AndroidManifest.xml revision 82f09bcf93cc2e0f9a363f40bf8a64bcaa6d8b9f
1<?xml version="1.0" encoding="utf-8"?> 2<!-- 3/* //device/apps/common/AndroidManifest.xml 4** 5** Copyright 2006, The Android Open Source Project 6** 7** Licensed under the Apache License, Version 2.0 (the "License"); 8** you may not use this file except in compliance with the License. 9** You may obtain a copy of the License at 10** 11** http://www.apache.org/licenses/LICENSE-2.0 12** 13** Unless required by applicable law or agreed to in writing, software 14** distributed under the License is distributed on an "AS IS" BASIS, 15** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 16** See the License for the specific language governing permissions and 17** limitations under the License. 18*/ 19--> 20<manifest xmlns:android="http://schemas.android.com/apk/res/android" 21 package="android" coreApp="true" android:sharedUserId="android.uid.system" 22 android:sharedUserLabel="@string/android_system_label"> 23 24 <!-- ================================================ --> 25 <!-- Special broadcasts that only the system can send --> 26 <!-- ================================================ --> 27 <eat-comment /> 28 29 <protected-broadcast android:name="android.intent.action.SCREEN_OFF" /> 30 <protected-broadcast android:name="android.intent.action.SCREEN_ON" /> 31 <protected-broadcast android:name="android.intent.action.USER_PRESENT" /> 32 <protected-broadcast android:name="android.intent.action.TIME_SET" /> 33 <protected-broadcast android:name="android.intent.action.TIME_TICK" /> 34 <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" /> 35 <protected-broadcast android:name="android.intent.action.DATE_CHANGED" /> 36 <protected-broadcast android:name="android.intent.action.PRE_BOOT_COMPLETED" /> 37 <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" /> 38 <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" /> 39 <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" /> 40 <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" /> 41 <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" /> 42 <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" /> 43 <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" /> 44 <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" /> 45 <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" /> 46 <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" /> 47 <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" /> 48 <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" /> 49 <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" /> 50 <protected-broadcast android:name="android.intent.action.PACKAGES_SUSPENDED" /> 51 <protected-broadcast android:name="android.intent.action.PACKAGES_UNSUSPENDED" /> 52 <protected-broadcast android:name="android.intent.action.ACTION_PREFERRED_ACTIVITY_CHANGED" /> 53 <protected-broadcast android:name="android.intent.action.UID_REMOVED" /> 54 <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" /> 55 <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" /> 56 <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" /> 57 <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" /> 58 <protected-broadcast android:name="android.intent.action.BATTERY_LOW" /> 59 <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" /> 60 <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" /> 61 <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" /> 62 <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" /> 63 <protected-broadcast android:name="android.intent.action.CHARGING" /> 64 <protected-broadcast android:name="android.intent.action.DISCHARGING" /> 65 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" /> 66 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" /> 67 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" /> 68 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" /> 69 <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" /> 70 <protected-broadcast android:name="android.intent.action.REBOOT" /> 71 <protected-broadcast android:name="android.intent.action.DOCK_EVENT" /> 72 <protected-broadcast android:name="android.intent.action.THERMAL_EVENT" /> 73 <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" /> 74 <protected-broadcast android:name="android.intent.action.USER_ADDED" /> 75 <protected-broadcast android:name="android.intent.action.USER_REMOVED" /> 76 <protected-broadcast android:name="android.intent.action.USER_STARTING" /> 77 <protected-broadcast android:name="android.intent.action.USER_STARTED" /> 78 <protected-broadcast android:name="android.intent.action.USER_STOPPING" /> 79 <protected-broadcast android:name="android.intent.action.USER_STOPPED" /> 80 <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" /> 81 <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" /> 82 <protected-broadcast android:name="android.intent.action.USER_SWITCHED" /> 83 <protected-broadcast android:name="android.intent.action.USER_INITIALIZE" /> 84 <protected-broadcast android:name="android.intent.action.INTENT_FILTER_NEEDS_VERIFICATION" /> 85 <protected-broadcast android:name="android.intent.action.OVERLAY_ADDED" /> 86 <protected-broadcast android:name="android.intent.action.OVERLAY_CHANGED" /> 87 <protected-broadcast android:name="android.intent.action.OVERLAY_REMOVED" /> 88 <protected-broadcast android:name="android.intent.action.OVERLAY_PRIORITY_CHANGED" /> 89 90 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED" /> 91 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGING" /> 92 <protected-broadcast android:name="android.os.action.DEVICE_IDLE_MODE_CHANGED" /> 93 <protected-broadcast android:name="android.os.action.POWER_SAVE_WHITELIST_CHANGED" /> 94 <protected-broadcast android:name="android.os.action.POWER_SAVE_TEMP_WHITELIST_CHANGED" /> 95 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED_INTERNAL" /> 96 97 <!-- @deprecated This is rarely used and will be phased out soon. --> 98 <protected-broadcast android:name="android.os.action.SCREEN_BRIGHTNESS_BOOST_CHANGED" /> 99 100 <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" /> 101 <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" /> 102 <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" /> 103 <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" /> 104 <protected-broadcast android:name="android.app.action.NEXT_ALARM_CLOCK_CHANGED" /> 105 106 <protected-broadcast android:name="android.app.action.BUGREPORT_SHARING_DECLINED" /> 107 <protected-broadcast android:name="android.app.action.BUGREPORT_FAILED" /> 108 <protected-broadcast android:name="android.app.action.BUGREPORT_SHARE" /> 109 <protected-broadcast android:name="android.app.action.SHOW_DEVICE_MONITORING_DIALOG" /> 110 111 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" /> 112 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" /> 113 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" /> 114 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" /> 115 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_HOST_RESTORED" /> 116 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_RESTORED" /> 117 118 <protected-broadcast android:name="android.os.action.SETTING_RESTORED" /> 119 120 <protected-broadcast android:name="android.app.backup.intent.RUN" /> 121 <protected-broadcast android:name="android.app.backup.intent.CLEAR" /> 122 <protected-broadcast android:name="android.app.backup.intent.INIT" /> 123 124 <protected-broadcast android:name="android.bluetooth.intent.DISCOVERABLE_TIMEOUT" /> 125 <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" /> 126 <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" /> 127 <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" /> 128 <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" /> 129 <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" /> 130 <protected-broadcast android:name="android.bluetooth.adapter.action.BLUETOOTH_ADDRESS_CHANGED" /> 131 <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" /> 132 <protected-broadcast android:name="android.bluetooth.device.action.UUID" /> 133 <protected-broadcast android:name="android.bluetooth.device.action.MAS_INSTANCE" /> 134 <protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" /> 135 <protected-broadcast android:name="android.bluetooth.device.action.FOUND" /> 136 <protected-broadcast android:name="android.bluetooth.device.action.DISAPPEARED" /> 137 <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" /> 138 <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" /> 139 <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" /> 140 <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" /> 141 <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" /> 142 <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" /> 143 <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" /> 144 <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" /> 145 <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" /> 146 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" /> 147 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" /> 148 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" /> 149 <protected-broadcast android:name="android.bluetooth.device.action.SDP_RECORD" /> 150 <protected-broadcast android:name="android.bluetooth.device.action.BATTERY_LEVEL_CHANGED" /> 151 <protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" /> 152 <protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" /> 153 <protected-broadcast 154 android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" /> 155 <protected-broadcast 156 android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" /> 157 <protected-broadcast 158 android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" /> 159 <protected-broadcast 160 android:name="android.bluetooth.headset.action.HF_INDICATORS_VALUE_CHANGED" /> 161 <protected-broadcast 162 android:name="android.bluetooth.headset.profile.action.ACTIVE_DEVICE_CHANGED" /> 163 <protected-broadcast 164 android:name="android.bluetooth.headsetclient.profile.action.CONNECTION_STATE_CHANGED" /> 165 <protected-broadcast 166 android:name="android.bluetooth.headsetclient.profile.action.AUDIO_STATE_CHANGED" /> 167 <protected-broadcast 168 android:name="android.bluetooth.headsetclient.profile.action.AG_EVENT" /> 169 <protected-broadcast 170 android:name="android.bluetooth.headsetclient.profile.action.AG_CALL_CHANGED" /> 171 <protected-broadcast 172 android:name="android.bluetooth.headsetclient.profile.action.RESULT" /> 173 <protected-broadcast 174 android:name="android.bluetooth.headsetclient.profile.action.LAST_VTAG" /> 175 <protected-broadcast 176 android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" /> 177 <protected-broadcast 178 android:name="android.bluetooth.a2dp.profile.action.ACTIVE_DEVICE_CHANGED" /> 179 <protected-broadcast 180 android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" /> 181 <protected-broadcast 182 android:name="android.bluetooth.a2dp.profile.action.CODEC_CONFIG_CHANGED" /> 183 <protected-broadcast 184 android:name="android.bluetooth.a2dp-sink.profile.action.CONNECTION_STATE_CHANGED" /> 185 <protected-broadcast 186 android:name="android.bluetooth.a2dp-sink.profile.action.PLAYING_STATE_CHANGED" /> 187 <protected-broadcast 188 android:name="android.bluetooth.a2dp-sink.profile.action.AUDIO_CONFIG_CHANGED" /> 189 <protected-broadcast 190 android:name="android.bluetooth.avrcp-controller.profile.action.BROWSE_CONNECTION_STATE_CHANGED" /> 191 <protected-broadcast 192 android:name="android.bluetooth.avrcp-controller.profile.action.CONNECTION_STATE_CHANGED" /> 193 <protected-broadcast 194 android:name="android.bluetooth.avrcp-controller.profile.action.FOLDER_LIST" /> 195 <protected-broadcast 196 android:name="android.bluetooth.avrcp-controller.profile.action.TRACK_EVENT" /> 197 <protected-broadcast 198 android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" /> 199 <protected-broadcast 200 android:name="android.bluetooth.input.profile.action.IDLE_TIME_CHANGED" /> 201 <protected-broadcast 202 android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" /> 203 <protected-broadcast 204 android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" /> 205 <protected-broadcast 206 android:name="android.bluetooth.hiddevice.profile.action.CONNECTION_STATE_CHANGED" /> 207 <protected-broadcast 208 android:name="android.bluetooth.map.profile.action.CONNECTION_STATE_CHANGED" /> 209 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.CONNECTION_STATE_CHANGED" /> 210 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_RECEIVED" /> 211 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_SENT_SUCCESSFULLY" /> 212 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_DELIVERED_SUCCESSFULLY" /> 213 <protected-broadcast 214 android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_SENT" /> 215 <protected-broadcast 216 android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_DELIVERY" /> 217 <protected-broadcast 218 android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" /> 219 <protected-broadcast android:name="android.bluetooth.pbap.profile.action.CONNECTION_STATE_CHANGED" /> 220 <protected-broadcast android:name="android.bluetooth.pbapclient.profile.action.CONNECTION_STATE_CHANGED" /> 221 <protected-broadcast android:name="android.bluetooth.sap.profile.action.CONNECTION_STATE_CHANGED" /> 222 <protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" /> 223 <protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" /> 224 <protected-broadcast android:name="android.btopp.intent.action.LIST" /> 225 <protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" /> 226 <protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" /> 227 <protected-broadcast android:name="android.btopp.intent.action.CONFIRM" /> 228 <protected-broadcast android:name="android.btopp.intent.action.HIDE" /> 229 <protected-broadcast android:name="android.btopp.intent.action.RETRY" /> 230 <protected-broadcast android:name="android.btopp.intent.action.OPEN" /> 231 <protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" /> 232 <protected-broadcast android:name="android.btopp.intent.action.TRANSFER_COMPLETE" /> 233 <protected-broadcast android:name="android.btopp.intent.action.ACCEPT" /> 234 <protected-broadcast android:name="android.btopp.intent.action.DECLINE" /> 235 <protected-broadcast android:name="com.android.bluetooth.gatt.REFRESH_BATCHED_SCAN" /> 236 <protected-broadcast android:name="com.android.bluetooth.pbap.authchall" /> 237 <protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" /> 238 <protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" /> 239 <protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" /> 240 <protected-broadcast android:name="com.android.bluetooth.sap.USER_CONFIRM_TIMEOUT" /> 241 <protected-broadcast android:name="com.android.bluetooth.sap.action.DISCONNECT_ACTION" /> 242 243 <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" /> 244 245 <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" /> 246 <protected-broadcast android:name="android.hardware.usb.action.USB_PORT_CHANGED" /> 247 <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" /> 248 <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_DETACHED" /> 249 <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" /> 250 <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" /> 251 252 <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" /> 253 <protected-broadcast android:name="android.media.action.HDMI_AUDIO_PLUG" /> 254 255 <protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" /> 256 <protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" /> 257 <protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" /> 258 <protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" /> 259 <protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" /> 260 <protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" /> 261 <protected-broadcast android:name="android.media.MASTER_MONO_CHANGED_ACTION" /> 262 <protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" /> 263 <protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" /> 264 265 <protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" /> 266 <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" /> 267 <protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" /> 268 <protected-broadcast android:name="android.intent.action.MEDIA_NOFS" /> 269 <protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" /> 270 <protected-broadcast android:name="android.intent.action.MEDIA_SHARED" /> 271 <protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" /> 272 <protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" /> 273 <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" /> 274 <protected-broadcast android:name="android.intent.action.MEDIA_EJECT" /> 275 276 <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL" /> 277 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" /> 278 <!-- @deprecated. Only {@link android.net.ConnectivityManager.CONNECTIVITY_ACTION} is sent. --> 279 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" /> 280 <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" /> 281 <protected-broadcast android:name="android.net.conn.RESTRICT_BACKGROUND_CHANGED" /> 282 <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" /> 283 <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" /> 284 285 <protected-broadcast android:name="android.net.nsd.STATE_CHANGED" /> 286 287 <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" /> 288 <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" /> 289 <protected-broadcast android:name="com.android.nfc.action.LLCP_UP" /> 290 <protected-broadcast android:name="com.android.nfc.action.LLCP_DOWN" /> 291 <protected-broadcast android:name="com.android.nfc.cardemulation.action.CLOSE_TAP_DIALOG" /> 292 <protected-broadcast android:name="com.android.nfc.handover.action.ALLOW_CONNECT" /> 293 <protected-broadcast android:name="com.android.nfc.handover.action.DENY_CONNECT" /> 294 <protected-broadcast android:name="com.android.nfc.handover.action.TIMEOUT_CONNECT" /> 295 <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" /> 296 <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" /> 297 <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" /> 298 <!-- For NFC to BT handover --> 299 <protected-broadcast android:name="android.btopp.intent.action.WHITELIST_DEVICE" /> 300 <protected-broadcast android:name="android.btopp.intent.action.STOP_HANDOVER_TRANSFER" /> 301 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND" /> 302 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND_MULTIPLE" /> 303 <protected-broadcast android:name="com.android.nfc.handover.action.CANCEL_HANDOVER_TRANSFER" /> 304 305 <protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" /> 306 <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" /> 307 308 <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" /> 309 310 <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" /> 311 <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" /> 312 <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" /> 313 314 <protected-broadcast android:name="com.android.server.stats.action.TRIGGER_COLLECTION" /> 315 316 <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" /> 317 <protected-broadcast android:name="com.android.server.WifiManager.action.START_PNO" /> 318 <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" /> 319 <protected-broadcast android:name="com.android.server.WifiManager.action.DEVICE_IDLE" /> 320 <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_ACCEPTED" /> 321 <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_DECLINED" /> 322 <protected-broadcast android:name="com.android.internal.action.EUICC_FACTORY_RESET" /> 323 <protected-broadcast android:name="com.android.server.usb.ACTION_OPEN_IN_APPS" /> 324 <protected-broadcast android:name="com.android.server.am.DELETE_DUMPHEAP" /> 325 <protected-broadcast android:name="com.android.server.net.action.SNOOZE_WARNING" /> 326 <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.USER_DISMISSED_NOTIFICATION" /> 327 <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.CONNECT_TO_NETWORK" /> 328 <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.PICK_WIFI_NETWORK" /> 329 <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.PICK_NETWORK_AFTER_FAILURE" /> 330 <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" /> 331 <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" /> 332 <protected-broadcast android:name="android.net.wifi.WIFI_CREDENTIAL_CHANGED" /> 333 <protected-broadcast android:name="android.net.wifi.WIFI_SCAN_AVAILABLE" /> 334 <protected-broadcast android:name="android.net.wifi.aware.action.WIFI_AWARE_STATE_CHANGED" /> 335 <protected-broadcast android:name="android.net.wifi.rtt.action.WIFI_RTT_STATE_CHANGED" /> 336 <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" /> 337 <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" /> 338 <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" /> 339 <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" /> 340 <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" /> 341 <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_DEAUTH_IMMINENT" /> 342 <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_ICON" /> 343 <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_OSU_PROVIDERS_LIST" /> 344 <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_SUBSCRIPTION_REMEDIATION" /> 345 <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" /> 346 <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" /> 347 <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" /> 348 <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" /> 349 <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" /> 350 <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" /> 351 <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" /> 352 <protected-broadcast android:name="android.net.wifi.p2p.PERSISTENT_GROUPS_CHANGED" /> 353 <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" /> 354 <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" /> 355 <protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" /> 356 <protected-broadcast 357 android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" /> 358 <protected-broadcast android:name="android.net.scoring.SCORE_NETWORKS" /> 359 <protected-broadcast android:name="android.net.scoring.SCORER_CHANGED" /> 360 <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" /> 361 <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" /> 362 <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" /> 363 <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" /> 364 <protected-broadcast android:name="android.intent.action.APPLICATION_RESTRICTIONS_CHANGED" /> 365 366 <!-- Legacy --> 367 <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" /> 368 <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" /> 369 370 <protected-broadcast android:name="com.android.server.ACTION_TRIGGER_IDLE" /> 371 372 <protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" /> 373 374 <protected-broadcast android:name="android.intent.action.PHONE_STATE" /> 375 376 <protected-broadcast android:name="android.intent.action.SUB_DEFAULT_CHANGED" /> 377 378 <protected-broadcast android:name="android.location.GPS_ENABLED_CHANGE" /> 379 <protected-broadcast android:name="android.location.PROVIDERS_CHANGED" /> 380 <protected-broadcast android:name="android.location.MODE_CHANGED" /> 381 <protected-broadcast android:name="android.location.GPS_FIX_CHANGE" /> 382 <protected-broadcast android:name="android.net.proxy.PAC_REFRESH" /> 383 384 <protected-broadcast android:name="android.telecom.action.DEFAULT_DIALER_CHANGED" /> 385 <protected-broadcast android:name="android.provider.action.DEFAULT_SMS_PACKAGE_CHANGED" /> 386 <protected-broadcast android:name="android.intent.action.CONTENT_CHANGED" /> 387 <protected-broadcast android:name="android.provider.Telephony.MMS_DOWNLOADED" /> 388 389 <protected-broadcast 390 android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" /> 391 392 <!-- Defined in RestrictionsManager --> 393 <protected-broadcast 394 android:name="android.intent.action.PERMISSION_RESPONSE_RECEIVED" /> 395 <!-- Defined in RestrictionsManager --> 396 397 <protected-broadcast android:name="android.intent.action.REQUEST_PERMISSION" /> 398 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_STARTED" /> 399 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" /> 400 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_PROGRESS" /> 401 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" /> 402 403 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_DATA_SUBSCRIPTION_CHANGED" /> 404 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_VOICE_SUBSCRIPTION_CHANGED" /> 405 <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_CONTENT_CHANGE" /> 406 <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_RECORD_UPDATED" /> 407 408 <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_DONE" /> 409 <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_FAILED" /> 410 411 <protected-broadcast android:name="android.internal.policy.action.BURN_IN_PROTECTION" /> 412 <protected-broadcast android:name="android.app.action.SYSTEM_UPDATE_POLICY_CHANGED" /> 413 <protected-broadcast android:name="android.app.action.DEVICE_OWNER_CHANGED" /> 414 <protected-broadcast android:name="android.app.action.MANAGED_USER_CREATED" /> 415 416 <!-- Added in N --> 417 <protected-broadcast android:name="android.intent.action.ANR" /> 418 <protected-broadcast android:name="android.intent.action.CALL" /> 419 <protected-broadcast android:name="android.intent.action.CALL_PRIVILEGED" /> 420 <protected-broadcast android:name="android.intent.action.DROPBOX_ENTRY_ADDED" /> 421 <protected-broadcast android:name="android.intent.action.INPUT_METHOD_CHANGED" /> 422 <protected-broadcast android:name="android.intent.action.internal_sim_state_changed" /> 423 <protected-broadcast android:name="android.intent.action.LOCKED_BOOT_COMPLETED" /> 424 <protected-broadcast android:name="android.intent.action.PRECISE_CALL_STATE" /> 425 <protected-broadcast android:name="android.intent.action.PRECISE_DATA_CONNECTION_STATE_CHANGED" /> 426 <protected-broadcast android:name="android.intent.action.SUBSCRIPTION_PHONE_STATE" /> 427 <protected-broadcast android:name="android.intent.action.USER_INFO_CHANGED" /> 428 <protected-broadcast android:name="android.intent.action.USER_UNLOCKED" /> 429 <protected-broadcast android:name="android.intent.action.WALLPAPER_CHANGED" /> 430 431 <protected-broadcast android:name="android.app.action.DEVICE_POLICY_MANAGER_STATE_CHANGED" /> 432 <protected-broadcast android:name="android.app.action.CHOOSE_PRIVATE_KEY_ALIAS" /> 433 <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLED" /> 434 <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLE_REQUESTED" /> 435 <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_ENABLED" /> 436 <protected-broadcast android:name="android.app.action.LOCK_TASK_ENTERING" /> 437 <protected-broadcast android:name="android.app.action.LOCK_TASK_EXITING" /> 438 <protected-broadcast android:name="android.app.action.NOTIFY_PENDING_SYSTEM_UPDATE" /> 439 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_CHANGED" /> 440 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_EXPIRING" /> 441 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_FAILED" /> 442 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_SUCCEEDED" /> 443 <protected-broadcast android:name="com.android.server.ACTION_EXPIRED_PASSWORD_NOTIFICATION" /> 444 445 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_ADDED" /> 446 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNLOCKED" /> 447 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_REMOVED" /> 448 449 <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_STATE_CHANGED" /> 450 <protected-broadcast android:name="com.android.bluetooth.map.USER_CONFIRM_TIMEOUT" /> 451 <protected-broadcast android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_SENT" /> 452 <protected-broadcast android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_DELIVERY" /> 453 <protected-broadcast android:name="android.content.jobscheduler.JOB_DELAY_EXPIRED" /> 454 <protected-broadcast android:name="android.content.syncmanager.SYNC_ALARM" /> 455 <protected-broadcast android:name="android.media.INTERNAL_RINGER_MODE_CHANGED_ACTION" /> 456 <protected-broadcast android:name="android.media.STREAM_DEVICES_CHANGED_ACTION" /> 457 <protected-broadcast android:name="android.media.STREAM_MUTE_CHANGED_ACTION" /> 458 <protected-broadcast android:name="android.net.sip.SIP_SERVICE_UP" /> 459 <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" /> 460 <protected-broadcast android:name="android.os.action.CHARGING" /> 461 <protected-broadcast android:name="android.os.action.DISCHARGING" /> 462 <protected-broadcast android:name="android.search.action.SEARCHABLES_CHANGED" /> 463 <protected-broadcast android:name="android.security.STORAGE_CHANGED" /> 464 <protected-broadcast android:name="android.security.action.TRUST_STORE_CHANGED" /> 465 <protected-broadcast android:name="android.security.action.KEYCHAIN_CHANGED" /> 466 <protected-broadcast android:name="android.security.action.KEY_ACCESS_CHANGED" /> 467 <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_REGISTERED" /> 468 <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_UNREGISTERED" /> 469 <protected-broadcast android:name="android.telecom.action.SHOW_MISSED_CALLS_NOTIFICATION" /> 470 <protected-broadcast android:name="android.telephony.action.CARRIER_CONFIG_CHANGED" /> 471 <protected-broadcast android:name="android.telephony.action.DEFAULT_SUBSCRIPTION_CHANGED" /> 472 <protected-broadcast android:name="android.telephony.action.DEFAULT_SMS_SUBSCRIPTION_CHANGED" /> 473 <protected-broadcast android:name="android.telephony.action.SHOW_VOICEMAIL_NOTIFICATION" /> 474 475 <protected-broadcast android:name="com.android.bluetooth.btservice.action.ALARM_WAKEUP" /> 476 <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_POLL" /> 477 <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_UPDATED" /> 478 <protected-broadcast android:name="com.android.server.NetworkTimeUpdateService.action.POLL" /> 479 <protected-broadcast android:name="com.android.server.telecom.intent.action.CALLS_ADD_ENTRY" /> 480 <protected-broadcast android:name="com.android.settings.location.MODE_CHANGING" /> 481 <protected-broadcast android:name="com.android.settings.bluetooth.ACTION_DISMISS_PAIRING" /> 482 483 <protected-broadcast android:name="NotificationManagerService.TIMEOUT" /> 484 <protected-broadcast android:name="ScheduleConditionProvider.EVALUATE" /> 485 <protected-broadcast android:name="EventConditionProvider.EVALUATE" /> 486 <protected-broadcast android:name="SnoozeHelper.EVALUATE" /> 487 <protected-broadcast android:name="wifi_scan_available" /> 488 489 <protected-broadcast android:name="action.cne.started" /> 490 <protected-broadcast android:name="android.content.jobscheduler.JOB_DEADLINE_EXPIRED" /> 491 <protected-broadcast android:name="android.intent.action.ACTION_UNSOL_RESPONSE_OEM_HOOK_RAW" /> 492 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_SUPL" /> 493 <protected-broadcast android:name="android.os.action.LIGHT_DEVICE_IDLE_MODE_CHANGED" /> 494 <protected-broadcast android:name="android.os.storage.action.VOLUME_STATE_CHANGED" /> 495 <protected-broadcast android:name="android.os.storage.action.DISK_SCANNED" /> 496 <protected-broadcast android:name="com.android.server.action.UPDATE_TWILIGHT_STATE" /> 497 <protected-broadcast android:name="com.android.server.action.RESET_TWILIGHT_AUTO" /> 498 <protected-broadcast android:name="com.android.server.device_idle.STEP_IDLE_STATE" /> 499 <protected-broadcast android:name="com.android.server.device_idle.STEP_LIGHT_IDLE_STATE" /> 500 <protected-broadcast android:name="com.android.server.Wifi.action.TOGGLE_PNO" /> 501 <protected-broadcast android:name="intent.action.ACTION_RF_BAND_INFO" /> 502 <protected-broadcast android:name="android.intent.action.MEDIA_RESOURCE_GRANTED" /> 503 <protected-broadcast android:name="android.app.action.NETWORK_LOGS_AVAILABLE" /> 504 <protected-broadcast android:name="android.app.action.SECURITY_LOGS_AVAILABLE" /> 505 506 <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED" /> 507 <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED_INTERNAL" /> 508 <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_CHANGED" /> 509 <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_ACCESS_GRANTED_CHANGED" /> 510 <protected-broadcast android:name="android.os.action.ACTION_EFFECTS_SUPPRESSOR_CHANGED" /> 511 <protected-broadcast android:name="android.app.action.NOTIFICATION_CHANNEL_BLOCK_STATE_CHANGED" /> 512 <protected-broadcast android:name="android.app.action.NOTIFICATION_CHANNEL_GROUP_BLOCK_STATE_CHANGED" /> 513 514 <protected-broadcast android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS" /> 515 <protected-broadcast android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS" /> 516 517 <protected-broadcast android:name="android.intent.action.DYNAMIC_SENSOR_CHANGED" /> 518 519 <protected-broadcast android:name="android.intent.action.ACTION_RADIO_OFF" /> 520 521 <protected-broadcast android:name="android.accounts.LOGIN_ACCOUNTS_CHANGED" /> 522 <protected-broadcast android:name="android.accounts.action.ACCOUNT_REMOVED" /> 523 <protected-broadcast android:name="android.accounts.action.VISIBLE_ACCOUNTS_CHANGED" /> 524 525 <protected-broadcast android:name="com.android.sync.SYNC_CONN_STATUS_CHANGED" /> 526 527 <protected-broadcast android:name="com.android.phone.SIP_INCOMING_CALL" /> 528 <protected-broadcast android:name="com.android.phone.SIP_ADD_PHONE" /> 529 <protected-broadcast android:name="com.android.phone.SIP_REMOVE_PHONE" /> 530 <protected-broadcast android:name="com.android.phone.SIP_CALL_OPTION_CHANGED" /> 531 532 <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_CONNECTED" /> 533 <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_DISCONNECTED" /> 534 535 <protected-broadcast android:name="android.bluetooth.input.profile.action.HANDSHAKE" /> 536 <protected-broadcast android:name="android.bluetooth.input.profile.action.REPORT" /> 537 538 <protected-broadcast android:name="android.intent.action.TWILIGHT_CHANGED" /> 539 540 <protected-broadcast android:name="com.android.server.fingerprint.ACTION_LOCKOUT_RESET" /> 541 <protected-broadcast android:name="android.net.wifi.PASSPOINT_ICON_RECEIVED" /> 542 <protected-broadcast android:name="com.android.server.notification.CountdownConditionProvider" /> 543 544 <protected-broadcast android:name="com.android.internal.location.ALARM_WAKEUP" /> 545 <protected-broadcast android:name="com.android.internal.location.ALARM_TIMEOUT" /> 546 <protected-broadcast android:name="android.intent.action.GLOBAL_BUTTON" /> 547 548 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_AVAILABLE" /> 549 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNAVAILABLE" /> 550 <protected-broadcast android:name="com.android.server.pm.DISABLE_QUIET_MODE_AFTER_UNLOCK" /> 551 552 <protected-broadcast android:name="com.android.server.retaildemo.ACTION_RESET_DEMO" /> 553 554 <protected-broadcast android:name="android.intent.action.DEVICE_LOCKED_CHANGED" /> 555 556 <!-- Added in O --> 557 <protected-broadcast android:name="android.app.action.APPLICATION_DELEGATION_SCOPES_CHANGED" /> 558 <protected-broadcast android:name="com.android.server.wm.ACTION_REVOKE_SYSTEM_ALERT_WINDOW_PERMISSION" /> 559 <protected-broadcast android:name="android.media.tv.action.PARENTAL_CONTROLS_ENABLED_CHANGED" /> 560 561 <protected-broadcast android:name="android.content.pm.action.SESSION_COMMITTED" /> 562 <protected-broadcast android:name="android.os.action.USER_RESTRICTIONS_CHANGED" /> 563 <protected-broadcast android:name="android.media.tv.action.PREVIEW_PROGRAM_ADDED_TO_WATCH_NEXT" /> 564 <protected-broadcast android:name="android.media.tv.action.PREVIEW_PROGRAM_BROWSABLE_DISABLED" /> 565 <protected-broadcast android:name="android.media.tv.action.WATCH_NEXT_PROGRAM_BROWSABLE_DISABLED" /> 566 <protected-broadcast android:name="android.media.tv.action.CHANNEL_BROWSABLE_REQUESTED" /> 567 <protected-broadcast android:name="com.android.server.InputMethodManagerService.SHOW_INPUT_METHOD_PICKER" /> 568 569 <!-- Made protected in P (was introduced in JB-MR2) --> 570 <protected-broadcast android:name="android.intent.action.GET_RESTRICTION_ENTRIES" /> 571 <protected-broadcast android:name="android.telephony.euicc.action.OTA_STATUS_CHANGED" /> 572 573 <!-- Added in P --> 574 <protected-broadcast android:name="android.app.action.PROFILE_OWNER_CHANGED" /> 575 <protected-broadcast android:name="android.app.action.TRANSFER_OWNERSHIP_COMPLETE" /> 576 <protected-broadcast android:name="android.app.action.DATA_SHARING_RESTRICTION_CHANGED" /> 577 578 <!-- ====================================================================== --> 579 <!-- RUNTIME PERMISSIONS --> 580 <!-- ====================================================================== --> 581 <eat-comment /> 582 583 <!-- ====================================================================== --> 584 <!-- Permissions for accessing user's contacts including personal profile --> 585 <!-- ====================================================================== --> 586 <eat-comment /> 587 588 <!-- Used for runtime permissions related to contacts and profiles on this 589 device. --> 590 <permission-group android:name="android.permission-group.CONTACTS" 591 android:icon="@drawable/perm_group_contacts" 592 android:label="@string/permgrouplab_contacts" 593 android:description="@string/permgroupdesc_contacts" 594 android:request="@string/permgrouprequest_contacts" 595 android:priority="100" /> 596 597 <!-- Allows an application to read the user's contacts data. 598 <p>Protection level: dangerous 599 --> 600 <permission android:name="android.permission.READ_CONTACTS" 601 android:permissionGroup="android.permission-group.CONTACTS" 602 android:label="@string/permlab_readContacts" 603 android:description="@string/permdesc_readContacts" 604 android:protectionLevel="dangerous" /> 605 606 <!-- Allows an application to write the user's contacts data. 607 <p>Protection level: dangerous 608 --> 609 <permission android:name="android.permission.WRITE_CONTACTS" 610 android:permissionGroup="android.permission-group.CONTACTS" 611 android:label="@string/permlab_writeContacts" 612 android:description="@string/permdesc_writeContacts" 613 android:protectionLevel="dangerous" /> 614 615 <!-- ====================================================================== --> 616 <!-- Permissions for accessing user's calendar --> 617 <!-- ====================================================================== --> 618 <eat-comment /> 619 620 <!-- Used for runtime permissions related to user's calendar. --> 621 <permission-group android:name="android.permission-group.CALENDAR" 622 android:icon="@drawable/perm_group_calendar" 623 android:label="@string/permgrouplab_calendar" 624 android:description="@string/permgroupdesc_calendar" 625 android:request="@string/permgrouprequest_calendar" 626 android:priority="200" /> 627 628 <!-- Allows an application to read the user's calendar data. 629 <p>Protection level: dangerous 630 --> 631 <permission android:name="android.permission.READ_CALENDAR" 632 android:permissionGroup="android.permission-group.CALENDAR" 633 android:label="@string/permlab_readCalendar" 634 android:description="@string/permdesc_readCalendar" 635 android:protectionLevel="dangerous" /> 636 637 <!-- Allows an application to write the user's calendar data. 638 <p>Protection level: dangerous 639 --> 640 <permission android:name="android.permission.WRITE_CALENDAR" 641 android:permissionGroup="android.permission-group.CALENDAR" 642 android:label="@string/permlab_writeCalendar" 643 android:description="@string/permdesc_writeCalendar" 644 android:protectionLevel="dangerous" /> 645 646 <!-- ====================================================================== --> 647 <!-- Permissions for accessing and modifying user's SMS messages --> 648 <!-- ====================================================================== --> 649 <eat-comment /> 650 651 <!-- Used for runtime permissions related to user's SMS messages. --> 652 <permission-group android:name="android.permission-group.SMS" 653 android:icon="@drawable/perm_group_sms" 654 android:label="@string/permgrouplab_sms" 655 android:description="@string/permgroupdesc_sms" 656 android:request="@string/permgrouprequest_sms" 657 android:priority="300" /> 658 659 <!-- Allows an application to send SMS messages. 660 <p>Protection level: dangerous 661 --> 662 <permission android:name="android.permission.SEND_SMS" 663 android:permissionGroup="android.permission-group.SMS" 664 android:label="@string/permlab_sendSms" 665 android:description="@string/permdesc_sendSms" 666 android:permissionFlags="costsMoney" 667 android:protectionLevel="dangerous" /> 668 669 <!-- Allows an application to receive SMS messages. 670 <p>Protection level: dangerous 671 --> 672 <permission android:name="android.permission.RECEIVE_SMS" 673 android:permissionGroup="android.permission-group.SMS" 674 android:label="@string/permlab_receiveSms" 675 android:description="@string/permdesc_receiveSms" 676 android:protectionLevel="dangerous"/> 677 678 <!-- Allows an application to read SMS messages. 679 <p>Protection level: dangerous 680 --> 681 <permission android:name="android.permission.READ_SMS" 682 android:permissionGroup="android.permission-group.SMS" 683 android:label="@string/permlab_readSms" 684 android:description="@string/permdesc_readSms" 685 android:protectionLevel="dangerous" /> 686 687 <!-- Allows an application to receive WAP push messages. 688 <p>Protection level: dangerous 689 --> 690 <permission android:name="android.permission.RECEIVE_WAP_PUSH" 691 android:permissionGroup="android.permission-group.SMS" 692 android:label="@string/permlab_receiveWapPush" 693 android:description="@string/permdesc_receiveWapPush" 694 android:protectionLevel="dangerous" /> 695 696 <!-- Allows an application to monitor incoming MMS messages. 697 <p>Protection level: dangerous 698 --> 699 <permission android:name="android.permission.RECEIVE_MMS" 700 android:permissionGroup="android.permission-group.SMS" 701 android:label="@string/permlab_receiveMms" 702 android:description="@string/permdesc_receiveMms" 703 android:protectionLevel="dangerous" /> 704 705 <!-- Allows an application to read previously received cell broadcast 706 messages and to register a content observer to get notifications when 707 a cell broadcast has been received and added to the database. For 708 emergency alerts, the database is updated immediately after the 709 alert dialog and notification sound/vibration/speech are presented. 710 The "read" column is then updated after the user dismisses the alert. 711 This enables supplementary emergency assistance apps to start loading 712 additional emergency information (if Internet access is available) 713 when the alert is first received, and to delay presenting the info 714 to the user until after the initial alert dialog is dismissed. 715 <p>Protection level: dangerous 716 @hide Pending API council approval --> 717 <permission android:name="android.permission.READ_CELL_BROADCASTS" 718 android:permissionGroup="android.permission-group.SMS" 719 android:label="@string/permlab_readCellBroadcasts" 720 android:description="@string/permdesc_readCellBroadcasts" 721 android:protectionLevel="dangerous" /> 722 723 <!-- ====================================================================== --> 724 <!-- Permissions for accessing external storage --> 725 <!-- ====================================================================== --> 726 <eat-comment /> 727 728 <!-- Used for runtime permissions related to the shared external storage. --> 729 <permission-group android:name="android.permission-group.STORAGE" 730 android:icon="@drawable/perm_group_storage" 731 android:label="@string/permgrouplab_storage" 732 android:description="@string/permgroupdesc_storage" 733 android:request="@string/permgrouprequest_storage" 734 android:priority="900" /> 735 736 <!-- Allows an application to read from external storage. 737 <p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly 738 granted this permission.</p> 739 <p>This permission is enforced starting in API level 19. Before API level 19, this 740 permission is not enforced and all apps still have access to read from external storage. 741 You can test your app with the permission enforced by enabling <em>Protect USB 742 storage</em> under Developer options in the Settings app on a device running Android 4.1 or 743 higher.</p> 744 <p>Also starting in API level 19, this permission is <em>not</em> required to 745 read/write files in your application-specific directories returned by 746 {@link android.content.Context#getExternalFilesDir} and 747 {@link android.content.Context#getExternalCacheDir}. 748 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 749 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 750 minSdkVersion}</a> and <a 751 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 752 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 753 grants your app this permission. If you don't need this permission, be sure your <a 754 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 755 targetSdkVersion}</a> is 4 or higher. 756 <p>Protection level: dangerous 757 --> 758 <permission android:name="android.permission.READ_EXTERNAL_STORAGE" 759 android:permissionGroup="android.permission-group.STORAGE" 760 android:label="@string/permlab_sdcardRead" 761 android:description="@string/permdesc_sdcardRead" 762 android:protectionLevel="dangerous" /> 763 764 <!-- Allows an application to write to external storage. 765 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 766 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 767 minSdkVersion}</a> and <a 768 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 769 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 770 grants your app this permission. If you don't need this permission, be sure your <a 771 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 772 targetSdkVersion}</a> is 4 or higher. 773 <p>Starting in API level 19, this permission is <em>not</em> required to 774 read/write files in your application-specific directories returned by 775 {@link android.content.Context#getExternalFilesDir} and 776 {@link android.content.Context#getExternalCacheDir}. 777 <p>Protection level: dangerous 778 --> 779 <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE" 780 android:permissionGroup="android.permission-group.STORAGE" 781 android:label="@string/permlab_sdcardWrite" 782 android:description="@string/permdesc_sdcardWrite" 783 android:protectionLevel="dangerous" /> 784 785 <!-- ====================================================================== --> 786 <!-- Permissions for accessing the device location --> 787 <!-- ====================================================================== --> 788 <eat-comment /> 789 790 <!-- Used for permissions that allow accessing the device location. --> 791 <permission-group android:name="android.permission-group.LOCATION" 792 android:icon="@drawable/perm_group_location" 793 android:label="@string/permgrouplab_location" 794 android:description="@string/permgroupdesc_location" 795 android:request="@string/permgrouprequest_location" 796 android:priority="400" /> 797 798 <!-- Allows an app to access precise location. 799 Alternatively, you might want {@link #ACCESS_COARSE_LOCATION}. 800 <p>Protection level: dangerous 801 --> 802 <permission android:name="android.permission.ACCESS_FINE_LOCATION" 803 android:permissionGroup="android.permission-group.LOCATION" 804 android:label="@string/permlab_accessFineLocation" 805 android:description="@string/permdesc_accessFineLocation" 806 android:protectionLevel="dangerous|instant" /> 807 808 <!-- Allows an app to access approximate location. 809 Alternatively, you might want {@link #ACCESS_FINE_LOCATION}. 810 <p>Protection level: dangerous 811 --> 812 <permission android:name="android.permission.ACCESS_COARSE_LOCATION" 813 android:permissionGroup="android.permission-group.LOCATION" 814 android:label="@string/permlab_accessCoarseLocation" 815 android:description="@string/permdesc_accessCoarseLocation" 816 android:protectionLevel="dangerous|instant" /> 817 818 <!-- ====================================================================== --> 819 <!-- Permissions for accessing the device telephony --> 820 <!-- ====================================================================== --> 821 <eat-comment /> 822 823 <!-- Used for permissions that are associated telephony features. --> 824 <permission-group android:name="android.permission-group.PHONE" 825 android:icon="@drawable/perm_group_phone_calls" 826 android:label="@string/permgrouplab_phone" 827 android:description="@string/permgroupdesc_phone" 828 android:request="@string/permgrouprequest_phone" 829 android:priority="500" /> 830 831 <!-- Allows read only access to phone state, including the phone number of the device, 832 current cellular network information, the status of any ongoing calls, and a list of any 833 {@link android.telecom.PhoneAccount}s registered on the device. 834 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 835 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 836 minSdkVersion}</a> and <a 837 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 838 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 839 grants your app this permission. If you don't need this permission, be sure your <a 840 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 841 targetSdkVersion}</a> is 4 or higher. 842 <p>Protection level: dangerous 843 --> 844 <permission android:name="android.permission.READ_PHONE_STATE" 845 android:permissionGroup="android.permission-group.PHONE" 846 android:label="@string/permlab_readPhoneState" 847 android:description="@string/permdesc_readPhoneState" 848 android:protectionLevel="dangerous" /> 849 850 <!-- Allows read access to the device's phone number(s). This is a subset of the capabilities 851 granted by {@link #READ_PHONE_STATE} but is exposed to instant applications. 852 <p>Protection level: dangerous--> 853 <permission android:name="android.permission.READ_PHONE_NUMBERS" 854 android:permissionGroup="android.permission-group.PHONE" 855 android:label="@string/permlab_readPhoneNumbers" 856 android:description="@string/permdesc_readPhoneNumbers" 857 android:protectionLevel="dangerous|instant" /> 858 859 <!-- Allows an application to initiate a phone call without going through 860 the Dialer user interface for the user to confirm the call. 861 <p>Protection level: dangerous 862 --> 863 <permission android:name="android.permission.CALL_PHONE" 864 android:permissionGroup="android.permission-group.PHONE" 865 android:permissionFlags="costsMoney" 866 android:label="@string/permlab_callPhone" 867 android:description="@string/permdesc_callPhone" 868 android:protectionLevel="dangerous" /> 869 870 <!-- Allows an application to access the IMS call service: making and 871 modifying a call 872 <p>Protection level: signature|privileged 873 @hide 874 --> 875 <permission android:name="android.permission.ACCESS_IMS_CALL_SERVICE" 876 android:permissionGroup="android.permission-group.PHONE" 877 android:label="@string/permlab_accessImsCallService" 878 android:description="@string/permdesc_accessImsCallService" 879 android:protectionLevel="signature|privileged" /> 880 881 <!-- Allows an application to read the user's call log. 882 <p class="note"><strong>Note:</strong> If your app uses the 883 {@link #READ_CONTACTS} permission and <em>both</em> your <a 884 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 885 minSdkVersion}</a> and <a 886 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 887 targetSdkVersion}</a> values are set to 15 or lower, the system implicitly 888 grants your app this permission. If you don't need this permission, be sure your <a 889 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 890 targetSdkVersion}</a> is 16 or higher.</p> 891 <p>Protection level: dangerous 892 --> 893 <permission android:name="android.permission.READ_CALL_LOG" 894 android:permissionGroup="android.permission-group.PHONE" 895 android:label="@string/permlab_readCallLog" 896 android:description="@string/permdesc_readCallLog" 897 android:protectionLevel="dangerous" /> 898 899 <!-- Allows an application to write (but not read) the user's 900 call log data. 901 <p class="note"><strong>Note:</strong> If your app uses the 902 {@link #WRITE_CONTACTS} permission and <em>both</em> your <a 903 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 904 minSdkVersion}</a> and <a 905 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 906 targetSdkVersion}</a> values are set to 15 or lower, the system implicitly 907 grants your app this permission. If you don't need this permission, be sure your <a 908 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 909 targetSdkVersion}</a> is 16 or higher.</p> 910 <p>Protection level: dangerous 911 --> 912 <permission android:name="android.permission.WRITE_CALL_LOG" 913 android:permissionGroup="android.permission-group.PHONE" 914 android:label="@string/permlab_writeCallLog" 915 android:description="@string/permdesc_writeCallLog" 916 android:protectionLevel="dangerous" /> 917 918 <!-- Allows an application to add voicemails into the system. 919 <p>Protection level: dangerous 920 --> 921 <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL" 922 android:permissionGroup="android.permission-group.PHONE" 923 android:label="@string/permlab_addVoicemail" 924 android:description="@string/permdesc_addVoicemail" 925 android:protectionLevel="dangerous" /> 926 927 <!-- Allows an application to use SIP service. 928 <p>Protection level: dangerous 929 --> 930 <permission android:name="android.permission.USE_SIP" 931 android:permissionGroup="android.permission-group.PHONE" 932 android:description="@string/permdesc_use_sip" 933 android:label="@string/permlab_use_sip" 934 android:protectionLevel="dangerous"/> 935 936 <!-- Allows an application to see the number being dialed during an outgoing 937 call with the option to redirect the call to a different number or 938 abort the call altogether. 939 <p>Protection level: dangerous 940 --> 941 <permission android:name="android.permission.PROCESS_OUTGOING_CALLS" 942 android:permissionGroup="android.permission-group.PHONE" 943 android:label="@string/permlab_processOutgoingCalls" 944 android:description="@string/permdesc_processOutgoingCalls" 945 android:protectionLevel="dangerous" /> 946 947 948 <!-- Allows the app to answer an incoming phone call. 949 <p>Protection level: dangerous 950 --> 951 <permission android:name="android.permission.ANSWER_PHONE_CALLS" 952 android:permissionGroup="android.permission-group.PHONE" 953 android:label="@string/permlab_answerPhoneCalls" 954 android:description="@string/permdesc_answerPhoneCalls" 955 android:protectionLevel="dangerous|runtime" /> 956 957 <!-- Allows a calling application which manages it own calls through the self-managed 958 {@link android.telecom.ConnectionService} APIs. See 959 {@link android.telecom.PhoneAccount#CAPABILITY_SELF_MANAGED for more information on the 960 self-managed ConnectionService APIs. 961 <p>Protection level: normal 962 --> 963 <permission android:name="android.permission.MANAGE_OWN_CALLS" 964 android:label="@string/permlab_manageOwnCalls" 965 android:description="@string/permdesc_manageOwnCalls" 966 android:protectionLevel="normal" /> 967 968 <!-- ====================================================================== --> 969 <!-- Permissions for accessing the device microphone --> 970 <!-- ====================================================================== --> 971 <eat-comment /> 972 973 <!-- Used for permissions that are associated with accessing 974 microphone audio from the device. Note that phone calls also capture audio 975 but are in a separate (more visible) permission group. --> 976 <permission-group android:name="android.permission-group.MICROPHONE" 977 android:icon="@drawable/perm_group_microphone" 978 android:label="@string/permgrouplab_microphone" 979 android:description="@string/permgroupdesc_microphone" 980 android:request="@string/permgrouprequest_microphone" 981 android:priority="600" /> 982 983 <!-- Allows an application to record audio. 984 <p>Protection level: dangerous 985 --> 986 <permission android:name="android.permission.RECORD_AUDIO" 987 android:permissionGroup="android.permission-group.MICROPHONE" 988 android:label="@string/permlab_recordAudio" 989 android:description="@string/permdesc_recordAudio" 990 android:protectionLevel="dangerous|instant"/> 991 992 <!-- ====================================================================== --> 993 <!-- Permissions for accessing the UCE Service --> 994 <!-- ====================================================================== --> 995 996 <!-- @hide Allows an application to Access UCE-Presence. 997 <p>Protection level: signature|privileged 998 --> 999 <permission android:name="android.permission.ACCESS_UCE_PRESENCE_SERVICE" 1000 android:permissionGroup="android.permission-group.PHONE" 1001 android:protectionLevel="signature|privileged"/> 1002 1003 <!-- @hide Allows an application to Access UCE-OPTIONS. 1004 <p>Protection level: signature|privileged 1005 --> 1006 <permission android:name="android.permission.ACCESS_UCE_OPTIONS_SERVICE" 1007 android:permissionGroup="android.permission-group.PHONE" 1008 android:protectionLevel="signature|privileged"/> 1009 1010 1011 1012 <!-- ====================================================================== --> 1013 <!-- Permissions for accessing the device camera --> 1014 <!-- ====================================================================== --> 1015 <eat-comment /> 1016 1017 <!-- Used for permissions that are associated with accessing 1018 camera or capturing images/video from the device. --> 1019 <permission-group android:name="android.permission-group.CAMERA" 1020 android:icon="@drawable/perm_group_camera" 1021 android:label="@string/permgrouplab_camera" 1022 android:description="@string/permgroupdesc_camera" 1023 android:request="@string/permgrouprequest_camera" 1024 android:priority="700" /> 1025 1026 <!-- Required to be able to access the camera device. 1027 <p>This will automatically enforce the <a 1028 href="{@docRoot}guide/topics/manifest/uses-feature-element.html"> 1029 <uses-feature>}</a> manifest element for <em>all</em> camera features. 1030 If you do not require all camera features or can properly operate if a camera 1031 is not available, then you must modify your manifest as appropriate in order to 1032 install on devices that don't support all camera features.</p> 1033 <p>Protection level: dangerous 1034 --> 1035 <permission android:name="android.permission.CAMERA" 1036 android:permissionGroup="android.permission-group.CAMERA" 1037 android:label="@string/permlab_camera" 1038 android:description="@string/permdesc_camera" 1039 android:protectionLevel="dangerous|instant" /> 1040 1041 1042 <!-- ====================================================================== --> 1043 <!-- Permissions for accessing the device sensors --> 1044 <!-- ====================================================================== --> 1045 <eat-comment /> 1046 1047 <!-- Used for permissions that are associated with accessing 1048 body or environmental sensors. --> 1049 <permission-group android:name="android.permission-group.SENSORS" 1050 android:icon="@drawable/perm_group_sensors" 1051 android:label="@string/permgrouplab_sensors" 1052 android:description="@string/permgroupdesc_sensors" 1053 android:request="@string/permgrouprequest_sensors" 1054 android:priority="800" /> 1055 1056 <!-- Allows an application to access data from sensors that the user uses to 1057 measure what is happening inside his/her body, such as heart rate. 1058 <p>Protection level: dangerous --> 1059 <permission android:name="android.permission.BODY_SENSORS" 1060 android:permissionGroup="android.permission-group.SENSORS" 1061 android:label="@string/permlab_bodySensors" 1062 android:description="@string/permdesc_bodySensors" 1063 android:protectionLevel="dangerous" /> 1064 1065 <!-- Allows an app to use fingerprint hardware. 1066 <p>Protection level: normal 1067 --> 1068 <permission android:name="android.permission.USE_FINGERPRINT" 1069 android:permissionGroup="android.permission-group.SENSORS" 1070 android:label="@string/permlab_useFingerprint" 1071 android:description="@string/permdesc_useFingerprint" 1072 android:protectionLevel="normal" /> 1073 1074 <!-- ====================================================================== --> 1075 <!-- REMOVED PERMISSIONS --> 1076 <!-- ====================================================================== --> 1077 1078 <!-- @hide We need to keep this around for backwards compatibility --> 1079 <permission android:name="android.permission.READ_PROFILE" 1080 android:protectionLevel="normal" 1081 android:permissionFlags="removed"/> 1082 1083 <!-- @hide We need to keep this around for backwards compatibility --> 1084 <permission android:name="android.permission.WRITE_PROFILE" 1085 android:protectionLevel="normal" 1086 android:permissionFlags="removed"/> 1087 1088 <!-- @hide We need to keep this around for backwards compatibility --> 1089 <permission android:name="android.permission.READ_SOCIAL_STREAM" 1090 android:protectionLevel="normal" 1091 android:permissionFlags="removed"/> 1092 1093 <!-- @hide We need to keep this around for backwards compatibility --> 1094 <permission android:name="android.permission.WRITE_SOCIAL_STREAM" 1095 android:protectionLevel="normal" 1096 android:permissionFlags="removed"/> 1097 1098 <!-- @hide We need to keep this around for backwards compatibility --> 1099 <permission android:name="android.permission.READ_USER_DICTIONARY" 1100 android:protectionLevel="normal" 1101 android:permissionFlags="removed"/> 1102 1103 <!-- @hide We need to keep this around for backwards compatibility --> 1104 <permission android:name="android.permission.WRITE_USER_DICTIONARY" 1105 android:protectionLevel="normal" 1106 android:permissionFlags="removed"/> 1107 1108 <!-- @hide We need to keep this around for backwards compatibility --> 1109 <permission android:name="android.permission.WRITE_SMS" 1110 android:protectionLevel="normal" 1111 android:permissionFlags="removed"/> 1112 1113 <!-- @hide We need to keep this around for backwards compatibility --> 1114 <permission android:name="com.android.browser.permission.READ_HISTORY_BOOKMARKS" 1115 android:protectionLevel="normal" 1116 android:permissionFlags="removed"/> 1117 1118 <!-- @hide We need to keep this around for backwards compatibility --> 1119 <permission android:name="com.android.browser.permission.WRITE_HISTORY_BOOKMARKS" 1120 android:protectionLevel="normal" 1121 android:permissionFlags="removed"/> 1122 1123 <!-- @hide We need to keep this around for backwards compatibility --> 1124 <permission android:name="android.permission.AUTHENTICATE_ACCOUNTS" 1125 android:protectionLevel="normal" 1126 android:permissionFlags="removed"/> 1127 1128 <!-- @hide We need to keep this around for backwards compatibility --> 1129 <permission android:name="android.permission.MANAGE_ACCOUNTS" 1130 android:protectionLevel="normal" 1131 android:permissionFlags="removed"/> 1132 1133 <!-- @hide We need to keep this around for backwards compatibility --> 1134 <permission android:name="android.permission.USE_CREDENTIALS" 1135 android:protectionLevel="normal" 1136 android:permissionFlags="removed"/> 1137 1138 <!-- @hide We need to keep this around for backwards compatibility --> 1139 <permission android:name="android.permission.SUBSCRIBED_FEEDS_READ" 1140 android:protectionLevel="normal" 1141 android:permissionFlags="removed"/> 1142 1143 <!-- @hide We need to keep this around for backwards compatibility --> 1144 <permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE" 1145 android:protectionLevel="normal" 1146 android:permissionFlags="removed"/> 1147 1148 <!-- @hide We need to keep this around for backwards compatibility --> 1149 <permission android:name="android.permission.FLASHLIGHT" 1150 android:protectionLevel="normal" 1151 android:permissionFlags="removed"/> 1152 1153 <!-- ====================================================================== --> 1154 <!-- INSTALL PERMISSIONS --> 1155 <!-- ====================================================================== --> 1156 1157 <!-- ================================== --> 1158 <!-- Permissions for accessing messages --> 1159 <!-- ================================== --> 1160 <eat-comment /> 1161 1162 <!-- @SystemApi Allows an application (Phone) to send a request to other applications 1163 to handle the respond-via-message action during incoming calls. 1164 <p>Not for use by third-party applications. --> 1165 <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE" 1166 android:protectionLevel="signature|privileged" /> 1167 1168 <!-- @SystemApi Allows an application to send SMS to premium shortcodes without user permission. 1169 <p>Not for use by third-party applications. 1170 @hide --> 1171 <permission android:name="android.permission.SEND_SMS_NO_CONFIRMATION" 1172 android:protectionLevel="signature|privileged" /> 1173 1174 <!-- Allows an application to filter carrier specific sms. 1175 @hide --> 1176 <permission android:name="android.permission.CARRIER_FILTER_SMS" 1177 android:protectionLevel="signature|privileged" /> 1178 1179 <!-- @SystemApi Allows an application to receive emergency cell broadcast messages, 1180 to record or display them to the user. 1181 <p>Not for use by third-party applications. 1182 @hide --> 1183 <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST" 1184 android:protectionLevel="signature|privileged" /> 1185 1186 <!-- Allows an application to monitor incoming Bluetooth MAP messages, to record 1187 or perform processing on them. --> 1188 <!-- @hide --> 1189 <permission android:name="android.permission.RECEIVE_BLUETOOTH_MAP" 1190 android:protectionLevel="signature|privileged" /> 1191 1192 <!-- @SystemApi @hide Allows an application to execute contacts directory search. 1193 This should only be used by ContactsProvider. 1194 <p>Not for use by third-party applications. --> 1195 <permission android:name="android.permission.BIND_DIRECTORY_SEARCH" 1196 android:protectionLevel="signature|privileged" /> 1197 1198 <!-- @SystemApi @hide Allows an application to modify cell broadcasts through the content provider. 1199 <p>Not for use by third-party applications. --> 1200 <permission android:name="android.permission.MODIFY_CELL_BROADCASTS" 1201 android:protectionLevel="signature|privileged" /> 1202 1203 <!-- =============================================================== --> 1204 <!-- Permissions for setting the device alarm --> 1205 <!-- =============================================================== --> 1206 <eat-comment /> 1207 1208 <!-- Allows an application to broadcast an Intent to set an alarm for the user. 1209 <p>Protection level: normal 1210 --> 1211 <permission android:name="com.android.alarm.permission.SET_ALARM" 1212 android:label="@string/permlab_setAlarm" 1213 android:description="@string/permdesc_setAlarm" 1214 android:protectionLevel="normal" /> 1215 1216 <!-- =============================================================== --> 1217 <!-- Permissions for accessing the user voicemail --> 1218 <!-- =============================================================== --> 1219 <eat-comment /> 1220 1221 <!-- Allows an application to modify and remove existing voicemails in the system. 1222 <p>Protection level: signature|privileged 1223 --> 1224 <permission android:name="com.android.voicemail.permission.WRITE_VOICEMAIL" 1225 android:protectionLevel="signature|privileged" /> 1226 1227 <!-- Allows an application to read voicemails in the system. 1228 <p>Protection level: signature|privileged 1229 --> 1230 <permission android:name="com.android.voicemail.permission.READ_VOICEMAIL" 1231 android:protectionLevel="signature|privileged" /> 1232 1233 <!-- ======================================= --> 1234 <!-- Permissions for accessing location info --> 1235 <!-- ======================================= --> 1236 <eat-comment /> 1237 1238 <!-- Allows an application to access extra location provider commands. 1239 <p>Protection level: normal 1240 --> 1241 <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS" 1242 android:label="@string/permlab_accessLocationExtraCommands" 1243 android:description="@string/permdesc_accessLocationExtraCommands" 1244 android:protectionLevel="normal" /> 1245 1246 <!-- @SystemApi Allows an application to install a location provider into the Location Manager. 1247 <p>Not for use by third-party applications. --> 1248 <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER" 1249 android:protectionLevel="signature|privileged" /> 1250 1251 <!-- @SystemApi @hide Allows HDMI-CEC service to access device and configuration files. 1252 This should only be used by HDMI-CEC service. 1253 --> 1254 <permission android:name="android.permission.HDMI_CEC" 1255 android:protectionLevel="signature|privileged" /> 1256 1257 <!-- @SystemApi Allows an application to use location features in hardware, 1258 such as the geofencing api. 1259 <p>Not for use by third-party applications. --> 1260 <permission android:name="android.permission.LOCATION_HARDWARE" 1261 android:protectionLevel="signature|privileged" /> 1262 <uses-permission android:name="android.permission.LOCATION_HARDWARE"/> 1263 1264 <!-- @SystemApi Allows an application to create mock location providers for testing. 1265 <p>Protection level: signature 1266 @hide 1267 --> 1268 <permission android:name="android.permission.ACCESS_MOCK_LOCATION" 1269 android:protectionLevel="signature" /> 1270 1271 <!-- ======================================= --> 1272 <!-- Permissions for accessing networks --> 1273 <!-- ======================================= --> 1274 <eat-comment /> 1275 1276 <!-- Allows applications to open network sockets. 1277 <p>Protection level: normal 1278 --> 1279 <permission android:name="android.permission.INTERNET" 1280 android:description="@string/permdesc_createNetworkSockets" 1281 android:label="@string/permlab_createNetworkSockets" 1282 android:protectionLevel="normal|instant" /> 1283 1284 <!-- Allows applications to access information about networks. 1285 <p>Protection level: normal 1286 --> 1287 <permission android:name="android.permission.ACCESS_NETWORK_STATE" 1288 android:description="@string/permdesc_accessNetworkState" 1289 android:label="@string/permlab_accessNetworkState" 1290 android:protectionLevel="normal|instant" /> 1291 1292 <!-- Allows applications to access information about Wi-Fi networks. 1293 <p>Protection level: normal 1294 --> 1295 <permission android:name="android.permission.ACCESS_WIFI_STATE" 1296 android:description="@string/permdesc_accessWifiState" 1297 android:label="@string/permlab_accessWifiState" 1298 android:protectionLevel="normal" /> 1299 1300 <!-- Allows applications to change Wi-Fi connectivity state. 1301 <p>Protection level: normal 1302 --> 1303 <permission android:name="android.permission.CHANGE_WIFI_STATE" 1304 android:description="@string/permdesc_changeWifiState" 1305 android:label="@string/permlab_changeWifiState" 1306 android:protectionLevel="normal" /> 1307 1308 <!-- @SystemApi @hide Allows applications to read Wi-Fi credential. 1309 <p>Not for use by third-party applications. --> 1310 <permission android:name="android.permission.READ_WIFI_CREDENTIAL" 1311 android:protectionLevel="signature|privileged" /> 1312 1313 <!-- @SystemApi @hide Allows applications to change tether state and run 1314 tether carrier provisioning. 1315 <p>Not for use by third-party applications. --> 1316 <permission android:name="android.permission.TETHER_PRIVILEGED" 1317 android:protectionLevel="signature|privileged" /> 1318 1319 <!-- @SystemApi @hide Allow system apps to receive broadcast 1320 when a wifi network credential is changed. 1321 <p>Not for use by third-party applications. --> 1322 <permission android:name="android.permission.RECEIVE_WIFI_CREDENTIAL_CHANGE" 1323 android:protectionLevel="signature|privileged" /> 1324 1325 <!-- @SystemApi @hide Allows an application to modify any wifi configuration, even if created 1326 by another application. Once reconfigured the original creator cannot make any further 1327 modifications. 1328 <p>Not for use by third-party applications. --> 1329 <permission android:name="android.permission.OVERRIDE_WIFI_CONFIG" 1330 android:protectionLevel="signature|privileged" /> 1331 1332 <!-- @hide --> 1333 <permission android:name="android.permission.ACCESS_WIMAX_STATE" 1334 android:description="@string/permdesc_accessWimaxState" 1335 android:label="@string/permlab_accessWimaxState" 1336 android:protectionLevel="normal" /> 1337 1338 <!-- @hide --> 1339 <permission android:name="android.permission.CHANGE_WIMAX_STATE" 1340 android:description="@string/permdesc_changeWimaxState" 1341 android:label="@string/permlab_changeWimaxState" 1342 android:protectionLevel="normal" /> 1343 1344 <!-- Allows applications to act as network scorers. @hide @SystemApi--> 1345 <permission android:name="android.permission.SCORE_NETWORKS" 1346 android:protectionLevel="signature|privileged" /> 1347 1348 <!-- Allows applications to request network 1349 recommendations and scores from the NetworkScoreService. 1350 <p>Not for use by third-party applications. @hide --> 1351 <permission android:name="android.permission.REQUEST_NETWORK_SCORES" 1352 android:protectionLevel="signature|setup" /> 1353 1354 <!-- Allows network stack services (Connectivity and Wifi) to coordinate 1355 <p>Not for use by third-party or privileged applications. 1356 @hide This should only be used by Connectivity and Wifi Services. 1357 --> 1358 <permission android:name="android.permission.NETWORK_STACK" 1359 android:protectionLevel="signature" /> 1360 1361 <!-- Allows Settings and SystemUI to call methods in Networking services 1362 <p>Not for use by third-party or privileged applications. 1363 @hide This should only be used by Settings and SystemUI. 1364 --> 1365 <permission android:name="android.permission.NETWORK_SETTINGS" 1366 android:protectionLevel="signature" /> 1367 1368 <!-- #SystemApi @hide Allows applications to access information about LoWPAN interfaces. 1369 <p>Not for use by third-party applications. --> 1370 <permission android:name="android.permission.ACCESS_LOWPAN_STATE" 1371 android:protectionLevel="signature|privileged" /> 1372 1373 <!-- #SystemApi @hide Allows applications to change LoWPAN connectivity state. 1374 <p>Not for use by third-party applications. --> 1375 <permission android:name="android.permission.CHANGE_LOWPAN_STATE" 1376 android:protectionLevel="signature|privileged" /> 1377 1378 <!-- #SystemApi @hide Allows applications to read LoWPAN credential. 1379 <p>Not for use by third-party applications. --> 1380 <permission android:name="android.permission.READ_LOWPAN_CREDENTIAL" 1381 android:protectionLevel="signature|privileged" /> 1382 1383 <!-- #SystemApi @hide Allows a service to register or unregister 1384 new LoWPAN interfaces. 1385 <p>Not for use by third-party applications. --> 1386 <permission android:name="android.permission.MANAGE_LOWPAN_INTERFACES" 1387 android:protectionLevel="signature|privileged" /> 1388 1389 <!-- ======================================= --> 1390 <!-- Permissions for short range, peripheral networks --> 1391 <!-- ======================================= --> 1392 <eat-comment /> 1393 1394 <!-- Allows applications to connect to paired bluetooth devices. 1395 <p>Protection level: normal 1396 --> 1397 <permission android:name="android.permission.BLUETOOTH" 1398 android:description="@string/permdesc_bluetooth" 1399 android:label="@string/permlab_bluetooth" 1400 android:protectionLevel="normal" /> 1401 1402 <!-- Allows applications to discover and pair bluetooth devices. 1403 <p>Protection level: normal 1404 --> 1405 <permission android:name="android.permission.BLUETOOTH_ADMIN" 1406 android:description="@string/permdesc_bluetoothAdmin" 1407 android:label="@string/permlab_bluetoothAdmin" 1408 android:protectionLevel="normal" /> 1409 1410 <!-- @SystemApi Allows applications to pair bluetooth devices without user interaction, and to 1411 allow or disallow phonebook access or message access. 1412 This is not available to third party applications. --> 1413 <permission android:name="android.permission.BLUETOOTH_PRIVILEGED" 1414 android:protectionLevel="signature|privileged" /> 1415 1416 <!-- Control access to email providers exclusively for Bluetooth 1417 @hide 1418 --> 1419 <permission android:name="android.permission.BLUETOOTH_MAP" 1420 android:protectionLevel="signature" /> 1421 1422 <!-- Allows bluetooth stack to access files 1423 @hide This should only be used by Bluetooth apk. 1424 --> 1425 <permission android:name="android.permission.BLUETOOTH_STACK" 1426 android:protectionLevel="signature" /> 1427 1428 <!-- Allows applications to perform I/O operations over NFC. 1429 <p>Protection level: normal 1430 --> 1431 <permission android:name="android.permission.NFC" 1432 android:description="@string/permdesc_nfc" 1433 android:label="@string/permlab_nfc" 1434 android:protectionLevel="normal" /> 1435 1436 <!-- @SystemApi Allows an internal user to use privileged ConnectivityManager APIs. 1437 @hide --> 1438 <permission android:name="android.permission.CONNECTIVITY_INTERNAL" 1439 android:protectionLevel="signature|privileged" /> 1440 1441 <!-- @SystemApi Allows an internal user to use restricted Networks. 1442 @hide --> 1443 <permission android:name="android.permission.CONNECTIVITY_USE_RESTRICTED_NETWORKS" 1444 android:protectionLevel="signature|privileged" /> 1445 1446 <!-- Allows a system application to access hardware packet offload capabilities. 1447 @hide --> 1448 <permission android:name="android.permission.PACKET_KEEPALIVE_OFFLOAD" 1449 android:protectionLevel="signature|privileged" /> 1450 1451 <!-- @SystemApi 1452 @hide --> 1453 <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE" 1454 android:protectionLevel="signature|privileged" /> 1455 1456 <!-- @SystemApi Allows access to the loop radio (Android@Home mesh network) device. 1457 @hide --> 1458 <permission android:name="android.permission.LOOP_RADIO" 1459 android:protectionLevel="signature|privileged" /> 1460 1461 <!-- Allows sending and receiving handover transfer status from Wifi and Bluetooth 1462 @hide --> 1463 <permission android:name="android.permission.NFC_HANDOVER_STATUS" 1464 android:protectionLevel="signature|privileged" /> 1465 1466 <!-- ================================== --> 1467 <!-- Permissions for accessing accounts --> 1468 <!-- ================================== --> 1469 <eat-comment /> 1470 1471 <!-- Allows access to the list of accounts in the Accounts Service. 1472 1473 <p class="note"><strong>Note:</strong> Beginning with Android 6.0 (API level 1474 23), if an app shares the signature of the authenticator that manages an 1475 account, it does not need <code>"GET_ACCOUNTS"</code> permission to read 1476 information about that account. On Android 5.1 and lower, all apps need 1477 <code>"GET_ACCOUNTS"</code> permission to read information about any 1478 account.</p> 1479 1480 <p>Protection level: dangerous 1481 --> 1482 <permission android:name="android.permission.GET_ACCOUNTS" 1483 android:permissionGroup="android.permission-group.CONTACTS" 1484 android:protectionLevel="dangerous" 1485 android:description="@string/permdesc_getAccounts" 1486 android:label="@string/permlab_getAccounts" /> 1487 <uses-permission android:name="android.permission.GET_ACCOUNTS"/> 1488 1489 <!-- @SystemApi Allows applications to call into AccountAuthenticators. 1490 <p>Not for use by third-party applications. --> 1491 <permission android:name="android.permission.ACCOUNT_MANAGER" 1492 android:protectionLevel="signature" /> 1493 1494 <!-- ================================== --> 1495 <!-- Permissions for accessing hardware that may effect battery life--> 1496 <!-- ================================== --> 1497 <eat-comment /> 1498 1499 <!-- Allows applications to enter Wi-Fi Multicast mode. 1500 <p>Protection level: normal 1501 --> 1502 <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE" 1503 android:description="@string/permdesc_changeWifiMulticastState" 1504 android:label="@string/permlab_changeWifiMulticastState" 1505 android:protectionLevel="normal" /> 1506 1507 <!-- Allows access to the vibrator. 1508 <p>Protection level: normal 1509 --> 1510 <permission android:name="android.permission.VIBRATE" 1511 android:label="@string/permlab_vibrate" 1512 android:description="@string/permdesc_vibrate" 1513 android:protectionLevel="normal|instant" /> 1514 1515 <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen 1516 from dimming. 1517 <p>Protection level: normal 1518 --> 1519 <permission android:name="android.permission.WAKE_LOCK" 1520 android:label="@string/permlab_wakeLock" 1521 android:description="@string/permdesc_wakeLock" 1522 android:protectionLevel="normal|instant" /> 1523 1524 <!-- Allows using the device's IR transmitter, if available. 1525 <p>Protection level: normal 1526 --> 1527 <permission android:name="android.permission.TRANSMIT_IR" 1528 android:label="@string/permlab_transmitIr" 1529 android:description="@string/permdesc_transmitIr" 1530 android:protectionLevel="normal" /> 1531 1532 <!-- ==================================================== --> 1533 <!-- Permissions related to changing audio settings --> 1534 <!-- ==================================================== --> 1535 <eat-comment /> 1536 1537 <!-- Allows an application to modify global audio settings. 1538 <p>Protection level: normal 1539 --> 1540 <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS" 1541 android:label="@string/permlab_modifyAudioSettings" 1542 android:description="@string/permdesc_modifyAudioSettings" 1543 android:protectionLevel="normal" /> 1544 1545 <!-- ================================== --> 1546 <!-- Permissions for accessing hardware --> 1547 <!-- ================================== --> 1548 <eat-comment /> 1549 1550 <!-- @SystemApi Allows an application to manage preferences and permissions for USB devices 1551 @hide --> 1552 <permission android:name="android.permission.MANAGE_USB" 1553 android:protectionLevel="signature|privileged" /> 1554 1555 <!-- @SystemApi Allows an application to access the MTP USB kernel driver. 1556 For use only by the device side MTP implementation. 1557 @hide --> 1558 <permission android:name="android.permission.ACCESS_MTP" 1559 android:protectionLevel="signature|privileged" /> 1560 1561 <!-- @SystemApi Allows access to hardware peripherals. Intended only for hardware testing. 1562 <p>Not for use by third-party applications. 1563 @hide 1564 --> 1565 <permission android:name="android.permission.HARDWARE_TEST" 1566 android:protectionLevel="signature" /> 1567 1568 <!-- @SystemApi Allows access to Broadcast Radio 1569 @hide This is not a third-party API (intended for system apps).--> 1570 <permission android:name="android.permission.ACCESS_BROADCAST_RADIO" 1571 android:protectionLevel="signature|privileged" /> 1572 1573 <!-- @deprecated @SystemApi Allows access to FM 1574 @hide This is not a third-party API (intended for system apps).--> 1575 <permission android:name="android.permission.ACCESS_FM_RADIO" 1576 android:protectionLevel="signature|privileged" /> 1577 1578 <!-- Allows access to configure network interfaces, configure/use IPSec, etc. 1579 @hide --> 1580 <permission android:name="android.permission.NET_ADMIN" 1581 android:protectionLevel="signature" /> 1582 1583 <!-- Allows registration for remote audio playback. @hide --> 1584 <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK" 1585 android:protectionLevel="signature" /> 1586 1587 <!-- @SystemApi Allows TvInputService to access underlying TV input hardware such as 1588 built-in tuners and HDMI-in's. 1589 @hide This should only be used by OEM's TvInputService's. 1590 --> 1591 <permission android:name="android.permission.TV_INPUT_HARDWARE" 1592 android:protectionLevel="signature|privileged" /> 1593 1594 <!-- @SystemApi Allows to capture a frame of TV input hardware such as 1595 built-in tuners and HDMI-in's. 1596 @hide <p>Not for use by third-party applications. 1597 --> 1598 <permission android:name="android.permission.CAPTURE_TV_INPUT" 1599 android:protectionLevel="signature|privileged" /> 1600 1601 <!-- @hide Allows TvInputService to access DVB device. 1602 <p>Not for use by third-party applications. --> 1603 <permission android:name="android.permission.DVB_DEVICE" 1604 android:protectionLevel="signature|privileged" /> 1605 1606 <!-- @SystemApi Allows reading and enabling/disabling the OEM unlock allowed by carrier state 1607 @hide <p>Not for use by third-party applications. --> 1608 <permission android:name="android.permission.MANAGE_CARRIER_OEM_UNLOCK_STATE" 1609 android:protectionLevel="signature|privileged" /> 1610 1611 <!-- @SystemApi Allows reading and enabling/disabling the OEM unlock allowed by user state 1612 @hide <p>Not for use by third-party applications. --> 1613 <permission android:name="android.permission.MANAGE_USER_OEM_UNLOCK_STATE" 1614 android:protectionLevel="signature|privileged" /> 1615 1616 <!-- @SystemApi Allows reading the OEM unlock state 1617 @hide <p>Not for use by third-party applications. --> 1618 <permission android:name="android.permission.READ_OEM_UNLOCK_STATE" 1619 android:protectionLevel="signature|privileged" /> 1620 1621 <!-- @hide Allows enabling/disabling OEM unlock 1622 <p>Not for use by third-party applications. --> 1623 <permission android:name="android.permission.OEM_UNLOCK_STATE" 1624 android:protectionLevel="signature" /> 1625 1626 <!-- @hide Allows querying state of PersistentDataBlock 1627 <p>Not for use by third-party applications. --> 1628 <permission android:name="android.permission.ACCESS_PDB_STATE" 1629 android:protectionLevel="signature" /> 1630 1631 <!-- Allows testing if a passwords is forbidden by the admins. 1632 @hide <p>Not for use by third-party applications. --> 1633 <permission android:name="android.permission.TEST_BLACKLISTED_PASSWORD" 1634 android:protectionLevel="signature" /> 1635 1636 <!-- @hide Allows system update service to notify device owner about pending updates. 1637 <p>Not for use by third-party applications. --> 1638 <permission android:name="android.permission.NOTIFY_PENDING_SYSTEM_UPDATE" 1639 android:protectionLevel="signature|privileged" /> 1640 1641 <!-- =========================================== --> 1642 <!-- Permissions associated with camera and image capture --> 1643 <!-- =========================================== --> 1644 <eat-comment /> 1645 1646 <!-- @SystemApi Allows disabling the transmit-indicator LED that is normally on when 1647 a camera is in use by an application. 1648 @hide --> 1649 <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED" 1650 android:protectionLevel="signature|privileged" /> 1651 1652 <!-- Allows sending the camera service notifications about system-wide events. 1653 @hide --> 1654 <permission android:name="android.permission.CAMERA_SEND_SYSTEM_EVENTS" 1655 android:protectionLevel="signature|privileged" /> 1656 1657 <!-- =========================================== --> 1658 <!-- Permissions associated with telephony state --> 1659 <!-- =========================================== --> 1660 <eat-comment /> 1661 1662 <!-- @SystemApi Allows modification of the telephony state - power on, mmi, etc. 1663 Does not include placing calls. 1664 <p>Not for use by third-party applications. --> 1665 <permission android:name="android.permission.MODIFY_PHONE_STATE" 1666 android:protectionLevel="signature|privileged" /> 1667 1668 <!-- Allows read only access to precise phone state. 1669 @hide Pending API council approval --> 1670 <permission android:name="android.permission.READ_PRECISE_PHONE_STATE" 1671 android:protectionLevel="signature|privileged" /> 1672 1673 <!-- @SystemApi Allows read access to privileged phone state. 1674 @hide Used internally. --> 1675 <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE" 1676 android:protectionLevel="signature|privileged" /> 1677 1678 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1679 PhoneAccount#CAPABILITY_SIM_SUBSCRIPTION. This capability indicates that the PhoneAccount 1680 corresponds to a device SIM. 1681 @hide --> 1682 <permission android:name="android.permission.REGISTER_SIM_SUBSCRIPTION" 1683 android:protectionLevel="signature|privileged" /> 1684 1685 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1686 PhoneAccount#CAPABILITY_CALL_PROVIDER. 1687 @hide --> 1688 <permission android:name="android.permission.REGISTER_CALL_PROVIDER" 1689 android:protectionLevel="signature|privileged" /> 1690 1691 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1692 PhoneAccount#CAPABILITY_CONNECTION_MANAGER 1693 @hide --> 1694 <permission android:name="android.permission.REGISTER_CONNECTION_MANAGER" 1695 android:protectionLevel="signature|privileged" /> 1696 1697 <!-- Must be required by a {@link android.telecom.InCallService}, 1698 to ensure that only the system can bind to it. 1699 <p>Protection level: signature|privileged 1700 --> 1701 <permission android:name="android.permission.BIND_INCALL_SERVICE" 1702 android:protectionLevel="signature|privileged" /> 1703 1704 <!-- Must be required by a link {@link android.telephony.VisualVoicemailService} to ensure that 1705 only the system can bind to it. 1706 <p>Protection level: signature|privileged 1707 --> 1708 <permission 1709 android:name="android.permission.BIND_VISUAL_VOICEMAIL_SERVICE" 1710 android:protectionLevel="signature|privileged"/> 1711 1712 <!-- Must be required by a {@link android.telecom.CallScreeningService}, 1713 to ensure that only the system can bind to it. 1714 <p>Protection level: signature|privileged 1715 --> 1716 <permission android:name="android.permission.BIND_SCREENING_SERVICE" 1717 android:protectionLevel="signature|privileged" /> 1718 1719 <!-- Must be required by a {@link android.telecom.ConnectionService}, 1720 to ensure that only the system can bind to it. 1721 @deprecated {@link android.telecom.ConnectionService}s should require 1722 android.permission.BIND_TELECOM_CONNECTION_SERVICE instead. 1723 @SystemApi 1724 @hide --> 1725 <permission android:name="android.permission.BIND_CONNECTION_SERVICE" 1726 android:protectionLevel="signature|privileged" /> 1727 1728 <!-- Must be required by a {@link android.telecom.ConnectionService}, 1729 to ensure that only the system can bind to it. 1730 <p>Protection level: signature|privileged 1731 --> 1732 <permission android:name="android.permission.BIND_TELECOM_CONNECTION_SERVICE" 1733 android:protectionLevel="signature|privileged" /> 1734 1735 <!-- @SystemApi Allows an application to control the in-call experience. 1736 @hide --> 1737 <permission android:name="android.permission.CONTROL_INCALL_EXPERIENCE" 1738 android:protectionLevel="signature|privileged" /> 1739 1740 <!-- Allows an application to receive STK related commands. 1741 @hide --> 1742 <permission android:name="android.permission.RECEIVE_STK_COMMANDS" 1743 android:protectionLevel="signature|privileged" /> 1744 1745 <!-- Allows an application to send EMBMS download intents to apps 1746 @hide --> 1747 <permission android:name="android.permission.SEND_EMBMS_INTENTS" 1748 android:protectionLevel="signature|privileged" /> 1749 1750 1751 <!-- Allows internal management of the sensor framework 1752 @hide --> 1753 <permission android:name="android.permission.MANAGE_SENSORS" 1754 android:protectionLevel="signature" /> 1755 1756 <!-- Must be required by an ImsService to ensure that only the 1757 system can bind to it. 1758 <p>Protection level: signature|privileged 1759 @SystemApi 1760 @hide 1761 --> 1762 <permission android:name="android.permission.BIND_IMS_SERVICE" 1763 android:protectionLevel="signature|privileged|vendorPrivileged" /> 1764 1765 <!-- Allows an application to manage embedded subscriptions (those on a eUICC) through 1766 EuiccManager APIs. 1767 <p>Protection level: signature|privileged|development 1768 TODO(b/35851809): Mark this as a SystemApi and remove com. prefix. 1769 @hide --> 1770 <permission android:name="com.android.permission.WRITE_EMBEDDED_SUBSCRIPTIONS" 1771 android:protectionLevel="signature|privileged|development" /> 1772 1773 <!-- Must be required by an EuiccService to ensure that only the system can bind to it. 1774 <p>Protection level: signature 1775 TODO(b/35851809): Mark this as a SystemApi and remove com. prefix. 1776 @hide --> 1777 <permission android:name="com.android.permission.BIND_EUICC_SERVICE" 1778 android:protectionLevel="signature" /> 1779 1780 <!-- ================================== --> 1781 <!-- Permissions for sdcard interaction --> 1782 <!-- ================================== --> 1783 <eat-comment /> 1784 1785 <!-- @SystemApi Allows an application to write to internal media storage 1786 @hide --> 1787 <permission android:name="android.permission.WRITE_MEDIA_STORAGE" 1788 android:protectionLevel="signature|privileged" /> 1789 1790 <!-- Allows an application to manage access to documents, usually as part 1791 of a document picker. 1792 <p>This permission should <em>only</em> be requested by the platform 1793 document management app. This permission cannot be granted to 1794 third-party apps. 1795 <p>Protection level: signature 1796 --> 1797 <permission android:name="android.permission.MANAGE_DOCUMENTS" 1798 android:protectionLevel="signature" /> 1799 1800 <!-- @hide Allows an application to cache content. 1801 <p>Not for use by third-party applications. 1802 <p>Protection level: signature 1803 --> 1804 <permission android:name="android.permission.CACHE_CONTENT" 1805 android:protectionLevel="signature" /> 1806 1807 <!-- @SystemApi @hide 1808 Allows an application to aggressively allocate disk space. 1809 <p>Not for use by third-party applications. 1810 --> 1811 <permission android:name="android.permission.ALLOCATE_AGGRESSIVE" 1812 android:protectionLevel="signature|privileged" /> 1813 1814 <!-- @SystemApi @hide 1815 Allows an application to use reserved disk space. 1816 <p>Not for use by third-party applications. Should only be requested by 1817 apps that provide core system functionality, to ensure system stability 1818 when disk is otherwise completely full. 1819 --> 1820 <permission android:name="android.permission.USE_RESERVED_DISK" 1821 android:protectionLevel="signature|privileged" /> 1822 1823 <!-- ================================== --> 1824 <!-- Permissions for screenlock --> 1825 <!-- ================================== --> 1826 <eat-comment /> 1827 1828 <!-- Allows applications to disable the keyguard if it is not secure. 1829 <p>Protection level: normal 1830 --> 1831 <permission android:name="android.permission.DISABLE_KEYGUARD" 1832 android:description="@string/permdesc_disableKeyguard" 1833 android:label="@string/permlab_disableKeyguard" 1834 android:protectionLevel="normal" /> 1835 1836 <!-- ================================== --> 1837 <!-- Permissions to access other installed applications --> 1838 <!-- ================================== --> 1839 <eat-comment /> 1840 1841 <!-- @deprecated No longer enforced. --> 1842 <permission android:name="android.permission.GET_TASKS" 1843 android:label="@string/permlab_getTasks" 1844 android:description="@string/permdesc_getTasks" 1845 android:protectionLevel="normal" /> 1846 1847 <!-- New version of GET_TASKS that apps can request, since GET_TASKS doesn't really 1848 give access to task information. We need this new one because there are 1849 many existing apps that use add libraries and such that have validation 1850 code to ensure the app has requested the GET_TASKS permission by seeing 1851 if it has been granted the permission... if it hasn't, it kills the app 1852 with a message about being upset. So we need to have it continue to look 1853 like the app is getting that permission, even though it will never be 1854 checked, and new privileged apps can now request this one for real access. 1855 @hide 1856 @SystemApi --> 1857 <permission android:name="android.permission.REAL_GET_TASKS" 1858 android:protectionLevel="signature|privileged" /> 1859 1860 <!-- Allows an application to start a task from a ActivityManager#RecentTaskInfo. 1861 @hide --> 1862 <permission android:name="android.permission.START_TASKS_FROM_RECENTS" 1863 android:protectionLevel="signature|privileged" /> 1864 1865 <!-- @SystemApi @hide Allows an application to call APIs that allow it to do interactions 1866 across the users on the device, using singleton services and 1867 user-targeted broadcasts. This permission is not available to 1868 third party applications. --> 1869 <permission android:name="android.permission.INTERACT_ACROSS_USERS" 1870 android:protectionLevel="signature|privileged|development" /> 1871 1872 <!-- @SystemApi Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS} 1873 that removes restrictions on where broadcasts can be sent and allows other 1874 types of interactions 1875 @hide --> 1876 <permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL" 1877 android:protectionLevel="signature|installer" /> 1878 1879 <!-- @SystemApi @hide Allows an application to call APIs that allow it to query and manage 1880 users on the device. This permission is not available to 1881 third party applications. --> 1882 <permission android:name="android.permission.MANAGE_USERS" 1883 android:protectionLevel="signature|privileged" /> 1884 1885 <!-- @hide Allows an application to create, remove users and get the list of 1886 users on the device. Applications holding this permission can only create restricted, 1887 guest, managed, demo, and ephemeral users. For creating other kind of users, 1888 {@link android.Manifest.permission#MANAGE_USERS} is needed. 1889 This permission is not available to third party applications. --> 1890 <permission android:name="android.permission.CREATE_USERS" 1891 android:protectionLevel="signature" /> 1892 1893 <!-- @hide Allows an application to set the profile owners and the device owner. 1894 This permission is not available to third party applications.--> 1895 <permission android:name="android.permission.MANAGE_PROFILE_AND_DEVICE_OWNERS" 1896 android:protectionLevel="signature" 1897 android:label="@string/permlab_manageProfileAndDeviceOwners" 1898 android:description="@string/permdesc_manageProfileAndDeviceOwners" /> 1899 1900 <!-- Allows an application to get full detailed information about 1901 recently running tasks, with full fidelity to the real state. 1902 @hide --> 1903 <permission android:name="android.permission.GET_DETAILED_TASKS" 1904 android:protectionLevel="signature" /> 1905 1906 <!-- Allows an application to change the Z-order of tasks. 1907 <p>Protection level: normal 1908 --> 1909 <permission android:name="android.permission.REORDER_TASKS" 1910 android:label="@string/permlab_reorderTasks" 1911 android:description="@string/permdesc_reorderTasks" 1912 android:protectionLevel="normal" /> 1913 1914 <!-- @hide Allows an application to change to remove/kill tasks --> 1915 <permission android:name="android.permission.REMOVE_TASKS" 1916 android:protectionLevel="signature" /> 1917 1918 <!-- @SystemApi @hide Allows an application to create/manage/remove stacks --> 1919 <permission android:name="android.permission.MANAGE_ACTIVITY_STACKS" 1920 android:protectionLevel="signature|privileged|development" /> 1921 1922 <!-- @SystemApi @hide Allows an application to embed other activities --> 1923 <permission android:name="android.permission.ACTIVITY_EMBEDDING" 1924 android:protectionLevel="signature|privileged|development" /> 1925 1926 <!-- Allows an application to start any activity, regardless of permission 1927 protection or exported state. 1928 @hide --> 1929 <permission android:name="android.permission.START_ANY_ACTIVITY" 1930 android:protectionLevel="signature" /> 1931 1932 <!-- @deprecated The {@link android.app.ActivityManager#restartPackage} 1933 API is no longer supported. --> 1934 <permission android:name="android.permission.RESTART_PACKAGES" 1935 android:label="@string/permlab_killBackgroundProcesses" 1936 android:description="@string/permdesc_killBackgroundProcesses" 1937 android:protectionLevel="normal" /> 1938 1939 <!-- Allows an application to call 1940 {@link android.app.ActivityManager#killBackgroundProcesses}. 1941 <p>Protection level: normal 1942 --> 1943 <permission android:name="android.permission.KILL_BACKGROUND_PROCESSES" 1944 android:label="@string/permlab_killBackgroundProcesses" 1945 android:description="@string/permdesc_killBackgroundProcesses" 1946 android:protectionLevel="normal" /> 1947 1948 <!-- @SystemApi @hide Allows an application to query process states and current 1949 OOM adjustment scores. 1950 <p>Not for use by third-party applications. --> 1951 <permission android:name="android.permission.GET_PROCESS_STATE_AND_OOM_SCORE" 1952 android:protectionLevel="signature|privileged|development" /> 1953 1954 <!-- Allows use of PendingIntent.getIntent(). 1955 @hide --> 1956 <permission android:name="android.permission.GET_INTENT_SENDER_INTENT" 1957 android:protectionLevel="signature" /> 1958 1959 <!-- ================================== --> 1960 <!-- Permissions affecting the display of other applications --> 1961 <!-- ================================== --> 1962 <eat-comment /> 1963 1964 <!-- Allows an app to create windows using the type 1965 {@link android.view.WindowManager.LayoutParams#TYPE_APPLICATION_OVERLAY}, 1966 shown on top of all other apps. Very few apps 1967 should use this permission; these windows are intended for 1968 system-level interaction with the user. 1969 1970 <p class="note"><strong>Note:</strong> If the app 1971 targets API level 23 or higher, the app user must explicitly grant 1972 this permission to the app through a permission management screen. The app requests 1973 the user's approval by sending an intent with action 1974 {@link android.provider.Settings#ACTION_MANAGE_OVERLAY_PERMISSION}. 1975 The app can check whether it has this authorization by calling 1976 {@link android.provider.Settings#canDrawOverlays 1977 Settings.canDrawOverlays()}. 1978 <p>Protection level: signature --> 1979 <permission android:name="android.permission.SYSTEM_ALERT_WINDOW" 1980 android:label="@string/permlab_systemAlertWindow" 1981 android:description="@string/permdesc_systemAlertWindow" 1982 android:protectionLevel="signature|preinstalled|appop|pre23|development" /> 1983 1984 <!-- @deprecated Use {@link android.Manifest.permission#REQUEST_COMPANION_RUN_IN_BACKGROUND} 1985 @hide 1986 --> 1987 <permission android:name="android.permission.RUN_IN_BACKGROUND" 1988 android:label="@string/permlab_runInBackground" 1989 android:description="@string/permdesc_runInBackground" 1990 android:protectionLevel="signature" /> 1991 1992 <!-- @deprecated Use 1993 {@link android.Manifest.permission#REQUEST_COMPANION_USE_DATA_IN_BACKGROUND} 1994 @hide 1995 --> 1996 <permission android:name="android.permission.USE_DATA_IN_BACKGROUND" 1997 android:label="@string/permlab_useDataInBackground" 1998 android:description="@string/permdesc_useDataInBackground" 1999 android:protectionLevel="signature" /> 2000 2001 <!-- @hide Allows an application to set display offsets for the screen. 2002 This permission is not available to third party applications. --> 2003 <permission android:name="android.permission.SET_DISPLAY_OFFSET" 2004 android:protectionLevel="signature|privileged" /> 2005 2006 <!-- Allows a companion app to run in the background. 2007 <p>Protection level: normal 2008 --> 2009 <permission android:name="android.permission.REQUEST_COMPANION_RUN_IN_BACKGROUND" 2010 android:label="@string/permlab_runInBackground" 2011 android:description="@string/permdesc_runInBackground" 2012 android:protectionLevel="normal" /> 2013 2014 <!-- Allows a companion app to use data in the background. 2015 <p>Protection level: normal 2016 --> 2017 <permission android:name="android.permission.REQUEST_COMPANION_USE_DATA_IN_BACKGROUND" 2018 android:label="@string/permlab_useDataInBackground" 2019 android:description="@string/permdesc_useDataInBackground" 2020 android:protectionLevel="normal" /> 2021 2022 2023 <!-- ================================== --> 2024 <!-- Permissions affecting the system wallpaper --> 2025 <!-- ================================== --> 2026 <eat-comment /> 2027 2028 <!-- Allows applications to set the wallpaper. 2029 <p>Protection level: normal 2030 --> 2031 <permission android:name="android.permission.SET_WALLPAPER" 2032 android:label="@string/permlab_setWallpaper" 2033 android:description="@string/permdesc_setWallpaper" 2034 android:protectionLevel="normal" /> 2035 2036 <!-- Allows applications to set the wallpaper hints. 2037 <p>Protection level: normal 2038 --> 2039 <permission android:name="android.permission.SET_WALLPAPER_HINTS" 2040 android:label="@string/permlab_setWallpaperHints" 2041 android:description="@string/permdesc_setWallpaperHints" 2042 android:protectionLevel="normal" /> 2043 2044 <!-- Allow the app to read the system wallpaper image without 2045 holding the READ_EXTERNAL_STORAGE permission. 2046 <p>Not for use by third-party applications. 2047 @hide 2048 @SystemApi 2049 --> 2050 <permission android:name="android.permission.READ_WALLPAPER_INTERNAL" 2051 android:protectionLevel="signature|privileged" /> 2052 2053 <!-- ============================================ --> 2054 <!-- Permissions for changing the system clock --> 2055 <!-- ============================================ --> 2056 <eat-comment /> 2057 2058 <!-- @SystemApi Allows applications to set the system time. 2059 <p>Not for use by third-party applications. --> 2060 <permission android:name="android.permission.SET_TIME" 2061 android:protectionLevel="signature|privileged" /> 2062 2063 <!-- Allows applications to set the system time zone. 2064 <p>Not for use by third-party applications. 2065 --> 2066 <permission android:name="android.permission.SET_TIME_ZONE" 2067 android:label="@string/permlab_setTimeZone" 2068 android:description="@string/permdesc_setTimeZone" 2069 android:protectionLevel="signature|privileged" /> 2070 2071 <!-- ==================================================== --> 2072 <!-- Permissions related to changing status bar --> 2073 <!-- ==================================================== --> 2074 <eat-comment /> 2075 2076 <!-- Allows an application to expand or collapse the status bar. 2077 <p>Protection level: normal 2078 --> 2079 <permission android:name="android.permission.EXPAND_STATUS_BAR" 2080 android:label="@string/permlab_expandStatusBar" 2081 android:description="@string/permdesc_expandStatusBar" 2082 android:protectionLevel="normal" /> 2083 2084 <!-- ============================================================== --> 2085 <!-- Permissions related to adding/removing shortcuts from Launcher --> 2086 <!-- ============================================================== --> 2087 <eat-comment /> 2088 2089 <!-- Allows an application to install a shortcut in Launcher. 2090 <p>In Android O (API level 26) and higher, the <code>INSTALL_SHORTCUT</code> broadcast no 2091 longer has any effect on your app because it's a private, implicit 2092 broadcast. Instead, you should create an app shortcut by using the 2093 {@link android.content.pm.ShortcutManager#requestPinShortcut requestPinShortcut()} 2094 method from the {@link android.content.pm.ShortcutManager} class. 2095 <p>Protection level: normal 2096 --> 2097 <permission android:name="com.android.launcher.permission.INSTALL_SHORTCUT" 2098 android:label="@string/permlab_install_shortcut" 2099 android:description="@string/permdesc_install_shortcut" 2100 android:protectionLevel="normal"/> 2101 2102 <!--This permission is no longer supported. 2103 --> 2104 <permission android:name="com.android.launcher.permission.UNINSTALL_SHORTCUT" 2105 android:label="@string/permlab_uninstall_shortcut" 2106 android:description="@string/permdesc_uninstall_shortcut" 2107 android:protectionLevel="normal"/> 2108 2109 <!-- ==================================================== --> 2110 <!-- Permissions related to accessing sync settings --> 2111 <!-- ==================================================== --> 2112 <eat-comment /> 2113 2114 <!-- Allows applications to read the sync settings. 2115 <p>Protection level: normal 2116 --> 2117 <permission android:name="android.permission.READ_SYNC_SETTINGS" 2118 android:description="@string/permdesc_readSyncSettings" 2119 android:label="@string/permlab_readSyncSettings" 2120 android:protectionLevel="normal" /> 2121 2122 <!-- Allows applications to write the sync settings. 2123 <p>Protection level: normal 2124 --> 2125 <permission android:name="android.permission.WRITE_SYNC_SETTINGS" 2126 android:description="@string/permdesc_writeSyncSettings" 2127 android:label="@string/permlab_writeSyncSettings" 2128 android:protectionLevel="normal" /> 2129 2130 <!-- Allows applications to read the sync stats. 2131 <p>Protection level: normal 2132 --> 2133 <permission android:name="android.permission.READ_SYNC_STATS" 2134 android:description="@string/permdesc_readSyncStats" 2135 android:label="@string/permlab_readSyncStats" 2136 android:protectionLevel="normal" /> 2137 2138 <!-- ============================================ --> 2139 <!-- Permissions for low-level system interaction --> 2140 <!-- ============================================ --> 2141 <eat-comment /> 2142 2143 <!-- @SystemApi @hide Change the screen compatibility mode of applications --> 2144 <permission android:name="android.permission.SET_SCREEN_COMPATIBILITY" 2145 android:protectionLevel="signature" /> 2146 2147 <!-- @SystemApi Allows an application to modify the current configuration, such 2148 as locale. --> 2149 <permission android:name="android.permission.CHANGE_CONFIGURATION" 2150 android:protectionLevel="signature|privileged|development" /> 2151 2152 <!-- Allows an application to read or write the system settings. 2153 2154 <p class="note"><strong>Note:</strong> If the app targets API level 23 2155 or higher, the app user 2156 must explicitly grant this permission to the app through a permission management screen. 2157 The app requests the user's approval by sending an intent with action 2158 {@link android.provider.Settings#ACTION_MANAGE_WRITE_SETTINGS}. The app 2159 can check whether it has this authorization by calling {@link 2160 android.provider.Settings.System#canWrite Settings.System.canWrite()}. 2161 2162 <p>Protection level: signature 2163 --> 2164 <permission android:name="android.permission.WRITE_SETTINGS" 2165 android:label="@string/permlab_writeSettings" 2166 android:description="@string/permdesc_writeSettings" 2167 android:protectionLevel="signature|preinstalled|appop|pre23" /> 2168 2169 <!-- @SystemApi Allows an application to modify the Google service map. 2170 <p>Not for use by third-party applications. --> 2171 <permission android:name="android.permission.WRITE_GSERVICES" 2172 android:protectionLevel="signature|privileged" /> 2173 2174 <!-- @SystemApi Allows an application to call 2175 {@link android.app.ActivityManager#forceStopPackage}. 2176 @hide --> 2177 <permission android:name="android.permission.FORCE_STOP_PACKAGES" 2178 android:protectionLevel="signature|privileged" /> 2179 2180 <!-- @SystemApi @hide Allows an application to retrieve the content of the active window 2181 An active window is the window that has fired an accessibility event. --> 2182 <permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT" 2183 android:protectionLevel="signature|privileged" /> 2184 2185 <!-- @SystemApi Modify the global animation scaling factor. 2186 <p>Not for use by third-party applications. --> 2187 <permission android:name="android.permission.SET_ANIMATION_SCALE" 2188 android:protectionLevel="signature|privileged|development" /> 2189 2190 <!-- @deprecated This functionality will be removed in the future; please do 2191 not use. Allow an application to make its activities persistent. --> 2192 <permission android:name="android.permission.PERSISTENT_ACTIVITY" 2193 android:label="@string/permlab_persistentActivity" 2194 android:description="@string/permdesc_persistentActivity" 2195 android:protectionLevel="normal" /> 2196 2197 <!-- Allows an application to find out the space used by any package. 2198 <p>Protection level: normal 2199 --> 2200 <permission android:name="android.permission.GET_PACKAGE_SIZE" 2201 android:label="@string/permlab_getPackageSize" 2202 android:description="@string/permdesc_getPackageSize" 2203 android:protectionLevel="normal" /> 2204 2205 <!-- @deprecated No longer useful, see 2206 {@link android.content.pm.PackageManager#addPackageToPreferred} 2207 for details. --> 2208 <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS" 2209 android:protectionLevel="signature|verifier" /> 2210 2211 <!-- Allows an application to receive the 2212 {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is 2213 broadcast after the system finishes booting. If you don't 2214 request this permission, you will not receive the broadcast at 2215 that time. Though holding this permission does not have any 2216 security implications, it can have a negative impact on the 2217 user experience by increasing the amount of time it takes the 2218 system to start and allowing applications to have themselves 2219 running without the user being aware of them. As such, you must 2220 explicitly declare your use of this facility to make that visible 2221 to the user. 2222 <p>Protection level: normal 2223 --> 2224 <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED" 2225 android:label="@string/permlab_receiveBootCompleted" 2226 android:description="@string/permdesc_receiveBootCompleted" 2227 android:protectionLevel="normal" /> 2228 2229 <!-- Allows an application to broadcast sticky intents. These are 2230 broadcasts whose data is held by the system after being finished, 2231 so that clients can quickly retrieve that data without having 2232 to wait for the next broadcast. 2233 <p>Protection level: normal 2234 --> 2235 <permission android:name="android.permission.BROADCAST_STICKY" 2236 android:label="@string/permlab_broadcastSticky" 2237 android:description="@string/permdesc_broadcastSticky" 2238 android:protectionLevel="normal" /> 2239 2240 <!-- @SystemApi Allows mounting and unmounting file systems for removable storage. 2241 <p>Not for use by third-party applications.--> 2242 <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS" 2243 android:protectionLevel="signature|privileged" /> 2244 2245 <!-- @SystemApi Allows formatting file systems for removable storage. 2246 <p>Not for use by third-party applications. --> 2247 <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS" 2248 android:protectionLevel="signature|privileged" /> 2249 2250 <!-- @hide --> 2251 <permission android:name="android.permission.STORAGE_INTERNAL" 2252 android:protectionLevel="signature" /> 2253 2254 <!-- Allows access to ASEC non-destructive API calls 2255 @hide --> 2256 <permission android:name="android.permission.ASEC_ACCESS" 2257 android:protectionLevel="signature" /> 2258 2259 <!-- Allows creation of ASEC volumes 2260 @hide --> 2261 <permission android:name="android.permission.ASEC_CREATE" 2262 android:protectionLevel="signature" /> 2263 2264 <!-- Allows destruction of ASEC volumes 2265 @hide --> 2266 <permission android:name="android.permission.ASEC_DESTROY" 2267 android:protectionLevel="signature" /> 2268 2269 <!-- Allows mount / unmount of ASEC volumes 2270 @hide --> 2271 <permission android:name="android.permission.ASEC_MOUNT_UNMOUNT" 2272 android:protectionLevel="signature" /> 2273 2274 <!-- Allows rename of ASEC volumes 2275 @hide --> 2276 <permission android:name="android.permission.ASEC_RENAME" 2277 android:protectionLevel="signature" /> 2278 2279 <!-- @SystemApi Allows applications to write the apn settings. 2280 <p>Not for use by third-party applications. --> 2281 <permission android:name="android.permission.WRITE_APN_SETTINGS" 2282 android:protectionLevel="signature|privileged" /> 2283 2284 <!-- Allows applications to change network connectivity state. 2285 <p>Protection level: normal 2286 --> 2287 <permission android:name="android.permission.CHANGE_NETWORK_STATE" 2288 android:description="@string/permdesc_changeNetworkState" 2289 android:label="@string/permlab_changeNetworkState" 2290 android:protectionLevel="normal" /> 2291 2292 <!-- Allows an application to clear the caches of all installed 2293 applications on the device. 2294 <p>Protection level: signature|privileged 2295 --> 2296 <permission android:name="android.permission.CLEAR_APP_CACHE" 2297 android:protectionLevel="signature|privileged" /> 2298 2299 <!-- @SystemApi Allows an application to use any media decoder when decoding for playback 2300 @hide --> 2301 <permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK" 2302 android:protectionLevel="signature|privileged" /> 2303 2304 <!-- @SystemApi Allows an application to install and/or uninstall CA certificates on 2305 behalf of the user. 2306 @hide --> 2307 <permission android:name="android.permission.MANAGE_CA_CERTIFICATES" 2308 android:protectionLevel="signature|privileged" /> 2309 2310 <!-- @SystemApi Allows an application to do certain operations needed for 2311 interacting with the recovery (system update) system. 2312 @hide --> 2313 <permission android:name="android.permission.RECOVERY" 2314 android:protectionLevel="signature|privileged" /> 2315 2316 <!-- Allows the system to bind to an application's task services 2317 @hide --> 2318 <permission android:name="android.permission.BIND_JOB_SERVICE" 2319 android:protectionLevel="signature" /> 2320 <uses-permission android:name="android.permission.BIND_JOB_SERVICE"/> 2321 2322 <!-- Allows an application to initiate configuration updates 2323 <p>An application requesting this permission is responsible for 2324 verifying the source and integrity of any update before passing 2325 it off to the various individual installer components 2326 @hide --> 2327 <permission android:name="android.permission.UPDATE_CONFIG" 2328 android:protectionLevel="signature|privileged" /> 2329 2330 <!-- Allows a time zone rule updater application to request 2331 the system installs / uninstalls timezone rules. 2332 <p>An application requesting this permission is responsible for 2333 verifying the source and integrity of the update before passing 2334 it off to the installer components. 2335 @SystemApi @hide --> 2336 <permission android:name="android.permission.UPDATE_TIME_ZONE_RULES" 2337 android:protectionLevel="signature|privileged" /> 2338 2339 <!-- Must be required by a time zone rule updater application, 2340 to ensure that only the system can trigger it. 2341 @hide --> 2342 <permission android:name="android.permission.TRIGGER_TIME_ZONE_RULES_CHECK" 2343 android:protectionLevel="signature" /> 2344 <uses-permission android:name="android.permission.TRIGGER_TIME_ZONE_RULES_CHECK"/> 2345 2346 <!-- Allows the system to reset throttling in shortcut manager. 2347 @hide --> 2348 <permission android:name="android.permission.RESET_SHORTCUT_MANAGER_THROTTLING" 2349 android:protectionLevel="signature" /> 2350 2351 <!-- Allows the system to bind to the discovered Network Recommendation Service. 2352 @SystemApi @hide --> 2353 <permission android:name="android.permission.BIND_NETWORK_RECOMMENDATION_SERVICE" 2354 android:protectionLevel="signature" /> 2355 <uses-permission android:name="android.permission.BIND_NETWORK_RECOMMENDATION_SERVICE"/> 2356 2357 <!-- Allows an application to enable, disable and change priority of 2358 runtime resource overlays. 2359 @hide --> 2360 <permission android:name="android.permission.CHANGE_OVERLAY_PACKAGES" 2361 android:protectionLevel="signature|privileged" /> 2362 2363 <!-- ========================================= --> 2364 <!-- Permissions for special development tools --> 2365 <!-- ========================================= --> 2366 <eat-comment /> 2367 2368 <!-- @SystemApi Allows an application to read or write the secure system settings. 2369 <p>Not for use by third-party applications. --> 2370 <permission android:name="android.permission.WRITE_SECURE_SETTINGS" 2371 android:protectionLevel="signature|privileged|development" /> 2372 2373 <!-- @SystemApi Allows an application to retrieve state dump information from system services. 2374 <p>Not for use by third-party applications. --> 2375 <permission android:name="android.permission.DUMP" 2376 android:protectionLevel="signature|privileged|development" /> 2377 2378 <!-- @SystemApi Allows an application to read the low-level system log files. 2379 <p>Not for use by third-party applications, because 2380 Log entries can contain the user's private information. --> 2381 <permission android:name="android.permission.READ_LOGS" 2382 android:protectionLevel="signature|privileged|development" /> 2383 2384 <!-- @SystemApi Configure an application for debugging. 2385 <p>Not for use by third-party applications. --> 2386 <permission android:name="android.permission.SET_DEBUG_APP" 2387 android:protectionLevel="signature|privileged|development" /> 2388 2389 <!-- @SystemApi Allows an application to set the maximum number of (not needed) 2390 application processes that can be running. 2391 <p>Not for use by third-party applications. --> 2392 <permission android:name="android.permission.SET_PROCESS_LIMIT" 2393 android:protectionLevel="signature|privileged|development" /> 2394 2395 <!-- @SystemApi Allows an application to control whether activities are immediately 2396 finished when put in the background. 2397 <p>Not for use by third-party applications. --> 2398 <permission android:name="android.permission.SET_ALWAYS_FINISH" 2399 android:protectionLevel="signature|privileged|development" /> 2400 2401 <!-- @SystemApi Allow an application to request that a signal be sent to all persistent processes. 2402 <p>Not for use by third-party applications. --> 2403 <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES" 2404 android:protectionLevel="signature|privileged|development" /> 2405 2406 <!-- ==================================== --> 2407 <!-- Private permissions --> 2408 <!-- ==================================== --> 2409 <eat-comment /> 2410 2411 <!-- @SystemApi Allows access to the list of accounts in the Accounts Service. --> 2412 <permission android:name="android.permission.GET_ACCOUNTS_PRIVILEGED" 2413 android:protectionLevel="signature|privileged" /> 2414 2415 <!-- Allows but does not guarantee access to user passwords at the conclusion of add account 2416 @hide --> 2417 <permission android:name="android.permission.GET_PASSWORD" 2418 android:protectionLevel="signature" /> 2419 2420 <!-- @SystemApi Allows applications to RW to diagnostic resources. 2421 <p>Not for use by third-party applications. --> 2422 <permission android:name="android.permission.DIAGNOSTIC" 2423 android:protectionLevel="signature" /> 2424 2425 <!-- @SystemApi Allows an application to open, close, or disable the status bar 2426 and its icons. 2427 <p>Not for use by third-party applications. --> 2428 <permission android:name="android.permission.STATUS_BAR" 2429 android:protectionLevel="signature|privileged" /> 2430 2431 <!-- Allows an application to be the status bar. Currently used only by SystemUI.apk 2432 @hide --> 2433 <permission android:name="android.permission.STATUS_BAR_SERVICE" 2434 android:protectionLevel="signature" /> 2435 2436 <!-- Allows an application to bind to third party quick settings tiles. 2437 <p>Should only be requested by the System, should be required by 2438 TileService declarations.--> 2439 <permission android:name="android.permission.BIND_QUICK_SETTINGS_TILE" 2440 android:protectionLevel="signature" /> 2441 2442 <!-- @SystemApi Allows an application to force a BACK operation on whatever is the 2443 top activity. 2444 <p>Not for use by third-party applications. 2445 @hide 2446 --> 2447 <permission android:name="android.permission.FORCE_BACK" 2448 android:protectionLevel="signature" /> 2449 2450 <!-- @SystemApi Allows an application to update device statistics. 2451 <p>Not for use by third-party applications. --> 2452 <permission android:name="android.permission.UPDATE_DEVICE_STATS" 2453 android:protectionLevel="signature|privileged" /> 2454 2455 <!-- @SystemApi @hide Allows an application to collect application operation statistics. 2456 Not for use by third party apps. --> 2457 <permission android:name="android.permission.GET_APP_OPS_STATS" 2458 android:protectionLevel="signature|privileged|development" /> 2459 2460 <!-- @SystemApi Allows an application to update application operation statistics. Not for 2461 use by third party apps. 2462 @hide --> 2463 <permission android:name="android.permission.UPDATE_APP_OPS_STATS" 2464 android:protectionLevel="signature|privileged|installer" /> 2465 2466 <!-- @SystemApi Allows an application to update the user app op restrictions. 2467 Not for use by third party apps. 2468 @hide --> 2469 <permission android:name="android.permission.MANAGE_APP_OPS_RESTRICTIONS" 2470 android:protectionLevel="signature|installer" /> 2471 2472 <!-- @SystemApi Allows an application to open windows that are for use by parts 2473 of the system user interface. 2474 <p>Not for use by third-party applications. 2475 @hide 2476 --> 2477 <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW" 2478 android:protectionLevel="signature" /> 2479 2480 <!-- @SystemApi Allows an application to use 2481 {@link android.view.WindowManager.LayoutsParams#PRIVATE_FLAG_HIDE_NON_SYSTEM_OVERLAY_WINDOWS} 2482 to hide non-system-overlay windows. 2483 <p>Not for use by third-party applications. 2484 @hide 2485 --> 2486 <permission android:name="android.permission.HIDE_NON_SYSTEM_OVERLAY_WINDOWS" 2487 android:protectionLevel="signature|installer" /> 2488 2489 <!-- @SystemApi Allows an application to manage (create, destroy, 2490 Z-order) application tokens in the window manager. 2491 <p>Not for use by third-party applications. 2492 @hide 2493 --> 2494 <permission android:name="android.permission.MANAGE_APP_TOKENS" 2495 android:protectionLevel="signature" /> 2496 2497 <!-- Allows System UI to register listeners for events from Window Manager. 2498 @hide --> 2499 <permission android:name="android.permission.REGISTER_WINDOW_MANAGER_LISTENERS" 2500 android:protectionLevel="signature" /> 2501 2502 <!-- @hide Allows the application to temporarily freeze the screen for a 2503 full-screen transition. --> 2504 <permission android:name="android.permission.FREEZE_SCREEN" 2505 android:protectionLevel="signature" /> 2506 2507 <!-- @SystemApi Allows an application to inject user events (keys, touch, trackball) 2508 into the event stream and deliver them to ANY window. Without this 2509 permission, you can only deliver events to windows in your own process. 2510 <p>Not for use by third-party applications. 2511 @hide 2512 --> 2513 <permission android:name="android.permission.INJECT_EVENTS" 2514 android:protectionLevel="signature" /> 2515 2516 <!-- @hide Allows an application to register an input filter which filters the stream 2517 of user events (keys, touch, trackball) before they are dispatched to any window. --> 2518 <permission android:name="android.permission.FILTER_EVENTS" 2519 android:protectionLevel="signature" /> 2520 2521 <!-- @hide Allows an application to retrieve the window token from the accessibility manager. --> 2522 <permission android:name="android.permission.RETRIEVE_WINDOW_TOKEN" 2523 android:protectionLevel="signature" /> 2524 2525 <!-- @hide Allows an application to modify accessibility information from another app. --> 2526 <permission android:name="android.permission.MODIFY_ACCESSIBILITY_DATA" 2527 android:protectionLevel="signature" /> 2528 2529 <!-- @hide Allows an application to change the accessibility volume. --> 2530 <permission android:name="android.permission.CHANGE_ACCESSIBILITY_VOLUME" 2531 android:protectionLevel="signature" /> 2532 2533 <!-- @hide Allows an application to collect frame statistics --> 2534 <permission android:name="android.permission.FRAME_STATS" 2535 android:protectionLevel="signature" /> 2536 2537 <!-- @hide Allows an application to temporary enable accessibility on the device. --> 2538 <permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY" 2539 android:protectionLevel="signature" /> 2540 2541 <!-- @SystemApi Allows an application to watch and control how activities are 2542 started globally in the system. Only for is in debugging 2543 (usually the monkey command). 2544 <p>Not for use by third-party applications. 2545 @hide 2546 --> 2547 <permission android:name="android.permission.SET_ACTIVITY_WATCHER" 2548 android:protectionLevel="signature" /> 2549 2550 <!-- @SystemApi Allows an application to call the activity manager shutdown() API 2551 to put the higher-level system there into a shutdown state. 2552 @hide --> 2553 <permission android:name="android.permission.SHUTDOWN" 2554 android:protectionLevel="signature|privileged" /> 2555 2556 <!-- @SystemApi Allows an application to tell the activity manager to temporarily 2557 stop application switches, putting it into a special mode that 2558 prevents applications from immediately switching away from some 2559 critical UI such as the home screen. 2560 @hide --> 2561 <permission android:name="android.permission.STOP_APP_SWITCHES" 2562 android:protectionLevel="signature|privileged" /> 2563 2564 <!-- @SystemApi Allows an application to retrieve private information about 2565 the current top activity, such as any assist context it can provide. 2566 <p>Not for use by third-party applications. 2567 @hide 2568 --> 2569 <permission android:name="android.permission.GET_TOP_ACTIVITY_INFO" 2570 android:protectionLevel="signature" /> 2571 2572 <!-- Allows an application to retrieve the current state of keys and 2573 switches. 2574 <p>Not for use by third-party applications. 2575 @deprecated The API that used this permission has been removed. --> 2576 <permission android:name="android.permission.READ_INPUT_STATE" 2577 android:protectionLevel="signature" /> 2578 2579 <!-- Must be required by an {@link android.inputmethodservice.InputMethodService}, 2580 to ensure that only the system can bind to it. 2581 <p>Protection level: signature 2582 --> 2583 <permission android:name="android.permission.BIND_INPUT_METHOD" 2584 android:protectionLevel="signature" /> 2585 2586 <!-- Must be required by an {@link android.media.midi.MidiDeviceService}, 2587 to ensure that only the system can bind to it. 2588 <p>Protection level: signature 2589 --> 2590 <permission android:name="android.permission.BIND_MIDI_DEVICE_SERVICE" 2591 android:protectionLevel="signature" /> 2592 2593 <!-- Must be required by an {@link android.accessibilityservice.AccessibilityService}, 2594 to ensure that only the system can bind to it. 2595 <p>Protection level: signature 2596 --> 2597 <permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE" 2598 android:protectionLevel="signature" /> 2599 2600 <!-- Must be required by a {@link android.printservice.PrintService}, 2601 to ensure that only the system can bind to it. 2602 <p>Protection level: signature 2603 --> 2604 <permission android:name="android.permission.BIND_PRINT_SERVICE" 2605 android:protectionLevel="signature" /> 2606 2607 <!-- Must be required by a {@link android.printservice.recommendation.RecommendationService}, 2608 to ensure that only the system can bind to it. 2609 @hide 2610 @SystemApi 2611 <p>Protection level: signature 2612 --> 2613 <permission android:name="android.permission.BIND_PRINT_RECOMMENDATION_SERVICE" 2614 android:protectionLevel="signature" /> 2615 2616 <!-- Allows applications to get the installed and enabled print services. 2617 @hide 2618 @SystemApi 2619 <p>Protection level: signature|preinstalled 2620 --> 2621 <permission android:name="android.permission.READ_PRINT_SERVICES" 2622 android:protectionLevel="signature|preinstalled" /> 2623 2624 <!-- Allows applications to get the currently recommended print services for printers. 2625 @hide 2626 @SystemApi 2627 <p>Protection level: signature|preinstalled 2628 --> 2629 <permission android:name="android.permission.READ_PRINT_SERVICE_RECOMMENDATIONS" 2630 android:protectionLevel="signature|preinstalled" /> 2631 2632 <!-- Must be required by a {@link android.nfc.cardemulation.HostApduService} 2633 or {@link android.nfc.cardemulation.OffHostApduService} to ensure that only 2634 the system can bind to it. 2635 <p>Protection level: signature 2636 --> 2637 <permission android:name="android.permission.BIND_NFC_SERVICE" 2638 android:protectionLevel="signature" /> 2639 2640 <!-- Must be required by the PrintSpooler to ensure that only the system can bind to it. 2641 @hide --> 2642 <permission android:name="android.permission.BIND_PRINT_SPOOLER_SERVICE" 2643 android:protectionLevel="signature" /> 2644 2645 <!-- Must be required by the CompanionDeviceManager to ensure that only the system can bind to it. 2646 @hide --> 2647 <permission android:name="android.permission.BIND_COMPANION_DEVICE_MANAGER_SERVICE" 2648 android:protectionLevel="signature" /> 2649 2650 <!-- @SystemApi Must be required by the RuntimePermissionPresenterService to ensure 2651 that only the system can bind to it. 2652 @hide --> 2653 <permission android:name="android.permission.BIND_RUNTIME_PERMISSION_PRESENTER_SERVICE" 2654 android:protectionLevel="signature" /> 2655 2656 <!-- Must be required by a TextService (e.g. SpellCheckerService) 2657 to ensure that only the system can bind to it. 2658 <p>Protection level: signature 2659 --> 2660 <permission android:name="android.permission.BIND_TEXT_SERVICE" 2661 android:protectionLevel="signature" /> 2662 2663 <!-- Must be required by a {@link android.net.VpnService}, 2664 to ensure that only the system can bind to it. 2665 <p>Protection level: signature 2666 --> 2667 <permission android:name="android.permission.BIND_VPN_SERVICE" 2668 android:protectionLevel="signature" /> 2669 2670 <!-- Must be required by a {@link android.service.wallpaper.WallpaperService}, 2671 to ensure that only the system can bind to it. 2672 <p>Protection level: signature|privileged 2673 --> 2674 <permission android:name="android.permission.BIND_WALLPAPER" 2675 android:protectionLevel="signature|privileged" /> 2676 2677 <!-- Must be required by a {@link android.service.voice.VoiceInteractionService}, 2678 to ensure that only the system can bind to it. 2679 <p>Protection level: signature 2680 --> 2681 <permission android:name="android.permission.BIND_VOICE_INTERACTION" 2682 android:protectionLevel="signature" /> 2683 2684 <!-- Must be required by a {@link android.service.autofill.AutofillService}, 2685 to ensure that only the system can bind to it. 2686 <p>Protection level: signature 2687 --> 2688 <permission android:name="android.permission.BIND_AUTOFILL_SERVICE" 2689 android:protectionLevel="signature" /> 2690 2691 <!-- Must be required by an {@link android.service.autofill.AutofillFieldClassificationService} 2692 to ensure that only the system can bind to it. 2693 @hide This is not a third-party API (intended for OEMs and system apps). 2694 --> 2695 <permission android:name="android.permission.BIND_AUTOFILL_FIELD_CLASSIFICATION_SERVICE" 2696 android:protectionLevel="signature" /> 2697 2698 <!-- Must be required by hotword enrollment application, 2699 to ensure that only the system can interact with it. 2700 @hide <p>Not for use by third-party applications.</p> --> 2701 <permission android:name="android.permission.MANAGE_VOICE_KEYPHRASES" 2702 android:protectionLevel="signature|privileged" /> 2703 2704 <!-- Must be required by a {@link com.android.media.remotedisplay.RemoteDisplayProvider}, 2705 to ensure that only the system can bind to it. 2706 @hide --> 2707 <permission android:name="android.permission.BIND_REMOTE_DISPLAY" 2708 android:protectionLevel="signature" /> 2709 2710 <!-- Must be required by a {@link android.media.tv.TvInputService} 2711 to ensure that only the system can bind to it. 2712 <p>Protection level: signature|privileged 2713 --> 2714 <permission android:name="android.permission.BIND_TV_INPUT" 2715 android:protectionLevel="signature|privileged" /> 2716 2717 <!-- @SystemApi 2718 Must be required by a {@link com.android.media.tv.remoteprovider.TvRemoteProvider} 2719 to ensure that only the system can bind to it. 2720 <p>Protection level: signature|privileged 2721 <p>Not for use by third-party applications. </p> 2722 @hide --> 2723 <permission android:name="android.permission.BIND_TV_REMOTE_SERVICE" 2724 android:protectionLevel="signature|privileged" /> 2725 2726 <!-- @SystemApi 2727 Must be required for a virtual remote controller for TV. 2728 <p>Protection level: signature|privileged 2729 <p>Not for use by third-party applications. </p> 2730 @hide --> 2731 <permission android:name="android.permission.TV_VIRTUAL_REMOTE_CONTROLLER" 2732 android:protectionLevel="signature|privileged" /> 2733 2734 <!-- Allows an application to change HDMI CEC active source. 2735 <p>Not for use by third-party applications. 2736 @hide --> 2737 <permission android:name="android.permission.CHANGE_HDMI_CEC_ACTIVE_SOURCE" 2738 android:protectionLevel="signature|privileged" /> 2739 2740 <!-- @SystemApi Allows an application to modify parental controls 2741 <p>Not for use by third-party applications. 2742 @hide --> 2743 <permission android:name="android.permission.MODIFY_PARENTAL_CONTROLS" 2744 android:protectionLevel="signature|privileged" /> 2745 2746 <!-- @SystemApi Allows an application to read TvContentRatingSystemInfo 2747 <p>Not for use by third-party applications. 2748 @hide --> 2749 <permission android:name="android.permission.READ_CONTENT_RATING_SYSTEMS" 2750 android:protectionLevel="signature|privileged" /> 2751 2752 <!-- @SystemApi Allows an application to notify TV inputs by sending broadcasts. 2753 <p>Protection level: signature|privileged 2754 <p>Not for use by third-party applications. 2755 @hide --> 2756 <permission android:name="android.permission.NOTIFY_TV_INPUTS" 2757 android:protectionLevel="signature|privileged" /> 2758 2759 <!-- Must be required by a {@link android.media.routing.MediaRouteService} 2760 to ensure that only the system can interact with it. 2761 @hide --> 2762 <permission android:name="android.permission.BIND_ROUTE_PROVIDER" 2763 android:protectionLevel="signature" /> 2764 2765 <!-- Must be required by device administration receiver, to ensure that only the 2766 system can interact with it. 2767 <p>Protection level: signature 2768 --> 2769 <permission android:name="android.permission.BIND_DEVICE_ADMIN" 2770 android:protectionLevel="signature" /> 2771 2772 <!-- @SystemApi Required to add or remove another application as a device admin. 2773 <p>Not for use by third-party applications. 2774 @hide --> 2775 <permission android:name="android.permission.MANAGE_DEVICE_ADMINS" 2776 android:protectionLevel="signature|privileged" /> 2777 2778 <!-- @SystemApi Allows low-level access to setting the orientation (actually 2779 rotation) of the screen. 2780 <p>Not for use by third-party applications. 2781 @hide 2782 --> 2783 <permission android:name="android.permission.SET_ORIENTATION" 2784 android:protectionLevel="signature" /> 2785 2786 <!-- @SystemApi Allows low-level access to setting the pointer speed. 2787 <p>Not for use by third-party applications. 2788 @hide 2789 --> 2790 <permission android:name="android.permission.SET_POINTER_SPEED" 2791 android:protectionLevel="signature" /> 2792 2793 <!-- Allows low-level access to setting input device calibration. 2794 <p>Not for use by normal applications. 2795 @hide --> 2796 <permission android:name="android.permission.SET_INPUT_CALIBRATION" 2797 android:protectionLevel="signature" /> 2798 2799 <!-- Allows low-level access to setting the keyboard layout. 2800 <p>Not for use by third-party applications. 2801 @hide --> 2802 <permission android:name="android.permission.SET_KEYBOARD_LAYOUT" 2803 android:protectionLevel="signature" /> 2804 2805 <!-- Allows an application to query tablet mode state and monitor changes 2806 in it. 2807 <p>Not for use by third-party applications. 2808 @hide --> 2809 <permission android:name="android.permission.TABLET_MODE" 2810 android:protectionLevel="signature" /> 2811 2812 <!-- Allows an application to request installing packages. Apps 2813 targeting APIs greater than 25 must hold this permission in 2814 order to use {@link android.content.Intent#ACTION_INSTALL_PACKAGE}. 2815 <p>Protection level: signature 2816 --> 2817 <permission android:name="android.permission.REQUEST_INSTALL_PACKAGES" 2818 android:label="@string/permlab_requestInstallPackages" 2819 android:description="@string/permdesc_requestInstallPackages" 2820 android:protectionLevel="signature|appop" /> 2821 2822 <!-- Allows an application to request deleting packages. Apps 2823 targeting APIs {@link android.os.Build.VERSION_CODES#P} or greater must hold this 2824 permission in order to use {@link android.content.Intent#ACTION_UNINSTALL_PACKAGE} or 2825 {@link android.content.pm.PackageInstaller#uninstall}. 2826 <p>Protection level: normal 2827 --> 2828 <permission android:name="android.permission.REQUEST_DELETE_PACKAGES" 2829 android:label="@string/permlab_requestDeletePackages" 2830 android:description="@string/permdesc_requestDeletePackages" 2831 android:protectionLevel="normal" /> 2832 2833 <!-- @SystemApi Allows an application to install packages. 2834 <p>Not for use by third-party applications. --> 2835 <permission android:name="android.permission.INSTALL_PACKAGES" 2836 android:protectionLevel="signature|privileged" /> 2837 2838 <!-- @SystemApi Allows an application to install self updates. This is a limited version 2839 of {@link android.Manifest.permission#INSTALL_PACKAGES}. 2840 <p>Not for use by third-party applications. 2841 @hide 2842 --> 2843 <permission android:name="android.permission.INSTALL_SELF_UPDATES" 2844 android:protectionLevel="signature|privileged" /> 2845 2846 <!-- @SystemApi Allows an application to clear user data. 2847 <p>Not for use by third-party applications 2848 @hide 2849 --> 2850 <permission android:name="android.permission.CLEAR_APP_USER_DATA" 2851 android:protectionLevel="signature|installer" /> 2852 2853 <!-- @hide Allows an application to get the URI permissions 2854 granted to another application. 2855 <p>Not for use by third-party applications 2856 --> 2857 <permission android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS" 2858 android:protectionLevel="signature" /> 2859 2860 <!-- @hide Allows an application to clear the URI permissions 2861 granted to another application. 2862 <p>Not for use by third-party applications 2863 --> 2864 <permission 2865 android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS" 2866 android:protectionLevel="signature" /> 2867 2868 <!-- @hide 2869 Allows an application to change the status of Scoped Access Directory requests granted or 2870 rejected by the user. 2871 <p>This permission should <em>only</em> be requested by the platform 2872 settings app. This permission cannot be granted to third-party apps. 2873 <p>Protection level: signature 2874 --> 2875 <permission android:name="android.permission.MANAGE_SCOPED_ACCESS_DIRECTORY_PERMISSIONS" 2876 android:protectionLevel="signature" /> 2877 2878 <!-- @SystemApi Allows an application to delete cache files. 2879 <p>Not for use by third-party applications. --> 2880 <permission android:name="android.permission.DELETE_CACHE_FILES" 2881 android:protectionLevel="signature|privileged" /> 2882 2883 <!-- @SystemApi Allows an application to delete packages. 2884 <p>Not for use by third-party applications. 2885 <p>Starting in {@link android.os.Build.VERSION_CODES#N}, user confirmation is requested 2886 when the application deleting the package is not the same application that installed the 2887 package. --> 2888 <permission android:name="android.permission.DELETE_PACKAGES" 2889 android:protectionLevel="signature|privileged" /> 2890 2891 <!-- @SystemApi Allows an application to move location of installed package. 2892 @hide --> 2893 <permission android:name="android.permission.MOVE_PACKAGE" 2894 android:protectionLevel="signature|privileged" /> 2895 2896 <!-- @SystemApi Allows an application to change whether an application component (other than its own) is 2897 enabled or not. 2898 <p>Not for use by third-party applications. --> 2899 <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE" 2900 android:protectionLevel="signature|privileged" /> 2901 2902 <!-- @SystemApi Allows an application to grant specific permissions. 2903 @hide --> 2904 <permission android:name="android.permission.GRANT_RUNTIME_PERMISSIONS" 2905 android:protectionLevel="signature|installer|verifier" /> 2906 2907 <!-- @SystemApi Allows an app that has this permission and the permissions to install packages 2908 to request certain runtime permissions to be granted at installation. 2909 @hide --> 2910 <permission android:name="android.permission.INSTALL_GRANT_RUNTIME_PERMISSIONS" 2911 android:protectionLevel="signature|installer|verifier" /> 2912 2913 <!-- @SystemApi Allows an application to revoke specific permissions. 2914 @hide --> 2915 <permission android:name="android.permission.REVOKE_RUNTIME_PERMISSIONS" 2916 android:protectionLevel="signature|installer|verifier" /> 2917 2918 <!-- @hide Allows an application to observe permission changes. --> 2919 <permission android:name="android.permission.OBSERVE_GRANT_REVOKE_PERMISSIONS" 2920 android:protectionLevel="signature|privileged" /> 2921 2922 <!-- @SystemApi Allows an application to use SurfaceFlinger's low level features. 2923 <p>Not for use by third-party applications. 2924 @hide 2925 --> 2926 <permission android:name="android.permission.ACCESS_SURFACE_FLINGER" 2927 android:protectionLevel="signature" /> 2928 2929 <!-- @SystemApi Allows an application to take screen shots and more generally 2930 get access to the frame buffer data. 2931 <p>Not for use by third-party applications. --> 2932 <permission android:name="android.permission.READ_FRAME_BUFFER" 2933 android:protectionLevel="signature|privileged" /> 2934 2935 <!-- Allows an application to use InputFlinger's low level features. 2936 @hide --> 2937 <permission android:name="android.permission.ACCESS_INPUT_FLINGER" 2938 android:protectionLevel="signature" /> 2939 2940 <!-- Allows an application to disable/enable input devices. 2941 Could be used to prevent unwanted touch events 2942 on a touchscreen, for example during swimming or rain. 2943 @hide --> 2944 <permission android:name="android.permission.DISABLE_INPUT_DEVICE" 2945 android:protectionLevel="signature" /> 2946 2947 <!-- Allows an application to configure and connect to Wifi displays 2948 @hide --> 2949 <permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY" 2950 android:protectionLevel="signature" /> 2951 2952 <!-- Allows an application to control low-level features of Wifi displays 2953 such as opening an RTSP socket. This permission should only be used 2954 by the display manager. 2955 @hide --> 2956 <permission android:name="android.permission.CONTROL_WIFI_DISPLAY" 2957 android:protectionLevel="signature" /> 2958 2959 <!-- Allows an application to control the color modes set for displays system-wide. 2960 <p>Not for use by third-party applications.</p> 2961 @hide --> 2962 <permission android:name="android.permission.CONFIGURE_DISPLAY_COLOR_MODE" 2963 android:protectionLevel="signature" /> 2964 2965 <!-- Allows an application to collect usage infomation about brightness slider changes. 2966 <p>Not for use by third-party applications.</p> 2967 @hide 2968 @SystemApi --> 2969 <permission android:name="android.permission.BRIGHTNESS_SLIDER_USAGE" 2970 android:protectionLevel="signature|privileged|development" /> 2971 2972 <!-- Allows an application to modify the display brightness configuration 2973 @hide 2974 @SystemApi --> 2975 <permission android:name="android.permission.CONFIGURE_DISPLAY_BRIGHTNESS" 2976 android:protectionLevel="signature|privileged|development" /> 2977 2978 <!-- @SystemApi Allows an application to control VPN. 2979 <p>Not for use by third-party applications.</p> 2980 @hide --> 2981 <permission android:name="android.permission.CONTROL_VPN" 2982 android:protectionLevel="signature|privileged" /> 2983 <uses-permission android:name="android.permission.CONTROL_VPN" /> 2984 2985 <!-- @SystemApi Allows an application to capture audio output. 2986 <p>Not for use by third-party applications.</p> --> 2987 <permission android:name="android.permission.CAPTURE_AUDIO_OUTPUT" 2988 android:protectionLevel="signature|privileged" /> 2989 2990 <!-- @SystemApi Allows an application to capture audio for hotword detection. 2991 <p>Not for use by third-party applications.</p> 2992 @hide --> 2993 <permission android:name="android.permission.CAPTURE_AUDIO_HOTWORD" 2994 android:protectionLevel="signature|privileged" /> 2995 2996 <!-- @SystemApi Allows an application to modify audio routing and override policy decisions. 2997 <p>Not for use by third-party applications.</p> 2998 @hide --> 2999 <permission android:name="android.permission.MODIFY_AUDIO_ROUTING" 3000 android:protectionLevel="signature|privileged" /> 3001 3002 <!-- @SystemApi Allows an application to capture video output. 3003 <p>Not for use by third-party applications.</p> --> 3004 <permission android:name="android.permission.CAPTURE_VIDEO_OUTPUT" 3005 android:protectionLevel="signature|privileged" /> 3006 3007 <!-- @SystemApi Allows an application to capture secure video output. 3008 <p>Not for use by third-party applications.</p> --> 3009 <permission android:name="android.permission.CAPTURE_SECURE_VIDEO_OUTPUT" 3010 android:protectionLevel="signature|privileged" /> 3011 3012 <!-- @SystemApi Allows an application to know what content is playing and control its playback. 3013 <p>Not for use by third-party applications due to privacy of media consumption</p> --> 3014 <permission android:name="android.permission.MEDIA_CONTENT_CONTROL" 3015 android:protectionLevel="signature|privileged" /> 3016 3017 <!-- @SystemApi @hide Allows an application to set the volume key long-press listener. 3018 <p>When it's set, the application will receive the volume key long-press event 3019 instead of changing volume.</p> 3020 <p>Not for use by third-party applications</p> --> 3021 <permission android:name="android.permission.SET_VOLUME_KEY_LONG_PRESS_LISTENER" 3022 android:protectionLevel="signature|privileged|development" /> 3023 3024 <!-- @SystemApi @hide Allows an application to set media key event listener. 3025 <p>When it's set, the application will receive the media key event before 3026 any other media sessions. If the event is handled by the listener, other sessions 3027 cannot get the event.</p> 3028 <p>Not for use by third-party applications</p> --> 3029 <permission android:name="android.permission.SET_MEDIA_KEY_LISTENER" 3030 android:protectionLevel="signature|privileged|development" /> 3031 3032 <!-- @SystemApi Required to be able to disable the device (very dangerous!). 3033 <p>Not for use by third-party applications. 3034 @hide 3035 --> 3036 <permission android:name="android.permission.BRICK" 3037 android:protectionLevel="signature" /> 3038 3039 <!-- @SystemApi Required to be able to reboot the device. 3040 <p>Not for use by third-party applications. --> 3041 <permission android:name="android.permission.REBOOT" 3042 android:protectionLevel="signature|privileged" /> 3043 3044 <!-- @SystemApi Allows low-level access to power management. 3045 <p>Not for use by third-party applications. 3046 @hide 3047 --> 3048 <permission android:name="android.permission.DEVICE_POWER" 3049 android:protectionLevel="signature" /> 3050 3051 <!-- Allows access to the PowerManager.userActivity function. 3052 <p>Not for use by third-party applications. @hide @SystemApi --> 3053 <permission android:name="android.permission.USER_ACTIVITY" 3054 android:protectionLevel="signature|privileged" /> 3055 3056 <!-- @hide Allows low-level access to tun tap driver --> 3057 <permission android:name="android.permission.NET_TUNNELING" 3058 android:protectionLevel="signature" /> 3059 3060 <!-- Run as a manufacturer test application, running as the root user. 3061 Only available when the device is running in manufacturer test mode. 3062 <p>Not for use by third-party applications. 3063 --> 3064 <permission android:name="android.permission.FACTORY_TEST" 3065 android:protectionLevel="signature" /> 3066 3067 <!-- Allows an application to broadcast a notification that an application 3068 package has been removed. 3069 <p>Not for use by third-party applications. 3070 --> 3071 <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED" 3072 android:protectionLevel="signature" /> 3073 3074 <!-- Allows an application to broadcast an SMS receipt notification. 3075 <p>Not for use by third-party applications. 3076 --> 3077 <permission android:name="android.permission.BROADCAST_SMS" 3078 android:protectionLevel="signature" /> 3079 3080 <!-- Allows an application to broadcast a WAP PUSH receipt notification. 3081 <p>Not for use by third-party applications. 3082 --> 3083 <permission android:name="android.permission.BROADCAST_WAP_PUSH" 3084 android:protectionLevel="signature" /> 3085 3086 <!-- @SystemApi Allows an application to broadcast privileged networking requests. 3087 <p>Not for use by third-party applications. 3088 @hide 3089 @deprecated Use {@link android.Manifest.permission#REQUEST_NETWORK_SCORES} instead 3090 --> 3091 <permission android:name="android.permission.BROADCAST_NETWORK_PRIVILEGED" 3092 android:protectionLevel="signature|privileged" /> 3093 3094 <!-- @SystemApi Not for use by third-party applications. --> 3095 <permission android:name="android.permission.MASTER_CLEAR" 3096 android:protectionLevel="signature|privileged" /> 3097 3098 <!-- @SystemApi Allows an application to call any phone number, including emergency 3099 numbers, without going through the Dialer user interface for the user 3100 to confirm the call being placed. 3101 <p>Not for use by third-party applications. --> 3102 <permission android:name="android.permission.CALL_PRIVILEGED" 3103 android:protectionLevel="signature|privileged" /> 3104 3105 <!-- @SystemApi Allows an application to perform CDMA OTA provisioning @hide --> 3106 <permission android:name="android.permission.PERFORM_CDMA_PROVISIONING" 3107 android:protectionLevel="signature|privileged" /> 3108 3109 <!-- @SystemApi Allows an application to perform SIM Activation @hide --> 3110 <permission android:name="android.permission.PERFORM_SIM_ACTIVATION" 3111 android:protectionLevel="signature|privileged" /> 3112 3113 <!-- @SystemApi Allows enabling/disabling location update notifications from 3114 the radio. 3115 <p>Not for use by third-party applications. --> 3116 <permission android:name="android.permission.CONTROL_LOCATION_UPDATES" 3117 android:protectionLevel="signature|privileged" /> 3118 3119 <!-- @SystemApi Allows read/write access to the "properties" table in the checkin 3120 database, to change values that get uploaded. 3121 <p>Not for use by third-party applications. --> 3122 <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES" 3123 android:protectionLevel="signature|privileged" /> 3124 3125 <!-- @SystemApi Allows an application to collect component usage 3126 statistics 3127 <p>Declaring the permission implies intention to use the API and the user of the 3128 device can grant permission through the Settings application. --> 3129 <permission android:name="android.permission.PACKAGE_USAGE_STATS" 3130 android:protectionLevel="signature|privileged|development|appop" /> 3131 <uses-permission android:name="android.permission.PACKAGE_USAGE_STATS" /> 3132 3133 <!-- @hide @SystemApi Allows an application to change the app idle state of an app. 3134 <p>Not for use by third-party applications. --> 3135 <permission android:name="android.permission.CHANGE_APP_IDLE_STATE" 3136 android:protectionLevel="signature|privileged" /> 3137 3138 <!-- @hide @SystemApi Allows an application to temporarily whitelist an inactive app to 3139 access the network and acquire wakelocks. 3140 <p>Not for use by third-party applications. --> 3141 <permission android:name="android.permission.CHANGE_DEVICE_IDLE_TEMP_WHITELIST" 3142 android:protectionLevel="signature|privileged" /> 3143 3144 <!-- Permission an application must hold in order to use 3145 {@link android.provider.Settings#ACTION_REQUEST_IGNORE_BATTERY_OPTIMIZATIONS}. 3146 This is a normal permission: an app requesting it will always be granted the 3147 permission, without the user needing to approve or see it. --> 3148 <permission android:name="android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS" 3149 android:label="@string/permlab_requestIgnoreBatteryOptimizations" 3150 android:description="@string/permdesc_requestIgnoreBatteryOptimizations" 3151 android:protectionLevel="normal" /> 3152 3153 <!-- @SystemApi Allows an application to collect battery statistics --> 3154 <permission android:name="android.permission.BATTERY_STATS" 3155 android:protectionLevel="signature|privileged|development" /> 3156 3157 <!--Allows an application to manage statscompanion. 3158 <p>Not for use by third-party applications. 3159 @hide --> 3160 <permission android:name="android.permission.STATSCOMPANION" 3161 android:protectionLevel="signature" /> 3162 3163 <!-- @SystemApi Allows an application to control the backup and restore process. 3164 <p>Not for use by third-party applications. 3165 @hide pending API council --> 3166 <permission android:name="android.permission.BACKUP" 3167 android:protectionLevel="signature|privileged" /> 3168 3169 <!-- @SystemApi Allows application to manage RecoverableKeyStoreLoader. 3170 <p>Not for use by third-party applications. 3171 @hide --> 3172 <permission android:name="android.permission.RECOVER_KEYSTORE" 3173 android:protectionLevel="signature|privileged" /> 3174 3175 <!-- Allows a package to launch the secure full-backup confirmation UI. 3176 ONLY the system process may hold this permission. 3177 @hide --> 3178 <permission android:name="android.permission.CONFIRM_FULL_BACKUP" 3179 android:protectionLevel="signature" /> 3180 3181 <!-- @SystemApi Must be required by a {@link android.widget.RemoteViewsService}, 3182 to ensure that only the system can bind to it. --> 3183 <permission android:name="android.permission.BIND_REMOTEVIEWS" 3184 android:protectionLevel="signature|privileged" /> 3185 3186 <!-- @SystemApi Allows an application to tell the AppWidget service which application 3187 can access AppWidget's data. The normal user flow is that a user 3188 picks an AppWidget to go into a particular host, thereby giving that 3189 host application access to the private data from the AppWidget app. 3190 An application that has this permission should honor that contract. 3191 <p>Not for use by third-party applications. --> 3192 <permission android:name="android.permission.BIND_APPWIDGET" 3193 android:protectionLevel="signature|privileged" /> 3194 3195 <!-- @hide Allows sysui to manage user grants of slice permissions. --> 3196 <permission android:name="android.permission.MANAGE_SLICE_PERMISSIONS" 3197 android:protectionLevel="signature" /> 3198 3199 <!-- Allows an application to bind app's slices and get their 3200 content. This content will be surfaced to the 3201 user and not to leave the device. 3202 <p>Not for use by third-party applications.--> 3203 <permission android:name="android.permission.BIND_SLICE" 3204 android:protectionLevel="signature|privileged|development" /> 3205 3206 <!-- @SystemApi Private permission, to restrict who can bring up a dialog to add a new 3207 keyguard widget 3208 @hide --> 3209 <permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET" 3210 android:protectionLevel="signature|privileged" /> 3211 3212 <!-- @SystemApi Internal permission allowing an application to query/set which 3213 applications can bind AppWidgets. 3214 @hide --> 3215 <permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS" 3216 android:protectionLevel="signature|privileged" /> 3217 3218 <!-- Allows applications to change the background data setting. 3219 <p>Not for use by third-party applications. 3220 @hide pending API council --> 3221 <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING" 3222 android:protectionLevel="signature" /> 3223 3224 <!-- @SystemApi This permission can be used on content providers to allow the global 3225 search system to access their data. Typically it used when the 3226 provider has some permissions protecting it (which global search 3227 would not be expected to hold), and added as a read-only permission 3228 to the path in the provider where global search queries are 3229 performed. This permission can not be held by regular applications; 3230 it is used by applications to protect themselves from everyone else 3231 besides global search. --> 3232 <permission android:name="android.permission.GLOBAL_SEARCH" 3233 android:protectionLevel="signature|privileged" /> 3234 3235 <!-- Internal permission protecting access to the global search 3236 system: ensures that only the system can access the provider 3237 to perform queries (since this otherwise provides unrestricted 3238 access to a variety of content providers), and to write the 3239 search statistics (to keep applications from gaming the source 3240 ranking). 3241 @hide --> 3242 <permission android:name="android.permission.GLOBAL_SEARCH_CONTROL" 3243 android:protectionLevel="signature" /> 3244 3245 <!-- @SystemApi Internal permission to allows an application to read indexable data. 3246 @hide --> 3247 <permission android:name="android.permission.READ_SEARCH_INDEXABLES" 3248 android:protectionLevel="signature|privileged" /> 3249 3250 <!-- @SystemApi Internal permission to allows an application to bind to suggestion service. 3251 @hide --> 3252 <permission android:name="android.permission.BIND_SETTINGS_SUGGESTIONS_SERVICE" 3253 android:protectionLevel="signature" /> 3254 3255 <!-- @SystemApi Allows applications to set a live wallpaper. 3256 @hide XXX Change to signature once the picker is moved to its 3257 own apk as Ghod Intended. --> 3258 <permission android:name="android.permission.SET_WALLPAPER_COMPONENT" 3259 android:protectionLevel="signature|privileged" /> 3260 3261 <!-- @SystemApi Allows applications to read dream settings and dream state. 3262 @hide --> 3263 <permission android:name="android.permission.READ_DREAM_STATE" 3264 android:protectionLevel="signature|privileged" /> 3265 3266 <!-- @SystemApi Allows applications to write dream settings, and start or stop dreaming. 3267 @hide --> 3268 <permission android:name="android.permission.WRITE_DREAM_STATE" 3269 android:protectionLevel="signature|privileged" /> 3270 3271 <!-- @SystemApi Allow an application to read and write the cache partition. 3272 @hide --> 3273 <permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM" 3274 android:protectionLevel="signature|privileged" /> 3275 3276 <!-- Must be required by default container service so that only 3277 the system can bind to it and use it to copy 3278 protected data to secure containers or files 3279 accessible to the system. 3280 @hide --> 3281 <permission android:name="android.permission.COPY_PROTECTED_DATA" 3282 android:protectionLevel="signature" /> 3283 3284 <!-- @SystemApi Internal permission protecting access to the encryption methods 3285 @hide 3286 --> 3287 <permission android:name="android.permission.CRYPT_KEEPER" 3288 android:protectionLevel="signature|privileged" /> 3289 3290 <!-- @SystemApi Allows an application to read historical network usage for 3291 specific networks and applications. @hide --> 3292 <permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY" 3293 android:protectionLevel="signature|privileged" /> 3294 3295 <!-- Allows an application to manage network policies (such as warning and disable 3296 limits) and to define application-specific rules. @hide --> 3297 <permission android:name="android.permission.MANAGE_NETWORK_POLICY" 3298 android:protectionLevel="signature" /> 3299 3300 <!-- @SystemApi @hide @deprecated use UPDATE_DEVICE_STATS instead --> 3301 <permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING" 3302 android:protectionLevel="signature|privileged" /> 3303 3304 <!-- @SystemApi @hide Allows an application to manage carrier subscription plans. --> 3305 <permission android:name="android.permission.MANAGE_SUBSCRIPTION_PLANS" 3306 android:protectionLevel="signature|privileged" /> 3307 3308 <!-- C2DM permission. 3309 @hide Used internally. 3310 --> 3311 <permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE" 3312 android:protectionLevel="signature" /> 3313 <uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/> 3314 3315 <!-- @SystemApi @hide Package verifier needs to have this permission before the PackageManager will 3316 trust it to verify packages. 3317 --> 3318 <permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT" 3319 android:protectionLevel="signature|privileged" /> 3320 3321 <!-- Must be required by package verifier receiver, to ensure that only the 3322 system can interact with it. 3323 @hide 3324 --> 3325 <permission android:name="android.permission.BIND_PACKAGE_VERIFIER" 3326 android:protectionLevel="signature" /> 3327 3328 <!-- @SystemApi @hide Allows an application to mark other applications as harmful --> 3329 <permission android:name="android.permission.SET_HARMFUL_APP_WARNINGS" 3330 android:protectionLevel="signature|verifier" /> 3331 3332 <!-- @SystemApi @hide Intent filter verifier needs to have this permission before the 3333 PackageManager will trust it to verify intent filters. 3334 --> 3335 <permission android:name="android.permission.INTENT_FILTER_VERIFICATION_AGENT" 3336 android:protectionLevel="signature|privileged" /> 3337 3338 <!-- Must be required by intent filter verifier receiver, to ensure that only the 3339 system can interact with it. 3340 @hide 3341 --> 3342 <permission android:name="android.permission.BIND_INTENT_FILTER_VERIFIER" 3343 android:protectionLevel="signature" /> 3344 3345 <!-- @SystemApi Allows applications to access serial ports via the SerialManager. 3346 @hide --> 3347 <permission android:name="android.permission.SERIAL_PORT" 3348 android:protectionLevel="signature|privileged" /> 3349 3350 <!-- Allows the holder to access content providers from outside an ApplicationThread. 3351 This permission is enforced by the ActivityManagerService on the corresponding APIs, 3352 in particular ActivityManagerService#getContentProviderExternal(String) and 3353 ActivityManagerService#removeContentProviderExternal(String). 3354 @hide 3355 --> 3356 <permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY" 3357 android:protectionLevel="signature" /> 3358 3359 <!-- @SystemApi Allows an application to hold an UpdateLock, recommending that a headless 3360 OTA reboot *not* occur while the lock is held. 3361 @hide --> 3362 <permission android:name="android.permission.UPDATE_LOCK" 3363 android:protectionLevel="signature|privileged" /> 3364 3365 <!-- @SystemApi Allows an application to read the current set of notifications, including 3366 any metadata and intents attached. 3367 @hide --> 3368 <permission android:name="android.permission.ACCESS_NOTIFICATIONS" 3369 android:protectionLevel="signature|privileged|appop" /> 3370 3371 <!-- Marker permission for applications that wish to access notification policy. 3372 <p>Protection level: normal 3373 --> 3374 <permission android:name="android.permission.ACCESS_NOTIFICATION_POLICY" 3375 android:description="@string/permdesc_access_notification_policy" 3376 android:label="@string/permlab_access_notification_policy" 3377 android:protectionLevel="normal" /> 3378 3379 <!-- Allows modification of do not disturb rules and policies. Only allowed for system 3380 processes. 3381 @hide --> 3382 <permission android:name="android.permission.MANAGE_NOTIFICATIONS" 3383 android:protectionLevel="signature" /> 3384 3385 <!-- Allows notifications to be colorized 3386 <p>Not for use by third-party applications. @hide --> 3387 <permission android:name="android.permission.USE_COLORIZED_NOTIFICATIONS" 3388 android:protectionLevel="signature|setup" /> 3389 3390 <!-- Allows access to keyguard secure storage. Only allowed for system processes. 3391 @hide --> 3392 <permission android:name="android.permission.ACCESS_KEYGUARD_SECURE_STORAGE" 3393 android:protectionLevel="signature" /> 3394 3395 <!-- Allows managing (adding, removing) fingerprint templates. Reserved for the system. @hide --> 3396 <permission android:name="android.permission.MANAGE_FINGERPRINT" 3397 android:protectionLevel="signature|privileged" /> 3398 3399 <!-- Allows an app to reset fingerprint attempt counter. Reserved for the system. @hide --> 3400 <permission android:name="android.permission.RESET_FINGERPRINT_LOCKOUT" 3401 android:protectionLevel="signature" /> 3402 3403 <!-- Allows an application to control keyguard. Only allowed for system processes. 3404 @hide --> 3405 <permission android:name="android.permission.CONTROL_KEYGUARD" 3406 android:protectionLevel="signature" /> 3407 3408 <!-- Allows an application to listen to trust changes. Only allowed for system processes. 3409 @hide --> 3410 <permission android:name="android.permission.TRUST_LISTENER" 3411 android:protectionLevel="signature" /> 3412 3413 <!-- @SystemApi Allows an application to provide a trust agent. 3414 @hide For security reasons, this is a platform-only permission. --> 3415 <permission android:name="android.permission.PROVIDE_TRUST_AGENT" 3416 android:protectionLevel="signature|privileged" /> 3417 3418 <!-- @SystemApi Allows an application to show a message 3419 on the keyguard when asking to dismiss it. 3420 @hide For security reasons, this is a platform-only permission. --> 3421 <permission android:name="android.permission.SHOW_KEYGUARD_MESSAGE" 3422 android:protectionLevel="signature|privileged" /> 3423 3424 <!-- Allows an application to launch the trust agent settings activity. 3425 @hide --> 3426 <permission android:name="android.permission.LAUNCH_TRUST_AGENT_SETTINGS" 3427 android:protectionLevel="signature|privileged" /> 3428 3429 <!-- @SystemApi Must be required by an {@link 3430 android.service.trust.TrustAgentService}, 3431 to ensure that only the system can bind to it. 3432 @hide --> 3433 <permission android:name="android.permission.BIND_TRUST_AGENT" 3434 android:protectionLevel="signature" /> 3435 3436 <!-- Must be required by an {@link 3437 android.service.notification.NotificationListenerService}, 3438 to ensure that only the system can bind to it. 3439 <p>Protection level: signature 3440 --> 3441 <permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE" 3442 android:protectionLevel="signature" /> 3443 3444 <!-- @SystemApi Must be required by an {@link 3445 android.service.notification.NotificationAssistantService} to ensure that only the system 3446 can bind to it. 3447 <p>Protection level: signature 3448 @hide 3449 --> 3450 <permission android:name="android.permission.BIND_NOTIFICATION_ASSISTANT_SERVICE" 3451 android:protectionLevel="signature" /> 3452 3453 <!-- Must be required by a {@link 3454 android.service.chooser.ChooserTargetService}, to ensure that 3455 only the system can bind to it. 3456 <p>Protection level: signature 3457 --> 3458 <permission android:name="android.permission.BIND_CHOOSER_TARGET_SERVICE" 3459 android:protectionLevel="signature" /> 3460 3461 <!-- @SystemApi Must be held by services that extend 3462 {@link android.service.resolver.ResolverRankerService}. 3463 <p>Protection level: signature|privileged 3464 @hide 3465 --> 3466 <permission android:name="android.permission.PROVIDE_RESOLVER_RANKER_SERVICE" 3467 android:protectionLevel="signature|privileged" /> 3468 3469 <!-- @SystemApi Must be required by services that extend 3470 {@link android.service.resolver.ResolverRankerService}, to ensure that only the system can 3471 bind to them. 3472 <p>Protection level: signature 3473 @hide 3474 --> 3475 <permission android:name="android.permission.BIND_RESOLVER_RANKER_SERVICE" 3476 android:protectionLevel="signature" /> 3477 3478 <!-- Must be required by a {@link 3479 android.service.notification.ConditionProviderService}, 3480 to ensure that only the system can bind to it. 3481 <p>Protection level: signature 3482 --> 3483 <permission android:name="android.permission.BIND_CONDITION_PROVIDER_SERVICE" 3484 android:protectionLevel="signature" /> 3485 3486 <!-- Must be required by an {@link android.service.dreams.DreamService}, 3487 to ensure that only the system can bind to it. 3488 <p>Protection level: signature 3489 --> 3490 <permission android:name="android.permission.BIND_DREAM_SERVICE" 3491 android:protectionLevel="signature" /> 3492 3493 <!-- Must be required by an {@link android.app.usage.CacheQuotaService} to ensure that only the 3494 system can bind to it. 3495 @hide This is not a third-party API (intended for OEMs and system apps). 3496 --> 3497 <permission android:name="android.permission.BIND_CACHE_QUOTA_SERVICE" 3498 android:protectionLevel="signature" /> 3499 3500 <!-- @SystemApi Allows an application to call into a carrier setup flow. It is up to the 3501 carrier setup application to enforce that this permission is required 3502 @hide This is not a third-party API (intended for OEMs and system apps). --> 3503 <permission android:name="android.permission.INVOKE_CARRIER_SETUP" 3504 android:protectionLevel="signature|privileged" /> 3505 3506 <!-- @SystemApi Allows an application to listen for network condition observations. 3507 @hide This is not a third-party API (intended for system apps). --> 3508 <permission android:name="android.permission.ACCESS_NETWORK_CONDITIONS" 3509 android:protectionLevel="signature|privileged" /> 3510 3511 <!-- @SystemApi Allows an application to provision and access DRM certificates 3512 @hide This is not a third-party API (intended for system apps). --> 3513 <permission android:name="android.permission.ACCESS_DRM_CERTIFICATES" 3514 android:protectionLevel="signature|privileged" /> 3515 3516 <!-- Api Allows an application to manage media projection sessions. 3517 @hide This is not a third-party API (intended for system apps). --> 3518 <permission android:name="android.permission.MANAGE_MEDIA_PROJECTION" 3519 android:protectionLevel="signature" /> 3520 3521 <!-- @SystemApi Allows an application to read install sessions 3522 @hide This is not a third-party API (intended for system apps). --> 3523 <permission android:name="android.permission.READ_INSTALL_SESSIONS" 3524 android:label="@string/permlab_readInstallSessions" 3525 android:description="@string/permdesc_readInstallSessions" 3526 android:protectionLevel="normal"/> 3527 3528 <!-- @SystemApi Allows an application to remove DRM certificates 3529 @hide This is not a third-party API (intended for system apps). --> 3530 <permission android:name="android.permission.REMOVE_DRM_CERTIFICATES" 3531 android:protectionLevel="signature|privileged" /> 3532 3533 <!-- @deprecated Use {@link android.Manifest.permission#BIND_CARRIER_SERVICES} instead --> 3534 <permission android:name="android.permission.BIND_CARRIER_MESSAGING_SERVICE" 3535 android:protectionLevel="signature|privileged" /> 3536 3537 <!-- Allows an application to interact with the currently active 3538 {@link android.service.voice.VoiceInteractionService}. 3539 @hide --> 3540 <permission android:name="android.permission.ACCESS_VOICE_INTERACTION_SERVICE" 3541 android:protectionLevel="signature" /> 3542 3543 <!-- The system process that is allowed to bind to services in carrier apps will 3544 have this permission. Carrier apps should use this permission to protect 3545 their services that only the system is allowed to bind to. 3546 <p>Protection level: signature|privileged 3547 --> 3548 <permission android:name="android.permission.BIND_CARRIER_SERVICES" 3549 android:label="@string/permlab_bindCarrierServices" 3550 android:description="@string/permdesc_bindCarrierServices" 3551 android:protectionLevel="signature|privileged" /> 3552 3553 <!-- Allows an application to query whether DO_NOT_ASK_CREDENTIALS_ON_BOOT 3554 flag is set. 3555 @hide --> 3556 <permission android:name="android.permission.QUERY_DO_NOT_ASK_CREDENTIALS_ON_BOOT" 3557 android:protectionLevel="signature" /> 3558 3559 <!-- @SystemApi Allows applications to kill UIDs. 3560 <p>Not for use by third-party applications. 3561 @hide --> 3562 <permission android:name="android.permission.KILL_UID" 3563 android:protectionLevel="signature|installer" /> 3564 3565 <!-- @SystemApi Allows applications to read the local WiFi and Bluetooth MAC address. 3566 @hide --> 3567 <permission android:name="android.permission.LOCAL_MAC_ADDRESS" 3568 android:protectionLevel="signature|privileged" /> 3569 <uses-permission android:name="android.permission.LOCAL_MAC_ADDRESS"/> 3570 3571 <!-- @SystemApi Allows access to MAC addresses of WiFi and Bluetooth peer devices. 3572 @hide --> 3573 <permission android:name="android.permission.PEERS_MAC_ADDRESS" 3574 android:protectionLevel="signature|setup" /> 3575 3576 <!-- Allows the Nfc stack to dispatch Nfc messages to applications. Applications 3577 can use this permission to ensure incoming Nfc messages are from the Nfc stack 3578 and not simulated by another application. 3579 @hide --> 3580 <permission android:name="android.permission.DISPATCH_NFC_MESSAGE" 3581 android:protectionLevel="signature|privileged" /> 3582 3583 <!-- @SystemApi Allows changing day / night mode when system is configured with 3584 config_lockDayNightMode set to true. If requesting app does not have permission, 3585 it will be ignored. 3586 @hide --> 3587 <permission android:name="android.permission.MODIFY_DAY_NIGHT_MODE" 3588 android:protectionLevel="signature|privileged" /> 3589 3590 <!-- The system process is explicitly the only one allowed to launch the 3591 confirmation UI for full backup/restore --> 3592 <uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/> 3593 3594 <!-- Allows the holder to access and manage instant applications on the device. 3595 @hide --> 3596 <permission android:name="android.permission.ACCESS_INSTANT_APPS" 3597 android:protectionLevel="signature|installer|verifier" /> 3598 <uses-permission android:name="android.permission.ACCESS_INSTANT_APPS"/> 3599 3600 <!-- Allows the holder to view the instant applications on the device. 3601 @hide --> 3602 <permission android:name="android.permission.VIEW_INSTANT_APPS" 3603 android:protectionLevel="signature|preinstalled" /> 3604 3605 <!-- Allows the holder to manage whether the system can bind to services 3606 provided by instant apps. This permission is intended to protect 3607 test/development fucntionality and should be used only in such cases. 3608 @hide --> 3609 <permission android:name="android.permission.MANAGE_BIND_INSTANT_SERVICE" 3610 android:protectionLevel="signature" /> 3611 3612 <!-- Allows receiving the usage of media resource e.g. video/audio codec and 3613 graphic memory. 3614 @hide --> 3615 <permission android:name="android.permission.RECEIVE_MEDIA_RESOURCE_USAGE" 3616 android:protectionLevel="signature|privileged" /> 3617 3618 <!-- Must be required by system/priv apps when accessing the sound trigger 3619 APIs given by {@link SoundTriggerManager}. 3620 @hide <p>Not for use by third-party applications.</p> --> 3621 <permission android:name="android.permission.MANAGE_SOUND_TRIGGER" 3622 android:protectionLevel="signature|privileged" /> 3623 3624 <!-- @SystemApi Allows trusted applications to dispatch managed provisioning message to Managed 3625 Provisioning app. If requesting app does not have permission, it will be ignored. 3626 @hide --> 3627 <permission android:name="android.permission.DISPATCH_PROVISIONING_MESSAGE" 3628 android:protectionLevel="signature|privileged" /> 3629 3630 <!-- Allows the holder to read blocked numbers. See 3631 {@link android.provider.BlockedNumberContract}. 3632 @hide --> 3633 <permission android:name="android.permission.READ_BLOCKED_NUMBERS" 3634 android:protectionLevel="signature" /> 3635 3636 <!-- Allows the holder to write blocked numbers. See 3637 {@link android.provider.BlockedNumberContract}. 3638 @hide --> 3639 <permission android:name="android.permission.WRITE_BLOCKED_NUMBERS" 3640 android:protectionLevel="signature" /> 3641 3642 <!-- Must be required by an {@link android.service.vr.VrListenerService}, to ensure that only 3643 the system can bind to it. 3644 <p>Protection level: signature --> 3645 <permission android:name="android.permission.BIND_VR_LISTENER_SERVICE" 3646 android:protectionLevel="signature" /> 3647 3648 <!-- Must be required by system apps when accessing restricted VR APIs. 3649 @hide 3650 @SystemApi 3651 <p>Protection level: signature --> 3652 <permission android:name="android.permission.RESTRICTED_VR_ACCESS" 3653 android:protectionLevel="signature|preinstalled" /> 3654 3655 <!-- Required to make calls to {@link android.service.vr.IVrManager}. 3656 @hide --> 3657 <permission android:name="android.permission.ACCESS_VR_MANAGER" 3658 android:protectionLevel="signature" /> 3659 3660 <!-- Required to access VR-Mode state and state change events via {android.app.VrStateCallback} 3661 @hide --> 3662 <permission android:name="android.permission.ACCESS_VR_STATE" 3663 android:protectionLevel="signature|preinstalled" /> 3664 3665 <!-- Allows an application to whitelist tasks during lock task mode 3666 @hide <p>Not for use by third-party applications.</p> --> 3667 <permission android:name="android.permission.UPDATE_LOCK_TASK_PACKAGES" 3668 android:protectionLevel="signature|setup" /> 3669 3670 <!-- @SystemApi Allows an application to replace the app name displayed alongside notifications 3671 in the N-release and later. 3672 @hide <p>Not for use by third-party applications.</p> --> 3673 <permission android:name="android.permission.SUBSTITUTE_NOTIFICATION_APP_NAME" 3674 android:protectionLevel="signature|privileged" /> 3675 3676 <!-- @SystemApi Allows an application to show notifications before the device is provisioned. 3677 @hide <p>Not for use by third-party applications.</p> --> 3678 <permission android:name="android.permission.NOTIFICATION_DURING_SETUP" 3679 android:protectionLevel="signature|privileged" /> 3680 3681 <!-- @SystemApi Allows an application to manage auto-fill sessions. 3682 @hide <p>Not for use by third-party applications.</p> --> 3683 <permission android:name="android.permission.MANAGE_AUTO_FILL" 3684 android:protectionLevel="signature" /> 3685 3686 <!-- Allows an app to set the theme overlay in /vendor/overlay 3687 being used. 3688 @hide <p>Not for use by third-party applications.</p> --> 3689 <permission android:name="android.permission.MODIFY_THEME_OVERLAY" 3690 android:protectionLevel="signature" /> 3691 3692 <!-- Allows an instant app to create foreground services. --> 3693 <permission android:name="android.permission.INSTANT_APP_FOREGROUND_SERVICE" 3694 android:protectionLevel="signature|development|instant|appop" /> 3695 3696 <!-- @hide Allows system components to access all app shortcuts. --> 3697 <permission android:name="android.permission.ACCESS_SHORTCUTS" 3698 android:protectionLevel="signature" /> 3699 3700 <!-- @SystemApi Allows an application to read the runtime profiles of other apps. 3701 @hide <p>Not for use by third-party applications. --> 3702 <permission android:name="android.permission.READ_RUNTIME_PROFILES" 3703 android:protectionLevel="signature|privileged" /> 3704 3705 <!-- @hide Allows audio policy management. --> 3706 <permission android:name="android.permission.MANAGE_AUDIO_POLICY" 3707 android:protectionLevel="signature" /> 3708 3709 <!-- @SystemApi Allows an application to turn on / off quiet mode. 3710 @hide <p>Not for use by third-party applications. --> 3711 <permission android:name="android.permission.MODIFY_QUIET_MODE" 3712 android:protectionLevel="signature|privileged" /> 3713 3714 <!-- Allows internal management of the camera framework 3715 @hide --> 3716 <permission android:name="android.permission.MANAGE_CAMERA" 3717 android:protectionLevel="signature" /> 3718 3719 <!-- Allows an application to control remote animations. See 3720 {@link ActivityOptions#makeRemoteAnimation} 3721 @hide <p>Not for use by third-party applications. --> 3722 <permission android:name="android.permission.CONTROL_REMOTE_APP_TRANSITION_ANIMATIONS" 3723 android:protectionLevel="signature|privileged" /> 3724 3725 <application android:process="system" 3726 android:persistent="true" 3727 android:hasCode="false" 3728 android:label="@string/android_system_label" 3729 android:allowClearUserData="false" 3730 android:backupAgent="com.android.server.backup.SystemBackupAgent" 3731 android:killAfterRestore="false" 3732 android:icon="@drawable/ic_launcher_android" 3733 android:supportsRtl="true" 3734 android:theme="@style/Theme.DeviceDefault.Light.DarkActionBar" 3735 android:defaultToDeviceProtectedStorage="true" 3736 android:directBootAware="true"> 3737 <activity android:name="com.android.internal.app.ChooserActivity" 3738 android:theme="@style/Theme.DeviceDefault.Resolver" 3739 android:finishOnCloseSystemDialogs="true" 3740 android:excludeFromRecents="true" 3741 android:documentLaunchMode="never" 3742 android:relinquishTaskIdentity="true" 3743 android:configChanges="screenSize|smallestScreenSize|screenLayout|orientation|keyboard|keyboardHidden" 3744 android:process=":ui" 3745 android:visibleToInstantApps="true"> 3746 <intent-filter> 3747 <action android:name="android.intent.action.CHOOSER" /> 3748 <category android:name="android.intent.category.DEFAULT" /> 3749 <category android:name="android.intent.category.VOICE" /> 3750 </intent-filter> 3751 </activity> 3752 <activity android:name="com.android.internal.app.AccessibilityButtonChooserActivity" 3753 android:exported="false" 3754 android:theme="@style/Theme.DeviceDefault.Resolver" 3755 android:finishOnCloseSystemDialogs="true" 3756 android:excludeFromRecents="true" 3757 android:documentLaunchMode="never" 3758 android:relinquishTaskIdentity="true" 3759 android:configChanges="screenSize|smallestScreenSize|screenLayout|orientation|keyboard|keyboardHidden" 3760 android:process=":ui" 3761 android:visibleToInstantApps="true"> 3762 <intent-filter> 3763 <action android:name="com.android.internal.intent.action.CHOOSE_ACCESSIBILITY_BUTTON" /> 3764 <category android:name="android.intent.category.DEFAULT" /> 3765 </intent-filter> 3766 </activity> 3767 <activity android:name="com.android.internal.app.IntentForwarderActivity" 3768 android:finishOnCloseSystemDialogs="true" 3769 android:theme="@style/Theme.NoDisplay" 3770 android:excludeFromRecents="true" 3771 android:label="@string/user_owner_label" 3772 android:exported="true" 3773 > 3774 </activity> 3775 <activity-alias android:name="com.android.internal.app.ForwardIntentToParent" 3776 android:targetActivity="com.android.internal.app.IntentForwarderActivity" 3777 android:exported="true" 3778 android:label="@string/user_owner_label"> 3779 </activity-alias> 3780 <activity-alias android:name="com.android.internal.app.ForwardIntentToManagedProfile" 3781 android:targetActivity="com.android.internal.app.IntentForwarderActivity" 3782 android:icon="@drawable/ic_corp_badge" 3783 android:exported="true" 3784 android:label="@string/managed_profile_label"> 3785 </activity-alias> 3786 <activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity" 3787 android:theme="@style/Theme.DeviceDefault.Light.Dialog" 3788 android:label="@string/heavy_weight_switcher_title" 3789 android:finishOnCloseSystemDialogs="true" 3790 android:excludeFromRecents="true" 3791 android:process=":ui"> 3792 </activity> 3793 <activity android:name="com.android.internal.app.PlatLogoActivity" 3794 android:theme="@style/Theme.Wallpaper.NoTitleBar.Fullscreen" 3795 android:configChanges="orientation|keyboardHidden" 3796 android:process=":ui"> 3797 </activity> 3798 <activity android:name="com.android.internal.app.DisableCarModeActivity" 3799 android:theme="@style/Theme.NoDisplay" 3800 android:excludeFromRecents="true" 3801 android:process=":ui"> 3802 </activity> 3803 <activity android:name="com.android.internal.app.DumpHeapActivity" 3804 android:theme="@style/Theme.Translucent.NoTitleBar" 3805 android:label="@string/dump_heap_title" 3806 android:finishOnCloseSystemDialogs="true" 3807 android:noHistory="true" 3808 android:excludeFromRecents="true" 3809 android:process=":ui"> 3810 </activity> 3811 <provider android:name="com.android.server.am.DumpHeapProvider" 3812 android:authorities="com.android.server.heapdump" 3813 android:grantUriPermissions="true" 3814 android:multiprocess="false" 3815 android:singleUser="true" /> 3816 3817 <activity android:name="android.accounts.ChooseAccountActivity" 3818 android:excludeFromRecents="true" 3819 android:exported="true" 3820 android:theme="@style/Theme.DeviceDefault.Light.Dialog" 3821 android:label="@string/choose_account_label" 3822 android:process=":ui" 3823 android:visibleToInstantApps="true"> 3824 </activity> 3825 3826 <activity android:name="android.accounts.ChooseTypeAndAccountActivity" 3827 android:excludeFromRecents="true" 3828 android:exported="true" 3829 android:theme="@style/Theme.DeviceDefault.Light.Dialog" 3830 android:label="@string/choose_account_label" 3831 android:process=":ui" 3832 android:visibleToInstantApps="true"> 3833 </activity> 3834 3835 <activity android:name="android.accounts.ChooseAccountTypeActivity" 3836 android:excludeFromRecents="true" 3837 android:theme="@style/Theme.DeviceDefault.Light.Dialog" 3838 android:label="@string/choose_account_label" 3839 android:process=":ui" 3840 android:visibleToInstantApps="true"> 3841 </activity> 3842 3843 <activity android:name="android.accounts.CantAddAccountActivity" 3844 android:excludeFromRecents="true" 3845 android:exported="true" 3846 android:theme="@style/Theme.DeviceDefault.Light.Dialog.NoActionBar" 3847 android:process=":ui"> 3848 </activity> 3849 3850 <activity android:name="android.accounts.GrantCredentialsPermissionActivity" 3851 android:excludeFromRecents="true" 3852 android:exported="true" 3853 android:theme="@style/Theme.DeviceDefault.Light.DialogWhenLarge" 3854 android:process=":ui" 3855 android:visibleToInstantApps="true"> 3856 </activity> 3857 3858 <activity android:name="android.content.SyncActivityTooManyDeletes" 3859 android:theme="@style/Theme.DeviceDefault.Light.Dialog" 3860 android:label="@string/sync_too_many_deletes" 3861 android:process=":ui"> 3862 </activity> 3863 3864 <activity android:name="com.android.internal.app.ShutdownActivity" 3865 android:permission="android.permission.SHUTDOWN" 3866 android:theme="@style/Theme.NoDisplay" 3867 android:excludeFromRecents="true"> 3868 <intent-filter> 3869 <action android:name="com.android.internal.intent.action.REQUEST_SHUTDOWN" /> 3870 <category android:name="android.intent.category.DEFAULT" /> 3871 </intent-filter> 3872 <intent-filter> 3873 <action android:name="android.intent.action.REBOOT" /> 3874 <category android:name="android.intent.category.DEFAULT" /> 3875 </intent-filter> 3876 </activity> 3877 3878 <activity android:name="com.android.internal.app.NetInitiatedActivity" 3879 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert" 3880 android:excludeFromRecents="true" 3881 android:process=":ui"> 3882 </activity> 3883 3884 <activity android:name="com.android.internal.app.SystemUserHomeActivity" 3885 android:enabled="false" 3886 android:process=":ui" 3887 android:systemUserOnly="true" 3888 android:theme="@style/Theme.Translucent.NoTitleBar"> 3889 <intent-filter android:priority="-100"> 3890 <action android:name="android.intent.action.MAIN" /> 3891 <category android:name="android.intent.category.HOME" /> 3892 </intent-filter> 3893 </activity> 3894 3895 <!-- Activity to prompt user if it's ok to create a new user sandbox for a 3896 specified account. --> 3897 <activity android:name="com.android.internal.app.ConfirmUserCreationActivity" 3898 android:excludeFromRecents="true" 3899 android:process=":ui" 3900 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert"> 3901 <intent-filter android:priority="1000"> 3902 <action android:name="android.os.action.CREATE_USER" /> 3903 <category android:name="android.intent.category.DEFAULT" /> 3904 </intent-filter> 3905 </activity> 3906 3907 <activity android:name="com.android.internal.app.UnlaunchableAppActivity" 3908 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert" 3909 android:excludeFromRecents="true" 3910 android:process=":ui"> 3911 </activity> 3912 3913 <activity android:name="com.android.settings.notification.NotificationAccessConfirmationActivity" 3914 android:theme="@android:style/Theme.DeviceDefault.Light.Dialog.Alert" 3915 android:excludeFromRecents="true"> 3916 </activity> 3917 3918 <activity android:name="com.android.internal.app.HarmfulAppWarningActivity" 3919 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert" 3920 android:excludeFromRecents="true" 3921 android:process=":ui" 3922 android:exported="false"> 3923 </activity> 3924 3925 <receiver android:name="com.android.server.BootReceiver" 3926 android:systemUserOnly="true"> 3927 <intent-filter android:priority="1000"> 3928 <action android:name="android.intent.action.BOOT_COMPLETED" /> 3929 </intent-filter> 3930 </receiver> 3931 3932 <receiver android:name="com.android.server.updates.CertPinInstallReceiver" 3933 android:permission="android.permission.UPDATE_CONFIG"> 3934 <intent-filter> 3935 <action android:name="android.intent.action.UPDATE_PINS" /> 3936 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3937 </intent-filter> 3938 </receiver> 3939 3940 <receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver" 3941 android:permission="android.permission.UPDATE_CONFIG"> 3942 <intent-filter> 3943 <action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" /> 3944 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3945 </intent-filter> 3946 </receiver> 3947 3948 <receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver" 3949 android:permission="android.permission.UPDATE_CONFIG"> 3950 <intent-filter> 3951 <action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" /> 3952 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3953 </intent-filter> 3954 </receiver> 3955 3956 <receiver android:name="com.android.server.updates.NetworkWatchlistInstallReceiver" 3957 android:permission="android.permission.UPDATE_CONFIG"> 3958 <intent-filter> 3959 <action android:name="android.intent.action.UPDATE_NETWORK_WATCHLIST" /> 3960 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3961 </intent-filter> 3962 </receiver> 3963 3964 <receiver android:name="com.android.server.updates.ApnDbInstallReceiver" 3965 android:permission="android.permission.UPDATE_CONFIG"> 3966 <intent-filter> 3967 <action android:name="com.android.internal.intent.action.UPDATE_APN_DB" /> 3968 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3969 </intent-filter> 3970 </receiver> 3971 3972 <receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver" 3973 android:permission="android.permission.UPDATE_CONFIG"> 3974 <intent-filter> 3975 <action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" /> 3976 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3977 </intent-filter> 3978 </receiver> 3979 3980 <receiver android:name="com.android.server.updates.CertificateTransparencyLogInstallReceiver" 3981 android:permission="android.permission.UPDATE_CONFIG"> 3982 <intent-filter> 3983 <action android:name="android.intent.action.UPDATE_CT_LOGS" /> 3984 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3985 </intent-filter> 3986 </receiver> 3987 3988 <receiver android:name="com.android.server.updates.LangIdInstallReceiver" 3989 android:permission="android.permission.UPDATE_CONFIG"> 3990 <intent-filter> 3991 <action android:name="android.intent.action.UPDATE_LANG_ID" /> 3992 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3993 </intent-filter> 3994 </receiver> 3995 3996 <receiver android:name="com.android.server.updates.SmartSelectionInstallReceiver" 3997 android:permission="android.permission.UPDATE_CONFIG"> 3998 <intent-filter> 3999 <action android:name="android.intent.action.UPDATE_SMART_SELECTION" /> 4000 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 4001 </intent-filter> 4002 </receiver> 4003 4004 <receiver android:name="com.android.server.updates.CarrierIdInstallReceiver" 4005 android:permission="android.permission.UPDATE_CONFIG"> 4006 <intent-filter> 4007 <action android:name="com.android.internal.intent.action.UPDATE_CARRIER_ID_DB" /> 4008 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 4009 </intent-filter> 4010 </receiver> 4011 4012 <receiver android:name="com.android.server.MasterClearReceiver" 4013 android:permission="android.permission.MASTER_CLEAR"> 4014 <intent-filter 4015 android:priority="100" > 4016 <!-- For Checkin, Settings, etc.: action=FACTORY_RESET --> 4017 <action android:name="android.intent.action.FACTORY_RESET" /> 4018 <!-- As above until all the references to the deprecated MASTER_CLEAR get updated to 4019 FACTORY_RESET. --> 4020 <action android:name="android.intent.action.MASTER_CLEAR" /> 4021 4022 <!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR --> 4023 <action android:name="com.google.android.c2dm.intent.RECEIVE" /> 4024 <category android:name="android.intent.category.MASTER_CLEAR" /> 4025 </intent-filter> 4026 </receiver> 4027 4028 <receiver android:name="com.android.server.stats.StatsCompanionService$AnomalyAlarmReceiver" 4029 android:permission="android.permission.STATSCOMPANION" 4030 android:exported="false"> 4031 </receiver> 4032 4033 <receiver android:name="com.android.server.stats.StatsCompanionService$PollingAlarmReceiver" 4034 android:permission="android.permission.STATSCOMPANION" 4035 android:exported="false"> 4036 </receiver> 4037 4038 <service android:name="android.hardware.location.GeofenceHardwareService" 4039 android:permission="android.permission.LOCATION_HARDWARE" 4040 android:exported="false" /> 4041 4042 <service android:name="com.android.internal.backup.LocalTransportService" 4043 android:permission="android.permission.CONFIRM_FULL_BACKUP" 4044 android:exported="false"> 4045 <intent-filter> 4046 <action android:name="android.backup.TRANSPORT_HOST" /> 4047 </intent-filter> 4048 </service> 4049 4050 <service android:name="com.android.server.MountServiceIdler" 4051 android:exported="true" 4052 android:permission="android.permission.BIND_JOB_SERVICE" > 4053 </service> 4054 4055 <service android:name="com.android.server.backup.FullBackupJob" 4056 android:exported="true" 4057 android:permission="android.permission.BIND_JOB_SERVICE" > 4058 </service> 4059 4060 <service android:name="com.android.server.backup.KeyValueBackupJob" 4061 android:permission="android.permission.BIND_JOB_SERVICE" > 4062 </service> 4063 4064 <service android:name="com.android.server.content.SyncJobService" 4065 android:permission="android.permission.BIND_JOB_SERVICE" > 4066 </service> 4067 4068 <service android:name="com.android.server.pm.BackgroundDexOptService" 4069 android:exported="true" 4070 android:permission="android.permission.BIND_JOB_SERVICE"> 4071 </service> 4072 4073 <service android:name="com.android.server.PruneInstantAppsJobService" 4074 android:permission="android.permission.BIND_JOB_SERVICE" > 4075 </service> 4076 4077 <service android:name="com.android.server.storage.DiskStatsLoggingService" 4078 android:permission="android.permission.BIND_JOB_SERVICE" > 4079 </service> 4080 4081 <service android:name="com.android.server.PreloadsFileCacheExpirationJobService" 4082 android:permission="android.permission.BIND_JOB_SERVICE" > 4083 </service> 4084 4085 <service android:name="com.android.server.camera.CameraStatsJobService" 4086 android:permission="android.permission.BIND_JOB_SERVICE" > 4087 </service> 4088 4089 <service android:name="com.android.server.timezone.TimeZoneUpdateIdler" 4090 android:permission="android.permission.BIND_JOB_SERVICE" > 4091 </service> 4092 4093 <service android:name="com.android.server.net.watchlist.ReportWatchlistJobService" 4094 android:permission="android.permission.BIND_JOB_SERVICE" > 4095 </service> 4096 4097 <service android:name="com.android.server.display.BrightnessIdleJob" 4098 android:permission="android.permission.BIND_JOB_SERVICE" > 4099 </service> 4100</application> 4101 4102</manifest> 4103