AndroidManifest.xml revision 66d7588078fbdbdadf646577dce6b3821976d25c
1<?xml version="1.0" encoding="utf-8"?> 2<!-- 3/* //device/apps/common/AndroidManifest.xml 4** 5** Copyright 2006, The Android Open Source Project 6** 7** Licensed under the Apache License, Version 2.0 (the "License"); 8** you may not use this file except in compliance with the License. 9** You may obtain a copy of the License at 10** 11** http://www.apache.org/licenses/LICENSE-2.0 12** 13** Unless required by applicable law or agreed to in writing, software 14** distributed under the License is distributed on an "AS IS" BASIS, 15** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 16** See the License for the specific language governing permissions and 17** limitations under the License. 18*/ 19--> 20<manifest xmlns:android="http://schemas.android.com/apk/res/android" 21 package="android" coreApp="true" android:sharedUserId="android.uid.system" 22 android:sharedUserLabel="@string/android_system_label"> 23 24 <!-- ================================================ --> 25 <!-- Special broadcasts that only the system can send --> 26 <!-- ================================================ --> 27 <eat-comment /> 28 29 <protected-broadcast android:name="android.intent.action.SCREEN_OFF" /> 30 <protected-broadcast android:name="android.intent.action.SCREEN_ON" /> 31 <protected-broadcast android:name="android.intent.action.USER_PRESENT" /> 32 <protected-broadcast android:name="android.intent.action.TIME_SET" /> 33 <protected-broadcast android:name="android.intent.action.TIME_TICK" /> 34 <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" /> 35 <protected-broadcast android:name="android.intent.action.DATE_CHANGED" /> 36 <protected-broadcast android:name="android.intent.action.PRE_BOOT_COMPLETED" /> 37 <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" /> 38 <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" /> 39 <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" /> 40 <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" /> 41 <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" /> 42 <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" /> 43 <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" /> 44 <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" /> 45 <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" /> 46 <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" /> 47 <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" /> 48 <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" /> 49 <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" /> 50 <protected-broadcast android:name="android.intent.action.PACKAGES_SUSPENDED" /> 51 <protected-broadcast android:name="android.intent.action.PACKAGES_UNSUSPENDED" /> 52 <protected-broadcast android:name="android.intent.action.UID_REMOVED" /> 53 <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" /> 54 <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" /> 55 <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" /> 56 <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" /> 57 <protected-broadcast android:name="android.intent.action.BATTERY_LOW" /> 58 <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" /> 59 <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" /> 60 <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" /> 61 <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" /> 62 <protected-broadcast android:name="android.intent.action.CHARGING" /> 63 <protected-broadcast android:name="android.intent.action.DISCHARGING" /> 64 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" /> 65 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" /> 66 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" /> 67 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" /> 68 <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" /> 69 <protected-broadcast android:name="android.intent.action.REBOOT" /> 70 <protected-broadcast android:name="android.intent.action.DOCK_EVENT" /> 71 <protected-broadcast android:name="android.intent.action.THERMAL_EVENT" /> 72 <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" /> 73 <protected-broadcast android:name="android.intent.action.USER_ADDED" /> 74 <protected-broadcast android:name="android.intent.action.USER_REMOVED" /> 75 <protected-broadcast android:name="android.intent.action.USER_STARTING" /> 76 <protected-broadcast android:name="android.intent.action.USER_STARTED" /> 77 <protected-broadcast android:name="android.intent.action.USER_STOPPING" /> 78 <protected-broadcast android:name="android.intent.action.USER_STOPPED" /> 79 <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" /> 80 <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" /> 81 <protected-broadcast android:name="android.intent.action.USER_SWITCHED" /> 82 <protected-broadcast android:name="android.intent.action.USER_INITIALIZE" /> 83 <protected-broadcast android:name="android.intent.action.INTENT_FILTER_NEEDS_VERIFICATION" /> 84 85 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED" /> 86 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGING" /> 87 <protected-broadcast android:name="android.os.action.DEVICE_IDLE_MODE_CHANGED" /> 88 <protected-broadcast android:name="android.os.action.POWER_SAVE_WHITELIST_CHANGED" /> 89 <protected-broadcast android:name="android.os.action.POWER_SAVE_TEMP_WHITELIST_CHANGED" /> 90 91 <protected-broadcast android:name="android.os.action.SCREEN_BRIGHTNESS_BOOST_CHANGED" /> 92 93 <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" /> 94 <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" /> 95 <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" /> 96 <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" /> 97 <protected-broadcast android:name="android.app.action.NEXT_ALARM_CLOCK_CHANGED" /> 98 99 <protected-broadcast android:name="android.app.action.BUGREPORT_SHARING_DECLINED" /> 100 <protected-broadcast android:name="android.app.action.BUGREPORT_FAILED" /> 101 <protected-broadcast android:name="android.app.action.BUGREPORT_SHARE" /> 102 103 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" /> 104 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" /> 105 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" /> 106 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" /> 107 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_HOST_RESTORED" /> 108 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_RESTORED" /> 109 110 <protected-broadcast android:name="android.os.action.SETTING_RESTORED" /> 111 112 <protected-broadcast android:name="android.app.backup.intent.RUN" /> 113 <protected-broadcast android:name="android.app.backup.intent.CLEAR" /> 114 <protected-broadcast android:name="android.app.backup.intent.INIT" /> 115 116 <protected-broadcast android:name="android.bluetooth.intent.DISCOVERABLE_TIMEOUT" /> 117 <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" /> 118 <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" /> 119 <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" /> 120 <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" /> 121 <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" /> 122 <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" /> 123 <protected-broadcast android:name="android.bluetooth.device.action.UUID" /> 124 <protected-broadcast android:name="android.bluetooth.device.action.MAS_INSTANCE" /> 125 <protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" /> 126 <protected-broadcast android:name="android.bluetooth.device.action.FOUND" /> 127 <protected-broadcast android:name="android.bluetooth.device.action.DISAPPEARED" /> 128 <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" /> 129 <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" /> 130 <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" /> 131 <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" /> 132 <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" /> 133 <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" /> 134 <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" /> 135 <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" /> 136 <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" /> 137 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" /> 138 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" /> 139 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" /> 140 <protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" /> 141 <protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" /> 142 <protected-broadcast 143 android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" /> 144 <protected-broadcast 145 android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" /> 146 <protected-broadcast 147 android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" /> 148 <protected-broadcast 149 android:name="android.bluetooth.headsetclient.profile.action.CONNECTION_STATE_CHANGED" /> 150 <protected-broadcast 151 android:name="android.bluetooth.headsetclient.profile.action.AUDIO_STATE_CHANGED" /> 152 <protected-broadcast 153 android:name="android.bluetooth.headsetclient.profile.action.AG_EVENT" /> 154 <protected-broadcast 155 android:name="android.bluetooth.headsetclient.profile.action.AG_CALL_CHANGED" /> 156 <protected-broadcast 157 android:name="android.bluetooth.headsetclient.profile.action.RESULT" /> 158 <protected-broadcast 159 android:name="android.bluetooth.headsetclient.profile.action.LAST_VTAG" /> 160 <protected-broadcast 161 android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" /> 162 <protected-broadcast 163 android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" /> 164 <protected-broadcast 165 android:name="android.bluetooth.a2dp-sink.profile.action.CONNECTION_STATE_CHANGED" /> 166 <protected-broadcast 167 android:name="android.bluetooth.a2dp-sink.profile.action.PLAYING_STATE_CHANGED" /> 168 <protected-broadcast 169 android:name="android.bluetooth.a2dp-sink.profile.action.AUDIO_CONFIG_CHANGED" /> 170 <protected-broadcast 171 android:name="android.bluetooth.avrcp-controller.profile.action.CONNECTION_STATE_CHANGED" /> 172 <protected-broadcast 173 android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" /> 174 <protected-broadcast 175 android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" /> 176 <protected-broadcast 177 android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" /> 178 <protected-broadcast 179 android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" /> 180 <protected-broadcast android:name="android.bluetooth.pbap.intent.action.PBAP_STATE_CHANGED" /> 181 <protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" /> 182 <protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" /> 183 <protected-broadcast android:name="android.btopp.intent.action.LIST" /> 184 <protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" /> 185 <protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" /> 186 <protected-broadcast android:name="android.btopp.intent.action.CONFIRM" /> 187 <protected-broadcast android:name="android.btopp.intent.action.HIDE" /> 188 <protected-broadcast android:name="android.btopp.intent.action.RETRY" /> 189 <protected-broadcast android:name="android.btopp.intent.action.OPEN" /> 190 <protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" /> 191 <protected-broadcast android:name="com.android.bluetooth.pbap.authchall" /> 192 <protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" /> 193 <protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" /> 194 <protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" /> 195 196 <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" /> 197 198 <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" /> 199 <protected-broadcast android:name="android.hardware.usb.action.USB_PORT_CHANGED" /> 200 <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" /> 201 <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_DETACHED" /> 202 <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" /> 203 <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" /> 204 205 <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" /> 206 <protected-broadcast android:name="android.media.action.HDMI_AUDIO_PLUG" /> 207 208 <protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" /> 209 <protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" /> 210 <protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" /> 211 <protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" /> 212 <protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" /> 213 <protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" /> 214 <protected-broadcast android:name="android.media.MASTER_MONO_CHANGED_ACTION" /> 215 <protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" /> 216 <protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" /> 217 218 <protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" /> 219 <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" /> 220 <protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" /> 221 <protected-broadcast android:name="android.intent.action.MEDIA_NOFS" /> 222 <protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" /> 223 <protected-broadcast android:name="android.intent.action.MEDIA_SHARED" /> 224 <protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" /> 225 <protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" /> 226 <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" /> 227 <protected-broadcast android:name="android.intent.action.MEDIA_EJECT" /> 228 229 <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL" /> 230 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" /> 231 <!-- @deprecated. Only {@link android.net.ConnectivityManager.CONNECTIVITY_ACTION} is sent. --> 232 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" /> 233 <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" /> 234 <protected-broadcast android:name="android.net.conn.RESTRICT_BACKGROUND_CHANGED" /> 235 <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" /> 236 <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" /> 237 238 <protected-broadcast android:name="android.net.nsd.STATE_CHANGED" /> 239 240 <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" /> 241 <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" /> 242 <protected-broadcast android:name="com.android.nfc.action.LLCP_UP" /> 243 <protected-broadcast android:name="com.android.nfc.action.LLCP_DOWN" /> 244 <protected-broadcast android:name="com.android.nfc.cardemulation.action.CLOSE_TAP_DIALOG" /> 245 <protected-broadcast android:name="com.android.nfc.handover.action.ALLOW_CONNECT" /> 246 <protected-broadcast android:name="com.android.nfc.handover.action.DENY_CONNECT" /> 247 <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" /> 248 <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" /> 249 <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" /> 250 <!-- For NFC to BT handover --> 251 <protected-broadcast android:name="android.btopp.intent.action.WHITELIST_DEVICE" /> 252 <protected-broadcast android:name="android.btopp.intent.action.STOP_HANDOVER_TRANSFER" /> 253 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND" /> 254 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND_MULTIPLE" /> 255 256 <protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" /> 257 <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" /> 258 259 <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" /> 260 261 <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" /> 262 <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" /> 263 <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" /> 264 265 <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" /> 266 <protected-broadcast android:name="com.android.server.WifiManager.action.START_PNO" /> 267 <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" /> 268 <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_ACCEPTED" /> 269 <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_DECLINED" /> 270 <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" /> 271 <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" /> 272 <protected-broadcast android:name="android.net.wifi.WIFI_CREDENTIAL_CHANGED" /> 273 <protected-broadcast android:name="android.net.wifi.WIFI_SCAN_AVAILABLE" /> 274 <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" /> 275 <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" /> 276 <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" /> 277 <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" /> 278 <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" /> 279 <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" /> 280 <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" /> 281 <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" /> 282 <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" /> 283 <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" /> 284 <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" /> 285 <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" /> 286 <protected-broadcast android:name="android.net.wifi.p2p.PERSISTENT_GROUPS_CHANGED" /> 287 <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" /> 288 <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" /> 289 <protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" /> 290 <protected-broadcast 291 android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" /> 292 <protected-broadcast android:name="android.net.scoring.SCORE_NETWORKS" /> 293 <protected-broadcast android:name="android.net.scoring.SCORER_CHANGED" /> 294 <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" /> 295 <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" /> 296 <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" /> 297 <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" /> 298 <protected-broadcast android:name="android.intent.action.APPLICATION_RESTRICTIONS_CHANGED" /> 299 300 <!-- Legacy --> 301 <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" /> 302 <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" /> 303 304 <protected-broadcast android:name="com.android.server.task.controllers.IdleController.ACTION_TRIGGER_IDLE" /> 305 306 <protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" /> 307 308 <protected-broadcast android:name="android.intent.action.PHONE_STATE" /> 309 310 <protected-broadcast android:name="android.intent.action.SUB_DEFAULT_CHANGED" /> 311 312 <protected-broadcast android:name="android.location.GPS_ENABLED_CHANGE" /> 313 <protected-broadcast android:name="android.location.PROVIDERS_CHANGED" /> 314 <protected-broadcast android:name="android.location.MODE_CHANGED" /> 315 <protected-broadcast android:name="android.location.GPS_FIX_CHANGE" /> 316 <protected-broadcast android:name="android.net.proxy.PAC_REFRESH" /> 317 318 <protected-broadcast android:name="android.telecom.action.DEFAULT_DIALER_CHANGED" /> 319 320 <protected-broadcast 321 android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" /> 322 323 <!-- Defined in RestrictionsManager --> 324 <protected-broadcast 325 android:name="android.intent.action.PERMISSION_RESPONSE_RECEIVED" /> 326 <!-- Defined in RestrictionsManager --> 327 328 <protected-broadcast android:name="android.intent.action.REQUEST_PERMISSION" /> 329 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_STARTED" /> 330 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" /> 331 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_PROGRESS" /> 332 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" /> 333 334 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_SUBSCRIPTION_CHANGED" /> 335 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_SMS_SUBSCRIPTION_CHANGED" /> 336 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_DATA_SUBSCRIPTION_CHANGED" /> 337 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_VOICE_SUBSCRIPTION_CHANGED" /> 338 <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_CONTENT_CHANGE" /> 339 <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_RECORD_UPDATED" /> 340 341 <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_DONE" /> 342 <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_FAILED" /> 343 344 <protected-broadcast android:name="android.internal.policy.action.BURN_IN_PROTECTION" /> 345 <protected-broadcast android:name="android.app.action.SYSTEM_UPDATE_POLICY_CHANGED" /> 346 <protected-broadcast android:name="android.app.action.DEVICE_OWNER_CHANGED" /> 347 348 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_AVAILABILITY_CHANGED" /> 349 350 <!-- Added in N --> 351 <protected-broadcast android:name="android.intent.action.ANR" /> 352 <protected-broadcast android:name="android.intent.action.CALL" /> 353 <protected-broadcast android:name="android.intent.action.DROPBOX_ENTRY_ADDED" /> 354 <protected-broadcast android:name="android.intent.action.INPUT_METHOD_CHANGED" /> 355 <protected-broadcast android:name="android.intent.action.internal_sim_state_changed" /> 356 <protected-broadcast android:name="android.intent.action.LOCKED_BOOT_COMPLETED" /> 357 <protected-broadcast android:name="android.intent.action.PRECISE_CALL_STATE" /> 358 <protected-broadcast android:name="android.intent.action.PRECISE_DATA_CONNECTION_STATE_CHANGED" /> 359 <protected-broadcast android:name="android.intent.action.SUBSCRIPTION_PHONE_STATE" /> 360 <protected-broadcast android:name="android.intent.action.USER_INFO_CHANGED" /> 361 <protected-broadcast android:name="android.intent.action.USER_UNLOCKED" /> 362 <protected-broadcast android:name="android.intent.action.WALLPAPER_CHANGED" /> 363 364 <protected-broadcast android:name="android.app.action.DEVICE_POLICY_MANAGER_STATE_CHANGED" /> 365 <protected-broadcast android:name="android.app.action.CHOOSE_PRIVATE_KEY_ALIAS" /> 366 <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLED" /> 367 <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLE_REQUESTED" /> 368 <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_ENABLED" /> 369 <protected-broadcast android:name="android.app.action.LOCK_TASK_ENTERING" /> 370 <protected-broadcast android:name="android.app.action.LOCK_TASK_EXITING" /> 371 <protected-broadcast android:name="android.app.action.NOTIFY_PENDING_SYSTEM_UPDATE" /> 372 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_CHANGED" /> 373 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_EXPIRING" /> 374 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_FAILED" /> 375 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_SUCCEEDED" /> 376 <protected-broadcast android:name="com.android.server.ACTION_EXPIRED_PASSWORD_NOTIFICATION" /> 377 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_ADDED" /> 378 379 <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_STATE_CHANGED" /> 380 <protected-broadcast android:name="android.content.jobscheduler.JOB_DELAY_EXPIRED" /> 381 <protected-broadcast android:name="android.content.syncmanager.SYNC_ALARM" /> 382 <protected-broadcast android:name="android.media.INTERNAL_RINGER_MODE_CHANGED_ACTION" /> 383 <protected-broadcast android:name="android.media.STREAM_DEVICES_CHANGED_ACTION" /> 384 <protected-broadcast android:name="android.media.STREAM_MUTE_CHANGED_ACTION" /> 385 <protected-broadcast android:name="android.net.sip.SIP_SERVICE_UP" /> 386 <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" /> 387 <protected-broadcast android:name="android.os.action.CHARGING" /> 388 <protected-broadcast android:name="android.os.action.DISCHARGING" /> 389 <protected-broadcast android:name="android.search.action.SEARCHABLES_CHANGED" /> 390 <protected-broadcast android:name="android.security.STORAGE_CHANGED" /> 391 <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_REGISTERED" /> 392 <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_UNREGISTERED" /> 393 <protected-broadcast android:name="android.telecom.action.SHOW_MISSED_CALLS_NOTIFICATION" /> 394 <protected-broadcast android:name="android.telephony.action.CARRIER_CONFIG_CHANGED" /> 395 396 <protected-broadcast android:name="com.android.bluetooth.btservice.action.ALARM_WAKEUP" /> 397 <protected-broadcast android:name="com.android.ims.IMS_SERVICE_UP" /> 398 <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_POLL" /> 399 <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_UPDATED" /> 400 <protected-broadcast android:name="com.android.server.NetworkTimeUpdateService.action.POLL" /> 401 <protected-broadcast android:name="com.android.server.telecom.intent.action.CALLS_ADD_ENTRY" /> 402 <protected-broadcast android:name="com.android.settings.location.MODE_CHANGING" /> 403 404 <protected-broadcast android:name="ScheduleConditionProvider.EVALUATE" /> 405 <protected-broadcast android:name="EventConditionProvider.EVALUATE" /> 406 <protected-broadcast android:name="wifi_scan_available" /> 407 408 <protected-broadcast android:name="action.cne.started" /> 409 <protected-broadcast android:name="android.content.jobscheduler.JOB_DEADLINE_EXPIRED" /> 410 <protected-broadcast android:name="android.intent.action.ACTION_UNSOL_RESPONSE_OEM_HOOK_RAW" /> 411 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_SUPL" /> 412 <protected-broadcast android:name="android.os.action.ACTION_EFFECTS_SUPPRESSOR_CHANGED" /> 413 <protected-broadcast android:name="android.os.action.LIGHT_DEVICE_IDLE_MODE_CHANGED" /> 414 <protected-broadcast android:name="android.os.storage.action.VOLUME_STATE_CHANGED" /> 415 <protected-broadcast android:name="com.android.server.action.UPDATE_TWILIGHT_STATE" /> 416 <protected-broadcast android:name="com.android.server.device_idle.STEP_IDLE_STATE" /> 417 <protected-broadcast android:name="com.android.server.device_idle.STEP_LIGHT_IDLE_STATE" /> 418 <protected-broadcast android:name="com.android.server.Wifi.action.TOGGLE_PNO" /> 419 <protected-broadcast android:name="intent.action.ACTION_RF_BAND_INFO" /> 420 <protected-broadcast android:name="android.intent.action.MEDIA_RESOURCE_GRANTED" /> 421 <protected-broadcast android:name="android.app.action.SECURITY_LOGS_AVAILABLE" /> 422 423 <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED" /> 424 <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED_INTERNAL" /> 425 <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_CHANGED" /> 426 <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_ACCESS_GRANTED_CHANGED" /> 427 <protected-broadcast android:name="android.os.action.ACTION_EFFECTS_SUPPRESSOR_CHANGED" /> 428 429 <protected-broadcast android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS" /> 430 <protected-broadcast android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS" /> 431 432 <protected-broadcast android:name="android.intent.action.DYNAMIC_SENSOR_CHANGED" /> 433 434 <protected-broadcast android:name="android.intent.action.ACTION_RADIO_OFF" /> 435 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNLOCKED" /> 436 437 <protected-broadcast android:name="android.accounts.LOGIN_ACCOUNTS_CHANGED" /> 438 <protected-broadcast android:name="com.android.sync.SYNC_CONN_STATUS_CHANGED" /> 439 440 <protected-broadcast android:name="com.android.phone.SIP_INCOMING_CALL" /> 441 <protected-broadcast android:name="com.android.phone.SIP_ADD_PHONE" /> 442 <protected-broadcast android:name="com.android.phone.SIP_REMOVE_PHONE" /> 443 <protected-broadcast android:name="com.android.phone.SIP_CALL_OPTION_CHANGED" /> 444 445 <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_CONNECTED" /> 446 <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_DISCONNECTED" /> 447 448 <protected-broadcast android:name="android.bluetooth.input.profile.action.HANDSHAKE" /> 449 <protected-broadcast android:name="android.bluetooth.input.profile.action.REPORT" /> 450 451 <protected-broadcast android:name="android.intent.action.TWILIGHT_CHANGED" /> 452 453 <!-- ====================================================================== --> 454 <!-- RUNTIME PERMISSIONS --> 455 <!-- ====================================================================== --> 456 <eat-comment /> 457 458 <!-- ====================================================================== --> 459 <!-- Permissions for accessing user's contacts including personal profile --> 460 <!-- ====================================================================== --> 461 <eat-comment /> 462 463 <!-- Used for runtime permissions related to user's contacts and profile. --> 464 <permission-group android:name="android.permission-group.CONTACTS" 465 android:icon="@drawable/perm_group_contacts" 466 android:label="@string/permgrouplab_contacts" 467 android:description="@string/permgroupdesc_contacts" 468 android:priority="100" /> 469 470 <!-- Allows an application to read the user's contacts data. 471 <p>Protection level: dangerous 472 --> 473 <permission android:name="android.permission.READ_CONTACTS" 474 android:permissionGroup="android.permission-group.CONTACTS" 475 android:label="@string/permlab_readContacts" 476 android:description="@string/permdesc_readContacts" 477 android:protectionLevel="dangerous" /> 478 479 <!-- Allows an application to write the user's contacts data. 480 <p>Protection level: dangerous 481 --> 482 <permission android:name="android.permission.WRITE_CONTACTS" 483 android:permissionGroup="android.permission-group.CONTACTS" 484 android:label="@string/permlab_writeContacts" 485 android:description="@string/permdesc_writeContacts" 486 android:protectionLevel="dangerous" /> 487 488 <!-- ====================================================================== --> 489 <!-- Permissions for accessing user's calendar --> 490 <!-- ====================================================================== --> 491 <eat-comment /> 492 493 <!-- Used for runtime permissions related to user's calendar. --> 494 <permission-group android:name="android.permission-group.CALENDAR" 495 android:icon="@drawable/perm_group_calendar" 496 android:label="@string/permgrouplab_calendar" 497 android:description="@string/permgroupdesc_calendar" 498 android:priority="200" /> 499 500 <!-- Allows an application to read the user's calendar data. 501 <p>Protection level: dangerous 502 --> 503 <permission android:name="android.permission.READ_CALENDAR" 504 android:permissionGroup="android.permission-group.CALENDAR" 505 android:label="@string/permlab_readCalendar" 506 android:description="@string/permdesc_readCalendar" 507 android:protectionLevel="dangerous" /> 508 509 <!-- Allows an application to write the user's calendar data. 510 <p>Protection level: dangerous 511 --> 512 <permission android:name="android.permission.WRITE_CALENDAR" 513 android:permissionGroup="android.permission-group.CALENDAR" 514 android:label="@string/permlab_writeCalendar" 515 android:description="@string/permdesc_writeCalendar" 516 android:protectionLevel="dangerous" /> 517 518 <!-- ====================================================================== --> 519 <!-- Permissions for accessing and modifying user's SMS messages --> 520 <!-- ====================================================================== --> 521 <eat-comment /> 522 523 <!-- Used for runtime permissions related to user's SMS messages. --> 524 <permission-group android:name="android.permission-group.SMS" 525 android:icon="@drawable/perm_group_sms" 526 android:label="@string/permgrouplab_sms" 527 android:description="@string/permgroupdesc_sms" 528 android:priority="300" /> 529 530 <!-- Allows an application to send SMS messages. 531 <p>Protection level: dangerous 532 --> 533 <permission android:name="android.permission.SEND_SMS" 534 android:permissionGroup="android.permission-group.SMS" 535 android:label="@string/permlab_sendSms" 536 android:description="@string/permdesc_sendSms" 537 android:permissionFlags="costsMoney" 538 android:protectionLevel="dangerous" /> 539 540 <!-- Allows an application to receive SMS messages. 541 <p>Protection level: dangerous 542 --> 543 <permission android:name="android.permission.RECEIVE_SMS" 544 android:permissionGroup="android.permission-group.SMS" 545 android:label="@string/permlab_receiveSms" 546 android:description="@string/permdesc_receiveSms" 547 android:protectionLevel="dangerous"/> 548 549 <!-- Allows an application to read SMS messages. 550 <p>Protection level: dangerous 551 --> 552 <permission android:name="android.permission.READ_SMS" 553 android:permissionGroup="android.permission-group.SMS" 554 android:label="@string/permlab_readSms" 555 android:description="@string/permdesc_readSms" 556 android:protectionLevel="dangerous" /> 557 558 <!-- Allows an application to receive WAP push messages. 559 <p>Protection level: dangerous 560 --> 561 <permission android:name="android.permission.RECEIVE_WAP_PUSH" 562 android:permissionGroup="android.permission-group.SMS" 563 android:label="@string/permlab_receiveWapPush" 564 android:description="@string/permdesc_receiveWapPush" 565 android:protectionLevel="dangerous" /> 566 567 <!-- Allows an application to monitor incoming MMS messages. 568 <p>Protection level: dangerous 569 --> 570 <permission android:name="android.permission.RECEIVE_MMS" 571 android:permissionGroup="android.permission-group.SMS" 572 android:label="@string/permlab_receiveMms" 573 android:description="@string/permdesc_receiveMms" 574 android:protectionLevel="dangerous" /> 575 576 <!-- Allows an application to read previously received cell broadcast 577 messages and to register a content observer to get notifications when 578 a cell broadcast has been received and added to the database. For 579 emergency alerts, the database is updated immediately after the 580 alert dialog and notification sound/vibration/speech are presented. 581 The "read" column is then updated after the user dismisses the alert. 582 This enables supplementary emergency assistance apps to start loading 583 additional emergency information (if Internet access is available) 584 when the alert is first received, and to delay presenting the info 585 to the user until after the initial alert dialog is dismissed. 586 <p>Protection level: dangerous 587 @hide Pending API council approval --> 588 <permission android:name="android.permission.READ_CELL_BROADCASTS" 589 android:permissionGroup="android.permission-group.SMS" 590 android:label="@string/permlab_readCellBroadcasts" 591 android:description="@string/permdesc_readCellBroadcasts" 592 android:protectionLevel="dangerous" /> 593 594 <!-- ====================================================================== --> 595 <!-- Permissions for accessing external storage --> 596 <!-- ====================================================================== --> 597 <eat-comment /> 598 599 <!-- Used for runtime permissions related to the shared external storage. --> 600 <permission-group android:name="android.permission-group.STORAGE" 601 android:icon="@drawable/perm_group_storage" 602 android:label="@string/permgrouplab_storage" 603 android:description="@string/permgroupdesc_storage" 604 android:priority="900" /> 605 606 <!-- Allows an application to read from external storage. 607 <p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly 608 granted this permission.</p> 609 <p>This permission is enforced starting in API level 19. Before API level 19, this 610 permission is not enforced and all apps still have access to read from external storage. 611 You can test your app with the permission enforced by enabling <em>Protect USB 612 storage</em> under Developer options in the Settings app on a device running Android 4.1 or 613 higher.</p> 614 <p>Also starting in API level 19, this permission is <em>not</em> required to 615 read/write files in your application-specific directories returned by 616 {@link android.content.Context#getExternalFilesDir} and 617 {@link android.content.Context#getExternalCacheDir}. 618 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 619 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 620 minSdkVersion}</a> and <a 621 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 622 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 623 grants your app this permission. If you don't need this permission, be sure your <a 624 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 625 targetSdkVersion}</a> is 4 or higher. 626 <p>Protection level: dangerous 627 --> 628 <permission android:name="android.permission.READ_EXTERNAL_STORAGE" 629 android:permissionGroup="android.permission-group.STORAGE" 630 android:label="@string/permlab_sdcardRead" 631 android:description="@string/permdesc_sdcardRead" 632 android:protectionLevel="dangerous" /> 633 634 <!-- Allows an application to write to external storage. 635 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 636 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 637 minSdkVersion}</a> and <a 638 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 639 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 640 grants your app this permission. If you don't need this permission, be sure your <a 641 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 642 targetSdkVersion}</a> is 4 or higher. 643 <p>Starting in API level 19, this permission is <em>not</em> required to 644 read/write files in your application-specific directories returned by 645 {@link android.content.Context#getExternalFilesDir} and 646 {@link android.content.Context#getExternalCacheDir}. 647 <p>Protection level: dangerous 648 --> 649 <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE" 650 android:permissionGroup="android.permission-group.STORAGE" 651 android:label="@string/permlab_sdcardWrite" 652 android:description="@string/permdesc_sdcardWrite" 653 android:protectionLevel="dangerous" /> 654 655 <!-- ====================================================================== --> 656 <!-- Permissions for accessing the device location --> 657 <!-- ====================================================================== --> 658 <eat-comment /> 659 660 <!-- Used for permissions that allow accessing the device location. --> 661 <permission-group android:name="android.permission-group.LOCATION" 662 android:icon="@drawable/perm_group_location" 663 android:label="@string/permgrouplab_location" 664 android:description="@string/permgroupdesc_location" 665 android:priority="400" /> 666 667 <!-- Allows an app to access precise location. 668 <p>Protection level: dangerous 669 --> 670 <permission android:name="android.permission.ACCESS_FINE_LOCATION" 671 android:permissionGroup="android.permission-group.LOCATION" 672 android:label="@string/permlab_accessFineLocation" 673 android:description="@string/permdesc_accessFineLocation" 674 android:protectionLevel="dangerous" /> 675 676 <!-- Allows an app to access approximate location. 677 <p>Protection level: dangerous 678 --> 679 <permission android:name="android.permission.ACCESS_COARSE_LOCATION" 680 android:permissionGroup="android.permission-group.LOCATION" 681 android:label="@string/permlab_accessCoarseLocation" 682 android:description="@string/permdesc_accessCoarseLocation" 683 android:protectionLevel="dangerous" /> 684 685 <!-- ====================================================================== --> 686 <!-- Permissions for accessing the device telephony --> 687 <!-- ====================================================================== --> 688 <eat-comment /> 689 690 <!-- Used for permissions that are associated telephony features. --> 691 <permission-group android:name="android.permission-group.PHONE" 692 android:icon="@drawable/perm_group_phone_calls" 693 android:label="@string/permgrouplab_phone" 694 android:description="@string/permgroupdesc_phone" 695 android:priority="500" /> 696 697 <!-- Allows read only access to phone state. 698 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 699 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 700 minSdkVersion}</a> and <a 701 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 702 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 703 grants your app this permission. If you don't need this permission, be sure your <a 704 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 705 targetSdkVersion}</a> is 4 or higher. 706 <p>Protection level: dangerous 707 --> 708 <permission android:name="android.permission.READ_PHONE_STATE" 709 android:permissionGroup="android.permission-group.PHONE" 710 android:label="@string/permlab_readPhoneState" 711 android:description="@string/permdesc_readPhoneState" 712 android:protectionLevel="dangerous" /> 713 714 <!-- Allows an application to initiate a phone call without going through 715 the Dialer user interface for the user to confirm the call. 716 <p>Protection level: dangerous 717 --> 718 <permission android:name="android.permission.CALL_PHONE" 719 android:permissionGroup="android.permission-group.PHONE" 720 android:permissionFlags="costsMoney" 721 android:label="@string/permlab_callPhone" 722 android:description="@string/permdesc_callPhone" 723 android:protectionLevel="dangerous" /> 724 725 <!-- Allows an application to access the IMS call service: making and 726 modifying a call 727 <p>Protection level: signature|privileged 728 @hide 729 --> 730 <permission android:name="android.permission.ACCESS_IMS_CALL_SERVICE" 731 android:permissionGroup="android.permission-group.PHONE" 732 android:label="@string/permlab_accessImsCallService" 733 android:description="@string/permdesc_accessImsCallService" 734 android:protectionLevel="signature|privileged" /> 735 736 <!-- Allows an application to read the user's call log. 737 <p class="note"><strong>Note:</strong> If your app uses the 738 {@link #READ_CONTACTS} permission and <em>both</em> your <a 739 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 740 minSdkVersion}</a> and <a 741 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 742 targetSdkVersion}</a> values are set to 15 or lower, the system implicitly 743 grants your app this permission. If you don't need this permission, be sure your <a 744 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 745 targetSdkVersion}</a> is 16 or higher.</p> 746 <p>Protection level: dangerous 747 --> 748 <permission android:name="android.permission.READ_CALL_LOG" 749 android:permissionGroup="android.permission-group.PHONE" 750 android:label="@string/permlab_readCallLog" 751 android:description="@string/permdesc_readCallLog" 752 android:protectionLevel="dangerous" /> 753 754 <!-- Allows an application to write (but not read) the user's 755 call log data. 756 <p class="note"><strong>Note:</strong> If your app uses the 757 {@link #WRITE_CONTACTS} permission and <em>both</em> your <a 758 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 759 minSdkVersion}</a> and <a 760 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 761 targetSdkVersion}</a> values are set to 15 or lower, the system implicitly 762 grants your app this permission. If you don't need this permission, be sure your <a 763 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 764 targetSdkVersion}</a> is 16 or higher.</p> 765 <p>Protection level: dangerous 766 --> 767 <permission android:name="android.permission.WRITE_CALL_LOG" 768 android:permissionGroup="android.permission-group.PHONE" 769 android:label="@string/permlab_writeCallLog" 770 android:description="@string/permdesc_writeCallLog" 771 android:protectionLevel="dangerous" /> 772 773 <!-- Allows an application to add voicemails into the system. 774 <p>Protection level: dangerous 775 --> 776 <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL" 777 android:permissionGroup="android.permission-group.PHONE" 778 android:label="@string/permlab_addVoicemail" 779 android:description="@string/permdesc_addVoicemail" 780 android:protectionLevel="dangerous" /> 781 782 <!-- Allows an application to use SIP service. 783 <p>Protection level: dangerous 784 --> 785 <permission android:name="android.permission.USE_SIP" 786 android:permissionGroup="android.permission-group.PHONE" 787 android:description="@string/permdesc_use_sip" 788 android:label="@string/permlab_use_sip" 789 android:protectionLevel="dangerous"/> 790 791 <!-- Allows an application to see the number being dialed during an outgoing 792 call with the option to redirect the call to a different number or 793 abort the call altogether. 794 <p>Protection level: dangerous 795 --> 796 <permission android:name="android.permission.PROCESS_OUTGOING_CALLS" 797 android:permissionGroup="android.permission-group.PHONE" 798 android:label="@string/permlab_processOutgoingCalls" 799 android:description="@string/permdesc_processOutgoingCalls" 800 android:protectionLevel="dangerous" /> 801 802 <!-- ====================================================================== --> 803 <!-- Permissions for accessing the device microphone --> 804 <!-- ====================================================================== --> 805 <eat-comment /> 806 807 <!-- Used for permissions that are associated with accessing 808 microphone audio from the device. Note that phone calls also capture audio 809 but are in a separate (more visible) permission group. --> 810 <permission-group android:name="android.permission-group.MICROPHONE" 811 android:icon="@drawable/perm_group_microphone" 812 android:label="@string/permgrouplab_microphone" 813 android:description="@string/permgroupdesc_microphone" 814 android:priority="600" /> 815 816 <!-- Allows an application to record audio. 817 <p>Protection level: dangerous 818 --> 819 <permission android:name="android.permission.RECORD_AUDIO" 820 android:permissionGroup="android.permission-group.MICROPHONE" 821 android:label="@string/permlab_recordAudio" 822 android:description="@string/permdesc_recordAudio" 823 android:protectionLevel="dangerous"/> 824 825 <!-- ====================================================================== --> 826 <!-- Permissions for accessing the device camera --> 827 <!-- ====================================================================== --> 828 <eat-comment /> 829 830 <!-- Used for permissions that are associated with accessing 831 camera or capturing images/video from the device. --> 832 <permission-group android:name="android.permission-group.CAMERA" 833 android:icon="@drawable/perm_group_camera" 834 android:label="@string/permgrouplab_camera" 835 android:description="@string/permgroupdesc_camera" 836 android:priority="700" /> 837 838 <!-- Required to be able to access the camera device. 839 <p>This will automatically enforce the <a 840 href="{@docRoot}guide/topics/manifest/uses-feature-element.html"> 841 <uses-feature>}</a> manifest element for <em>all</em> camera features. 842 If you do not require all camera features or can properly operate if a camera 843 is not available, then you must modify your manifest as appropriate in order to 844 install on devices that don't support all camera features.</p> 845 <p>Protection level: dangerous 846 --> 847 <permission android:name="android.permission.CAMERA" 848 android:permissionGroup="android.permission-group.CAMERA" 849 android:label="@string/permlab_camera" 850 android:description="@string/permdesc_camera" 851 android:protectionLevel="dangerous" /> 852 853 854 <!-- ====================================================================== --> 855 <!-- Permissions for accessing the device sensors --> 856 <!-- ====================================================================== --> 857 <eat-comment /> 858 859 <!-- Used for permissions that are associated with accessing 860 camera or capturing images/video from the device. --> 861 <permission-group android:name="android.permission-group.SENSORS" 862 android:icon="@drawable/perm_group_sensors" 863 android:label="@string/permgrouplab_sensors" 864 android:description="@string/permgroupdesc_sensors" 865 android:priority="800" /> 866 867 <!-- Allows an application to access data from sensors that the user uses to 868 measure what is happening inside his/her body, such as heart rate. 869 <p>Protection level: dangerous --> 870 <permission android:name="android.permission.BODY_SENSORS" 871 android:permissionGroup="android.permission-group.SENSORS" 872 android:label="@string/permlab_bodySensors" 873 android:description="@string/permdesc_bodySensors" 874 android:protectionLevel="dangerous" /> 875 876 <!-- Allows an app to use fingerprint hardware. 877 <p>Protection level: normal 878 --> 879 <permission android:name="android.permission.USE_FINGERPRINT" 880 android:permissionGroup="android.permission-group.SENSORS" 881 android:label="@string/permlab_useFingerprint" 882 android:description="@string/permdesc_useFingerprint" 883 android:protectionLevel="normal" /> 884 885 <!-- ====================================================================== --> 886 <!-- REMOVED PERMISSIONS --> 887 <!-- ====================================================================== --> 888 889 <!-- @hide We need to keep this around for backwards compatibility --> 890 <permission android:name="android.permission.READ_PROFILE" 891 android:protectionLevel="normal" 892 android:permissionFlags="hidden"/> 893 894 <!-- @hide We need to keep this around for backwards compatibility --> 895 <permission android:name="android.permission.WRITE_PROFILE" 896 android:protectionLevel="normal" 897 android:permissionFlags="hidden"/> 898 899 <!-- @hide We need to keep this around for backwards compatibility --> 900 <permission android:name="android.permission.READ_SOCIAL_STREAM" 901 android:protectionLevel="normal" 902 android:permissionFlags="hidden"/> 903 904 <!-- @hide We need to keep this around for backwards compatibility --> 905 <permission android:name="android.permission.WRITE_SOCIAL_STREAM" 906 android:protectionLevel="normal" 907 android:permissionFlags="hidden"/> 908 909 <!-- @hide We need to keep this around for backwards compatibility --> 910 <permission android:name="android.permission.READ_USER_DICTIONARY" 911 android:protectionLevel="normal" 912 android:permissionFlags="hidden"/> 913 914 <!-- @hide We need to keep this around for backwards compatibility --> 915 <permission android:name="android.permission.WRITE_USER_DICTIONARY" 916 android:protectionLevel="normal" 917 android:permissionFlags="hidden"/> 918 919 <!-- @hide We need to keep this around for backwards compatibility --> 920 <permission android:name="android.permission.WRITE_SMS" 921 android:protectionLevel="normal" 922 android:permissionFlags="hidden"/> 923 924 <!-- @hide We need to keep this around for backwards compatibility --> 925 <permission android:name="com.android.browser.permission.READ_HISTORY_BOOKMARKS" 926 android:protectionLevel="normal" 927 android:permissionFlags="hidden"/> 928 929 <!-- @hide We need to keep this around for backwards compatibility --> 930 <permission android:name="com.android.browser.permission.WRITE_HISTORY_BOOKMARKS" 931 android:protectionLevel="normal" 932 android:permissionFlags="hidden"/> 933 934 <!-- @hide We need to keep this around for backwards compatibility --> 935 <permission android:name="android.permission.AUTHENTICATE_ACCOUNTS" 936 android:protectionLevel="normal" 937 android:permissionFlags="hidden"/> 938 939 <!-- @hide We need to keep this around for backwards compatibility --> 940 <permission android:name="android.permission.MANAGE_ACCOUNTS" 941 android:protectionLevel="normal" 942 android:permissionFlags="hidden"/> 943 944 <!-- @hide We need to keep this around for backwards compatibility --> 945 <permission android:name="android.permission.USE_CREDENTIALS" 946 android:protectionLevel="normal" 947 android:permissionFlags="hidden"/> 948 949 <!-- @hide We need to keep this around for backwards compatibility --> 950 <permission android:name="android.permission.SUBSCRIBED_FEEDS_READ" 951 android:protectionLevel="normal" 952 android:permissionFlags="hidden"/> 953 954 <!-- @hide We need to keep this around for backwards compatibility --> 955 <permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE" 956 android:protectionLevel="normal" 957 android:permissionFlags="hidden"/> 958 959 <!-- @hide We need to keep this around for backwards compatibility --> 960 <permission android:name="android.permission.FLASHLIGHT" 961 android:protectionLevel="normal" 962 android:permissionFlags="hidden"/> 963 964 <!-- ====================================================================== --> 965 <!-- INSTALL PERMISSIONS --> 966 <!-- ====================================================================== --> 967 968` <!-- =========================================== --> 969 <!-- Permissions for accessing contact metadata --> 970 <!-- =========================================== --> 971 <eat-comment /> 972 973 <!-- @SystemApi Allows an application to read/write contact metadata. 974 <p>Not for use by third-party applications. --> 975 <permission android:name="android.permission.READ_WRITE_CONTACT_METADATA" 976 android:protectionLevel="signature|system" /> 977 978 <!-- ================================== --> 979 <!-- Permissions for accessing messages --> 980 <!-- ================================== --> 981 <eat-comment /> 982 983 <!-- @SystemApi Allows an application (Phone) to send a request to other applications 984 to handle the respond-via-message action during incoming calls. 985 <p>Not for use by third-party applications. --> 986 <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE" 987 android:protectionLevel="signature|privileged" /> 988 989 <!-- Allows an application to filter carrier specific sms. 990 @hide --> 991 <permission android:name="android.permission.CARRIER_FILTER_SMS" 992 android:protectionLevel="signature|privileged" /> 993 994 <!-- @SystemApi Allows an application to receive emergency cell broadcast messages, 995 to record or display them to the user. 996 <p>Not for use by third-party applications. --> 997 <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST" 998 android:protectionLevel="signature|privileged" /> 999 1000 <!-- Allows an application to monitor incoming Bluetooth MAP messages, to record 1001 or perform processing on them. --> 1002 <!-- @hide --> 1003 <permission android:name="android.permission.RECEIVE_BLUETOOTH_MAP" 1004 android:protectionLevel="signature|privileged" /> 1005 1006 <!-- @SystemApi @hide Allows an application to execute contacts directory search. 1007 This should only be used by ContactsProvider. 1008 <p>Not for use by third-party applications. --> 1009 <permission android:name="android.permission.BIND_DIRECTORY_SEARCH" 1010 android:protectionLevel="signature|privileged" /> 1011 1012 <!-- @SystemApi @hide Allows an application to modify cell broadcasts through the content provider. 1013 <p>Not for use by third-party applications. --> 1014 <permission android:name="android.permission.MODIFY_CELL_BROADCASTS" 1015 android:protectionLevel="signature|privileged" /> 1016 1017 <!-- =============================================================== --> 1018 <!-- Permissions for setting the device alarm --> 1019 <!-- =============================================================== --> 1020 <eat-comment /> 1021 1022 <!-- Allows an application to broadcast an Intent to set an alarm for the user. 1023 <p>Protection level: normal 1024 --> 1025 <permission android:name="com.android.alarm.permission.SET_ALARM" 1026 android:label="@string/permlab_setAlarm" 1027 android:description="@string/permdesc_setAlarm" 1028 android:protectionLevel="normal" /> 1029 1030 <!-- =============================================================== --> 1031 <!-- Permissions for accessing the user voicemail --> 1032 <!-- =============================================================== --> 1033 <eat-comment /> 1034 1035 <!-- Allows an application to modify and remove existing voicemails in the system 1036 <p>Protection level: signature|privileged 1037 --> 1038 <permission android:name="com.android.voicemail.permission.WRITE_VOICEMAIL" 1039 android:protectionLevel="signature|privileged" /> 1040 1041 <!-- Allows an application to read voicemails in the system. 1042 <p>Protection level: signature|privileged 1043 --> 1044 <permission android:name="com.android.voicemail.permission.READ_VOICEMAIL" 1045 android:protectionLevel="signature|privileged" /> 1046 1047 <!-- ======================================= --> 1048 <!-- Permissions for accessing location info --> 1049 <!-- ======================================= --> 1050 <eat-comment /> 1051 1052 <!-- Allows an application to access extra location provider commands 1053 <p>Protection level: normal 1054 --> 1055 <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS" 1056 android:label="@string/permlab_accessLocationExtraCommands" 1057 android:description="@string/permdesc_accessLocationExtraCommands" 1058 android:protectionLevel="normal" /> 1059 1060 <!-- @SystemApi Allows an application to install a location provider into the Location Manager. 1061 <p>Not for use by third-party applications. --> 1062 <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER" 1063 android:protectionLevel="signature|privileged" /> 1064 1065 <!-- @SystemApi @hide Allows HDMI-CEC service to access device and configuration files. 1066 This should only be used by HDMI-CEC service. 1067 --> 1068 <permission android:name="android.permission.HDMI_CEC" 1069 android:protectionLevel="signature|privileged" /> 1070 1071 <!-- @SystemApi Allows an application to use location features in hardware, 1072 such as the geofencing api. 1073 <p>Not for use by third-party applications. --> 1074 <permission android:name="android.permission.LOCATION_HARDWARE" 1075 android:protectionLevel="signature|privileged" /> 1076 <uses-permission android:name="android.permission.LOCATION_HARDWARE"/> 1077 1078 <!-- @SystemApi Allows an application to create mock location providers for testing. 1079 <p>Protection level: signature 1080 @hide 1081 --> 1082 <permission android:name="android.permission.ACCESS_MOCK_LOCATION" 1083 android:protectionLevel="signature" /> 1084 1085 <!-- ======================================= --> 1086 <!-- Permissions for accessing networks --> 1087 <!-- ======================================= --> 1088 <eat-comment /> 1089 1090 <!-- Allows applications to open network sockets. 1091 <p>Protection level: normal 1092 --> 1093 <permission android:name="android.permission.INTERNET" 1094 android:description="@string/permdesc_createNetworkSockets" 1095 android:label="@string/permlab_createNetworkSockets" 1096 android:protectionLevel="normal" /> 1097 1098 <!-- Allows applications to access information about networks 1099 <p>Protection level: normal 1100 --> 1101 <permission android:name="android.permission.ACCESS_NETWORK_STATE" 1102 android:description="@string/permdesc_accessNetworkState" 1103 android:label="@string/permlab_accessNetworkState" 1104 android:protectionLevel="normal" /> 1105 1106 <!-- Allows applications to access information about Wi-Fi networks. 1107 <p>Protection level: normal 1108 --> 1109 <permission android:name="android.permission.ACCESS_WIFI_STATE" 1110 android:description="@string/permdesc_accessWifiState" 1111 android:label="@string/permlab_accessWifiState" 1112 android:protectionLevel="normal" /> 1113 1114 <!-- Allows applications to change Wi-Fi connectivity state. 1115 <p>Protection level: normal 1116 --> 1117 <permission android:name="android.permission.CHANGE_WIFI_STATE" 1118 android:description="@string/permdesc_changeWifiState" 1119 android:label="@string/permlab_changeWifiState" 1120 android:protectionLevel="normal" /> 1121 1122 <!-- @SystemApi @hide Allows applications to read Wi-Fi credential. 1123 <p>Not for use by third-party applications. --> 1124 <permission android:name="android.permission.READ_WIFI_CREDENTIAL" 1125 android:protectionLevel="signature|privileged" /> 1126 1127 <!-- @SystemApi @hide Allows applications to change tether state and run 1128 tether carrier provisioning. 1129 <p>Not for use by third-party applications. --> 1130 <permission android:name="android.permission.TETHER_PRIVILEGED" 1131 android:protectionLevel="signature|privileged" /> 1132 1133 <!-- @SystemApi @hide Allow system apps to receive broadcast 1134 when a wifi network credential is changed. 1135 <p>Not for use by third-party applications. --> 1136 <permission android:name="android.permission.RECEIVE_WIFI_CREDENTIAL_CHANGE" 1137 android:protectionLevel="signature|privileged" /> 1138 1139 <!-- @SystemApi @hide Allows an application to modify any wifi configuration, even if created 1140 by another application. Once reconfigured the original creator cannot make any further 1141 modifications. 1142 <p>Not for use by third-party applications. --> 1143 <permission android:name="android.permission.OVERRIDE_WIFI_CONFIG" 1144 android:protectionLevel="signature|privileged" /> 1145 1146 <!-- @hide --> 1147 <permission android:name="android.permission.ACCESS_WIMAX_STATE" 1148 android:description="@string/permdesc_accessWimaxState" 1149 android:label="@string/permlab_accessWimaxState" 1150 android:protectionLevel="normal" /> 1151 1152 <!-- @hide --> 1153 <permission android:name="android.permission.CHANGE_WIMAX_STATE" 1154 android:description="@string/permdesc_changeWimaxState" 1155 android:label="@string/permlab_changeWimaxState" 1156 android:protectionLevel="normal" /> 1157 1158 <!-- Allows applications to act as network scorers. @hide @SystemApi--> 1159 <permission android:name="android.permission.SCORE_NETWORKS" 1160 android:protectionLevel="signature|privileged" /> 1161 1162 <!-- ======================================= --> 1163 <!-- Permissions for short range, peripheral networks --> 1164 <!-- ======================================= --> 1165 <eat-comment /> 1166 1167 <!-- Allows applications to connect to paired bluetooth devices. 1168 <p>Protection level: normal 1169 --> 1170 <permission android:name="android.permission.BLUETOOTH" 1171 android:description="@string/permdesc_bluetooth" 1172 android:label="@string/permlab_bluetooth" 1173 android:protectionLevel="normal" /> 1174 1175 <!-- Allows applications to discover and pair bluetooth devices. 1176 <p>Protection level: normal 1177 --> 1178 <permission android:name="android.permission.BLUETOOTH_ADMIN" 1179 android:description="@string/permdesc_bluetoothAdmin" 1180 android:label="@string/permlab_bluetoothAdmin" 1181 android:protectionLevel="normal" /> 1182 1183 <!-- @SystemApi Allows applications to pair bluetooth devices without user interaction, and to 1184 allow or disallow phonebook access or message access. 1185 This is not available to third party applications. --> 1186 <permission android:name="android.permission.BLUETOOTH_PRIVILEGED" 1187 android:protectionLevel="signature|privileged" /> 1188 1189 <!-- Control access to email providers exclusively for Bluetooth 1190 @hide 1191 --> 1192 <permission android:name="android.permission.BLUETOOTH_MAP" 1193 android:protectionLevel="signature" /> 1194 1195 <!-- Allows bluetooth stack to access files 1196 @hide This should only be used by Bluetooth apk. 1197 --> 1198 <permission android:name="android.permission.BLUETOOTH_STACK" 1199 android:protectionLevel="signature" /> 1200 1201 <!-- Allows applications to perform I/O operations over NFC. 1202 <p>Protection level: normal 1203 --> 1204 <permission android:name="android.permission.NFC" 1205 android:description="@string/permdesc_nfc" 1206 android:label="@string/permlab_nfc" 1207 android:protectionLevel="normal" /> 1208 1209 <!-- @SystemApi Allows an internal user to use privileged ConnectivityManager APIs. 1210 @hide --> 1211 <permission android:name="android.permission.CONNECTIVITY_INTERNAL" 1212 android:protectionLevel="signature|privileged" /> 1213 1214 <!-- Allows a system application to access hardware packet offload capabilities. 1215 @hide --> 1216 <permission android:name="android.permission.PACKET_KEEPALIVE_OFFLOAD" 1217 android:protectionLevel="signature|privileged" /> 1218 1219 <!-- @SystemApi 1220 @hide --> 1221 <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE" 1222 android:protectionLevel="signature|privileged" /> 1223 1224 <!-- @SystemApi Allows access to the loop radio (Android@Home mesh network) device. 1225 @hide --> 1226 <permission android:name="android.permission.LOOP_RADIO" 1227 android:protectionLevel="signature|privileged" /> 1228 1229 <!-- Allows sending and receiving handover transfer status from Wifi and Bluetooth 1230 @hide --> 1231 <permission android:name="android.permission.NFC_HANDOVER_STATUS" 1232 android:protectionLevel="signature|privileged" /> 1233 1234 <!-- ================================== --> 1235 <!-- Permissions for accessing accounts --> 1236 <!-- ================================== --> 1237 <eat-comment /> 1238 1239 <!-- Allows access to the list of accounts in the Accounts Service. 1240 <p>Protection level: normal 1241 --> 1242 <permission android:name="android.permission.GET_ACCOUNTS" 1243 android:permissionGroup="android.permission-group.CONTACTS" 1244 android:protectionLevel="dangerous" 1245 android:description="@string/permdesc_getAccounts" 1246 android:label="@string/permlab_getAccounts" /> 1247 1248 <!-- @SystemApi Allows applications to call into AccountAuthenticators. 1249 <p>Not for use by third-party applications. --> 1250 <permission android:name="android.permission.ACCOUNT_MANAGER" 1251 android:protectionLevel="signature" /> 1252 1253 <!-- ================================== --> 1254 <!-- Permissions for accessing hardware that may effect battery life--> 1255 <!-- ================================== --> 1256 <eat-comment /> 1257 1258 <!-- Allows applications to enter Wi-Fi Multicast mode. 1259 <p>Protection level: normal 1260 --> 1261 <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE" 1262 android:description="@string/permdesc_changeWifiMulticastState" 1263 android:label="@string/permlab_changeWifiMulticastState" 1264 android:protectionLevel="normal" /> 1265 1266 <!-- Allows access to the vibrator. 1267 <p>Protection level: normal 1268 --> 1269 <permission android:name="android.permission.VIBRATE" 1270 android:label="@string/permlab_vibrate" 1271 android:description="@string/permdesc_vibrate" 1272 android:protectionLevel="normal" /> 1273 1274 <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen 1275 from dimming. 1276 <p>Protection level: normal 1277 --> 1278 <permission android:name="android.permission.WAKE_LOCK" 1279 android:label="@string/permlab_wakeLock" 1280 android:description="@string/permdesc_wakeLock" 1281 android:protectionLevel="normal" /> 1282 1283 <!-- Allows using the device's IR transmitter, if available. 1284 <p>Protection level: normal 1285 --> 1286 <permission android:name="android.permission.TRANSMIT_IR" 1287 android:label="@string/permlab_transmitIr" 1288 android:description="@string/permdesc_transmitIr" 1289 android:protectionLevel="normal" /> 1290 1291 <!-- ==================================================== --> 1292 <!-- Permissions related to changing audio settings --> 1293 <!-- ==================================================== --> 1294 <eat-comment /> 1295 1296 <!-- Allows an application to modify global audio settings. 1297 <p>Protection level: normal 1298 --> 1299 <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS" 1300 android:label="@string/permlab_modifyAudioSettings" 1301 android:description="@string/permdesc_modifyAudioSettings" 1302 android:protectionLevel="normal" /> 1303 1304 <!-- ================================== --> 1305 <!-- Permissions for accessing hardware --> 1306 <!-- ================================== --> 1307 <eat-comment /> 1308 1309 <!-- @SystemApi Allows an application to manage preferences and permissions for USB devices 1310 @hide --> 1311 <permission android:name="android.permission.MANAGE_USB" 1312 android:protectionLevel="signature|privileged" /> 1313 1314 <!-- @SystemApi Allows an application to access the MTP USB kernel driver. 1315 For use only by the device side MTP implementation. 1316 @hide --> 1317 <permission android:name="android.permission.ACCESS_MTP" 1318 android:protectionLevel="signature|privileged" /> 1319 1320 <!-- @SystemApi Allows access to hardware peripherals. Intended only for hardware testing. 1321 <p>Not for use by third-party applications. 1322 @hide 1323 --> 1324 <permission android:name="android.permission.HARDWARE_TEST" 1325 android:protectionLevel="signature" /> 1326 1327 <!-- @SystemApi Allows access to FM 1328 @hide This is not a third-party API (intended for system apps).--> 1329 <permission android:name="android.permission.ACCESS_FM_RADIO" 1330 android:protectionLevel="signature|privileged" /> 1331 1332 <!-- Allows access to configure network interfaces, configure/use IPSec, etc. 1333 @hide --> 1334 <permission android:name="android.permission.NET_ADMIN" 1335 android:protectionLevel="signature" /> 1336 1337 <!-- Allows registration for remote audio playback. @hide --> 1338 <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK" 1339 android:protectionLevel="signature" /> 1340 1341 <!-- @SystemApi Allows TvInputService to access underlying TV input hardware such as 1342 built-in tuners and HDMI-in's. 1343 @hide This should only be used by OEM's TvInputService's. 1344 --> 1345 <permission android:name="android.permission.TV_INPUT_HARDWARE" 1346 android:protectionLevel="signature|privileged" /> 1347 1348 <!-- @SystemApi Allows to capture a frame of TV input hardware such as 1349 built-in tuners and HDMI-in's. 1350 @hide <p>Not for use by third-party applications. 1351 --> 1352 <permission android:name="android.permission.CAPTURE_TV_INPUT" 1353 android:protectionLevel="signature|privileged" /> 1354 1355 <!-- @hide Allows TvInputService to access DVB device. 1356 <p>Not for use by third-party applications. --> 1357 <permission android:name="android.permission.DVB_DEVICE" 1358 android:protectionLevel="signature|privileged" /> 1359 1360 <!-- @hide Allows enabling/disabling OEM unlock 1361 <p>Not for use by third-party applications. --> 1362 <permission android:name="android.permission.OEM_UNLOCK_STATE" 1363 android:protectionLevel="signature" /> 1364 1365 <!-- @hide Allows querying state of PersistentDataBlock 1366 <p>Not for use by third-party applications. --> 1367 <permission android:name="android.permission.ACCESS_PDB_STATE" 1368 android:protectionLevel="signature" /> 1369 1370 <!-- @hide Allows system update service to notify device owner about pending updates. 1371 <p>Not for use by third-party applications. --> 1372 <permission android:name="android.permission.NOTIFY_PENDING_SYSTEM_UPDATE" 1373 android:protectionLevel="signature|privileged" /> 1374 1375 <!-- =========================================== --> 1376 <!-- Permissions associated with camera and image capture --> 1377 <!-- =========================================== --> 1378 <eat-comment /> 1379 1380 <!-- @SystemApi Allows disabling the transmit-indicator LED that is normally on when 1381 a camera is in use by an application. 1382 @hide --> 1383 <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED" 1384 android:protectionLevel="signature|privileged" /> 1385 1386 <!-- Allows sending the camera service notifications about system-wide events. 1387 @hide --> 1388 <permission android:name="android.permission.CAMERA_SEND_SYSTEM_EVENTS" 1389 android:protectionLevel="signature|privileged" /> 1390 1391 <!-- =========================================== --> 1392 <!-- Permissions associated with telephony state --> 1393 <!-- =========================================== --> 1394 <eat-comment /> 1395 1396 <!-- @SystemApi Allows modification of the telephony state - power on, mmi, etc. 1397 Does not include placing calls. 1398 <p>Not for use by third-party applications. --> 1399 <permission android:name="android.permission.MODIFY_PHONE_STATE" 1400 android:protectionLevel="signature|privileged" /> 1401 1402 <!-- Allows read only access to precise phone state. 1403 @hide Pending API council approval --> 1404 <permission android:name="android.permission.READ_PRECISE_PHONE_STATE" 1405 android:protectionLevel="signature|privileged" /> 1406 1407 <!-- @SystemApi Allows read access to privileged phone state. 1408 @hide Used internally. --> 1409 <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE" 1410 android:protectionLevel="signature|privileged" /> 1411 1412 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1413 PhoneAccount#CAPABILITY_SIM_SUBSCRIPTION. This capability indicates that the PhoneAccount 1414 corresponds to a device SIM. 1415 @hide --> 1416 <permission android:name="android.permission.REGISTER_SIM_SUBSCRIPTION" 1417 android:protectionLevel="signature|privileged" /> 1418 1419 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1420 PhoneAccount#CAPABILITY_CALL_PROVIDER. 1421 @hide --> 1422 <permission android:name="android.permission.REGISTER_CALL_PROVIDER" 1423 android:protectionLevel="signature|privileged" /> 1424 1425 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1426 PhoneAccount#CAPABILITY_CONNECTION_MANAGER 1427 @hide --> 1428 <permission android:name="android.permission.REGISTER_CONNECTION_MANAGER" 1429 android:protectionLevel="signature|privileged" /> 1430 1431 <!-- Must be required by a {@link android.telecom.InCallService}, 1432 to ensure that only the system can bind to it. 1433 <p>Protection level: signature|privileged 1434 --> 1435 <permission android:name="android.permission.BIND_INCALL_SERVICE" 1436 android:protectionLevel="signature|privileged" /> 1437 1438 <!-- Must be required by a {@link android.telecom.CallScreeningService}, 1439 to ensure that only the system can bind to it. 1440 <p>Protection level: signature|privileged 1441 --> 1442 <permission android:name="android.permission.BIND_SCREENING_SERVICE" 1443 android:protectionLevel="signature|privileged" /> 1444 1445 <!-- Must be required by a {@link android.telecom.ConnectionService}, 1446 to ensure that only the system can bind to it. 1447 @deprecated {@link android.telecom.ConnectionService}s should require 1448 android.permission.BIND_TELECOM_CONNECTION_SERVICE instead. 1449 @SystemApi 1450 @hide --> 1451 <permission android:name="android.permission.BIND_CONNECTION_SERVICE" 1452 android:protectionLevel="signature|privileged" /> 1453 1454 <!-- Must be required by a {@link android.telecom.ConnectionService}, 1455 to ensure that only the system can bind to it. 1456 <p>Protection level: signature|privileged 1457 --> 1458 <permission android:name="android.permission.BIND_TELECOM_CONNECTION_SERVICE" 1459 android:protectionLevel="signature|privileged" /> 1460 1461 <!-- @SystemApi Allows an application to control the in-call experience. 1462 @hide --> 1463 <permission android:name="android.permission.CONTROL_INCALL_EXPERIENCE" 1464 android:protectionLevel="signature|privileged" /> 1465 1466 <!-- Allows an application to receive STK related commands. 1467 @hide --> 1468 <permission android:name="android.permission.RECEIVE_STK_COMMANDS" 1469 android:protectionLevel="signature|privileged" /> 1470 1471 <!-- ================================== --> 1472 <!-- Permissions for sdcard interaction --> 1473 <!-- ================================== --> 1474 <eat-comment /> 1475 1476 <!-- @SystemApi Allows an application to write to internal media storage 1477 @hide --> 1478 <permission android:name="android.permission.WRITE_MEDIA_STORAGE" 1479 android:protectionLevel="signature|privileged" /> 1480 1481 <!-- Allows an application to manage access to documents, usually as part 1482 of a document picker. 1483 <p>Protection level: signature 1484 --> 1485 <permission android:name="android.permission.MANAGE_DOCUMENTS" 1486 android:protectionLevel="signature" /> 1487 1488 <!-- ================================== --> 1489 <!-- Permissions for screenlock --> 1490 <!-- ================================== --> 1491 <eat-comment /> 1492 1493 <!-- Allows applications to disable the keyguard if it is not secure. 1494 <p>Protection level: normal 1495 --> 1496 <permission android:name="android.permission.DISABLE_KEYGUARD" 1497 android:description="@string/permdesc_disableKeyguard" 1498 android:label="@string/permlab_disableKeyguard" 1499 android:protectionLevel="normal" /> 1500 1501 <!-- ================================== --> 1502 <!-- Permissions to access other installed applications --> 1503 <!-- ================================== --> 1504 <eat-comment /> 1505 1506 <!-- @deprecated No longer enforced. --> 1507 <permission android:name="android.permission.GET_TASKS" 1508 android:label="@string/permlab_getTasks" 1509 android:description="@string/permdesc_getTasks" 1510 android:protectionLevel="normal" /> 1511 1512 <!-- New version of GET_TASKS that apps can request, since GET_TASKS doesn't really 1513 give access to task information. We need this new one because there are 1514 many existing apps that use add libraries and such that have validation 1515 code to ensure the app has requested the GET_TASKS permission by seeing 1516 if it has been granted the permission... if it hasn't, it kills the app 1517 with a message about being upset. So we need to have it continue to look 1518 like the app is getting that permission, even though it will never be 1519 checked, and new privileged apps can now request this one for real access. 1520 @hide 1521 @SystemApi --> 1522 <permission android:name="android.permission.REAL_GET_TASKS" 1523 android:protectionLevel="signature|privileged" /> 1524 1525 <!-- Allows an application to start a task from a ActivityManager#RecentTaskInfo. 1526 @hide --> 1527 <permission android:name="android.permission.START_TASKS_FROM_RECENTS" 1528 android:protectionLevel="signature|privileged" /> 1529 1530 <!-- @SystemApi @hide Allows an application to call APIs that allow it to do interactions 1531 across the users on the device, using singleton services and 1532 user-targeted broadcasts. This permission is not available to 1533 third party applications. --> 1534 <permission android:name="android.permission.INTERACT_ACROSS_USERS" 1535 android:protectionLevel="signature|privileged|development" /> 1536 1537 <!-- @hide Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS} 1538 that removes restrictions on where broadcasts can be sent and allows other 1539 types of interactions. --> 1540 <permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL" 1541 android:protectionLevel="signature|installer" /> 1542 1543 <!-- @SystemApi @hide Allows an application to call APIs that allow it to query and manage 1544 users on the device. This permission is not available to 1545 third party applications. --> 1546 <permission android:name="android.permission.MANAGE_USERS" 1547 android:protectionLevel="signature|privileged" /> 1548 1549 <!-- @hide Allows an application to set the profile owners and the device owner. 1550 This permission is not available to third party applications.--> 1551 <permission android:name="android.permission.MANAGE_PROFILE_AND_DEVICE_OWNERS" 1552 android:protectionLevel="signature" 1553 android:label="@string/permlab_manageProfileAndDeviceOwners" 1554 android:description="@string/permdesc_manageProfileAndDeviceOwners" /> 1555 1556 <!-- Allows an application to get full detailed information about 1557 recently running tasks, with full fidelity to the real state. 1558 @hide --> 1559 <permission android:name="android.permission.GET_DETAILED_TASKS" 1560 android:protectionLevel="signature" /> 1561 1562 <!-- Allows an application to change the Z-order of tasks. 1563 <p>Protection level: normal 1564 --> 1565 <permission android:name="android.permission.REORDER_TASKS" 1566 android:label="@string/permlab_reorderTasks" 1567 android:description="@string/permdesc_reorderTasks" 1568 android:protectionLevel="normal" /> 1569 1570 <!-- @hide Allows an application to change to remove/kill tasks --> 1571 <permission android:name="android.permission.REMOVE_TASKS" 1572 android:protectionLevel="signature" /> 1573 1574 <!-- @SystemApi @hide Allows an application to create/manage/remove stacks --> 1575 <permission android:name="android.permission.MANAGE_ACTIVITY_STACKS" 1576 android:protectionLevel="signature|privileged" /> 1577 1578 <!-- Allows an application to start any activity, regardless of permission 1579 protection or exported state. 1580 @hide --> 1581 <permission android:name="android.permission.START_ANY_ACTIVITY" 1582 android:protectionLevel="signature" /> 1583 1584 <!-- @deprecated The {@link android.app.ActivityManager#restartPackage} 1585 API is no longer supported. --> 1586 <permission android:name="android.permission.RESTART_PACKAGES" 1587 android:label="@string/permlab_killBackgroundProcesses" 1588 android:description="@string/permdesc_killBackgroundProcesses" 1589 android:protectionLevel="normal" /> 1590 1591 <!-- Allows an application to call 1592 {@link android.app.ActivityManager#killBackgroundProcesses}. 1593 <p>Protection level: normal 1594 --> 1595 <permission android:name="android.permission.KILL_BACKGROUND_PROCESSES" 1596 android:label="@string/permlab_killBackgroundProcesses" 1597 android:description="@string/permdesc_killBackgroundProcesses" 1598 android:protectionLevel="normal" /> 1599 1600 <!-- @SystemApi @hide Allows an application to query process states and current 1601 OOM adjustment scores. 1602 <p>Not for use by third-party applications. --> 1603 <permission android:name="android.permission.GET_PROCESS_STATE_AND_OOM_SCORE" 1604 android:protectionLevel="signature|privileged|development" /> 1605 1606 <!-- @SystemApi @hide Allows an application to retrieve a package's importance. 1607 This permission is not available to third party applications. --> 1608 <permission android:name="android.permission.GET_PACKAGE_IMPORTANCE" 1609 android:protectionLevel="signature|privileged" /> 1610 1611 <!-- ================================== --> 1612 <!-- Permissions affecting the display of other applications --> 1613 <!-- ================================== --> 1614 <eat-comment /> 1615 1616 <!-- Allows an application to open windows using the type 1617 {@link android.view.WindowManager.LayoutParams#TYPE_SYSTEM_ALERT}, 1618 shown on top of all other applications. Very few applications 1619 should use this permission; these windows are intended for 1620 system-level interaction with the user. --> 1621 <permission android:name="android.permission.SYSTEM_ALERT_WINDOW" 1622 android:label="@string/permlab_systemAlertWindow" 1623 android:description="@string/permdesc_systemAlertWindow" 1624 android:protectionLevel="signature|preinstalled|appop|pre23|development" /> 1625 1626 <!-- ================================== --> 1627 <!-- Permissions affecting the system wallpaper --> 1628 <!-- ================================== --> 1629 <eat-comment /> 1630 1631 <!-- Allows applications to set the wallpaper. 1632 <p>Protection level: normal 1633 --> 1634 <permission android:name="android.permission.SET_WALLPAPER" 1635 android:label="@string/permlab_setWallpaper" 1636 android:description="@string/permdesc_setWallpaper" 1637 android:protectionLevel="normal" /> 1638 1639 <!-- Allows applications to set the wallpaper hints. 1640 <p>Protection level: normal 1641 --> 1642 <permission android:name="android.permission.SET_WALLPAPER_HINTS" 1643 android:label="@string/permlab_setWallpaperHints" 1644 android:description="@string/permdesc_setWallpaperHints" 1645 android:protectionLevel="normal" /> 1646 1647 <!-- ============================================ --> 1648 <!-- Permissions for changing the system clock --> 1649 <!-- ============================================ --> 1650 <eat-comment /> 1651 1652 <!-- @SystemApi Allows applications to set the system time. 1653 <p>Not for use by third-party applications. --> 1654 <permission android:name="android.permission.SET_TIME" 1655 android:protectionLevel="signature|privileged" /> 1656 1657 <!-- Allows applications to set the system time zone. 1658 <p>Protection level: normal 1659 --> 1660 <permission android:name="android.permission.SET_TIME_ZONE" 1661 android:label="@string/permlab_setTimeZone" 1662 android:description="@string/permdesc_setTimeZone" 1663 android:protectionLevel="normal" /> 1664 1665 <!-- ==================================================== --> 1666 <!-- Permissions related to changing status bar --> 1667 <!-- ==================================================== --> 1668 <eat-comment /> 1669 1670 <!-- Allows an application to expand or collapse the status bar. 1671 <p>Protection level: normal 1672 --> 1673 <permission android:name="android.permission.EXPAND_STATUS_BAR" 1674 android:label="@string/permlab_expandStatusBar" 1675 android:description="@string/permdesc_expandStatusBar" 1676 android:protectionLevel="normal" /> 1677 1678 <!-- ============================================================== --> 1679 <!-- Permissions related to adding/removing shortcuts from Launcher --> 1680 <!-- ============================================================== --> 1681 <eat-comment /> 1682 1683 <!-- Allows an application to install a shortcut in Launcher. 1684 <p>Protection level: normal 1685 --> 1686 <permission android:name="com.android.launcher.permission.INSTALL_SHORTCUT" 1687 android:label="@string/permlab_install_shortcut" 1688 android:description="@string/permdesc_install_shortcut" 1689 android:protectionLevel="normal"/> 1690 1691 <!-- Allows an application to uninstall a shortcut in Launcher. 1692 <p>Protection level: normal 1693 --> 1694 <permission android:name="com.android.launcher.permission.UNINSTALL_SHORTCUT" 1695 android:label="@string/permlab_uninstall_shortcut" 1696 android:description="@string/permdesc_uninstall_shortcut" 1697 android:protectionLevel="normal"/> 1698 1699 <!-- ==================================================== --> 1700 <!-- Permissions related to accessing sync settings --> 1701 <!-- ==================================================== --> 1702 <eat-comment /> 1703 1704 <!-- Allows applications to read the sync settings. 1705 <p>Protection level: normal 1706 --> 1707 <permission android:name="android.permission.READ_SYNC_SETTINGS" 1708 android:description="@string/permdesc_readSyncSettings" 1709 android:label="@string/permlab_readSyncSettings" 1710 android:protectionLevel="normal" /> 1711 1712 <!-- Allows applications to write the sync settings. 1713 <p>Protection level: normal 1714 --> 1715 <permission android:name="android.permission.WRITE_SYNC_SETTINGS" 1716 android:description="@string/permdesc_writeSyncSettings" 1717 android:label="@string/permlab_writeSyncSettings" 1718 android:protectionLevel="normal" /> 1719 1720 <!-- Allows applications to read the sync stats. 1721 <p>Protection level: normal 1722 --> 1723 <permission android:name="android.permission.READ_SYNC_STATS" 1724 android:description="@string/permdesc_readSyncStats" 1725 android:label="@string/permlab_readSyncStats" 1726 android:protectionLevel="normal" /> 1727 1728 <!-- ============================================ --> 1729 <!-- Permissions for low-level system interaction --> 1730 <!-- ============================================ --> 1731 <eat-comment /> 1732 1733 <!-- @SystemApi @hide Change the screen compatibility mode of applications --> 1734 <permission android:name="android.permission.SET_SCREEN_COMPATIBILITY" 1735 android:protectionLevel="signature" /> 1736 1737 <!-- @SystemApi Allows an application to modify the current configuration, such 1738 as locale. --> 1739 <permission android:name="android.permission.CHANGE_CONFIGURATION" 1740 android:protectionLevel="signature|privileged|development" /> 1741 1742 <!-- Allows an application to read or write the system settings. 1743 <p>Protection level: signature 1744 --> 1745 <permission android:name="android.permission.WRITE_SETTINGS" 1746 android:label="@string/permlab_writeSettings" 1747 android:description="@string/permdesc_writeSettings" 1748 android:protectionLevel="signature|preinstalled|appop|pre23" /> 1749 1750 <!-- @SystemApi Allows an application to modify the Google service map. 1751 <p>Not for use by third-party applications. --> 1752 <permission android:name="android.permission.WRITE_GSERVICES" 1753 android:protectionLevel="signature|privileged" /> 1754 1755 <!-- @SystemApi Allows an application to call 1756 {@link android.app.ActivityManager#forceStopPackage}. 1757 @hide --> 1758 <permission android:name="android.permission.FORCE_STOP_PACKAGES" 1759 android:protectionLevel="signature|privileged" /> 1760 1761 <!-- @SystemApi @hide Allows an application to retrieve the content of the active window 1762 An active window is the window that has fired an accessibility event. --> 1763 <permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT" 1764 android:protectionLevel="signature|privileged" /> 1765 1766 <!-- @SystemApi Modify the global animation scaling factor. 1767 <p>Not for use by third-party applications. --> 1768 <permission android:name="android.permission.SET_ANIMATION_SCALE" 1769 android:protectionLevel="signature|privileged|development" /> 1770 1771 <!-- @deprecated This functionality will be removed in the future; please do 1772 not use. Allow an application to make its activities persistent. --> 1773 <permission android:name="android.permission.PERSISTENT_ACTIVITY" 1774 android:label="@string/permlab_persistentActivity" 1775 android:description="@string/permdesc_persistentActivity" 1776 android:protectionLevel="normal" /> 1777 1778 <!-- Allows an application to find out the space used by any package. 1779 <p>Protection level: normal 1780 --> 1781 <permission android:name="android.permission.GET_PACKAGE_SIZE" 1782 android:label="@string/permlab_getPackageSize" 1783 android:description="@string/permdesc_getPackageSize" 1784 android:protectionLevel="normal" /> 1785 1786 <!-- @deprecated No longer useful, see 1787 {@link android.content.pm.PackageManager#addPackageToPreferred} 1788 for details. --> 1789 <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS" 1790 android:protectionLevel="signature" /> 1791 1792 <!-- Allows an application to receive the 1793 {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is 1794 broadcast after the system finishes booting. If you don't 1795 request this permission, you will not receive the broadcast at 1796 that time. Though holding this permission does not have any 1797 security implications, it can have a negative impact on the 1798 user experience by increasing the amount of time it takes the 1799 system to start and allowing applications to have themselves 1800 running without the user being aware of them. As such, you must 1801 explicitly declare your use of this facility to make that visible 1802 to the user. 1803 <p>Protection level: normal 1804 --> 1805 <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED" 1806 android:label="@string/permlab_receiveBootCompleted" 1807 android:description="@string/permdesc_receiveBootCompleted" 1808 android:protectionLevel="normal" /> 1809 1810 <!-- Allows an application to broadcast sticky intents. These are 1811 broadcasts whose data is held by the system after being finished, 1812 so that clients can quickly retrieve that data without having 1813 to wait for the next broadcast. 1814 <p>Protection level: normal 1815 --> 1816 <permission android:name="android.permission.BROADCAST_STICKY" 1817 android:label="@string/permlab_broadcastSticky" 1818 android:description="@string/permdesc_broadcastSticky" 1819 android:protectionLevel="normal" /> 1820 1821 <!-- @SystemApi Allows mounting and unmounting file systems for removable storage. 1822 <p>Not for use by third-party applications.--> 1823 <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS" 1824 android:protectionLevel="signature|privileged" /> 1825 1826 <!-- @SystemApi Allows formatting file systems for removable storage. 1827 <p>Not for use by third-party applications. --> 1828 <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS" 1829 android:protectionLevel="signature|privileged" /> 1830 1831 <!-- @hide --> 1832 <permission android:name="android.permission.STORAGE_INTERNAL" 1833 android:protectionLevel="signature" /> 1834 1835 <!-- Allows access to ASEC non-destructive API calls 1836 @hide --> 1837 <permission android:name="android.permission.ASEC_ACCESS" 1838 android:protectionLevel="signature" /> 1839 1840 <!-- Allows creation of ASEC volumes 1841 @hide --> 1842 <permission android:name="android.permission.ASEC_CREATE" 1843 android:protectionLevel="signature" /> 1844 1845 <!-- Allows destruction of ASEC volumes 1846 @hide --> 1847 <permission android:name="android.permission.ASEC_DESTROY" 1848 android:protectionLevel="signature" /> 1849 1850 <!-- Allows mount / unmount of ASEC volumes 1851 @hide --> 1852 <permission android:name="android.permission.ASEC_MOUNT_UNMOUNT" 1853 android:protectionLevel="signature" /> 1854 1855 <!-- Allows rename of ASEC volumes 1856 @hide --> 1857 <permission android:name="android.permission.ASEC_RENAME" 1858 android:protectionLevel="signature" /> 1859 1860 <!-- @SystemApi Allows applications to write the apn settings. 1861 <p>Not for use by third-party applications. --> 1862 <permission android:name="android.permission.WRITE_APN_SETTINGS" 1863 android:protectionLevel="signature|privileged" /> 1864 1865 <!-- Allows applications to change network connectivity state. 1866 <p>Protection level: normal 1867 --> 1868 <permission android:name="android.permission.CHANGE_NETWORK_STATE" 1869 android:description="@string/permdesc_changeNetworkState" 1870 android:label="@string/permlab_changeNetworkState" 1871 android:protectionLevel="normal" /> 1872 1873 <!-- Allows an application to clear the caches of all installed 1874 applications on the device. 1875 <p>Protection level: system|signature 1876 --> 1877 <permission android:name="android.permission.CLEAR_APP_CACHE" 1878 android:protectionLevel="signature|privileged" /> 1879 1880 <!-- @SystemApi Allows an application to use any media decoder when decoding for playback 1881 @hide --> 1882 <permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK" 1883 android:protectionLevel="signature|privileged" /> 1884 1885 <!-- @SystemApi Allows an application to install and/or uninstall CA certificates on 1886 behalf of the user. 1887 @hide --> 1888 <permission android:name="android.permission.MANAGE_CA_CERTIFICATES" 1889 android:protectionLevel="signature|privileged" /> 1890 1891 <!-- @SystemApi Allows an application to do certain operations needed for 1892 interacting with the recovery (system update) system. 1893 @hide --> 1894 <permission android:name="android.permission.RECOVERY" 1895 android:protectionLevel="signature|privileged" /> 1896 1897 <!-- Allows the system to bind to an application's task services 1898 @hide --> 1899 <permission android:name="android.permission.BIND_JOB_SERVICE" 1900 android:protectionLevel="signature" /> 1901 <uses-permission android:name="android.permission.BIND_JOB_SERVICE"/> 1902 1903 <!-- Allows an application to initiate configuration updates 1904 <p>An application requesting this permission is responsible for 1905 verifying the source and integrity of any update before passing 1906 it off to the various individual installer components 1907 @hide --> 1908 <permission android:name="android.permission.UPDATE_CONFIG" 1909 android:protectionLevel="signature|privileged" /> 1910 1911 <!-- ========================================= --> 1912 <!-- Permissions for special development tools --> 1913 <!-- ========================================= --> 1914 <eat-comment /> 1915 1916 <!-- @SystemApi Allows an application to read or write the secure system settings. 1917 <p>Not for use by third-party applications. --> 1918 <permission android:name="android.permission.WRITE_SECURE_SETTINGS" 1919 android:protectionLevel="signature|privileged|development" /> 1920 1921 <!-- @SystemApi Allows an application to retrieve state dump information from system services. 1922 <p>Not for use by third-party applications. --> 1923 <permission android:name="android.permission.DUMP" 1924 android:protectionLevel="signature|privileged|development" /> 1925 1926 <!-- @SystemApi Allows an application to read the low-level system log files. 1927 <p>Not for use by third-party applications, because 1928 Log entries can contain the user's private information. --> 1929 <permission android:name="android.permission.READ_LOGS" 1930 android:protectionLevel="signature|privileged|development" /> 1931 1932 <!-- @SystemApi Configure an application for debugging. 1933 <p>Not for use by third-party applications. --> 1934 <permission android:name="android.permission.SET_DEBUG_APP" 1935 android:protectionLevel="signature|privileged|development" /> 1936 1937 <!-- @SystemApi Allows an application to set the maximum number of (not needed) 1938 application processes that can be running. 1939 <p>Not for use by third-party applications. --> 1940 <permission android:name="android.permission.SET_PROCESS_LIMIT" 1941 android:protectionLevel="signature|privileged|development" /> 1942 1943 <!-- @SystemApi Allows an application to control whether activities are immediately 1944 finished when put in the background. 1945 <p>Not for use by third-party applications. --> 1946 <permission android:name="android.permission.SET_ALWAYS_FINISH" 1947 android:protectionLevel="signature|privileged|development" /> 1948 1949 <!-- @SystemApi Allow an application to request that a signal be sent to all persistent processes. 1950 <p>Not for use by third-party applications. --> 1951 <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES" 1952 android:protectionLevel="signature|privileged|development" /> 1953 1954 <!-- ==================================== --> 1955 <!-- Private permissions --> 1956 <!-- ==================================== --> 1957 <eat-comment /> 1958 1959 <!-- @SystemApi Allows access to the list of accounts in the Accounts Service. --> 1960 <permission android:name="android.permission.GET_ACCOUNTS_PRIVILEGED" 1961 android:protectionLevel="signature|privileged" /> 1962 1963 <!-- @SystemApi Allows applications to RW to diagnostic resources. 1964 <p>Not for use by third-party applications. --> 1965 <permission android:name="android.permission.DIAGNOSTIC" 1966 android:protectionLevel="signature" /> 1967 1968 <!-- @SystemApi Allows an application to open, close, or disable the status bar 1969 and its icons. 1970 <p>Not for use by third-party applications. --> 1971 <permission android:name="android.permission.STATUS_BAR" 1972 android:protectionLevel="signature|privileged" /> 1973 1974 <!-- Allows an application to be the status bar. Currently used only by SystemUI.apk 1975 @hide --> 1976 <permission android:name="android.permission.STATUS_BAR_SERVICE" 1977 android:protectionLevel="signature" /> 1978 1979 <!-- Allows an application to bind to third party quick settings tiles. 1980 <p>Should only be requested by the System, should be required by 1981 TileService declarations.--> 1982 <permission android:name="android.permission.BIND_QUICK_SETTINGS_TILE" 1983 android:protectionLevel="signature" /> 1984 1985 <!-- @SystemApi Allows an application to force a BACK operation on whatever is the 1986 top activity. 1987 <p>Not for use by third-party applications. 1988 @hide 1989 --> 1990 <permission android:name="android.permission.FORCE_BACK" 1991 android:protectionLevel="signature" /> 1992 1993 <!-- @SystemApi Allows an application to update device statistics. 1994 <p>Not for use by third-party applications. --> 1995 <permission android:name="android.permission.UPDATE_DEVICE_STATS" 1996 android:protectionLevel="signature|privileged" /> 1997 1998 <!-- @SystemApi @hide Allows an application to collect battery statistics --> 1999 <permission android:name="android.permission.GET_APP_OPS_STATS" 2000 android:protectionLevel="signature|privileged|development" /> 2001 2002 <!-- @SystemApi Allows an application to update application operation statistics. Not for 2003 use by third party apps. @hide --> 2004 <permission android:name="android.permission.UPDATE_APP_OPS_STATS" 2005 android:protectionLevel="signature|privileged|installer" /> 2006 2007 <!-- Allows an application to update the user app op restrictions. 2008 Not for use by third party apps. 2009 @hide --> 2010 <permission android:name="android.permission.MANAGE_APP_OPS_RESTRICTIONS" 2011 android:protectionLevel="signature|installer" /> 2012 2013 <!-- @SystemApi Allows an application to open windows that are for use by parts 2014 of the system user interface. 2015 <p>Not for use by third-party applications. 2016 @hide 2017 --> 2018 <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW" 2019 android:protectionLevel="signature" /> 2020 2021 <!-- @SystemApi Allows an application to manage (create, destroy, 2022 Z-order) application tokens in the window manager. 2023 <p>Not for use by third-party applications. 2024 @hide 2025 --> 2026 <permission android:name="android.permission.MANAGE_APP_TOKENS" 2027 android:protectionLevel="signature" /> 2028 2029 <!-- Allows System UI to register listeners for events from Window Manager. 2030 @hide --> 2031 <permission android:name="android.permission.REGISTER_WINDOW_MANAGER_LISTENERS" 2032 android:protectionLevel="signature" /> 2033 2034 <!-- @hide Allows the application to temporarily freeze the screen for a 2035 full-screen transition. --> 2036 <permission android:name="android.permission.FREEZE_SCREEN" 2037 android:protectionLevel="signature" /> 2038 2039 <!-- @SystemApi Allows an application to inject user events (keys, touch, trackball) 2040 into the event stream and deliver them to ANY window. Without this 2041 permission, you can only deliver events to windows in your own process. 2042 <p>Not for use by third-party applications. 2043 @hide 2044 --> 2045 <permission android:name="android.permission.INJECT_EVENTS" 2046 android:protectionLevel="signature" /> 2047 2048 <!-- @hide Allows an application to register an input filter which filters the stream 2049 of user events (keys, touch, trackball) before they are dispatched to any window. --> 2050 <permission android:name="android.permission.FILTER_EVENTS" 2051 android:protectionLevel="signature" /> 2052 2053 <!-- @hide Allows an application to retrieve the window token from the accessibility manager. --> 2054 <permission android:name="android.permission.RETRIEVE_WINDOW_TOKEN" 2055 android:protectionLevel="signature" /> 2056 2057 <!-- @hide Allows an application to collect frame statistics --> 2058 <permission android:name="android.permission.FRAME_STATS" 2059 android:protectionLevel="signature" /> 2060 2061 <!-- @hide Allows an application to temporary enable accessibility on the device. --> 2062 <permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY" 2063 android:protectionLevel="signature" /> 2064 2065 <!-- @SystemApi Allows an application to watch and control how activities are 2066 started globally in the system. Only for is in debugging 2067 (usually the monkey command). 2068 <p>Not for use by third-party applications. 2069 @hide 2070 --> 2071 <permission android:name="android.permission.SET_ACTIVITY_WATCHER" 2072 android:protectionLevel="signature" /> 2073 2074 <!-- @SystemApi Allows an application to call the activity manager shutdown() API 2075 to put the higher-level system there into a shutdown state. 2076 @hide --> 2077 <permission android:name="android.permission.SHUTDOWN" 2078 android:protectionLevel="signature|privileged" /> 2079 2080 <!-- @SystemApi Allows an application to tell the activity manager to temporarily 2081 stop application switches, putting it into a special mode that 2082 prevents applications from immediately switching away from some 2083 critical UI such as the home screen. 2084 @hide --> 2085 <permission android:name="android.permission.STOP_APP_SWITCHES" 2086 android:protectionLevel="signature|privileged" /> 2087 2088 <!-- @SystemApi Allows an application to retrieve private information about 2089 the current top activity, such as any assist context it can provide. 2090 <p>Not for use by third-party applications. 2091 @hide 2092 --> 2093 <permission android:name="android.permission.GET_TOP_ACTIVITY_INFO" 2094 android:protectionLevel="signature" /> 2095 2096 <!-- Allows an application to retrieve the current state of keys and 2097 switches. 2098 <p>Not for use by third-party applications. 2099 @deprecated The API that used this permission has been removed. --> 2100 <permission android:name="android.permission.READ_INPUT_STATE" 2101 android:protectionLevel="signature" /> 2102 2103 <!-- Must be required by an {@link android.inputmethodservice.InputMethodService}, 2104 to ensure that only the system can bind to it. 2105 <p>Protection level: signature 2106 --> 2107 <permission android:name="android.permission.BIND_INPUT_METHOD" 2108 android:protectionLevel="signature" /> 2109 2110 <!-- Must be required by an {@link android.media.midi.MidiDeviceService}, 2111 to ensure that only the system can bind to it. 2112 <p>Protection level: signature 2113 --> 2114 <permission android:name="android.permission.BIND_MIDI_DEVICE_SERVICE" 2115 android:protectionLevel="signature" /> 2116 2117 <!-- Must be required by an {@link android.accessibilityservice.AccessibilityService}, 2118 to ensure that only the system can bind to it. 2119 <p>Protection level: signature 2120 --> 2121 <permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE" 2122 android:protectionLevel="signature" /> 2123 2124 <!-- Must be required by a {@link android.printservice.PrintService}, 2125 to ensure that only the system can bind to it. 2126 <p>Protection level: signature 2127 --> 2128 <permission android:name="android.permission.BIND_PRINT_SERVICE" 2129 android:protectionLevel="signature" /> 2130 2131 <!-- Must be required by a {@link android.nfc.cardemulation.HostApduService} 2132 or {@link android.nfc.cardemulation.OffHostApduService} to ensure that only 2133 the system can bind to it. 2134 <p>Protection level: signature 2135 --> 2136 <permission android:name="android.permission.BIND_NFC_SERVICE" 2137 android:protectionLevel="signature" /> 2138 2139 <!-- Must be required by the PrintSpooler to ensure that only the system can bind to it. 2140 @hide --> 2141 <permission android:name="android.permission.BIND_PRINT_SPOOLER_SERVICE" 2142 android:protectionLevel="signature" /> 2143 2144 <!-- Must be required by a TextService (e.g. SpellCheckerService) 2145 to ensure that only the system can bind to it. 2146 <p>Protection level: signature 2147 --> 2148 <permission android:name="android.permission.BIND_TEXT_SERVICE" 2149 android:protectionLevel="signature" /> 2150 2151 <!-- Must be required by a {@link android.net.VpnService}, 2152 to ensure that only the system can bind to it. 2153 <p>Protection level: signature 2154 --> 2155 <permission android:name="android.permission.BIND_VPN_SERVICE" 2156 android:protectionLevel="signature" /> 2157 2158 <!-- Must be required by a {@link android.service.wallpaper.WallpaperService}, 2159 to ensure that only the system can bind to it. 2160 <p>Protection level: system|signature 2161 --> 2162 <permission android:name="android.permission.BIND_WALLPAPER" 2163 android:protectionLevel="signature|privileged" /> 2164 2165 <!-- Must be required by a {@link android.service.voice.VoiceInteractionService}, 2166 to ensure that only the system can bind to it. 2167 <p>Protection level: signature 2168 --> 2169 <permission android:name="android.permission.BIND_VOICE_INTERACTION" 2170 android:protectionLevel="signature" /> 2171 2172 <!-- Must be required by hotword enrollment application, 2173 to ensure that only the system can interact with it. 2174 @hide <p>Not for use by third-party applications.</p> --> 2175 <permission android:name="android.permission.MANAGE_VOICE_KEYPHRASES" 2176 android:protectionLevel="signature|privileged" /> 2177 2178 <!-- Must be required by a {@link com.android.media.remotedisplay.RemoteDisplayProvider}, 2179 to ensure that only the system can bind to it. 2180 @hide --> 2181 <permission android:name="android.permission.BIND_REMOTE_DISPLAY" 2182 android:protectionLevel="signature" /> 2183 2184 <!-- Must be required by a {@link android.media.tv.TvInputService} 2185 to ensure that only the system can bind to it. 2186 <p>Protection level: signature 2187 --> 2188 <permission android:name="android.permission.BIND_TV_INPUT" 2189 android:protectionLevel="signature|privileged" /> 2190 2191 <!-- @SystemApi Allows an application to modify parental controls 2192 <p>Not for use by third-party applications. 2193 @hide --> 2194 <permission android:name="android.permission.MODIFY_PARENTAL_CONTROLS" 2195 android:protectionLevel="signature|privileged" /> 2196 2197 <!-- Must be required by a {@link android.media.routing.MediaRouteService} 2198 to ensure that only the system can interact with it. 2199 @hide --> 2200 <permission android:name="android.permission.BIND_ROUTE_PROVIDER" 2201 android:protectionLevel="signature" /> 2202 2203 <!-- Must be required by device administration receiver, to ensure that only the 2204 system can interact with it. 2205 <p>Protection level: signature 2206 --> 2207 <permission android:name="android.permission.BIND_DEVICE_ADMIN" 2208 android:protectionLevel="signature" /> 2209 2210 <!-- @SystemApi Required to add or remove another application as a device admin. 2211 <p>Not for use by third-party applications. 2212 @hide --> 2213 <permission android:name="android.permission.MANAGE_DEVICE_ADMINS" 2214 android:protectionLevel="signature|privileged" /> 2215 2216 <!-- @SystemApi Allows low-level access to setting the orientation (actually 2217 rotation) of the screen. 2218 <p>Not for use by third-party applications. 2219 @hide 2220 --> 2221 <permission android:name="android.permission.SET_ORIENTATION" 2222 android:protectionLevel="signature" /> 2223 2224 <!-- @SystemApi Allows low-level access to setting the pointer speed. 2225 <p>Not for use by third-party applications. 2226 @hide 2227 --> 2228 <permission android:name="android.permission.SET_POINTER_SPEED" 2229 android:protectionLevel="signature" /> 2230 2231 <!-- Allows low-level access to setting input device calibration. 2232 <p>Not for use by normal applications. 2233 @hide --> 2234 <permission android:name="android.permission.SET_INPUT_CALIBRATION" 2235 android:protectionLevel="signature" /> 2236 2237 <!-- Allows low-level access to setting the keyboard layout. 2238 <p>Not for use by third-party applications. 2239 @hide --> 2240 <permission android:name="android.permission.SET_KEYBOARD_LAYOUT" 2241 android:protectionLevel="signature" /> 2242 2243 <!-- Allows an application to query tablet mode state and monitor changes 2244 in it. 2245 <p>Not for use by third-party applications. 2246 @hide --> 2247 <permission android:name="android.permission.TABLET_MODE" 2248 android:protectionLevel="signature" /> 2249 2250 <!-- Allows an application to request installing packages. Apps 2251 targeting APIs greater than 22 must hold this permission in 2252 order to use {@link android.content.Intent#ACTION_INSTALL_PACKAGE}. 2253 <p>Protection level: normal 2254 --> 2255 <permission android:name="android.permission.REQUEST_INSTALL_PACKAGES" 2256 android:label="@string/permlab_requestInstallPackages" 2257 android:description="@string/permdesc_requestInstallPackages" 2258 android:protectionLevel="normal" /> 2259 2260 <!-- @SystemApi Allows an application to install packages. 2261 <p>Not for use by third-party applications. --> 2262 <permission android:name="android.permission.INSTALL_PACKAGES" 2263 android:protectionLevel="signature|privileged" /> 2264 2265 <!-- @SystemApi Allows an application to clear user data. 2266 <p>Not for use by third-party applications 2267 @hide 2268 --> 2269 <permission android:name="android.permission.CLEAR_APP_USER_DATA" 2270 android:protectionLevel="signature|installer" /> 2271 2272 <!-- @hide Allows an application to get the URI permissions 2273 granted to another application. 2274 <p>Not for use by third-party applications 2275 --> 2276 <permission android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS" 2277 android:protectionLevel="signature" /> 2278 2279 <!-- @hide Allows an application to clear the URI permissions 2280 granted to another application. 2281 <p>Not for use by third-party applications 2282 --> 2283 <permission 2284 android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS" 2285 android:protectionLevel="signature" /> 2286 2287 <!-- @SystemApi Allows an application to delete cache files. 2288 <p>Not for use by third-party applications. --> 2289 <permission android:name="android.permission.DELETE_CACHE_FILES" 2290 android:protectionLevel="signature|privileged" /> 2291 2292 <!-- @SystemApi Allows an application to delete packages. 2293 <p>Not for use by third-party applications. --> 2294 <permission android:name="android.permission.DELETE_PACKAGES" 2295 android:protectionLevel="signature|privileged" /> 2296 2297 <!-- @SystemApi Allows an application to move location of installed package. 2298 @hide --> 2299 <permission android:name="android.permission.MOVE_PACKAGE" 2300 android:protectionLevel="signature|privileged" /> 2301 2302 <!-- @SystemApi Allows an application to change whether an application component (other than its own) is 2303 enabled or not. 2304 <p>Not for use by third-party applications. --> 2305 <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE" 2306 android:protectionLevel="signature|privileged" /> 2307 2308 <!-- Allows an application to grant specific permissions. 2309 @hide --> 2310 <permission android:name="android.permission.GRANT_RUNTIME_PERMISSIONS" 2311 android:protectionLevel="signature|installer|verifier" /> 2312 2313 <!-- Allows an app that has this permission and the permissions to install packages 2314 to request certain runtime permissions to be granted at installation. 2315 @hide 2316 @SystemApi --> 2317 <permission android:name="android.permission.INSTALL_GRANT_RUNTIME_PERMISSIONS" 2318 android:protectionLevel="signature|installer|verifier" /> 2319 2320 <!-- Allows an application to revoke specific permissions. 2321 @hide 2322 @SystemApi --> 2323 <permission android:name="android.permission.REVOKE_RUNTIME_PERMISSIONS" 2324 android:protectionLevel="signature|installer|verifier" /> 2325 2326 <!-- @hide Allows an application to observe permission changes. --> 2327 <permission android:name="android.permission.OBSERVE_GRANT_REVOKE_PERMISSIONS" 2328 android:protectionLevel="signature|privileged" /> 2329 2330 <!-- @SystemApi Allows an application to use SurfaceFlinger's low level features. 2331 <p>Not for use by third-party applications. 2332 @hide 2333 --> 2334 <permission android:name="android.permission.ACCESS_SURFACE_FLINGER" 2335 android:protectionLevel="signature" /> 2336 2337 <!-- @SystemApi Allows an application to take screen shots and more generally 2338 get access to the frame buffer data. 2339 <p>Not for use by third-party applications. --> 2340 <permission android:name="android.permission.READ_FRAME_BUFFER" 2341 android:protectionLevel="signature|privileged" /> 2342 2343 <!-- Allows an application to use InputFlinger's low level features. 2344 @hide --> 2345 <permission android:name="android.permission.ACCESS_INPUT_FLINGER" 2346 android:protectionLevel="signature" /> 2347 2348 <!-- Allows an application to configure and connect to Wifi displays 2349 @hide --> 2350 <permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY" 2351 android:protectionLevel="signature" /> 2352 2353 <!-- Allows an application to control low-level features of Wifi displays 2354 such as opening an RTSP socket. This permission should only be used 2355 by the display manager. 2356 @hide --> 2357 <permission android:name="android.permission.CONTROL_WIFI_DISPLAY" 2358 android:protectionLevel="signature" /> 2359 2360 <!-- Allows an application to control the color transforms applied to 2361 displays system-wide. 2362 <p>Not for use by third-party applications.</p> 2363 @hide --> 2364 <permission android:name="android.permission.CONFIGURE_DISPLAY_COLOR_TRANSFORM" 2365 android:protectionLevel="signature" /> 2366 2367 <!-- @SystemApi Allows an application to control VPN. 2368 <p>Not for use by third-party applications.</p> 2369 @hide --> 2370 <permission android:name="android.permission.CONTROL_VPN" 2371 android:protectionLevel="signature|privileged" /> 2372 <uses-permission android:name="android.permission.CONTROL_VPN" /> 2373 2374 <!-- @SystemApi Allows an application to capture audio output. 2375 <p>Not for use by third-party applications.</p> --> 2376 <permission android:name="android.permission.CAPTURE_AUDIO_OUTPUT" 2377 android:protectionLevel="signature|privileged" /> 2378 2379 <!-- @SystemApi Allows an application to capture audio for hotword detection. 2380 <p>Not for use by third-party applications.</p> 2381 @hide --> 2382 <permission android:name="android.permission.CAPTURE_AUDIO_HOTWORD" 2383 android:protectionLevel="signature|privileged" /> 2384 2385 <!-- @SystemApi Allows an application to modify audio routing and override policy decisions. 2386 <p>Not for use by third-party applications.</p> 2387 @hide --> 2388 <permission android:name="android.permission.MODIFY_AUDIO_ROUTING" 2389 android:protectionLevel="signature|privileged" /> 2390 2391 <!-- @SystemApi Allows an application to capture video output. 2392 <p>Not for use by third-party applications.</p> --> 2393 <permission android:name="android.permission.CAPTURE_VIDEO_OUTPUT" 2394 android:protectionLevel="signature|privileged" /> 2395 2396 <!-- @SystemApi Allows an application to capture secure video output. 2397 <p>Not for use by third-party applications.</p> --> 2398 <permission android:name="android.permission.CAPTURE_SECURE_VIDEO_OUTPUT" 2399 android:protectionLevel="signature|privileged" /> 2400 2401 <!-- @SystemApi Allows an application to know what content is playing and control its playback. 2402 <p>Not for use by third-party applications due to privacy of media consumption</p> --> 2403 <permission android:name="android.permission.MEDIA_CONTENT_CONTROL" 2404 android:protectionLevel="signature|privileged" /> 2405 2406 <!-- @SystemApi Required to be able to disable the device (very dangerous!). 2407 <p>Not for use by third-party applications. 2408 @hide 2409 --> 2410 <permission android:name="android.permission.BRICK" 2411 android:protectionLevel="signature" /> 2412 2413 <!-- @SystemApi Required to be able to reboot the device. 2414 <p>Not for use by third-party applications. --> 2415 <permission android:name="android.permission.REBOOT" 2416 android:protectionLevel="signature|privileged" /> 2417 2418 <!-- @SystemApi Allows low-level access to power management. 2419 <p>Not for use by third-party applications. 2420 @hide 2421 --> 2422 <permission android:name="android.permission.DEVICE_POWER" 2423 android:protectionLevel="signature" /> 2424 2425 <!-- Allows access to the PowerManager.userActivity function. 2426 <p>Not for use by third-party applications. @hide @SystemApi --> 2427 <permission android:name="android.permission.USER_ACTIVITY" 2428 android:protectionLevel="signature|privileged" /> 2429 2430 <!-- @hide Allows low-level access to tun tap driver --> 2431 <permission android:name="android.permission.NET_TUNNELING" 2432 android:protectionLevel="signature" /> 2433 2434 <!-- Run as a manufacturer test application, running as the root user. 2435 Only available when the device is running in manufacturer test mode. 2436 <p>Not for use by third-party applications. 2437 --> 2438 <permission android:name="android.permission.FACTORY_TEST" 2439 android:protectionLevel="signature" /> 2440 2441 <!-- Allows an application to broadcast a notification that an application 2442 package has been removed. 2443 <p>Not for use by third-party applications. 2444 --> 2445 <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED" 2446 android:protectionLevel="signature" /> 2447 2448 <!-- Allows an application to broadcast an SMS receipt notification. 2449 <p>Not for use by third-party applications. 2450 --> 2451 <permission android:name="android.permission.BROADCAST_SMS" 2452 android:protectionLevel="signature" /> 2453 2454 <!-- Allows an application to broadcast a WAP PUSH receipt notification. 2455 <p>Not for use by third-party applications. 2456 --> 2457 <permission android:name="android.permission.BROADCAST_WAP_PUSH" 2458 android:protectionLevel="signature" /> 2459 2460 <!-- @SystemApi Allows an application to broadcast privileged networking requests. 2461 <p>Not for use by third-party applications. @hide --> 2462 <permission android:name="android.permission.BROADCAST_NETWORK_PRIVILEGED" 2463 android:protectionLevel="signature|privileged" /> 2464 2465 <!-- @SystemApi Not for use by third-party applications. --> 2466 <permission android:name="android.permission.MASTER_CLEAR" 2467 android:protectionLevel="signature|privileged" /> 2468 2469 <!-- @SystemApi Allows an application to call any phone number, including emergency 2470 numbers, without going through the Dialer user interface for the user 2471 to confirm the call being placed. 2472 <p>Not for use by third-party applications. --> 2473 <permission android:name="android.permission.CALL_PRIVILEGED" 2474 android:protectionLevel="signature|privileged" /> 2475 2476 <!-- @SystemApi Allows an application to perform CDMA OTA provisioning @hide --> 2477 <permission android:name="android.permission.PERFORM_CDMA_PROVISIONING" 2478 android:protectionLevel="signature|privileged" /> 2479 2480 <!-- @SystemApi Allows an application to perform SIM Activation @hide --> 2481 <permission android:name="android.permission.PERFORM_SIM_ACTIVATION" 2482 android:protectionLevel="signature|privileged" /> 2483 2484 <!-- @SystemApi Allows enabling/disabling location update notifications from 2485 the radio. 2486 <p>Not for use by third-party applications. --> 2487 <permission android:name="android.permission.CONTROL_LOCATION_UPDATES" 2488 android:protectionLevel="signature|privileged" /> 2489 2490 <!-- @SystemApi Allows read/write access to the "properties" table in the checkin 2491 database, to change values that get uploaded. 2492 <p>Not for use by third-party applications. --> 2493 <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES" 2494 android:protectionLevel="signature|privileged" /> 2495 2496 <!-- @SystemApi Allows an application to collect component usage 2497 statistics 2498 <p>Declaring the permission implies intention to use the API and the user of the 2499 device can grant permission through the Settings application. --> 2500 <permission android:name="android.permission.PACKAGE_USAGE_STATS" 2501 android:protectionLevel="signature|privileged|development|appop" /> 2502 <uses-permission android:name="android.permission.PACKAGE_USAGE_STATS" /> 2503 2504 <!-- @hide Allows an application to change the app idle state of an app. 2505 <p>Not for use by third-party applications. --> 2506 <permission android:name="android.permission.CHANGE_APP_IDLE_STATE" 2507 android:protectionLevel="signature" /> 2508 2509 <!-- @hide @SystemApi Allows an application to temporarily whitelist an inactive app to 2510 access the network and acquire wakelocks. 2511 <p>Not for use by third-party applications. --> 2512 <permission android:name="android.permission.CHANGE_DEVICE_IDLE_TEMP_WHITELIST" 2513 android:protectionLevel="signature|privileged" /> 2514 2515 <!-- Permission an application must hold in order to use 2516 {@link android.provider.Settings#ACTION_REQUEST_IGNORE_BATTERY_OPTIMIZATIONS}. 2517 This is a normal permission: an app requesting it will always be granted the 2518 permission, without the user needing to approve or see it. --> 2519 <permission android:name="android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS" 2520 android:protectionLevel="normal" /> 2521 2522 <!-- @SystemApi Allows an application to collect battery statistics --> 2523 <permission android:name="android.permission.BATTERY_STATS" 2524 android:protectionLevel="signature|privileged|development" /> 2525 2526 <!-- @SystemApi Allows an application to control the backup and restore process. 2527 <p>Not for use by third-party applications. 2528 @hide pending API council --> 2529 <permission android:name="android.permission.BACKUP" 2530 android:protectionLevel="signature|privileged" /> 2531 2532 <!-- Allows a package to launch the secure full-backup confirmation UI. 2533 ONLY the system process may hold this permission. 2534 @hide --> 2535 <permission android:name="android.permission.CONFIRM_FULL_BACKUP" 2536 android:protectionLevel="signature" /> 2537 2538 <!-- @SystemApi Must be required by a {@link android.widget.RemoteViewsService}, 2539 to ensure that only the system can bind to it. --> 2540 <permission android:name="android.permission.BIND_REMOTEVIEWS" 2541 android:protectionLevel="signature|privileged" /> 2542 2543 <!-- @SystemApi Allows an application to tell the AppWidget service which application 2544 can access AppWidget's data. The normal user flow is that a user 2545 picks an AppWidget to go into a particular host, thereby giving that 2546 host application access to the private data from the AppWidget app. 2547 An application that has this permission should honor that contract. 2548 <p>Not for use by third-party applications. --> 2549 <permission android:name="android.permission.BIND_APPWIDGET" 2550 android:protectionLevel="signature|privileged" /> 2551 2552 <!-- @SystemApi Private permission, to restrict who can bring up a dialog to add a new 2553 keyguard widget 2554 @hide --> 2555 <permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET" 2556 android:protectionLevel="signature|privileged" /> 2557 2558 <!-- @SystemApi Internal permission allowing an application to query/set which 2559 applications can bind AppWidgets. 2560 @hide --> 2561 <permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS" 2562 android:protectionLevel="signature|privileged" /> 2563 2564 <!-- Allows applications to change the background data setting. 2565 <p>Not for use by third-party applications. 2566 @hide pending API council --> 2567 <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING" 2568 android:protectionLevel="signature" /> 2569 2570 <!-- @SystemApi This permission can be used on content providers to allow the global 2571 search system to access their data. Typically it used when the 2572 provider has some permissions protecting it (which global search 2573 would not be expected to hold), and added as a read-only permission 2574 to the path in the provider where global search queries are 2575 performed. This permission can not be held by regular applications; 2576 it is used by applications to protect themselves from everyone else 2577 besides global search. --> 2578 <permission android:name="android.permission.GLOBAL_SEARCH" 2579 android:protectionLevel="signature|privileged" /> 2580 2581 <!-- Internal permission protecting access to the global search 2582 system: ensures that only the system can access the provider 2583 to perform queries (since this otherwise provides unrestricted 2584 access to a variety of content providers), and to write the 2585 search statistics (to keep applications from gaming the source 2586 ranking). 2587 @hide --> 2588 <permission android:name="android.permission.GLOBAL_SEARCH_CONTROL" 2589 android:protectionLevel="signature" /> 2590 2591 <!-- @SystemApi Internal permission to allows an application to read indexable data. 2592 @hide --> 2593 <permission android:name="android.permission.READ_SEARCH_INDEXABLES" 2594 android:protectionLevel="signature|privileged" /> 2595 2596 <!-- @SystemApi Allows applications to set a live wallpaper. 2597 @hide XXX Change to signature once the picker is moved to its 2598 own apk as Ghod Intended. --> 2599 <permission android:name="android.permission.SET_WALLPAPER_COMPONENT" 2600 android:protectionLevel="signature|privileged" /> 2601 2602 <!-- @SystemApi Allows applications to read dream settings and dream state. 2603 @hide --> 2604 <permission android:name="android.permission.READ_DREAM_STATE" 2605 android:protectionLevel="signature|privileged" /> 2606 2607 <!-- @SystemApi Allows applications to write dream settings, and start or stop dreaming. 2608 @hide --> 2609 <permission android:name="android.permission.WRITE_DREAM_STATE" 2610 android:protectionLevel="signature|privileged" /> 2611 2612 <!-- @SystemApi Allow an application to read and write the cache partition. 2613 @hide --> 2614 <permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM" 2615 android:protectionLevel="signature|privileged" /> 2616 2617 <!-- Must be required by default container service so that only 2618 the system can bind to it and use it to copy 2619 protected data to secure containers or files 2620 accessible to the system. 2621 @hide --> 2622 <permission android:name="android.permission.COPY_PROTECTED_DATA" 2623 android:protectionLevel="signature" /> 2624 2625 <!-- @SystemApi Internal permission protecting access to the encryption methods 2626 @hide 2627 --> 2628 <permission android:name="android.permission.CRYPT_KEEPER" 2629 android:protectionLevel="signature|privileged" /> 2630 2631 <!-- @SystemApi Allows an application to read historical network usage for 2632 specific networks and applications. @hide --> 2633 <permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY" 2634 android:protectionLevel="signature|privileged" /> 2635 2636 <!-- Allows an application to manage network policies (such as warning and disable 2637 limits) and to define application-specific rules. @hide --> 2638 <permission android:name="android.permission.MANAGE_NETWORK_POLICY" 2639 android:protectionLevel="signature" /> 2640 2641 <!-- @SystemApi Allows an application to account its network traffic against other UIDs. Used 2642 by system services like download manager and media server. Not for use by 2643 third party apps. @hide --> 2644 <permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING" 2645 android:protectionLevel="signature|privileged" /> 2646 2647 <!-- C2DM permission. 2648 @hide Used internally. 2649 --> 2650 <permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE" 2651 android:protectionLevel="signature" /> 2652 <uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/> 2653 2654 <!-- @SystemApi @hide Package verifier needs to have this permission before the PackageManager will 2655 trust it to verify packages. 2656 --> 2657 <permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT" 2658 android:protectionLevel="signature|privileged" /> 2659 2660 <!-- Must be required by package verifier receiver, to ensure that only the 2661 system can interact with it. 2662 @hide 2663 --> 2664 <permission android:name="android.permission.BIND_PACKAGE_VERIFIER" 2665 android:protectionLevel="signature" /> 2666 2667 <!-- @SystemApi @hide Intent filter verifier needs to have this permission before the 2668 PackageManager will trust it to verify intent filters. 2669 --> 2670 <permission android:name="android.permission.INTENT_FILTER_VERIFICATION_AGENT" 2671 android:protectionLevel="signature|privileged" /> 2672 2673 <!-- Must be required by intent filter verifier receiver, to ensure that only the 2674 system can interact with it. 2675 @hide 2676 --> 2677 <permission android:name="android.permission.BIND_INTENT_FILTER_VERIFIER" 2678 android:protectionLevel="signature" /> 2679 2680 <!-- @SystemApi Allows applications to access serial ports via the SerialManager. 2681 @hide --> 2682 <permission android:name="android.permission.SERIAL_PORT" 2683 android:protectionLevel="signature|privileged" /> 2684 2685 <!-- Allows the holder to access content providers from outside an ApplicationThread. 2686 This permission is enforced by the ActivityManagerService on the corresponding APIs, 2687 in particular ActivityManagerService#getContentProviderExternal(String) and 2688 ActivityManagerService#removeContentProviderExternal(String). 2689 @hide 2690 --> 2691 <permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY" 2692 android:protectionLevel="signature" /> 2693 2694 <!-- @SystemApi Allows an application to hold an UpdateLock, recommending that a headless 2695 OTA reboot *not* occur while the lock is held. 2696 @hide --> 2697 <permission android:name="android.permission.UPDATE_LOCK" 2698 android:protectionLevel="signature|privileged" /> 2699 2700 <!-- @SystemApi Allows an application to read the current set of notifications, including 2701 any metadata and intents attached. 2702 @hide --> 2703 <permission android:name="android.permission.ACCESS_NOTIFICATIONS" 2704 android:protectionLevel="signature|privileged" /> 2705 2706 <!-- Marker permission for applications that wish to access notification policy. 2707 <p>Protection level: normal 2708 --> 2709 <permission android:name="android.permission.ACCESS_NOTIFICATION_POLICY" 2710 android:description="@string/permdesc_access_notification_policy" 2711 android:label="@string/permlab_access_notification_policy" 2712 android:protectionLevel="normal" /> 2713 2714 <!-- Allows modification of do not disturb rules and policies. Only allowed for system 2715 processes. 2716 @hide --> 2717 <permission android:name="android.permission.MANAGE_NOTIFICATIONS" 2718 android:protectionLevel="signature" /> 2719 2720 <!-- Allows access to keyguard secure storage. Only allowed for system processes. 2721 @hide --> 2722 <permission android:name="android.permission.ACCESS_KEYGUARD_SECURE_STORAGE" 2723 android:protectionLevel="signature" /> 2724 2725 <!-- Allows managing (adding, removing) fingerprint templates. Reserved for the system. @hide --> 2726 <permission android:name="android.permission.MANAGE_FINGERPRINT" 2727 android:protectionLevel="signature|privileged" /> 2728 2729 <!-- Allows an app to reset fingerprint attempt counter. Reserved for the system. @hide --> 2730 <permission android:name="android.permission.RESET_FINGERPRINT_LOCKOUT" 2731 android:protectionLevel="signature" /> 2732 2733 <!-- Allows an application to control keyguard. Only allowed for system processes. 2734 @hide --> 2735 <permission android:name="android.permission.CONTROL_KEYGUARD" 2736 android:protectionLevel="signature" /> 2737 2738 <!-- Allows an application to listen to trust changes. Only allowed for system processes. 2739 @hide --> 2740 <permission android:name="android.permission.TRUST_LISTENER" 2741 android:protectionLevel="signature" /> 2742 2743 <!-- @SystemApi Allows an application to provide a trust agent. 2744 @hide For security reasons, this is a platform-only permission. --> 2745 <permission android:name="android.permission.PROVIDE_TRUST_AGENT" 2746 android:protectionLevel="signature|privileged" /> 2747 2748 <!-- Allows an application to launch the trust agent settings activity. 2749 @hide --> 2750 <permission android:name="android.permission.LAUNCH_TRUST_AGENT_SETTINGS" 2751 android:protectionLevel="signature|privileged" /> 2752 2753 <!-- @SystemApi Must be required by an {@link 2754 android.service.trust.TrustAgentService}, 2755 to ensure that only the system can bind to it. 2756 @hide --> 2757 <permission android:name="android.permission.BIND_TRUST_AGENT" 2758 android:protectionLevel="signature" /> 2759 2760 <!-- Must be required by an {@link 2761 android.service.notification.NotificationListenerService}, 2762 to ensure that only the system can bind to it. 2763 <p>Protection level: signature 2764 --> 2765 <permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE" 2766 android:protectionLevel="signature" /> 2767 2768 <!-- Must be required by an {@link 2769 android.service.notification.NotificationAssistantService}, 2770 to ensure that only the system can bind to it. 2771 <p>Protection level: signature 2772 @hide This is not a third-party API (intended for system apps). --> 2773 --> 2774 <permission android:name="android.permission.BIND_NOTIFICATION_ASSISTANT_SERVICE" 2775 android:protectionLevel="signature" /> 2776 2777 <!-- Must be required by a {@link 2778 android.service.chooser.ChooserTargetService}, to ensure that 2779 only the system can bind to it. 2780 <p>Protection level: signature 2781 --> 2782 <permission android:name="android.permission.BIND_CHOOSER_TARGET_SERVICE" 2783 android:protectionLevel="signature" /> 2784 2785 <!-- Must be required by a {@link 2786 android.service.notification.ConditionProviderService}, 2787 to ensure that only the system can bind to it. 2788 <p>Protection level: signature 2789 --> 2790 <permission android:name="android.permission.BIND_CONDITION_PROVIDER_SERVICE" 2791 android:protectionLevel="signature" /> 2792 2793 <!-- Must be required by an {@link android.service.dreams.DreamService}, 2794 to ensure that only the system can bind to it. 2795 <p>Protection level: signature 2796 --> 2797 <permission android:name="android.permission.BIND_DREAM_SERVICE" 2798 android:protectionLevel="signature" /> 2799 2800 <!-- @SystemApi Allows an application to call into a carrier setup flow. It is up to the 2801 carrier setup application to enforce that this permission is required 2802 @hide This is not a third-party API (intended for OEMs and system apps). --> 2803 <permission android:name="android.permission.INVOKE_CARRIER_SETUP" 2804 android:protectionLevel="signature|privileged" /> 2805 2806 <!-- @SystemApi Allows an application to listen for network condition observations. 2807 @hide This is not a third-party API (intended for system apps). --> 2808 <permission android:name="android.permission.ACCESS_NETWORK_CONDITIONS" 2809 android:protectionLevel="signature|privileged" /> 2810 2811 <!-- @SystemApi Allows an application to provision and access DRM certificates 2812 @hide This is not a third-party API (intended for system apps). --> 2813 <permission android:name="android.permission.ACCESS_DRM_CERTIFICATES" 2814 android:protectionLevel="signature|privileged" /> 2815 2816 <!-- Api Allows an application to manage media projection sessions. 2817 @hide This is not a third-party API (intended for system apps). --> 2818 <permission android:name="android.permission.MANAGE_MEDIA_PROJECTION" 2819 android:protectionLevel="signature" /> 2820 2821 <!-- @SystemApi Allows an application to read install sessions 2822 @hide This is not a third-party API (intended for system apps). --> 2823 <permission android:name="android.permission.READ_INSTALL_SESSIONS" 2824 android:label="@string/permlab_readInstallSessions" 2825 android:description="@string/permdesc_readInstallSessions" 2826 android:protectionLevel="normal"/> 2827 2828 <!-- @SystemApi Allows an application to remove DRM certificates 2829 @hide This is not a third-party API (intended for system apps). --> 2830 <permission android:name="android.permission.REMOVE_DRM_CERTIFICATES" 2831 android:protectionLevel="signature|privileged" /> 2832 2833 <!-- @deprecated Use {@link android.Manifest.permission#BIND_CARRIER_SERVICES} instead --> 2834 <permission android:name="android.permission.BIND_CARRIER_MESSAGING_SERVICE" 2835 android:protectionLevel="signature|privileged" /> 2836 2837 <!-- Allows an application to interact with the currently active 2838 {@link android.service.voice.VoiceInteractionService}. 2839 @hide --> 2840 <permission android:name="android.permission.ACCESS_VOICE_INTERACTION_SERVICE" 2841 android:protectionLevel="signature" /> 2842 2843 <!-- The system process that is allowed to bind to services in carrier apps will 2844 have this permission. Carrier apps should use this permission to protect 2845 their services that only the system is allowed to bind to. 2846 <p>Protection level: system|signature 2847 --> 2848 <permission android:name="android.permission.BIND_CARRIER_SERVICES" 2849 android:label="@string/permlab_bindCarrierServices" 2850 android:description="@string/permdesc_bindCarrierServices" 2851 android:protectionLevel="signature|privileged" /> 2852 2853 <!-- Allows an application to query whether DO_NOT_ASK_CREDENTIALS_ON_BOOT 2854 flag is set. 2855 @hide --> 2856 <permission android:name="android.permission.QUERY_DO_NOT_ASK_CREDENTIALS_ON_BOOT" 2857 android:protectionLevel="signature" /> 2858 2859 <!-- Allows applications to kill UIDs. 2860 <p>Not for use by third-party applications. 2861 @hide --> 2862 <permission android:name="android.permission.KILL_UID" 2863 android:protectionLevel="signature|installer" /> 2864 2865 <!-- @SystemApi Allows applications to read the local WiFi and Bluetooth MAC address. 2866 @hide --> 2867 <permission android:name="android.permission.LOCAL_MAC_ADDRESS" 2868 android:protectionLevel="signature|privileged" /> 2869 2870 <!-- @SystemApi Allows access to MAC addresses of WiFi and Bluetooth peer devices. 2871 @hide --> 2872 <permission android:name="android.permission.PEERS_MAC_ADDRESS" 2873 android:protectionLevel="signature" /> 2874 2875 <!-- Allows the Nfc stack to dispatch Nfc messages to applications. Applications 2876 can use this permission to ensure incoming Nfc messages are from the Nfc stack 2877 and not simulated by another application. 2878 @hide --> 2879 <permission android:name="android.permission.DISPATCH_NFC_MESSAGE" 2880 android:protectionLevel="signature|privileged" /> 2881 2882 <!-- @SystemApi Allows changing day / night mode when system is configured with 2883 config_lockDayNightMode set to true. If requesting app does not have permission, 2884 it will be ignored. 2885 @hide --> 2886 <permission android:name="android.permission.MODIFY_DAY_NIGHT_MODE" 2887 android:protectionLevel="signature|privileged" /> 2888 2889 <!-- The system process is explicitly the only one allowed to launch the 2890 confirmation UI for full backup/restore --> 2891 <uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/> 2892 2893 2894 <!-- Allows the holder to access the ephemeral applications on the device. 2895 @hide --> 2896 <permission android:name="android.permission.ACCESS_EPHEMERAL_APPS" 2897 android:protectionLevel="signature" /> 2898 2899 <!-- Allows receiving the usage of media resource e.g. video/audio codec and 2900 graphic memory. 2901 @hide --> 2902 <permission android:name="android.permission.RECEIVE_MEDIA_RESOURCE_USAGE" 2903 android:protectionLevel="signature|privileged" /> 2904 2905 <!-- Must be required by system/priv apps when accessing the sound trigger 2906 APIs given by {@link SoundTriggerManager}. 2907 @hide <p>Not for use by third-party applications.</p> --> 2908 <permission android:name="android.permission.MANAGE_SOUND_TRIGGER" 2909 android:protectionLevel="signature|privileged" /> 2910 2911 <!-- @SystemApi Allows trusted applications to dispatch managed provisioning message to Managed 2912 Provisioning app. If requesting app does not have permission, it will be ignored. 2913 @hide --> 2914 <permission android:name="android.permission.DISPATCH_PROVISIONING_MESSAGE" 2915 android:protectionLevel="signature|privileged" /> 2916 2917 <!-- Allows the holder to read blocked numbers. See 2918 {@link android.provider.BlockedNumberContract}. 2919 @hide --> 2920 <permission android:name="android.permission.READ_BLOCKED_NUMBERS" 2921 android:protectionLevel="signature" /> 2922 2923 <!-- Allows the holder to write blocked numbers. See 2924 {@link android.provider.BlockedNumberContract}. 2925 @hide --> 2926 <permission android:name="android.permission.WRITE_BLOCKED_NUMBERS" 2927 android:protectionLevel="signature" /> 2928 2929 <application android:process="system" 2930 android:persistent="true" 2931 android:hasCode="false" 2932 android:label="@string/android_system_label" 2933 android:allowClearUserData="false" 2934 android:backupAgent="com.android.server.backup.SystemBackupAgent" 2935 android:killAfterRestore="false" 2936 android:icon="@drawable/ic_launcher_android" 2937 android:supportsRtl="true" 2938 android:theme="@style/Theme.Material.DayNight.DarkActionBar" 2939 android:forceDeviceEncrypted="true" 2940 android:encryptionAware="true"> 2941 <activity android:name="com.android.internal.app.ChooserActivity" 2942 android:theme="@style/Theme.DeviceDefault.Resolver" 2943 android:finishOnCloseSystemDialogs="true" 2944 android:excludeFromRecents="true" 2945 android:documentLaunchMode="never" 2946 android:relinquishTaskIdentity="true" 2947 android:process=":ui"> 2948 <intent-filter> 2949 <action android:name="android.intent.action.CHOOSER" /> 2950 <category android:name="android.intent.category.DEFAULT" /> 2951 <category android:name="android.intent.category.VOICE" /> 2952 </intent-filter> 2953 </activity> 2954 <activity android:name="com.android.internal.app.IntentForwarderActivity" 2955 android:finishOnCloseSystemDialogs="true" 2956 android:theme="@style/Theme.NoDisplay" 2957 android:excludeFromRecents="true" 2958 android:label="@string/user_owner_label" 2959 android:exported="true" 2960 > 2961 </activity> 2962 <activity-alias android:name="com.android.internal.app.ForwardIntentToParent" 2963 android:targetActivity="com.android.internal.app.IntentForwarderActivity" 2964 android:exported="true" 2965 android:label="@string/user_owner_label"> 2966 </activity-alias> 2967 <activity-alias android:name="com.android.internal.app.ForwardIntentToManagedProfile" 2968 android:targetActivity="com.android.internal.app.IntentForwarderActivity" 2969 android:icon="@drawable/ic_corp_icon" 2970 android:exported="true" 2971 android:label="@string/managed_profile_label"> 2972 </activity-alias> 2973 <activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity" 2974 android:theme="@style/Theme.Material.DayNight.Dialog" 2975 android:label="@string/heavy_weight_switcher_title" 2976 android:finishOnCloseSystemDialogs="true" 2977 android:excludeFromRecents="true" 2978 android:process=":ui"> 2979 </activity> 2980 <activity android:name="com.android.internal.app.PlatLogoActivity" 2981 android:theme="@style/Theme.Wallpaper.NoTitleBar.Fullscreen" 2982 android:configChanges="orientation|keyboardHidden" 2983 android:process=":ui"> 2984 </activity> 2985 <activity android:name="com.android.internal.app.DisableCarModeActivity" 2986 android:theme="@style/Theme.NoDisplay" 2987 android:excludeFromRecents="true" 2988 android:process=":ui"> 2989 </activity> 2990 <activity android:name="com.android.internal.app.DumpHeapActivity" 2991 android:theme="@style/Theme.Translucent.NoTitleBar" 2992 android:label="@string/dump_heap_title" 2993 android:finishOnCloseSystemDialogs="true" 2994 android:noHistory="true" 2995 android:excludeFromRecents="true" 2996 android:process=":ui"> 2997 </activity> 2998 <provider android:name="com.android.server.am.DumpHeapProvider" 2999 android:authorities="com.android.server.heapdump" 3000 android:grantUriPermissions="true" 3001 android:multiprocess="false" 3002 android:singleUser="true" /> 3003 3004 <activity android:name="android.accounts.ChooseAccountActivity" 3005 android:excludeFromRecents="true" 3006 android:exported="true" 3007 android:theme="@style/Theme.Material.DayNight.Dialog" 3008 android:label="@string/choose_account_label" 3009 android:process=":ui"> 3010 </activity> 3011 3012 <activity android:name="android.accounts.ChooseTypeAndAccountActivity" 3013 android:excludeFromRecents="true" 3014 android:exported="true" 3015 android:theme="@style/Theme.Material.DayNight.Dialog" 3016 android:label="@string/choose_account_label" 3017 android:process=":ui"> 3018 </activity> 3019 3020 <activity android:name="android.accounts.ChooseAccountTypeActivity" 3021 android:excludeFromRecents="true" 3022 android:theme="@style/Theme.Material.DayNight.Dialog" 3023 android:label="@string/choose_account_label" 3024 android:process=":ui"> 3025 </activity> 3026 3027 <activity android:name="android.accounts.CantAddAccountActivity" 3028 android:excludeFromRecents="true" 3029 android:exported="true" 3030 android:theme="@style/Theme.Material.DayNight.Dialog.NoActionBar" 3031 android:process=":ui"> 3032 </activity> 3033 3034 <activity android:name="android.accounts.GrantCredentialsPermissionActivity" 3035 android:excludeFromRecents="true" 3036 android:exported="true" 3037 android:theme="@style/Theme.Material.DayNight.DialogWhenLarge" 3038 android:process=":ui"> 3039 </activity> 3040 3041 <activity android:name="android.content.SyncActivityTooManyDeletes" 3042 android:theme="@style/Theme.Material.DayNight.Dialog" 3043 android:label="@string/sync_too_many_deletes" 3044 android:process=":ui"> 3045 </activity> 3046 3047 <activity android:name="com.android.internal.app.ShutdownActivity" 3048 android:permission="android.permission.SHUTDOWN" 3049 android:theme="@style/Theme.NoDisplay" 3050 android:excludeFromRecents="true"> 3051 <intent-filter> 3052 <action android:name="android.intent.action.ACTION_REQUEST_SHUTDOWN" /> 3053 <category android:name="android.intent.category.DEFAULT" /> 3054 </intent-filter> 3055 <intent-filter> 3056 <action android:name="android.intent.action.REBOOT" /> 3057 <category android:name="android.intent.category.DEFAULT" /> 3058 </intent-filter> 3059 </activity> 3060 3061 <activity android:name="com.android.internal.app.NetInitiatedActivity" 3062 android:theme="@style/Theme.Material.DayNight.Dialog.Alert" 3063 android:excludeFromRecents="true" 3064 android:process=":ui"> 3065 </activity> 3066 3067 <activity android:name="com.android.internal.app.SystemUserHomeActivity" 3068 android:enabled="false" 3069 android:process=":ui" 3070 android:systemUserOnly="true" 3071 android:theme="@style/Theme.Translucent.NoTitleBar"> 3072 <intent-filter android:priority="-100"> 3073 <action android:name="android.intent.action.MAIN" /> 3074 <category android:name="android.intent.category.HOME" /> 3075 </intent-filter> 3076 </activity> 3077 3078 <!-- Activity to prompt user if it's ok to create a new user sandbox for a 3079 specified account. --> 3080 <activity android:name="com.android.internal.app.ConfirmUserCreationActivity" 3081 android:excludeFromRecents="true" 3082 android:process=":ui" 3083 android:theme="@style/Theme.Material.DayNight.Dialog.Alert"> 3084 <intent-filter android:priority="1000"> 3085 <action android:name="android.os.action.CREATE_USER" /> 3086 <category android:name="android.intent.category.DEFAULT" /> 3087 </intent-filter> 3088 </activity> 3089 3090 <activity android:name="com.android.internal.app.UnlaunchableAppActivity" 3091 android:theme="@style/Theme.Material.DayNight.Dialog.Alert" 3092 android:excludeFromRecents="true" 3093 android:process=":ui"> 3094 </activity> 3095 3096 <receiver android:name="com.android.server.BootReceiver" 3097 android:systemUserOnly="true"> 3098 <intent-filter android:priority="1000"> 3099 <action android:name="android.intent.action.BOOT_COMPLETED" /> 3100 </intent-filter> 3101 </receiver> 3102 3103 <receiver android:name="com.android.server.updates.CertPinInstallReceiver" 3104 android:permission="android.permission.UPDATE_CONFIG"> 3105 <intent-filter> 3106 <action android:name="android.intent.action.UPDATE_PINS" /> 3107 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3108 </intent-filter> 3109 </receiver> 3110 3111 <receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver" 3112 android:permission="android.permission.UPDATE_CONFIG"> 3113 <intent-filter> 3114 <action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" /> 3115 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3116 </intent-filter> 3117 </receiver> 3118 3119 <receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver" 3120 android:permission="android.permission.UPDATE_CONFIG"> 3121 <intent-filter> 3122 <action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" /> 3123 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3124 </intent-filter> 3125 </receiver> 3126 3127 <receiver android:name="com.android.server.updates.ApnDbInstallReceiver" 3128 android:permission="android.permission.UPDATE_CONFIG"> 3129 <intent-filter> 3130 <action android:name="android.intent.action.UPDATE_APN_DB" /> 3131 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3132 </intent-filter> 3133 </receiver> 3134 3135 <receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver" 3136 android:permission="android.permission.UPDATE_CONFIG"> 3137 <intent-filter> 3138 <action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" /> 3139 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3140 </intent-filter> 3141 </receiver> 3142 3143 <receiver android:name="com.android.server.updates.TzDataInstallReceiver" 3144 android:permission="android.permission.UPDATE_CONFIG"> 3145 <intent-filter> 3146 <action android:name="android.intent.action.UPDATE_TZDATA" /> 3147 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3148 </intent-filter> 3149 </receiver> 3150 3151 <receiver android:name="com.android.server.updates.SELinuxPolicyInstallReceiver" 3152 android:permission="android.permission.UPDATE_CONFIG"> 3153 <intent-filter> 3154 <action android:name="android.intent.action.UPDATE_SEPOLICY" /> 3155 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3156 </intent-filter> 3157 </receiver> 3158 3159 <receiver android:name="com.android.server.MasterClearReceiver" 3160 android:permission="android.permission.MASTER_CLEAR"> 3161 <intent-filter 3162 android:priority="100" > 3163 <!-- For Checkin, Settings, etc.: action=MASTER_CLEAR --> 3164 <action android:name="android.intent.action.MASTER_CLEAR" /> 3165 3166 <!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR --> 3167 <action android:name="com.google.android.c2dm.intent.RECEIVE" /> 3168 <category android:name="android.intent.category.MASTER_CLEAR" /> 3169 </intent-filter> 3170 </receiver> 3171 3172 <service android:name="android.hardware.location.GeofenceHardwareService" 3173 android:permission="android.permission.LOCATION_HARDWARE" 3174 android:exported="false" /> 3175 3176 <service android:name="com.android.internal.backup.LocalTransportService" 3177 android:permission="android.permission.CONFIRM_FULL_BACKUP" 3178 android:exported="false"> 3179 <intent-filter> 3180 <action android:name="android.backup.TRANSPORT_HOST" /> 3181 </intent-filter> 3182 </service> 3183 3184 <service android:name="com.android.server.MountServiceIdler" 3185 android:exported="true" 3186 android:permission="android.permission.BIND_JOB_SERVICE" > 3187 </service> 3188 3189 <service android:name="com.android.server.backup.FullBackupJob" 3190 android:exported="true" 3191 android:permission="android.permission.BIND_JOB_SERVICE" > 3192 </service> 3193 3194 <service android:name="com.android.server.backup.KeyValueBackupJob" 3195 android:permission="android.permission.BIND_JOB_SERVICE" > 3196 </service> 3197 3198 <service android:name="com.android.server.content.SyncJobService" 3199 android:permission="android.permission.BIND_JOB_SERVICE" > 3200 </service> 3201 3202 <service 3203 android:name="com.android.server.pm.BackgroundDexOptService" 3204 android:exported="true" 3205 android:permission="android.permission.BIND_JOB_SERVICE"> 3206 </service> 3207 3208 </application> 3209 3210</manifest> 3211