        @hide -->
2867    <permission android:name="android.permission.LOCAL_MAC_ADDRESS"
2868                android:protectionLevel="signature|privileged" />
2869
2870    <!-- @SystemApi Allows access to MAC addresses of WiFi and Bluetooth peer devices.
2871        @hide -->
2872    <permission android:name="android.permission.PEERS_MAC_ADDRESS"
2873                android:protectionLevel="signature" />
2874
2875    <!-- Allows the Nfc stack to dispatch Nfc messages to applications. Applications
2876        can use this permission to ensure incoming Nfc messages are from the Nfc stack
2877        and not simulated by another application.
2878        @hide -->
2879    <permission android:name="android.permission.DISPATCH_NFC_MESSAGE"
2880                android:protectionLevel="signature|privileged" />
2881
2882    <!-- @SystemApi Allows changing day / night mode when system is configured with
2883         config_lockDayNightMode set to true. If requesting app does not have permission,
2884         it will be ignored.
2885        @hide -->
2886    <permission android:name="android.permission.MODIFY_DAY_NIGHT_MODE"
2887                android:protectionLevel="signature|privileged" />
2888
2889    <!-- The system process is explicitly the only one allowed to launch the
2890         confirmation UI for full backup/restore -->
2891    <uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/>
2892
2893
2894    <!-- Allows the holder to access the ephemeral applications on the device.
2895    @hide -->
2896    <permission android:name="android.permission.ACCESS_EPHEMERAL_APPS"
2897            android:protectionLevel="signature" />
2898
2899    <!-- Allows receiving the usage of media resource e.g. video/audio codec and
2900         graphic memory.
2901         @hide -->
2902    <permission android:name="android.permission.RECEIVE_MEDIA_RESOURCE_USAGE"
2903                android:protectionLevel="signature|privileged" />
2904
2905    <!-- Must be required by system/priv apps when accessing the sound trigger
2906         APIs given by {@link SoundTriggerManager}.
2907         @hide <p>Not for use by third-party applications.</p> -->
2908    <permission android:name="android.permission.MANAGE_SOUND_TRIGGER"
2909        android:protectionLevel="signature|privileged" />
2910
2911    <!-- @SystemApi Allows trusted applications to dispatch managed provisioning message to Managed
2912         Provisioning app. If requesting app does not have permission, it will be ignored.
2913         @hide -->
2914    <permission android:name="android.permission.DISPATCH_PROVISIONING_MESSAGE"
2915                android:protectionLevel="signature|privileged" />
2916
2917    <!-- Allows the holder to read blocked numbers. See
2918         {@link android.provider.BlockedNumberContract}.
2919         @hide -->
2920    <permission android:name="android.permission.READ_BLOCKED_NUMBERS"
2921                android:protectionLevel="signature" />
2922
2923    <!-- Allows the holder to write blocked numbers. See
2924         {@link android.provider.BlockedNumberContract}.
2925         @hide -->
2926    <permission android:name="android.permission.WRITE_BLOCKED_NUMBERS"
2927                android:protectionLevel="signature" />
2928
2929    <application android:process="system"
2930                 android:persistent="true"
2931                 android:hasCode="false"
2932                 android:label="@string/android_system_label"
2933                 android:allowClearUserData="false"
2934                 android:backupAgent="com.android.server.backup.SystemBackupAgent"
2935                 android:killAfterRestore="false"
2936                 android:icon="@drawable/ic_launcher_android"
2937                 android:supportsRtl="true"
2938                 android:theme="@style/Theme.Material.DayNight.DarkActionBar"
2939                 android:forceDeviceEncrypted="true"
2940                 android:encryptionAware="true">
2941        <activity android:name="com.android.internal.app.ChooserActivity"
2942                android:theme="@style/Theme.DeviceDefault.Resolver"
2943                android:finishOnCloseSystemDialogs="true"
2944                android:excludeFromRecents="true"
2945                android:documentLaunchMode="never"
2946                android:relinquishTaskIdentity="true"
2947                android:process=":ui">
2948            <intent-filter>
2949                <action android:name="android.intent.action.CHOOSER" />
2950                <category android:name="android.intent.category.DEFAULT" />
2951                <category android:name="android.intent.category.VOICE" />
2952            </intent-filter>
2953        </activity>
2954        <activity android:name="com.android.internal.app.IntentForwarderActivity"
2955                android:finishOnCloseSystemDialogs="true"
2956                android:theme="@style/Theme.NoDisplay"
2957                android:excludeFromRecents="true"
2958                android:label="@string/user_owner_label"
2959                android:exported="true"
2960                >
2961        </activity>
2962        <activity-alias android:name="com.android.internal.app.ForwardIntentToParent"
2963                android:targetActivity="com.android.internal.app.IntentForwarderActivity"
2964                android:exported="true"
2965                android:label="@string/user_owner_label">
2966        </activity-alias>
2967        <activity-alias android:name="com.android.internal.app.ForwardIntentToManagedProfile"
2968                android:targetActivity="com.android.internal.app.IntentForwarderActivity"
2969                android:icon="@drawable/ic_corp_icon"
2970                android:exported="true"
2971                android:label="@string/managed_profile_label">
2972        </activity-alias>
2973        <activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity"
2974                android:theme="@style/Theme.Material.DayNight.Dialog"
2975                android:label="@string/heavy_weight_switcher_title"
2976                android:finishOnCloseSystemDialogs="true"
2977                android:excludeFromRecents="true"
2978                android:process=":ui">
2979        </activity>
2980        <activity android:name="com.android.internal.app.PlatLogoActivity"
2981                android:theme="@style/Theme.Wallpaper.NoTitleBar.Fullscreen"
2982                android:configChanges="orientation|keyboardHidden"
2983                android:process=":ui">
2984        </activity>
2985        <activity android:name="com.android.internal.app.DisableCarModeActivity"
2986                android:theme="@style/Theme.NoDisplay"
2987                android:excludeFromRecents="true"
2988                android:process=":ui">
2989        </activity>
2990        <activity android:name="com.android.internal.app.DumpHeapActivity"
2991                android:theme="@style/Theme.Translucent.NoTitleBar"
2992                android:label="@string/dump_heap_title"
2993                android:finishOnCloseSystemDialogs="true"
2994                android:noHistory="true"
2995                android:excludeFromRecents="true"
2996                android:process=":ui">
2997        </activity>
2998        <provider android:name="com.android.server.am.DumpHeapProvider"
2999                android:authorities="com.android.server.heapdump"
3000                android:grantUriPermissions="true"
3001                android:multiprocess="false"
3002                android:singleUser="true" />
3003
3004        <activity android:name="android.accounts.ChooseAccountActivity"
3005                android:excludeFromRecents="true"
3006                android:exported="true"
3007                android:theme="@style/Theme.Material.DayNight.Dialog"
3008                android:label="@string/choose_account_label"
3009                android:process=":ui">
3010        </activity>
3011
3012        <activity android:name="android.accounts.ChooseTypeAndAccountActivity"
3013                android:excludeFromRecents="true"
3014                android:exported="true"
3015                android:theme="@style/Theme.Material.DayNight.Dialog"
3016                android:label="@string/choose_account_label"
3017                android:process=":ui">
3018        </activity>
3019
3020        <activity android:name="android.accounts.ChooseAccountTypeActivity"
3021                android:excludeFromRecents="true"
3022                android:theme="@style/Theme.Material.DayNight.Dialog"
3023                android:label="@string/choose_account_label"
3024                android:process=":ui">
3025        </activity>
3026
3027        <activity android:name="android.accounts.CantAddAccountActivity"
3028                android:excludeFromRecents="true"
3029                android:exported="true"
3030                android:theme="@style/Theme.Material.DayNight.Dialog.NoActionBar"
3031                android:process=":ui">
3032        </activity>
3033
3034        <activity android:name="android.accounts.GrantCredentialsPermissionActivity"
3035                android:excludeFromRecents="true"
3036                android:exported="true"
3037                android:theme="@style/Theme.Material.DayNight.DialogWhenLarge"
3038                android:process=":ui">
3039        </activity>
3040
3041        <activity android:name="android.content.SyncActivityTooManyDeletes"
3042               android:theme="@style/Theme.Material.DayNight.Dialog"
3043               android:label="@string/sync_too_many_deletes"
3044               android:process=":ui">
3045        </activity>
3046
3047        <activity android:name="com.android.internal.app.ShutdownActivity"
3048            android:permission="android.permission.SHUTDOWN"
3049            android:theme="@style/Theme.NoDisplay"
3050            android:excludeFromRecents="true">
3051            <intent-filter>
3052                <action android:name="android.intent.action.ACTION_REQUEST_SHUTDOWN" />
3053                <category android:name="android.intent.category.DEFAULT" />
3054            </intent-filter>
3055            <intent-filter>
3056                <action android:name="android.intent.action.REBOOT" />
3057                <category android:name="android.intent.category.DEFAULT" />
3058            </intent-filter>
3059        </activity>
3060
3061        <activity android:name="com.android.internal.app.NetInitiatedActivity"
3062                android:theme="@style/Theme.Material.DayNight.Dialog.Alert"
3063                android:excludeFromRecents="true"
3064                android:process=":ui">
3065        </activity>
3066
3067        <activity android:name="com.android.internal.app.SystemUserHomeActivity"
3068                  android:enabled="false"
3069                  android:process=":ui"
3070                  android:systemUserOnly="true"
3071                  android:theme="@style/Theme.Translucent.NoTitleBar">
3072            <intent-filter android:priority="-100">
3073                <action android:name="android.intent.action.MAIN" />
3074                <category android:name="android.intent.category.HOME" />
3075            </intent-filter>
3076        </activity>
3077
3078        <!-- Activity to prompt user if it's ok to create a new user sandbox for a
3079             specified account. -->
3080        <activity android:name="com.android.internal.app.ConfirmUserCreationActivity"
3081                android:excludeFromRecents="true"
3082                android:process=":ui"
3083                android:theme="@style/Theme.Material.DayNight.Dialog.Alert">
3084            <intent-filter android:priority="1000">
3085                <action android:name="android.os.action.CREATE_USER" />
3086                <category android:name="android.intent.category.DEFAULT" />
3087            </intent-filter>
3088        </activity>
3089
3090        <activity android:name="com.android.internal.app.UnlaunchableAppActivity"
3091                android:theme="@style/Theme.Material.DayNight.Dialog.Alert"
3092                android:excludeFromRecents="true"
3093                android:process=":ui">
3094        </activity>
3095
3096        <receiver android:name="com.android.server.BootReceiver"
3097                android:systemUserOnly="true">
3098            <intent-filter android:priority="1000">
3099                <action android:name="android.intent.action.BOOT_COMPLETED" />
3100            </intent-filter>
3101        </receiver>
3102
3103        <receiver android:name="com.android.server.updates.CertPinInstallReceiver"
3104                android:permission="android.permission.UPDATE_CONFIG">
3105            <intent-filter>
3106                <action android:name="android.intent.action.UPDATE_PINS" />
3107                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3108            </intent-filter>
3109        </receiver>
3110
3111        <receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver"
3112                android:permission="android.permission.UPDATE_CONFIG">
3113            <intent-filter>
3114                <action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" />
3115                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3116            </intent-filter>
3117        </receiver>
3118
3119        <receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver"
3120                android:permission="android.permission.UPDATE_CONFIG">
3121            <intent-filter>
3122                <action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" />
3123                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3124            </intent-filter>
3125        </receiver>
3126
3127        <receiver android:name="com.android.server.updates.ApnDbInstallReceiver"
3128                android:permission="android.permission.UPDATE_CONFIG">
3129            <intent-filter>
3130                <action android:name="android.intent.action.UPDATE_APN_DB" />
3131                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3132            </intent-filter>
3133        </receiver>
3134
3135        <receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver"
3136                android:permission="android.permission.UPDATE_CONFIG">
3137            <intent-filter>
3138                <action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" />
3139                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3140            </intent-filter>
3141        </receiver>
3142
3143        <receiver android:name="com.android.server.updates.TzDataInstallReceiver"
3144                android:permission="android.permission.UPDATE_CONFIG">
3145            <intent-filter>
3146                <action android:name="android.intent.action.UPDATE_TZDATA" />
3147                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3148            </intent-filter>
3149        </receiver>
3150
3151        <receiver android:name="com.android.server.updates.SELinuxPolicyInstallReceiver"
3152                android:permission="android.permission.UPDATE_CONFIG">
3153            <intent-filter>
3154                <action android:name="android.intent.action.UPDATE_SEPOLICY" />
3155                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3156            </intent-filter>
3157        </receiver>
3158
3159        <receiver android:name="com.android.server.MasterClearReceiver"
3160            android:permission="android.permission.MASTER_CLEAR">
3161            <intent-filter
3162                    android:priority="100" >
3163                <!-- For Checkin, Settings, etc.: action=MASTER_CLEAR -->
3164                <action android:name="android.intent.action.MASTER_CLEAR" />
3165
3166                <!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR -->
3167                <action android:name="com.google.android.c2dm.intent.RECEIVE" />
3168                <category android:name="android.intent.category.MASTER_CLEAR" />
3169            </intent-filter>
3170        </receiver>
3171
3172        <service android:name="android.hardware.location.GeofenceHardwareService"
3173            android:permission="android.permission.LOCATION_HARDWARE"
3174            android:exported="false" />
3175
3176        <service android:name="com.android.internal.backup.LocalTransportService"
3177                android:permission="android.permission.CONFIRM_FULL_BACKUP"
3178                android:exported="false">
3179            <intent-filter>
3180                <action android:name="android.backup.TRANSPORT_HOST" />
3181            </intent-filter>
3182        </service>
3183
3184        <service android:name="com.android.server.MountServiceIdler"
3185                 android:exported="true"
3186                 android:permission="android.permission.BIND_JOB_SERVICE" >
3187        </service>
3188
3189        <service android:name="com.android.server.backup.FullBackupJob"
3190                 android:exported="true"
3191                 android:permission="android.permission.BIND_JOB_SERVICE" >
3192        </service>
3193
3194        <service android:name="com.android.server.backup.KeyValueBackupJob"
3195                 android:permission="android.permission.BIND_JOB_SERVICE" >
3196        </service>
3197
3198        <service android:name="com.android.server.content.SyncJobService"
3199                 android:permission="android.permission.BIND_JOB_SERVICE" >
3200        </service>
3201
3202        <service
3203            android:name="com.android.server.pm.BackgroundDexOptService"
3204            android:exported="true"
3205            android:permission="android.permission.BIND_JOB_SERVICE">
3206        </service>
3207
3208    </application>
3209
3210</manifest>
3211