AndroidManifest.xml revision 82f09bcf93cc2e0f9a363f40bf8a64bcaa6d8b9f
1<?xml version="1.0" encoding="utf-8"?>
2<!--
3/* //device/apps/common/AndroidManifest.xml
4**
5** Copyright 2006, The Android Open Source Project
6**
7** Licensed under the Apache License, Version 2.0 (the "License");
8** you may not use this file except in compliance with the License.
9** You may obtain a copy of the License at
10**
11**     http://www.apache.org/licenses/LICENSE-2.0
12**
13** Unless required by applicable law or agreed to in writing, software
14** distributed under the License is distributed on an "AS IS" BASIS,
15** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16** See the License for the specific language governing permissions and
17** limitations under the License.
18*/
19-->
20<manifest xmlns:android="http://schemas.android.com/apk/res/android"
21    package="android" coreApp="true" android:sharedUserId="android.uid.system"
22    android:sharedUserLabel="@string/android_system_label">
23
24    <!-- ================================================ -->
25    <!-- Special broadcasts that only the system can send -->
26    <!-- ================================================ -->
27    <eat-comment />
28
29    <protected-broadcast android:name="android.intent.action.SCREEN_OFF" />
30    <protected-broadcast android:name="android.intent.action.SCREEN_ON" />
31    <protected-broadcast android:name="android.intent.action.USER_PRESENT" />
32    <protected-broadcast android:name="android.intent.action.TIME_SET" />
33    <protected-broadcast android:name="android.intent.action.TIME_TICK" />
34    <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" />
35    <protected-broadcast android:name="android.intent.action.DATE_CHANGED" />
36    <protected-broadcast android:name="android.intent.action.PRE_BOOT_COMPLETED" />
37    <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" />
38    <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" />
39    <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" />
40    <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" />
41    <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" />
42    <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" />
43    <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" />
44    <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" />
45    <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" />
46    <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" />
47    <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" />
48    <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" />
49    <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" />
50    <protected-broadcast android:name="android.intent.action.PACKAGES_SUSPENDED" />
51    <protected-broadcast android:name="android.intent.action.PACKAGES_UNSUSPENDED" />
52    <protected-broadcast android:name="android.intent.action.ACTION_PREFERRED_ACTIVITY_CHANGED" />
53    <protected-broadcast android:name="android.intent.action.UID_REMOVED" />
54    <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" />
55    <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" />
56    <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" />
57    <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" />
58    <protected-broadcast android:name="android.intent.action.BATTERY_LOW" />
59    <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" />
60    <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" />
61    <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" />
62    <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" />
63    <protected-broadcast android:name="android.intent.action.CHARGING" />
64    <protected-broadcast android:name="android.intent.action.DISCHARGING" />
65    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" />
66    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" />
67    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" />
68    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" />
69    <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" />
70    <protected-broadcast android:name="android.intent.action.REBOOT" />
71    <protected-broadcast android:name="android.intent.action.DOCK_EVENT" />
72    <protected-broadcast android:name="android.intent.action.THERMAL_EVENT" />
73    <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" />
74    <protected-broadcast android:name="android.intent.action.USER_ADDED" />
75    <protected-broadcast android:name="android.intent.action.USER_REMOVED" />
76    <protected-broadcast android:name="android.intent.action.USER_STARTING" />
77    <protected-broadcast android:name="android.intent.action.USER_STARTED" />
78    <protected-broadcast android:name="android.intent.action.USER_STOPPING" />
79    <protected-broadcast android:name="android.intent.action.USER_STOPPED" />
80    <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" />
81    <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" />
82    <protected-broadcast android:name="android.intent.action.USER_SWITCHED" />
83    <protected-broadcast android:name="android.intent.action.USER_INITIALIZE" />
84    <protected-broadcast android:name="android.intent.action.INTENT_FILTER_NEEDS_VERIFICATION" />
85    <protected-broadcast android:name="android.intent.action.OVERLAY_ADDED" />
86    <protected-broadcast android:name="android.intent.action.OVERLAY_CHANGED" />
87    <protected-broadcast android:name="android.intent.action.OVERLAY_REMOVED" />
88    <protected-broadcast android:name="android.intent.action.OVERLAY_PRIORITY_CHANGED" />
89
90    <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED" />
91    <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGING" />
92    <protected-broadcast android:name="android.os.action.DEVICE_IDLE_MODE_CHANGED" />
93    <protected-broadcast android:name="android.os.action.POWER_SAVE_WHITELIST_CHANGED" />
94    <protected-broadcast android:name="android.os.action.POWER_SAVE_TEMP_WHITELIST_CHANGED" />
95    <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED_INTERNAL" />
96
97    <!-- @deprecated This is rarely used and will be phased out soon. -->
98    <protected-broadcast android:name="android.os.action.SCREEN_BRIGHTNESS_BOOST_CHANGED" />
99
100    <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" />
101    <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" />
102    <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" />
103    <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" />
104    <protected-broadcast android:name="android.app.action.NEXT_ALARM_CLOCK_CHANGED" />
105
106    <protected-broadcast android:name="android.app.action.BUGREPORT_SHARING_DECLINED" />
107    <protected-broadcast android:name="android.app.action.BUGREPORT_FAILED" />
108    <protected-broadcast android:name="android.app.action.BUGREPORT_SHARE" />
109    <protected-broadcast android:name="android.app.action.SHOW_DEVICE_MONITORING_DIALOG" />
110
111    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" />
112    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" />
113    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" />
114    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" />
115    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_HOST_RESTORED" />
116    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_RESTORED" />
117
118    <protected-broadcast android:name="android.os.action.SETTING_RESTORED" />
119
120    <protected-broadcast android:name="android.app.backup.intent.RUN" />
121    <protected-broadcast android:name="android.app.backup.intent.CLEAR" />
122    <protected-broadcast android:name="android.app.backup.intent.INIT" />
123
124    <protected-broadcast android:name="android.bluetooth.intent.DISCOVERABLE_TIMEOUT" />
125    <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" />
126    <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" />
127    <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" />
128    <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" />
129    <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" />
130    <protected-broadcast android:name="android.bluetooth.adapter.action.BLUETOOTH_ADDRESS_CHANGED" />
131    <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" />
132    <protected-broadcast android:name="android.bluetooth.device.action.UUID" />
133    <protected-broadcast android:name="android.bluetooth.device.action.MAS_INSTANCE" />
134    <protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" />
135    <protected-broadcast android:name="android.bluetooth.device.action.FOUND" />
136    <protected-broadcast android:name="android.bluetooth.device.action.DISAPPEARED" />
137    <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" />
138    <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" />
139    <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" />
140    <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" />
141    <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" />
142    <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" />
143    <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" />
144    <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" />
145    <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" />
146    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" />
147    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" />
148    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" />
149    <protected-broadcast android:name="android.bluetooth.device.action.SDP_RECORD" />
150    <protected-broadcast android:name="android.bluetooth.device.action.BATTERY_LEVEL_CHANGED" />
151    <protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" />
152    <protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" />
153    <protected-broadcast
154        android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" />
155    <protected-broadcast
156        android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" />
157    <protected-broadcast
158        android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" />
159    <protected-broadcast
160        android:name="android.bluetooth.headset.action.HF_INDICATORS_VALUE_CHANGED" />
161    <protected-broadcast
162        android:name="android.bluetooth.headset.profile.action.ACTIVE_DEVICE_CHANGED" />
163    <protected-broadcast
164        android:name="android.bluetooth.headsetclient.profile.action.CONNECTION_STATE_CHANGED" />
165    <protected-broadcast
166        android:name="android.bluetooth.headsetclient.profile.action.AUDIO_STATE_CHANGED" />
167    <protected-broadcast
168        android:name="android.bluetooth.headsetclient.profile.action.AG_EVENT" />
169    <protected-broadcast
170        android:name="android.bluetooth.headsetclient.profile.action.AG_CALL_CHANGED" />
171    <protected-broadcast
172        android:name="android.bluetooth.headsetclient.profile.action.RESULT" />
173    <protected-broadcast
174        android:name="android.bluetooth.headsetclient.profile.action.LAST_VTAG" />
175    <protected-broadcast
176        android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" />
177    <protected-broadcast
178        android:name="android.bluetooth.a2dp.profile.action.ACTIVE_DEVICE_CHANGED" />
179    <protected-broadcast
180        android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" />
181    <protected-broadcast
182        android:name="android.bluetooth.a2dp.profile.action.CODEC_CONFIG_CHANGED" />
183    <protected-broadcast
184        android:name="android.bluetooth.a2dp-sink.profile.action.CONNECTION_STATE_CHANGED" />
185    <protected-broadcast
186        android:name="android.bluetooth.a2dp-sink.profile.action.PLAYING_STATE_CHANGED" />
187    <protected-broadcast
188        android:name="android.bluetooth.a2dp-sink.profile.action.AUDIO_CONFIG_CHANGED" />
189    <protected-broadcast
190        android:name="android.bluetooth.avrcp-controller.profile.action.BROWSE_CONNECTION_STATE_CHANGED" />
191    <protected-broadcast
192        android:name="android.bluetooth.avrcp-controller.profile.action.CONNECTION_STATE_CHANGED" />
193    <protected-broadcast
194        android:name="android.bluetooth.avrcp-controller.profile.action.FOLDER_LIST" />
195    <protected-broadcast
196        android:name="android.bluetooth.avrcp-controller.profile.action.TRACK_EVENT" />
197    <protected-broadcast
198        android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" />
199    <protected-broadcast
200        android:name="android.bluetooth.input.profile.action.IDLE_TIME_CHANGED" />
201    <protected-broadcast
202        android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" />
203    <protected-broadcast
204        android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" />
205    <protected-broadcast
206        android:name="android.bluetooth.hiddevice.profile.action.CONNECTION_STATE_CHANGED" />
207    <protected-broadcast
208        android:name="android.bluetooth.map.profile.action.CONNECTION_STATE_CHANGED" />
209    <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.CONNECTION_STATE_CHANGED" />
210    <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_RECEIVED" />
211    <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_SENT_SUCCESSFULLY" />
212    <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_DELIVERED_SUCCESSFULLY" />
213    <protected-broadcast
214        android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_SENT" />
215    <protected-broadcast
216        android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_DELIVERY" />
217    <protected-broadcast
218        android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" />
219    <protected-broadcast android:name="android.bluetooth.pbap.profile.action.CONNECTION_STATE_CHANGED" />
220    <protected-broadcast android:name="android.bluetooth.pbapclient.profile.action.CONNECTION_STATE_CHANGED" />
221    <protected-broadcast android:name="android.bluetooth.sap.profile.action.CONNECTION_STATE_CHANGED" />
222    <protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" />
223    <protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" />
224    <protected-broadcast android:name="android.btopp.intent.action.LIST" />
225    <protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" />
226    <protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" />
227    <protected-broadcast android:name="android.btopp.intent.action.CONFIRM" />
228    <protected-broadcast android:name="android.btopp.intent.action.HIDE" />
229    <protected-broadcast android:name="android.btopp.intent.action.RETRY" />
230    <protected-broadcast android:name="android.btopp.intent.action.OPEN" />
231    <protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" />
232    <protected-broadcast android:name="android.btopp.intent.action.TRANSFER_COMPLETE" />
233    <protected-broadcast android:name="android.btopp.intent.action.ACCEPT" />
234    <protected-broadcast android:name="android.btopp.intent.action.DECLINE" />
235    <protected-broadcast android:name="com.android.bluetooth.gatt.REFRESH_BATCHED_SCAN" />
236    <protected-broadcast android:name="com.android.bluetooth.pbap.authchall" />
237    <protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" />
238    <protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" />
239    <protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" />
240    <protected-broadcast android:name="com.android.bluetooth.sap.USER_CONFIRM_TIMEOUT" />
241    <protected-broadcast android:name="com.android.bluetooth.sap.action.DISCONNECT_ACTION" />
242
243    <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" />
244
245    <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" />
246    <protected-broadcast android:name="android.hardware.usb.action.USB_PORT_CHANGED" />
247    <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" />
248    <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_DETACHED" />
249    <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" />
250    <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" />
251
252    <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" />
253    <protected-broadcast android:name="android.media.action.HDMI_AUDIO_PLUG" />
254
255    <protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" />
256    <protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" />
257    <protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" />
258    <protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" />
259    <protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" />
260    <protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" />
261    <protected-broadcast android:name="android.media.MASTER_MONO_CHANGED_ACTION" />
262    <protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" />
263    <protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" />
264
265    <protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" />
266    <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" />
267    <protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" />
268    <protected-broadcast android:name="android.intent.action.MEDIA_NOFS" />
269    <protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" />
270    <protected-broadcast android:name="android.intent.action.MEDIA_SHARED" />
271    <protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" />
272    <protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" />
273    <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" />
274    <protected-broadcast android:name="android.intent.action.MEDIA_EJECT" />
275
276    <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL" />
277    <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" />
278    <!-- @deprecated.  Only {@link android.net.ConnectivityManager.CONNECTIVITY_ACTION} is sent. -->
279    <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" />
280    <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" />
281    <protected-broadcast android:name="android.net.conn.RESTRICT_BACKGROUND_CHANGED" />
282    <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" />
283    <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" />
284
285    <protected-broadcast android:name="android.net.nsd.STATE_CHANGED" />
286
287    <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" />
288    <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" />
289    <protected-broadcast android:name="com.android.nfc.action.LLCP_UP" />
290    <protected-broadcast android:name="com.android.nfc.action.LLCP_DOWN" />
291    <protected-broadcast android:name="com.android.nfc.cardemulation.action.CLOSE_TAP_DIALOG" />
292    <protected-broadcast android:name="com.android.nfc.handover.action.ALLOW_CONNECT" />
293    <protected-broadcast android:name="com.android.nfc.handover.action.DENY_CONNECT" />
294    <protected-broadcast android:name="com.android.nfc.handover.action.TIMEOUT_CONNECT" />
295    <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" />
296    <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" />
297    <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" />
298    <!-- For NFC to BT handover -->
299    <protected-broadcast android:name="android.btopp.intent.action.WHITELIST_DEVICE" />
300    <protected-broadcast android:name="android.btopp.intent.action.STOP_HANDOVER_TRANSFER" />
301    <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND" />
302    <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND_MULTIPLE" />
303    <protected-broadcast android:name="com.android.nfc.handover.action.CANCEL_HANDOVER_TRANSFER" />
304
305    <protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" />
306    <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" />
307
308    <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" />
309
310    <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" />
311    <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" />
312    <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" />
313
314    <protected-broadcast android:name="com.android.server.stats.action.TRIGGER_COLLECTION" />
315
316    <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" />
317    <protected-broadcast android:name="com.android.server.WifiManager.action.START_PNO" />
318    <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" />
319    <protected-broadcast android:name="com.android.server.WifiManager.action.DEVICE_IDLE" />
320    <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_ACCEPTED" />
321    <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_DECLINED" />
322    <protected-broadcast android:name="com.android.internal.action.EUICC_FACTORY_RESET" />
323    <protected-broadcast android:name="com.android.server.usb.ACTION_OPEN_IN_APPS" />
324    <protected-broadcast android:name="com.android.server.am.DELETE_DUMPHEAP" />
325    <protected-broadcast android:name="com.android.server.net.action.SNOOZE_WARNING" />
326    <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.USER_DISMISSED_NOTIFICATION" />
327    <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.CONNECT_TO_NETWORK" />
328    <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.PICK_WIFI_NETWORK" />
329    <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.PICK_NETWORK_AFTER_FAILURE" />
330    <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" />
331    <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" />
332    <protected-broadcast android:name="android.net.wifi.WIFI_CREDENTIAL_CHANGED" />
333    <protected-broadcast android:name="android.net.wifi.WIFI_SCAN_AVAILABLE" />
334    <protected-broadcast android:name="android.net.wifi.aware.action.WIFI_AWARE_STATE_CHANGED" />
335    <protected-broadcast android:name="android.net.wifi.rtt.action.WIFI_RTT_STATE_CHANGED" />
336    <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" />
337    <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" />
338    <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" />
339    <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" />
340    <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" />
341    <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_DEAUTH_IMMINENT" />
342    <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_ICON" />
343    <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_OSU_PROVIDERS_LIST" />
344    <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_SUBSCRIPTION_REMEDIATION" />
345    <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" />
346    <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" />
347    <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" />
348    <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" />
349    <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" />
350    <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" />
351    <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" />
352    <protected-broadcast android:name="android.net.wifi.p2p.PERSISTENT_GROUPS_CHANGED" />
353    <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" />
354    <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" />
355    <protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" />
356    <protected-broadcast
357            android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" />
358    <protected-broadcast android:name="android.net.scoring.SCORE_NETWORKS" />
359    <protected-broadcast android:name="android.net.scoring.SCORER_CHANGED" />
360    <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" />
361    <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" />
362    <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" />
363    <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" />
364    <protected-broadcast android:name="android.intent.action.APPLICATION_RESTRICTIONS_CHANGED" />
365
366    <!-- Legacy -->
367    <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" />
368    <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" />
369
370    <protected-broadcast android:name="com.android.server.ACTION_TRIGGER_IDLE" />
371
372    <protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" />
373
374    <protected-broadcast android:name="android.intent.action.PHONE_STATE" />
375
376    <protected-broadcast android:name="android.intent.action.SUB_DEFAULT_CHANGED" />
377
378    <protected-broadcast android:name="android.location.GPS_ENABLED_CHANGE" />
379    <protected-broadcast android:name="android.location.PROVIDERS_CHANGED" />
380    <protected-broadcast android:name="android.location.MODE_CHANGED" />
381    <protected-broadcast android:name="android.location.GPS_FIX_CHANGE" />
382    <protected-broadcast android:name="android.net.proxy.PAC_REFRESH" />
383
384    <protected-broadcast android:name="android.telecom.action.DEFAULT_DIALER_CHANGED" />
385    <protected-broadcast android:name="android.provider.action.DEFAULT_SMS_PACKAGE_CHANGED" />
386    <protected-broadcast android:name="android.intent.action.CONTENT_CHANGED" />
387    <protected-broadcast android:name="android.provider.Telephony.MMS_DOWNLOADED" />
388
389    <protected-broadcast
390        android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" />
391
392    <!-- Defined in RestrictionsManager -->
393    <protected-broadcast
394        android:name="android.intent.action.PERMISSION_RESPONSE_RECEIVED" />
395    <!-- Defined in RestrictionsManager -->
396
397    <protected-broadcast android:name="android.intent.action.REQUEST_PERMISSION" />
398    <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_STARTED" />
399    <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
400    <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_PROGRESS" />
401    <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
402
403    <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_DATA_SUBSCRIPTION_CHANGED" />
404    <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_VOICE_SUBSCRIPTION_CHANGED" />
405    <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_CONTENT_CHANGE" />
406    <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_RECORD_UPDATED" />
407
408    <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_DONE" />
409    <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_FAILED" />
410
411    <protected-broadcast android:name="android.internal.policy.action.BURN_IN_PROTECTION" />
412    <protected-broadcast android:name="android.app.action.SYSTEM_UPDATE_POLICY_CHANGED" />
413    <protected-broadcast android:name="android.app.action.DEVICE_OWNER_CHANGED" />
414    <protected-broadcast android:name="android.app.action.MANAGED_USER_CREATED" />
415
416    <!-- Added in N -->
417    <protected-broadcast android:name="android.intent.action.ANR" />
418    <protected-broadcast android:name="android.intent.action.CALL" />
419    <protected-broadcast android:name="android.intent.action.CALL_PRIVILEGED" />
420    <protected-broadcast android:name="android.intent.action.DROPBOX_ENTRY_ADDED" />
421    <protected-broadcast android:name="android.intent.action.INPUT_METHOD_CHANGED" />
422    <protected-broadcast android:name="android.intent.action.internal_sim_state_changed" />
423    <protected-broadcast android:name="android.intent.action.LOCKED_BOOT_COMPLETED" />
424    <protected-broadcast android:name="android.intent.action.PRECISE_CALL_STATE" />
425    <protected-broadcast android:name="android.intent.action.PRECISE_DATA_CONNECTION_STATE_CHANGED" />
426    <protected-broadcast android:name="android.intent.action.SUBSCRIPTION_PHONE_STATE" />
427    <protected-broadcast android:name="android.intent.action.USER_INFO_CHANGED" />
428    <protected-broadcast android:name="android.intent.action.USER_UNLOCKED" />
429    <protected-broadcast android:name="android.intent.action.WALLPAPER_CHANGED" />
430
431    <protected-broadcast android:name="android.app.action.DEVICE_POLICY_MANAGER_STATE_CHANGED" />
432    <protected-broadcast android:name="android.app.action.CHOOSE_PRIVATE_KEY_ALIAS" />
433    <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLED" />
434    <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLE_REQUESTED" />
435    <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_ENABLED" />
436    <protected-broadcast android:name="android.app.action.LOCK_TASK_ENTERING" />
437    <protected-broadcast android:name="android.app.action.LOCK_TASK_EXITING" />
438    <protected-broadcast android:name="android.app.action.NOTIFY_PENDING_SYSTEM_UPDATE" />
439    <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_CHANGED" />
440    <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_EXPIRING" />
441    <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_FAILED" />
442    <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_SUCCEEDED" />
443    <protected-broadcast android:name="com.android.server.ACTION_EXPIRED_PASSWORD_NOTIFICATION" />
444
445    <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_ADDED" />
446    <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNLOCKED" />
447    <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_REMOVED" />
448
449    <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_STATE_CHANGED" />
450    <protected-broadcast android:name="com.android.bluetooth.map.USER_CONFIRM_TIMEOUT" />
451    <protected-broadcast android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_SENT" />
452    <protected-broadcast android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_DELIVERY" />
453    <protected-broadcast android:name="android.content.jobscheduler.JOB_DELAY_EXPIRED" />
454    <protected-broadcast android:name="android.content.syncmanager.SYNC_ALARM" />
455    <protected-broadcast android:name="android.media.INTERNAL_RINGER_MODE_CHANGED_ACTION" />
456    <protected-broadcast android:name="android.media.STREAM_DEVICES_CHANGED_ACTION" />
457    <protected-broadcast android:name="android.media.STREAM_MUTE_CHANGED_ACTION" />
458    <protected-broadcast android:name="android.net.sip.SIP_SERVICE_UP" />
459    <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" />
460    <protected-broadcast android:name="android.os.action.CHARGING" />
461    <protected-broadcast android:name="android.os.action.DISCHARGING" />
462    <protected-broadcast android:name="android.search.action.SEARCHABLES_CHANGED" />
463    <protected-broadcast android:name="android.security.STORAGE_CHANGED" />
464    <protected-broadcast android:name="android.security.action.TRUST_STORE_CHANGED" />
465    <protected-broadcast android:name="android.security.action.KEYCHAIN_CHANGED" />
466    <protected-broadcast android:name="android.security.action.KEY_ACCESS_CHANGED" />
467    <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_REGISTERED" />
468    <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_UNREGISTERED" />
469    <protected-broadcast android:name="android.telecom.action.SHOW_MISSED_CALLS_NOTIFICATION" />
470    <protected-broadcast android:name="android.telephony.action.CARRIER_CONFIG_CHANGED" />
471    <protected-broadcast android:name="android.telephony.action.DEFAULT_SUBSCRIPTION_CHANGED" />
472    <protected-broadcast android:name="android.telephony.action.DEFAULT_SMS_SUBSCRIPTION_CHANGED" />
473    <protected-broadcast android:name="android.telephony.action.SHOW_VOICEMAIL_NOTIFICATION" />
474
475    <protected-broadcast android:name="com.android.bluetooth.btservice.action.ALARM_WAKEUP" />
476    <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_POLL" />
477    <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_UPDATED" />
478    <protected-broadcast android:name="com.android.server.NetworkTimeUpdateService.action.POLL" />
479    <protected-broadcast android:name="com.android.server.telecom.intent.action.CALLS_ADD_ENTRY" />
480    <protected-broadcast android:name="com.android.settings.location.MODE_CHANGING" />
481    <protected-broadcast android:name="com.android.settings.bluetooth.ACTION_DISMISS_PAIRING" />
482
483    <protected-broadcast android:name="NotificationManagerService.TIMEOUT" />
484    <protected-broadcast android:name="ScheduleConditionProvider.EVALUATE" />
485    <protected-broadcast android:name="EventConditionProvider.EVALUATE" />
486    <protected-broadcast android:name="SnoozeHelper.EVALUATE" />
487    <protected-broadcast android:name="wifi_scan_available" />
488
489    <protected-broadcast android:name="action.cne.started" />
490    <protected-broadcast android:name="android.content.jobscheduler.JOB_DEADLINE_EXPIRED" />
491    <protected-broadcast android:name="android.intent.action.ACTION_UNSOL_RESPONSE_OEM_HOOK_RAW" />
492    <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_SUPL" />
493    <protected-broadcast android:name="android.os.action.LIGHT_DEVICE_IDLE_MODE_CHANGED" />
494    <protected-broadcast android:name="android.os.storage.action.VOLUME_STATE_CHANGED" />
495    <protected-broadcast android:name="android.os.storage.action.DISK_SCANNED" />
496    <protected-broadcast android:name="com.android.server.action.UPDATE_TWILIGHT_STATE" />
497    <protected-broadcast android:name="com.android.server.action.RESET_TWILIGHT_AUTO" />
498    <protected-broadcast android:name="com.android.server.device_idle.STEP_IDLE_STATE" />
499    <protected-broadcast android:name="com.android.server.device_idle.STEP_LIGHT_IDLE_STATE" />
500    <protected-broadcast android:name="com.android.server.Wifi.action.TOGGLE_PNO" />
501    <protected-broadcast android:name="intent.action.ACTION_RF_BAND_INFO" />
502    <protected-broadcast android:name="android.intent.action.MEDIA_RESOURCE_GRANTED" />
503    <protected-broadcast android:name="android.app.action.NETWORK_LOGS_AVAILABLE" />
504    <protected-broadcast android:name="android.app.action.SECURITY_LOGS_AVAILABLE" />
505
506    <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED" />
507    <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED_INTERNAL" />
508    <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_CHANGED" />
509    <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_ACCESS_GRANTED_CHANGED" />
510    <protected-broadcast android:name="android.os.action.ACTION_EFFECTS_SUPPRESSOR_CHANGED" />
511    <protected-broadcast android:name="android.app.action.NOTIFICATION_CHANNEL_BLOCK_STATE_CHANGED" />
512    <protected-broadcast android:name="android.app.action.NOTIFICATION_CHANNEL_GROUP_BLOCK_STATE_CHANGED" />
513
514    <protected-broadcast android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS" />
515    <protected-broadcast android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS" />
516
517    <protected-broadcast android:name="android.intent.action.DYNAMIC_SENSOR_CHANGED" />
518
519    <protected-broadcast android:name="android.intent.action.ACTION_RADIO_OFF" />
520
521    <protected-broadcast android:name="android.accounts.LOGIN_ACCOUNTS_CHANGED" />
522    <protected-broadcast android:name="android.accounts.action.ACCOUNT_REMOVED" />
523    <protected-broadcast android:name="android.accounts.action.VISIBLE_ACCOUNTS_CHANGED" />
524
525    <protected-broadcast android:name="com.android.sync.SYNC_CONN_STATUS_CHANGED" />
526
527    <protected-broadcast android:name="com.android.phone.SIP_INCOMING_CALL" />
528    <protected-broadcast android:name="com.android.phone.SIP_ADD_PHONE" />
529    <protected-broadcast android:name="com.android.phone.SIP_REMOVE_PHONE" />
530    <protected-broadcast android:name="com.android.phone.SIP_CALL_OPTION_CHANGED" />
531
532    <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_CONNECTED" />
533    <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_DISCONNECTED" />
534
535    <protected-broadcast android:name="android.bluetooth.input.profile.action.HANDSHAKE" />
536    <protected-broadcast android:name="android.bluetooth.input.profile.action.REPORT" />
537
538    <protected-broadcast android:name="android.intent.action.TWILIGHT_CHANGED" />
539
540    <protected-broadcast android:name="com.android.server.fingerprint.ACTION_LOCKOUT_RESET" />
541    <protected-broadcast android:name="android.net.wifi.PASSPOINT_ICON_RECEIVED" />
542    <protected-broadcast android:name="com.android.server.notification.CountdownConditionProvider" />
543
544    <protected-broadcast android:name="com.android.internal.location.ALARM_WAKEUP" />
545    <protected-broadcast android:name="com.android.internal.location.ALARM_TIMEOUT" />
546    <protected-broadcast android:name="android.intent.action.GLOBAL_BUTTON" />
547
548    <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_AVAILABLE" />
549    <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNAVAILABLE" />
550    <protected-broadcast android:name="com.android.server.pm.DISABLE_QUIET_MODE_AFTER_UNLOCK" />
551
552    <protected-broadcast android:name="com.android.server.retaildemo.ACTION_RESET_DEMO" />
553
554    <protected-broadcast android:name="android.intent.action.DEVICE_LOCKED_CHANGED" />
555
556    <!-- Added in O -->
557    <protected-broadcast android:name="android.app.action.APPLICATION_DELEGATION_SCOPES_CHANGED" />
558    <protected-broadcast android:name="com.android.server.wm.ACTION_REVOKE_SYSTEM_ALERT_WINDOW_PERMISSION" />
559    <protected-broadcast android:name="android.media.tv.action.PARENTAL_CONTROLS_ENABLED_CHANGED" />
560
561    <protected-broadcast android:name="android.content.pm.action.SESSION_COMMITTED" />
562    <protected-broadcast android:name="android.os.action.USER_RESTRICTIONS_CHANGED" />
563    <protected-broadcast android:name="android.media.tv.action.PREVIEW_PROGRAM_ADDED_TO_WATCH_NEXT" />
564    <protected-broadcast android:name="android.media.tv.action.PREVIEW_PROGRAM_BROWSABLE_DISABLED" />
565    <protected-broadcast android:name="android.media.tv.action.WATCH_NEXT_PROGRAM_BROWSABLE_DISABLED" />
566    <protected-broadcast android:name="android.media.tv.action.CHANNEL_BROWSABLE_REQUESTED" />
567    <protected-broadcast android:name="com.android.server.InputMethodManagerService.SHOW_INPUT_METHOD_PICKER" />
568
569    <!-- Made protected in P (was introduced in JB-MR2) -->
570    <protected-broadcast android:name="android.intent.action.GET_RESTRICTION_ENTRIES" />
571    <protected-broadcast android:name="android.telephony.euicc.action.OTA_STATUS_CHANGED" />
572
573    <!-- Added in P -->
574    <protected-broadcast android:name="android.app.action.PROFILE_OWNER_CHANGED" />
575    <protected-broadcast android:name="android.app.action.TRANSFER_OWNERSHIP_COMPLETE" />
576    <protected-broadcast android:name="android.app.action.DATA_SHARING_RESTRICTION_CHANGED" />
577
578    <!-- ====================================================================== -->
579    <!--                          RUNTIME PERMISSIONS                           -->
580    <!-- ====================================================================== -->
581    <eat-comment />
582
583    <!-- ====================================================================== -->
584    <!-- Permissions for accessing user's contacts including personal profile   -->
585    <!-- ====================================================================== -->
586    <eat-comment />
587
588    <!-- Used for runtime permissions related to contacts and profiles on this
589        device. -->
590    <permission-group android:name="android.permission-group.CONTACTS"
591        android:icon="@drawable/perm_group_contacts"
592        android:label="@string/permgrouplab_contacts"
593        android:description="@string/permgroupdesc_contacts"
594        android:request="@string/permgrouprequest_contacts"
595        android:priority="100" />
596
597    <!-- Allows an application to read the user's contacts data.
598        <p>Protection level: dangerous
599    -->
600    <permission android:name="android.permission.READ_CONTACTS"
601        android:permissionGroup="android.permission-group.CONTACTS"
602        android:label="@string/permlab_readContacts"
603        android:description="@string/permdesc_readContacts"
604        android:protectionLevel="dangerous" />
605
606    <!-- Allows an application to write the user's contacts data.
607         <p>Protection level: dangerous
608    -->
609    <permission android:name="android.permission.WRITE_CONTACTS"
610        android:permissionGroup="android.permission-group.CONTACTS"
611        android:label="@string/permlab_writeContacts"
612        android:description="@string/permdesc_writeContacts"
613        android:protectionLevel="dangerous" />
614
615    <!-- ====================================================================== -->
616    <!-- Permissions for accessing user's calendar                              -->
617    <!-- ====================================================================== -->
618    <eat-comment />
619
620    <!-- Used for runtime permissions related to user's calendar. -->
621    <permission-group android:name="android.permission-group.CALENDAR"
622        android:icon="@drawable/perm_group_calendar"
623        android:label="@string/permgrouplab_calendar"
624        android:description="@string/permgroupdesc_calendar"
625        android:request="@string/permgrouprequest_calendar"
626        android:priority="200" />
627
628    <!-- Allows an application to read the user's calendar data.
629         <p>Protection level: dangerous
630    -->
631    <permission android:name="android.permission.READ_CALENDAR"
632        android:permissionGroup="android.permission-group.CALENDAR"
633        android:label="@string/permlab_readCalendar"
634        android:description="@string/permdesc_readCalendar"
635        android:protectionLevel="dangerous" />
636
637    <!-- Allows an application to write the user's calendar data.
638         <p>Protection level: dangerous
639    -->
640    <permission android:name="android.permission.WRITE_CALENDAR"
641        android:permissionGroup="android.permission-group.CALENDAR"
642        android:label="@string/permlab_writeCalendar"
643        android:description="@string/permdesc_writeCalendar"
644        android:protectionLevel="dangerous" />
645
646    <!-- ====================================================================== -->
647    <!-- Permissions for accessing and modifying user's SMS messages            -->
648    <!-- ====================================================================== -->
649    <eat-comment />
650
651    <!-- Used for runtime permissions related to user's SMS messages. -->
652    <permission-group android:name="android.permission-group.SMS"
653        android:icon="@drawable/perm_group_sms"
654        android:label="@string/permgrouplab_sms"
655        android:description="@string/permgroupdesc_sms"
656        android:request="@string/permgrouprequest_sms"
657        android:priority="300" />
658
659    <!-- Allows an application to send SMS messages.
660         <p>Protection level: dangerous
661    -->
662    <permission android:name="android.permission.SEND_SMS"
663        android:permissionGroup="android.permission-group.SMS"
664        android:label="@string/permlab_sendSms"
665        android:description="@string/permdesc_sendSms"
666        android:permissionFlags="costsMoney"
667        android:protectionLevel="dangerous" />
668
669    <!-- Allows an application to receive SMS messages.
670         <p>Protection level: dangerous
671    -->
672    <permission android:name="android.permission.RECEIVE_SMS"
673        android:permissionGroup="android.permission-group.SMS"
674        android:label="@string/permlab_receiveSms"
675        android:description="@string/permdesc_receiveSms"
676        android:protectionLevel="dangerous"/>
677
678    <!-- Allows an application to read SMS messages.
679         <p>Protection level: dangerous
680    -->
681    <permission android:name="android.permission.READ_SMS"
682        android:permissionGroup="android.permission-group.SMS"
683        android:label="@string/permlab_readSms"
684        android:description="@string/permdesc_readSms"
685        android:protectionLevel="dangerous" />
686
687    <!-- Allows an application to receive WAP push messages.
688         <p>Protection level: dangerous
689    -->
690    <permission android:name="android.permission.RECEIVE_WAP_PUSH"
691        android:permissionGroup="android.permission-group.SMS"
692        android:label="@string/permlab_receiveWapPush"
693        android:description="@string/permdesc_receiveWapPush"
694        android:protectionLevel="dangerous" />
695
696    <!-- Allows an application to monitor incoming MMS messages.
697        <p>Protection level: dangerous
698    -->
699    <permission android:name="android.permission.RECEIVE_MMS"
700        android:permissionGroup="android.permission-group.SMS"
701        android:label="@string/permlab_receiveMms"
702        android:description="@string/permdesc_receiveMms"
703        android:protectionLevel="dangerous" />
704
705    <!-- Allows an application to read previously received cell broadcast
706         messages and to register a content observer to get notifications when
707         a cell broadcast has been received and added to the database. For
708         emergency alerts, the database is updated immediately after the
709         alert dialog and notification sound/vibration/speech are presented.
710         The "read" column is then updated after the user dismisses the alert.
711         This enables supplementary emergency assistance apps to start loading
712         additional emergency information (if Internet access is available)
713         when the alert is first received, and to delay presenting the info
714         to the user until after the initial alert dialog is dismissed.
715         <p>Protection level: dangerous
716         @hide Pending API council approval -->
717    <permission android:name="android.permission.READ_CELL_BROADCASTS"
718        android:permissionGroup="android.permission-group.SMS"
719        android:label="@string/permlab_readCellBroadcasts"
720        android:description="@string/permdesc_readCellBroadcasts"
721        android:protectionLevel="dangerous" />
722
723    <!-- ====================================================================== -->
724    <!-- Permissions for accessing external storage                             -->
725    <!-- ====================================================================== -->
726    <eat-comment />
727
728    <!-- Used for runtime permissions related to the shared external storage. -->
729    <permission-group android:name="android.permission-group.STORAGE"
730        android:icon="@drawable/perm_group_storage"
731        android:label="@string/permgrouplab_storage"
732        android:description="@string/permgroupdesc_storage"
733        android:request="@string/permgrouprequest_storage"
734        android:priority="900" />
735
736    <!-- Allows an application to read from external storage.
737     <p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly
738     granted this permission.</p>
739     <p>This permission is enforced starting in API level 19.  Before API level 19, this
740     permission is not enforced and all apps still have access to read from external storage.
741     You can test your app with the permission enforced by enabling <em>Protect USB
742     storage</em> under Developer options in the Settings app on a device running Android 4.1 or
743     higher.</p>
744     <p>Also starting in API level 19, this permission is <em>not</em> required to
745     read/write files in your application-specific directories returned by
746     {@link android.content.Context#getExternalFilesDir} and
747     {@link android.content.Context#getExternalCacheDir}.
748     <p class="note"><strong>Note:</strong> If <em>both</em> your <a
749     href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
750     minSdkVersion}</a> and <a
751     href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
752     targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
753     grants your app this permission. If you don't need this permission, be sure your <a
754     href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
755     targetSdkVersion}</a> is 4 or higher.
756     <p>Protection level: dangerous
757     -->
758    <permission android:name="android.permission.READ_EXTERNAL_STORAGE"
759        android:permissionGroup="android.permission-group.STORAGE"
760        android:label="@string/permlab_sdcardRead"
761        android:description="@string/permdesc_sdcardRead"
762        android:protectionLevel="dangerous" />
763
764    <!-- Allows an application to write to external storage.
765         <p class="note"><strong>Note:</strong> If <em>both</em> your <a
766         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
767         minSdkVersion}</a> and <a
768         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
769         targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
770         grants your app this permission. If you don't need this permission, be sure your <a
771         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
772         targetSdkVersion}</a> is 4 or higher.
773         <p>Starting in API level 19, this permission is <em>not</em> required to
774         read/write files in your application-specific directories returned by
775         {@link android.content.Context#getExternalFilesDir} and
776         {@link android.content.Context#getExternalCacheDir}.
777         <p>Protection level: dangerous
778    -->
779    <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE"
780        android:permissionGroup="android.permission-group.STORAGE"
781        android:label="@string/permlab_sdcardWrite"
782        android:description="@string/permdesc_sdcardWrite"
783        android:protectionLevel="dangerous" />
784
785    <!-- ====================================================================== -->
786    <!-- Permissions for accessing the device location                          -->
787    <!-- ====================================================================== -->
788    <eat-comment />
789
790    <!-- Used for permissions that allow accessing the device location. -->
791    <permission-group android:name="android.permission-group.LOCATION"
792        android:icon="@drawable/perm_group_location"
793        android:label="@string/permgrouplab_location"
794        android:description="@string/permgroupdesc_location"
795        android:request="@string/permgrouprequest_location"
796        android:priority="400" />
797
798    <!-- Allows an app to access precise location.
799         Alternatively, you might want {@link #ACCESS_COARSE_LOCATION}.
800         <p>Protection level: dangerous
801    -->
802    <permission android:name="android.permission.ACCESS_FINE_LOCATION"
803        android:permissionGroup="android.permission-group.LOCATION"
804        android:label="@string/permlab_accessFineLocation"
805        android:description="@string/permdesc_accessFineLocation"
806        android:protectionLevel="dangerous|instant" />
807
808    <!-- Allows an app to access approximate location.
809         Alternatively, you might want {@link #ACCESS_FINE_LOCATION}.
810         <p>Protection level: dangerous
811    -->
812    <permission android:name="android.permission.ACCESS_COARSE_LOCATION"
813        android:permissionGroup="android.permission-group.LOCATION"
814        android:label="@string/permlab_accessCoarseLocation"
815        android:description="@string/permdesc_accessCoarseLocation"
816        android:protectionLevel="dangerous|instant" />
817
818    <!-- ====================================================================== -->
819    <!-- Permissions for accessing the device telephony                         -->
820    <!-- ====================================================================== -->
821    <eat-comment />
822
823    <!-- Used for permissions that are associated telephony features. -->
824    <permission-group android:name="android.permission-group.PHONE"
825        android:icon="@drawable/perm_group_phone_calls"
826        android:label="@string/permgrouplab_phone"
827        android:description="@string/permgroupdesc_phone"
828        android:request="@string/permgrouprequest_phone"
829        android:priority="500" />
830
831    <!-- Allows read only access to phone state, including the phone number of the device,
832         current cellular network information, the status of any ongoing calls, and a list of any
833         {@link android.telecom.PhoneAccount}s registered on the device.
834         <p class="note"><strong>Note:</strong> If <em>both</em> your <a
835         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
836         minSdkVersion}</a> and <a
837         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
838         targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
839         grants your app this permission. If you don't need this permission, be sure your <a
840         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
841         targetSdkVersion}</a> is 4 or higher.
842         <p>Protection level: dangerous
843    -->
844    <permission android:name="android.permission.READ_PHONE_STATE"
845        android:permissionGroup="android.permission-group.PHONE"
846        android:label="@string/permlab_readPhoneState"
847        android:description="@string/permdesc_readPhoneState"
848        android:protectionLevel="dangerous" />
849
850    <!-- Allows read access to the device's phone number(s). This is a subset of the capabilities
851         granted by {@link #READ_PHONE_STATE} but is exposed to instant applications.
852         <p>Protection level: dangerous-->
853    <permission android:name="android.permission.READ_PHONE_NUMBERS"
854        android:permissionGroup="android.permission-group.PHONE"
855        android:label="@string/permlab_readPhoneNumbers"
856        android:description="@string/permdesc_readPhoneNumbers"
857        android:protectionLevel="dangerous|instant" />
858
859    <!-- Allows an application to initiate a phone call without going through
860        the Dialer user interface for the user to confirm the call.
861        <p>Protection level: dangerous
862    -->
863    <permission android:name="android.permission.CALL_PHONE"
864        android:permissionGroup="android.permission-group.PHONE"
865        android:permissionFlags="costsMoney"
866        android:label="@string/permlab_callPhone"
867        android:description="@string/permdesc_callPhone"
868        android:protectionLevel="dangerous" />
869
870    <!-- Allows an application to access the IMS call service: making and
871         modifying a call
872        <p>Protection level: signature|privileged
873        @hide
874    -->
875    <permission android:name="android.permission.ACCESS_IMS_CALL_SERVICE"
876        android:permissionGroup="android.permission-group.PHONE"
877        android:label="@string/permlab_accessImsCallService"
878        android:description="@string/permdesc_accessImsCallService"
879        android:protectionLevel="signature|privileged" />
880
881    <!-- Allows an application to read the user's call log.
882         <p class="note"><strong>Note:</strong> If your app uses the
883         {@link #READ_CONTACTS} permission and <em>both</em> your <a
884         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
885         minSdkVersion}</a> and <a
886         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
887         targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
888         grants your app this permission. If you don't need this permission, be sure your <a
889         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
890         targetSdkVersion}</a> is 16 or higher.</p>
891         <p>Protection level: dangerous
892    -->
893    <permission android:name="android.permission.READ_CALL_LOG"
894        android:permissionGroup="android.permission-group.PHONE"
895        android:label="@string/permlab_readCallLog"
896        android:description="@string/permdesc_readCallLog"
897        android:protectionLevel="dangerous" />
898
899    <!-- Allows an application to write (but not read) the user's
900         call log data.
901         <p class="note"><strong>Note:</strong> If your app uses the
902         {@link #WRITE_CONTACTS} permission and <em>both</em> your <a
903         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
904         minSdkVersion}</a> and <a
905         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
906         targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
907         grants your app this permission. If you don't need this permission, be sure your <a
908         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
909         targetSdkVersion}</a> is 16 or higher.</p>
910         <p>Protection level: dangerous
911    -->
912    <permission android:name="android.permission.WRITE_CALL_LOG"
913        android:permissionGroup="android.permission-group.PHONE"
914        android:label="@string/permlab_writeCallLog"
915        android:description="@string/permdesc_writeCallLog"
916        android:protectionLevel="dangerous" />
917
918    <!-- Allows an application to add voicemails into the system.
919         <p>Protection level: dangerous
920    -->
921    <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL"
922        android:permissionGroup="android.permission-group.PHONE"
923        android:label="@string/permlab_addVoicemail"
924        android:description="@string/permdesc_addVoicemail"
925        android:protectionLevel="dangerous" />
926
927    <!-- Allows an application to use SIP service.
928         <p>Protection level: dangerous
929    -->
930    <permission android:name="android.permission.USE_SIP"
931        android:permissionGroup="android.permission-group.PHONE"
932        android:description="@string/permdesc_use_sip"
933        android:label="@string/permlab_use_sip"
934        android:protectionLevel="dangerous"/>
935
936    <!-- Allows an application to see the number being dialed during an outgoing
937         call with the option to redirect the call to a different number or
938         abort the call altogether.
939         <p>Protection level: dangerous
940    -->
941    <permission android:name="android.permission.PROCESS_OUTGOING_CALLS"
942        android:permissionGroup="android.permission-group.PHONE"
943        android:label="@string/permlab_processOutgoingCalls"
944        android:description="@string/permdesc_processOutgoingCalls"
945        android:protectionLevel="dangerous" />
946
947
948    <!-- Allows the app to answer an incoming phone call.
949         <p>Protection level: dangerous
950    -->
951    <permission android:name="android.permission.ANSWER_PHONE_CALLS"
952        android:permissionGroup="android.permission-group.PHONE"
953        android:label="@string/permlab_answerPhoneCalls"
954        android:description="@string/permdesc_answerPhoneCalls"
955        android:protectionLevel="dangerous|runtime" />
956
957    <!-- Allows a calling application which manages it own calls through the self-managed
958         {@link android.telecom.ConnectionService} APIs.  See
959         {@link android.telecom.PhoneAccount#CAPABILITY_SELF_MANAGED for more information on the
960         self-managed ConnectionService APIs.
961         <p>Protection level: normal
962    -->
963    <permission android:name="android.permission.MANAGE_OWN_CALLS"
964                android:label="@string/permlab_manageOwnCalls"
965                android:description="@string/permdesc_manageOwnCalls"
966                android:protectionLevel="normal" />
967
968    <!-- ====================================================================== -->
969    <!-- Permissions for accessing the device microphone                        -->
970    <!-- ====================================================================== -->
971    <eat-comment />
972
973    <!-- Used for permissions that are associated with accessing
974         microphone audio from the device. Note that phone calls also capture audio
975         but are in a separate (more visible) permission group. -->
976    <permission-group android:name="android.permission-group.MICROPHONE"
977        android:icon="@drawable/perm_group_microphone"
978        android:label="@string/permgrouplab_microphone"
979        android:description="@string/permgroupdesc_microphone"
980        android:request="@string/permgrouprequest_microphone"
981        android:priority="600" />
982
983    <!-- Allows an application to record audio.
984         <p>Protection level: dangerous
985    -->
986    <permission android:name="android.permission.RECORD_AUDIO"
987        android:permissionGroup="android.permission-group.MICROPHONE"
988        android:label="@string/permlab_recordAudio"
989        android:description="@string/permdesc_recordAudio"
990        android:protectionLevel="dangerous|instant"/>
991
992    <!-- ====================================================================== -->
993    <!-- Permissions for accessing the UCE Service                              -->
994    <!-- ====================================================================== -->
995
996    <!-- @hide Allows an application to Access UCE-Presence.
997         <p>Protection level: signature|privileged
998    -->
999    <permission android:name="android.permission.ACCESS_UCE_PRESENCE_SERVICE"
1000        android:permissionGroup="android.permission-group.PHONE"
1001        android:protectionLevel="signature|privileged"/>
1002
1003    <!-- @hide Allows an application to Access UCE-OPTIONS.
1004         <p>Protection level: signature|privileged
1005    -->
1006    <permission android:name="android.permission.ACCESS_UCE_OPTIONS_SERVICE"
1007        android:permissionGroup="android.permission-group.PHONE"
1008        android:protectionLevel="signature|privileged"/>
1009
1010
1011
1012    <!-- ====================================================================== -->
1013    <!-- Permissions for accessing the device camera                            -->
1014    <!-- ====================================================================== -->
1015    <eat-comment />
1016
1017    <!-- Used for permissions that are associated with accessing
1018     camera or capturing images/video from the device. -->
1019    <permission-group android:name="android.permission-group.CAMERA"
1020        android:icon="@drawable/perm_group_camera"
1021        android:label="@string/permgrouplab_camera"
1022        android:description="@string/permgroupdesc_camera"
1023        android:request="@string/permgrouprequest_camera"
1024        android:priority="700" />
1025
1026    <!-- Required to be able to access the camera device.
1027         <p>This will automatically enforce the <a
1028         href="{@docRoot}guide/topics/manifest/uses-feature-element.html">
1029         <uses-feature>}</a> manifest element for <em>all</em> camera features.
1030         If you do not require all camera features or can properly operate if a camera
1031         is not available, then you must modify your manifest as appropriate in order to
1032         install on devices that don't support all camera features.</p>
1033         <p>Protection level: dangerous
1034    -->
1035    <permission android:name="android.permission.CAMERA"
1036        android:permissionGroup="android.permission-group.CAMERA"
1037        android:label="@string/permlab_camera"
1038        android:description="@string/permdesc_camera"
1039        android:protectionLevel="dangerous|instant" />
1040
1041
1042    <!-- ====================================================================== -->
1043    <!-- Permissions for accessing the device sensors                           -->
1044    <!-- ====================================================================== -->
1045    <eat-comment />
1046
1047    <!-- Used for permissions that are associated with accessing
1048         body or environmental sensors. -->
1049    <permission-group android:name="android.permission-group.SENSORS"
1050        android:icon="@drawable/perm_group_sensors"
1051        android:label="@string/permgrouplab_sensors"
1052        android:description="@string/permgroupdesc_sensors"
1053        android:request="@string/permgrouprequest_sensors"
1054        android:priority="800" />
1055
1056    <!-- Allows an application to access data from sensors that the user uses to
1057         measure what is happening inside his/her body, such as heart rate.
1058         <p>Protection level: dangerous -->
1059    <permission android:name="android.permission.BODY_SENSORS"
1060        android:permissionGroup="android.permission-group.SENSORS"
1061        android:label="@string/permlab_bodySensors"
1062        android:description="@string/permdesc_bodySensors"
1063        android:protectionLevel="dangerous" />
1064
1065    <!-- Allows an app to use fingerprint hardware.
1066         <p>Protection level: normal
1067    -->
1068    <permission android:name="android.permission.USE_FINGERPRINT"
1069        android:permissionGroup="android.permission-group.SENSORS"
1070        android:label="@string/permlab_useFingerprint"
1071        android:description="@string/permdesc_useFingerprint"
1072        android:protectionLevel="normal" />
1073
1074    <!-- ====================================================================== -->
1075    <!-- REMOVED PERMISSIONS                                                    -->
1076    <!-- ====================================================================== -->
1077
1078    <!-- @hide We need to keep this around for backwards compatibility -->
1079    <permission android:name="android.permission.READ_PROFILE"
1080        android:protectionLevel="normal"
1081        android:permissionFlags="removed"/>
1082
1083    <!-- @hide We need to keep this around for backwards compatibility -->
1084    <permission android:name="android.permission.WRITE_PROFILE"
1085        android:protectionLevel="normal"
1086        android:permissionFlags="removed"/>
1087
1088    <!-- @hide We need to keep this around for backwards compatibility -->
1089    <permission android:name="android.permission.READ_SOCIAL_STREAM"
1090        android:protectionLevel="normal"
1091        android:permissionFlags="removed"/>
1092
1093    <!-- @hide We need to keep this around for backwards compatibility -->
1094    <permission android:name="android.permission.WRITE_SOCIAL_STREAM"
1095        android:protectionLevel="normal"
1096        android:permissionFlags="removed"/>
1097
1098    <!-- @hide We need to keep this around for backwards compatibility -->
1099    <permission android:name="android.permission.READ_USER_DICTIONARY"
1100        android:protectionLevel="normal"
1101        android:permissionFlags="removed"/>
1102
1103    <!-- @hide We need to keep this around for backwards compatibility -->
1104    <permission android:name="android.permission.WRITE_USER_DICTIONARY"
1105        android:protectionLevel="normal"
1106        android:permissionFlags="removed"/>
1107
1108    <!-- @hide We need to keep this around for backwards compatibility -->
1109    <permission android:name="android.permission.WRITE_SMS"
1110        android:protectionLevel="normal"
1111        android:permissionFlags="removed"/>
1112
1113    <!-- @hide We need to keep this around for backwards compatibility -->
1114    <permission android:name="com.android.browser.permission.READ_HISTORY_BOOKMARKS"
1115        android:protectionLevel="normal"
1116        android:permissionFlags="removed"/>
1117
1118    <!-- @hide We need to keep this around for backwards compatibility -->
1119    <permission android:name="com.android.browser.permission.WRITE_HISTORY_BOOKMARKS"
1120        android:protectionLevel="normal"
1121        android:permissionFlags="removed"/>
1122
1123    <!-- @hide We need to keep this around for backwards compatibility -->
1124    <permission android:name="android.permission.AUTHENTICATE_ACCOUNTS"
1125        android:protectionLevel="normal"
1126        android:permissionFlags="removed"/>
1127
1128    <!-- @hide We need to keep this around for backwards compatibility -->
1129    <permission android:name="android.permission.MANAGE_ACCOUNTS"
1130        android:protectionLevel="normal"
1131        android:permissionFlags="removed"/>
1132
1133    <!-- @hide We need to keep this around for backwards compatibility -->
1134    <permission android:name="android.permission.USE_CREDENTIALS"
1135        android:protectionLevel="normal"
1136        android:permissionFlags="removed"/>
1137
1138    <!-- @hide We need to keep this around for backwards compatibility -->
1139    <permission android:name="android.permission.SUBSCRIBED_FEEDS_READ"
1140        android:protectionLevel="normal"
1141        android:permissionFlags="removed"/>
1142
1143    <!-- @hide We need to keep this around for backwards compatibility -->
1144    <permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE"
1145        android:protectionLevel="normal"
1146        android:permissionFlags="removed"/>
1147
1148    <!-- @hide We need to keep this around for backwards compatibility -->
1149    <permission android:name="android.permission.FLASHLIGHT"
1150        android:protectionLevel="normal"
1151        android:permissionFlags="removed"/>
1152
1153    <!-- ====================================================================== -->
1154    <!-- INSTALL PERMISSIONS                                                    -->
1155    <!-- ====================================================================== -->
1156
1157    <!-- ================================== -->
1158    <!-- Permissions for accessing messages -->
1159    <!-- ================================== -->
1160    <eat-comment />
1161
1162    <!-- @SystemApi Allows an application (Phone) to send a request to other applications
1163         to handle the respond-via-message action during incoming calls.
1164         <p>Not for use by third-party applications. -->
1165    <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE"
1166        android:protectionLevel="signature|privileged" />
1167
1168    <!-- @SystemApi Allows an application to send SMS to premium shortcodes without user permission.
1169         <p>Not for use by third-party applications.
1170         @hide -->
1171    <permission android:name="android.permission.SEND_SMS_NO_CONFIRMATION"
1172        android:protectionLevel="signature|privileged" />
1173
1174    <!-- Allows an application to filter carrier specific sms.
1175         @hide -->
1176    <permission android:name="android.permission.CARRIER_FILTER_SMS"
1177        android:protectionLevel="signature|privileged" />
1178
1179    <!-- @SystemApi Allows an application to receive emergency cell broadcast messages,
1180         to record or display them to the user.
1181         <p>Not for use by third-party applications.
1182         @hide -->
1183    <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST"
1184        android:protectionLevel="signature|privileged" />
1185
1186    <!-- Allows an application to monitor incoming Bluetooth MAP messages, to record
1187         or perform processing on them. -->
1188    <!-- @hide -->
1189    <permission android:name="android.permission.RECEIVE_BLUETOOTH_MAP"
1190        android:protectionLevel="signature|privileged" />
1191
1192    <!-- @SystemApi @hide Allows an application to execute contacts directory search.
1193         This should only be used by ContactsProvider.
1194         <p>Not for use by third-party applications. -->
1195    <permission android:name="android.permission.BIND_DIRECTORY_SEARCH"
1196        android:protectionLevel="signature|privileged" />
1197
1198    <!-- @SystemApi @hide Allows an application to modify cell broadcasts through the content provider.
1199         <p>Not for use by third-party applications. -->
1200    <permission android:name="android.permission.MODIFY_CELL_BROADCASTS"
1201                android:protectionLevel="signature|privileged" />
1202
1203    <!-- =============================================================== -->
1204    <!-- Permissions for setting the device alarm                        -->
1205    <!-- =============================================================== -->
1206    <eat-comment />
1207
1208    <!-- Allows an application to broadcast an Intent to set an alarm for the user.
1209         <p>Protection level: normal
1210    -->
1211    <permission android:name="com.android.alarm.permission.SET_ALARM"
1212        android:label="@string/permlab_setAlarm"
1213        android:description="@string/permdesc_setAlarm"
1214        android:protectionLevel="normal" />
1215
1216    <!-- =============================================================== -->
1217    <!-- Permissions for accessing the user voicemail                    -->
1218    <!-- =============================================================== -->
1219    <eat-comment />
1220
1221    <!-- Allows an application to modify and remove existing voicemails in the system.
1222        <p>Protection level: signature|privileged
1223    -->
1224    <permission android:name="com.android.voicemail.permission.WRITE_VOICEMAIL"
1225        android:protectionLevel="signature|privileged" />
1226
1227    <!-- Allows an application to read voicemails in the system.
1228         <p>Protection level: signature|privileged
1229    -->
1230    <permission android:name="com.android.voicemail.permission.READ_VOICEMAIL"
1231        android:protectionLevel="signature|privileged" />
1232
1233    <!-- ======================================= -->
1234    <!-- Permissions for accessing location info -->
1235    <!-- ======================================= -->
1236    <eat-comment />
1237
1238    <!-- Allows an application to access extra location provider commands.
1239         <p>Protection level: normal
1240    -->
1241    <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS"
1242        android:label="@string/permlab_accessLocationExtraCommands"
1243        android:description="@string/permdesc_accessLocationExtraCommands"
1244        android:protectionLevel="normal" />
1245
1246    <!-- @SystemApi Allows an application to install a location provider into the Location Manager.
1247    <p>Not for use by third-party applications. -->
1248    <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER"
1249        android:protectionLevel="signature|privileged" />
1250
1251    <!-- @SystemApi @hide Allows HDMI-CEC service to access device and configuration files.
1252         This should only be used by HDMI-CEC service.
1253    -->
1254    <permission android:name="android.permission.HDMI_CEC"
1255        android:protectionLevel="signature|privileged" />
1256
1257    <!-- @SystemApi Allows an application to use location features in hardware,
1258         such as the geofencing api.
1259         <p>Not for use by third-party applications. -->
1260    <permission android:name="android.permission.LOCATION_HARDWARE"
1261        android:protectionLevel="signature|privileged" />
1262    <uses-permission android:name="android.permission.LOCATION_HARDWARE"/>
1263
1264    <!-- @SystemApi Allows an application to create mock location providers for testing.
1265         <p>Protection level: signature
1266         @hide
1267    -->
1268    <permission android:name="android.permission.ACCESS_MOCK_LOCATION"
1269        android:protectionLevel="signature" />
1270
1271    <!-- ======================================= -->
1272    <!-- Permissions for accessing networks -->
1273    <!-- ======================================= -->
1274    <eat-comment />
1275
1276    <!-- Allows applications to open network sockets.
1277         <p>Protection level: normal
1278    -->
1279    <permission android:name="android.permission.INTERNET"
1280        android:description="@string/permdesc_createNetworkSockets"
1281        android:label="@string/permlab_createNetworkSockets"
1282        android:protectionLevel="normal|instant" />
1283
1284    <!-- Allows applications to access information about networks.
1285         <p>Protection level: normal
1286    -->
1287    <permission android:name="android.permission.ACCESS_NETWORK_STATE"
1288        android:description="@string/permdesc_accessNetworkState"
1289        android:label="@string/permlab_accessNetworkState"
1290        android:protectionLevel="normal|instant" />
1291
1292    <!-- Allows applications to access information about Wi-Fi networks.
1293         <p>Protection level: normal
1294    -->
1295    <permission android:name="android.permission.ACCESS_WIFI_STATE"
1296        android:description="@string/permdesc_accessWifiState"
1297        android:label="@string/permlab_accessWifiState"
1298        android:protectionLevel="normal" />
1299
1300    <!-- Allows applications to change Wi-Fi connectivity state.
1301         <p>Protection level: normal
1302    -->
1303    <permission android:name="android.permission.CHANGE_WIFI_STATE"
1304        android:description="@string/permdesc_changeWifiState"
1305        android:label="@string/permlab_changeWifiState"
1306        android:protectionLevel="normal" />
1307
1308    <!-- @SystemApi @hide Allows applications to read Wi-Fi credential.
1309         <p>Not for use by third-party applications. -->
1310    <permission android:name="android.permission.READ_WIFI_CREDENTIAL"
1311        android:protectionLevel="signature|privileged" />
1312
1313    <!-- @SystemApi @hide Allows applications to change tether state and run
1314         tether carrier provisioning.
1315         <p>Not for use by third-party applications. -->
1316    <permission android:name="android.permission.TETHER_PRIVILEGED"
1317        android:protectionLevel="signature|privileged" />
1318
1319    <!-- @SystemApi @hide Allow system apps to receive broadcast
1320         when a wifi network credential is changed.
1321         <p>Not for use by third-party applications. -->
1322    <permission android:name="android.permission.RECEIVE_WIFI_CREDENTIAL_CHANGE"
1323        android:protectionLevel="signature|privileged" />
1324
1325    <!-- @SystemApi @hide Allows an application to modify any wifi configuration, even if created
1326     by another application. Once reconfigured the original creator cannot make any further
1327     modifications.
1328     <p>Not for use by third-party applications. -->
1329    <permission android:name="android.permission.OVERRIDE_WIFI_CONFIG"
1330        android:protectionLevel="signature|privileged" />
1331
1332    <!-- @hide -->
1333    <permission android:name="android.permission.ACCESS_WIMAX_STATE"
1334        android:description="@string/permdesc_accessWimaxState"
1335        android:label="@string/permlab_accessWimaxState"
1336        android:protectionLevel="normal" />
1337
1338    <!-- @hide -->
1339    <permission android:name="android.permission.CHANGE_WIMAX_STATE"
1340        android:description="@string/permdesc_changeWimaxState"
1341        android:label="@string/permlab_changeWimaxState"
1342        android:protectionLevel="normal" />
1343
1344    <!-- Allows applications to act as network scorers. @hide @SystemApi-->
1345    <permission android:name="android.permission.SCORE_NETWORKS"
1346        android:protectionLevel="signature|privileged" />
1347
1348    <!-- Allows applications to request network
1349         recommendations and scores from the NetworkScoreService.
1350         <p>Not for use by third-party applications. @hide -->
1351    <permission android:name="android.permission.REQUEST_NETWORK_SCORES"
1352        android:protectionLevel="signature|setup" />
1353
1354    <!-- Allows network stack services (Connectivity and Wifi) to coordinate
1355         <p>Not for use by third-party or privileged applications.
1356         @hide This should only be used by Connectivity and Wifi Services.
1357    -->
1358    <permission android:name="android.permission.NETWORK_STACK"
1359        android:protectionLevel="signature" />
1360
1361    <!-- Allows Settings and SystemUI to call methods in Networking services
1362         <p>Not for use by third-party or privileged applications.
1363         @hide This should only be used by Settings and SystemUI.
1364    -->
1365    <permission android:name="android.permission.NETWORK_SETTINGS"
1366        android:protectionLevel="signature" />
1367
1368    <!-- #SystemApi @hide Allows applications to access information about LoWPAN interfaces.
1369         <p>Not for use by third-party applications. -->
1370    <permission android:name="android.permission.ACCESS_LOWPAN_STATE"
1371        android:protectionLevel="signature|privileged" />
1372
1373    <!-- #SystemApi @hide Allows applications to change LoWPAN connectivity state.
1374         <p>Not for use by third-party applications. -->
1375    <permission android:name="android.permission.CHANGE_LOWPAN_STATE"
1376        android:protectionLevel="signature|privileged" />
1377
1378    <!-- #SystemApi @hide Allows applications to read LoWPAN credential.
1379         <p>Not for use by third-party applications. -->
1380    <permission android:name="android.permission.READ_LOWPAN_CREDENTIAL"
1381        android:protectionLevel="signature|privileged" />
1382
1383    <!-- #SystemApi @hide Allows a service to register or unregister
1384         new LoWPAN interfaces.
1385         <p>Not for use by third-party applications. -->
1386    <permission android:name="android.permission.MANAGE_LOWPAN_INTERFACES"
1387        android:protectionLevel="signature|privileged" />
1388
1389    <!-- ======================================= -->
1390    <!-- Permissions for short range, peripheral networks -->
1391    <!-- ======================================= -->
1392    <eat-comment />
1393
1394    <!-- Allows applications to connect to paired bluetooth devices.
1395         <p>Protection level: normal
1396    -->
1397    <permission android:name="android.permission.BLUETOOTH"
1398        android:description="@string/permdesc_bluetooth"
1399        android:label="@string/permlab_bluetooth"
1400        android:protectionLevel="normal" />
1401
1402    <!-- Allows applications to discover and pair bluetooth devices.
1403         <p>Protection level: normal
1404    -->
1405    <permission android:name="android.permission.BLUETOOTH_ADMIN"
1406        android:description="@string/permdesc_bluetoothAdmin"
1407        android:label="@string/permlab_bluetoothAdmin"
1408        android:protectionLevel="normal" />
1409
1410    <!-- @SystemApi Allows applications to pair bluetooth devices without user interaction, and to
1411         allow or disallow phonebook access or message access.
1412         This is not available to third party applications. -->
1413    <permission android:name="android.permission.BLUETOOTH_PRIVILEGED"
1414        android:protectionLevel="signature|privileged" />
1415
1416    <!-- Control access to email providers exclusively for Bluetooth
1417         @hide
1418    -->
1419    <permission android:name="android.permission.BLUETOOTH_MAP"
1420        android:protectionLevel="signature" />
1421
1422    <!-- Allows bluetooth stack to access files
1423         @hide This should only be used by Bluetooth apk.
1424    -->
1425    <permission android:name="android.permission.BLUETOOTH_STACK"
1426        android:protectionLevel="signature" />
1427
1428    <!-- Allows applications to perform I/O operations over NFC.
1429         <p>Protection level: normal
1430    -->
1431    <permission android:name="android.permission.NFC"
1432        android:description="@string/permdesc_nfc"
1433        android:label="@string/permlab_nfc"
1434        android:protectionLevel="normal" />
1435
1436    <!-- @SystemApi Allows an internal user to use privileged ConnectivityManager APIs.
1437         @hide -->
1438    <permission android:name="android.permission.CONNECTIVITY_INTERNAL"
1439        android:protectionLevel="signature|privileged" />
1440
1441    <!-- @SystemApi Allows an internal user to use restricted Networks.
1442         @hide -->
1443    <permission android:name="android.permission.CONNECTIVITY_USE_RESTRICTED_NETWORKS"
1444        android:protectionLevel="signature|privileged" />
1445
1446    <!-- Allows a system application to access hardware packet offload capabilities.
1447         @hide -->
1448    <permission android:name="android.permission.PACKET_KEEPALIVE_OFFLOAD"
1449        android:protectionLevel="signature|privileged" />
1450
1451    <!-- @SystemApi
1452         @hide -->
1453    <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE"
1454        android:protectionLevel="signature|privileged" />
1455
1456    <!-- @SystemApi Allows access to the loop radio (Android@Home mesh network) device.
1457         @hide -->
1458    <permission android:name="android.permission.LOOP_RADIO"
1459        android:protectionLevel="signature|privileged" />
1460
1461    <!-- Allows sending and receiving handover transfer status from Wifi and Bluetooth
1462         @hide -->
1463    <permission android:name="android.permission.NFC_HANDOVER_STATUS"
1464        android:protectionLevel="signature|privileged" />
1465
1466    <!-- ================================== -->
1467    <!-- Permissions for accessing accounts -->
1468    <!-- ================================== -->
1469    <eat-comment />
1470
1471    <!-- Allows access to the list of accounts in the Accounts Service.
1472
1473    <p class="note"><strong>Note:</strong> Beginning with Android 6.0 (API level
1474    23), if an app shares the signature of the authenticator that manages an
1475    account, it does not need <code>"GET_ACCOUNTS"</code> permission to read
1476    information about that account. On Android 5.1 and lower, all apps need
1477    <code>"GET_ACCOUNTS"</code> permission to read information about any
1478    account.</p>
1479
1480    <p>Protection level: dangerous
1481    -->
1482    <permission android:name="android.permission.GET_ACCOUNTS"
1483        android:permissionGroup="android.permission-group.CONTACTS"
1484        android:protectionLevel="dangerous"
1485        android:description="@string/permdesc_getAccounts"
1486        android:label="@string/permlab_getAccounts" />
1487    <uses-permission android:name="android.permission.GET_ACCOUNTS"/>
1488
1489    <!-- @SystemApi Allows applications to call into AccountAuthenticators.
1490    <p>Not for use by third-party applications. -->
1491    <permission android:name="android.permission.ACCOUNT_MANAGER"
1492        android:protectionLevel="signature" />
1493
1494    <!-- ================================== -->
1495    <!-- Permissions for accessing hardware that may effect battery life-->
1496    <!-- ================================== -->
1497    <eat-comment />
1498
1499    <!-- Allows applications to enter Wi-Fi Multicast mode.
1500         <p>Protection level: normal
1501    -->
1502    <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE"
1503        android:description="@string/permdesc_changeWifiMulticastState"
1504        android:label="@string/permlab_changeWifiMulticastState"
1505        android:protectionLevel="normal" />
1506
1507    <!-- Allows access to the vibrator.
1508         <p>Protection level: normal
1509    -->
1510    <permission android:name="android.permission.VIBRATE"
1511        android:label="@string/permlab_vibrate"
1512        android:description="@string/permdesc_vibrate"
1513        android:protectionLevel="normal|instant" />
1514
1515    <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen
1516         from dimming.
1517         <p>Protection level: normal
1518    -->
1519    <permission android:name="android.permission.WAKE_LOCK"
1520        android:label="@string/permlab_wakeLock"
1521        android:description="@string/permdesc_wakeLock"
1522        android:protectionLevel="normal|instant" />
1523
1524    <!-- Allows using the device's IR transmitter, if available.
1525         <p>Protection level: normal
1526    -->
1527    <permission android:name="android.permission.TRANSMIT_IR"
1528        android:label="@string/permlab_transmitIr"
1529        android:description="@string/permdesc_transmitIr"
1530        android:protectionLevel="normal" />
1531
1532    <!-- ==================================================== -->
1533    <!-- Permissions related to changing audio settings   -->
1534    <!-- ==================================================== -->
1535    <eat-comment />
1536
1537    <!-- Allows an application to modify global audio settings.
1538         <p>Protection level: normal
1539    -->
1540    <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS"
1541        android:label="@string/permlab_modifyAudioSettings"
1542        android:description="@string/permdesc_modifyAudioSettings"
1543        android:protectionLevel="normal" />
1544
1545    <!-- ================================== -->
1546    <!-- Permissions for accessing hardware -->
1547    <!-- ================================== -->
1548    <eat-comment />
1549
1550    <!-- @SystemApi Allows an application to manage preferences and permissions for USB devices
1551         @hide -->
1552    <permission android:name="android.permission.MANAGE_USB"
1553        android:protectionLevel="signature|privileged" />
1554
1555    <!-- @SystemApi Allows an application to access the MTP USB kernel driver.
1556         For use only by the device side MTP implementation.
1557         @hide -->
1558    <permission android:name="android.permission.ACCESS_MTP"
1559        android:protectionLevel="signature|privileged" />
1560
1561    <!-- @SystemApi Allows access to hardware peripherals.  Intended only for hardware testing.
1562         <p>Not for use by third-party applications.
1563         @hide
1564    -->
1565    <permission android:name="android.permission.HARDWARE_TEST"
1566        android:protectionLevel="signature" />
1567
1568    <!-- @SystemApi Allows access to Broadcast Radio
1569         @hide This is not a third-party API (intended for system apps).-->
1570    <permission android:name="android.permission.ACCESS_BROADCAST_RADIO"
1571        android:protectionLevel="signature|privileged" />
1572
1573    <!-- @deprecated @SystemApi Allows access to FM
1574         @hide This is not a third-party API (intended for system apps).-->
1575    <permission android:name="android.permission.ACCESS_FM_RADIO"
1576        android:protectionLevel="signature|privileged" />
1577
1578    <!-- Allows access to configure network interfaces, configure/use IPSec, etc.
1579         @hide -->
1580    <permission android:name="android.permission.NET_ADMIN"
1581        android:protectionLevel="signature" />
1582
1583    <!-- Allows registration for remote audio playback. @hide -->
1584    <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK"
1585        android:protectionLevel="signature" />
1586
1587    <!-- @SystemApi Allows TvInputService to access underlying TV input hardware such as
1588         built-in tuners and HDMI-in's.
1589         @hide This should only be used by OEM's TvInputService's.
1590    -->
1591    <permission android:name="android.permission.TV_INPUT_HARDWARE"
1592        android:protectionLevel="signature|privileged" />
1593
1594    <!-- @SystemApi Allows to capture a frame of TV input hardware such as
1595         built-in tuners and HDMI-in's.
1596         @hide <p>Not for use by third-party applications.
1597    -->
1598    <permission android:name="android.permission.CAPTURE_TV_INPUT"
1599        android:protectionLevel="signature|privileged" />
1600
1601    <!-- @hide Allows TvInputService to access DVB device.
1602   <p>Not for use by third-party applications. -->
1603    <permission android:name="android.permission.DVB_DEVICE"
1604        android:protectionLevel="signature|privileged" />
1605
1606    <!-- @SystemApi Allows reading and enabling/disabling the OEM unlock allowed by carrier state
1607         @hide <p>Not for use by third-party applications. -->
1608    <permission android:name="android.permission.MANAGE_CARRIER_OEM_UNLOCK_STATE"
1609        android:protectionLevel="signature|privileged" />
1610
1611    <!-- @SystemApi Allows reading and enabling/disabling the OEM unlock allowed by user state
1612         @hide <p>Not for use by third-party applications. -->
1613    <permission android:name="android.permission.MANAGE_USER_OEM_UNLOCK_STATE"
1614        android:protectionLevel="signature|privileged" />
1615
1616    <!-- @SystemApi Allows reading the OEM unlock state
1617         @hide <p>Not for use by third-party applications. -->
1618    <permission android:name="android.permission.READ_OEM_UNLOCK_STATE"
1619        android:protectionLevel="signature|privileged" />
1620
1621    <!-- @hide Allows enabling/disabling OEM unlock
1622   <p>Not for use by third-party applications. -->
1623    <permission android:name="android.permission.OEM_UNLOCK_STATE"
1624        android:protectionLevel="signature" />
1625
1626    <!-- @hide Allows querying state of PersistentDataBlock
1627   <p>Not for use by third-party applications. -->
1628    <permission android:name="android.permission.ACCESS_PDB_STATE"
1629        android:protectionLevel="signature" />
1630
1631    <!-- Allows testing if a passwords is forbidden by the admins.
1632         @hide <p>Not for use by third-party applications. -->
1633    <permission android:name="android.permission.TEST_BLACKLISTED_PASSWORD"
1634        android:protectionLevel="signature" />
1635
1636    <!-- @hide Allows system update service to notify device owner about pending updates.
1637   <p>Not for use by third-party applications. -->
1638    <permission android:name="android.permission.NOTIFY_PENDING_SYSTEM_UPDATE"
1639        android:protectionLevel="signature|privileged" />
1640
1641    <!-- =========================================== -->
1642    <!-- Permissions associated with camera and image capture -->
1643    <!-- =========================================== -->
1644    <eat-comment />
1645
1646    <!-- @SystemApi Allows disabling the transmit-indicator LED that is normally on when
1647         a camera is in use by an application.
1648         @hide -->
1649    <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED"
1650        android:protectionLevel="signature|privileged" />
1651
1652    <!-- Allows sending the camera service notifications about system-wide events.
1653        @hide -->
1654    <permission android:name="android.permission.CAMERA_SEND_SYSTEM_EVENTS"
1655        android:protectionLevel="signature|privileged" />
1656
1657    <!-- =========================================== -->
1658    <!-- Permissions associated with telephony state -->
1659    <!-- =========================================== -->
1660    <eat-comment />
1661
1662    <!-- @SystemApi Allows modification of the telephony state - power on, mmi, etc.
1663         Does not include placing calls.
1664         <p>Not for use by third-party applications. -->
1665    <permission android:name="android.permission.MODIFY_PHONE_STATE"
1666        android:protectionLevel="signature|privileged" />
1667
1668    <!-- Allows read only access to precise phone state.
1669         @hide Pending API council approval -->
1670    <permission android:name="android.permission.READ_PRECISE_PHONE_STATE"
1671        android:protectionLevel="signature|privileged" />
1672
1673    <!-- @SystemApi Allows read access to privileged phone state.
1674         @hide Used internally. -->
1675    <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE"
1676        android:protectionLevel="signature|privileged" />
1677
1678    <!-- @SystemApi Protects the ability to register any PhoneAccount with
1679         PhoneAccount#CAPABILITY_SIM_SUBSCRIPTION. This capability indicates that the PhoneAccount
1680         corresponds to a device SIM.
1681         @hide -->
1682    <permission android:name="android.permission.REGISTER_SIM_SUBSCRIPTION"
1683        android:protectionLevel="signature|privileged" />
1684
1685    <!-- @SystemApi Protects the ability to register any PhoneAccount with
1686         PhoneAccount#CAPABILITY_CALL_PROVIDER.
1687         @hide -->
1688    <permission android:name="android.permission.REGISTER_CALL_PROVIDER"
1689        android:protectionLevel="signature|privileged" />
1690
1691    <!-- @SystemApi Protects the ability to register any PhoneAccount with
1692         PhoneAccount#CAPABILITY_CONNECTION_MANAGER
1693         @hide -->
1694    <permission android:name="android.permission.REGISTER_CONNECTION_MANAGER"
1695        android:protectionLevel="signature|privileged" />
1696
1697    <!-- Must be required by a {@link android.telecom.InCallService},
1698         to ensure that only the system can bind to it.
1699         <p>Protection level: signature|privileged
1700    -->
1701    <permission android:name="android.permission.BIND_INCALL_SERVICE"
1702        android:protectionLevel="signature|privileged" />
1703
1704    <!-- Must be required by a link {@link android.telephony.VisualVoicemailService} to ensure that
1705         only the system can bind to it.
1706         <p>Protection level: signature|privileged
1707    -->
1708    <permission
1709      android:name="android.permission.BIND_VISUAL_VOICEMAIL_SERVICE"
1710      android:protectionLevel="signature|privileged"/>
1711
1712    <!-- Must be required by a {@link android.telecom.CallScreeningService},
1713         to ensure that only the system can bind to it.
1714         <p>Protection level: signature|privileged
1715    -->
1716    <permission android:name="android.permission.BIND_SCREENING_SERVICE"
1717        android:protectionLevel="signature|privileged" />
1718
1719    <!-- Must be required by a {@link android.telecom.ConnectionService},
1720         to ensure that only the system can bind to it.
1721         @deprecated {@link android.telecom.ConnectionService}s should require
1722                 android.permission.BIND_TELECOM_CONNECTION_SERVICE instead.
1723         @SystemApi
1724         @hide -->
1725    <permission android:name="android.permission.BIND_CONNECTION_SERVICE"
1726        android:protectionLevel="signature|privileged" />
1727
1728    <!-- Must be required by a {@link android.telecom.ConnectionService},
1729         to ensure that only the system can bind to it.
1730         <p>Protection level: signature|privileged
1731    -->
1732    <permission android:name="android.permission.BIND_TELECOM_CONNECTION_SERVICE"
1733        android:protectionLevel="signature|privileged" />
1734
1735    <!-- @SystemApi Allows an application to control the in-call experience.
1736         @hide -->
1737    <permission android:name="android.permission.CONTROL_INCALL_EXPERIENCE"
1738        android:protectionLevel="signature|privileged" />
1739
1740    <!-- Allows an application to receive STK related commands.
1741         @hide -->
1742    <permission android:name="android.permission.RECEIVE_STK_COMMANDS"
1743        android:protectionLevel="signature|privileged" />
1744
1745      <!-- Allows an application to send EMBMS download intents to apps
1746           @hide -->
1747    <permission android:name="android.permission.SEND_EMBMS_INTENTS"
1748        android:protectionLevel="signature|privileged" />
1749
1750
1751    <!-- Allows internal management of the sensor framework
1752         @hide -->
1753    <permission android:name="android.permission.MANAGE_SENSORS"
1754        android:protectionLevel="signature" />
1755
1756    <!-- Must be required by an ImsService to ensure that only the
1757         system can bind to it.
1758         <p>Protection level: signature|privileged
1759         @SystemApi
1760         @hide
1761    -->
1762    <permission android:name="android.permission.BIND_IMS_SERVICE"
1763        android:protectionLevel="signature|privileged|vendorPrivileged" />
1764
1765    <!-- Allows an application to manage embedded subscriptions (those on a eUICC) through
1766         EuiccManager APIs.
1767         <p>Protection level: signature|privileged|development
1768         TODO(b/35851809): Mark this as a SystemApi and remove com. prefix.
1769         @hide -->
1770    <permission android:name="com.android.permission.WRITE_EMBEDDED_SUBSCRIPTIONS"
1771                android:protectionLevel="signature|privileged|development" />
1772
1773    <!-- Must be required by an EuiccService to ensure that only the system can bind to it.
1774         <p>Protection level: signature
1775         TODO(b/35851809): Mark this as a SystemApi and remove com. prefix.
1776         @hide -->
1777    <permission android:name="com.android.permission.BIND_EUICC_SERVICE"
1778                android:protectionLevel="signature" />
1779
1780    <!-- ================================== -->
1781    <!-- Permissions for sdcard interaction -->
1782    <!-- ================================== -->
1783    <eat-comment />
1784
1785    <!-- @SystemApi Allows an application to write to internal media storage
1786         @hide  -->
1787    <permission android:name="android.permission.WRITE_MEDIA_STORAGE"
1788        android:protectionLevel="signature|privileged" />
1789
1790    <!-- Allows an application to manage access to documents, usually as part
1791         of a document picker.
1792         <p>This permission should <em>only</em> be requested by the platform
1793         document management app.  This permission cannot be granted to
1794         third-party apps.
1795         <p>Protection level: signature
1796    -->
1797    <permission android:name="android.permission.MANAGE_DOCUMENTS"
1798        android:protectionLevel="signature" />
1799
1800    <!-- @hide Allows an application to cache content.
1801         <p>Not for use by third-party applications.
1802         <p>Protection level: signature
1803    -->
1804    <permission android:name="android.permission.CACHE_CONTENT"
1805        android:protectionLevel="signature" />
1806
1807    <!-- @SystemApi @hide
1808         Allows an application to aggressively allocate disk space.
1809         <p>Not for use by third-party applications.
1810    -->
1811    <permission android:name="android.permission.ALLOCATE_AGGRESSIVE"
1812        android:protectionLevel="signature|privileged" />
1813
1814    <!-- @SystemApi @hide
1815         Allows an application to use reserved disk space.
1816         <p>Not for use by third-party applications.  Should only be requested by
1817         apps that provide core system functionality, to ensure system stability
1818         when disk is otherwise completely full.
1819    -->
1820    <permission android:name="android.permission.USE_RESERVED_DISK"
1821        android:protectionLevel="signature|privileged" />
1822
1823    <!-- ================================== -->
1824    <!-- Permissions for screenlock         -->
1825    <!-- ================================== -->
1826    <eat-comment />
1827
1828    <!-- Allows applications to disable the keyguard if it is not secure.
1829         <p>Protection level: normal
1830    -->
1831    <permission android:name="android.permission.DISABLE_KEYGUARD"
1832        android:description="@string/permdesc_disableKeyguard"
1833        android:label="@string/permlab_disableKeyguard"
1834        android:protectionLevel="normal" />
1835
1836    <!-- ================================== -->
1837    <!-- Permissions to access other installed applications  -->
1838    <!-- ================================== -->
1839    <eat-comment />
1840
1841    <!-- @deprecated No longer enforced. -->
1842    <permission android:name="android.permission.GET_TASKS"
1843        android:label="@string/permlab_getTasks"
1844        android:description="@string/permdesc_getTasks"
1845        android:protectionLevel="normal" />
1846
1847    <!-- New version of GET_TASKS that apps can request, since GET_TASKS doesn't really
1848         give access to task information.  We need this new one because there are
1849         many existing apps that use add libraries and such that have validation
1850         code to ensure the app has requested the GET_TASKS permission by seeing
1851         if it has been granted the permission...  if it hasn't, it kills the app
1852         with a message about being upset.  So we need to have it continue to look
1853         like the app is getting that permission, even though it will never be
1854         checked, and new privileged apps can now request this one for real access.
1855         @hide
1856         @SystemApi -->
1857    <permission android:name="android.permission.REAL_GET_TASKS"
1858        android:protectionLevel="signature|privileged" />
1859
1860    <!-- Allows an application to start a task from a ActivityManager#RecentTaskInfo.
1861         @hide -->
1862    <permission android:name="android.permission.START_TASKS_FROM_RECENTS"
1863        android:protectionLevel="signature|privileged" />
1864
1865    <!-- @SystemApi @hide Allows an application to call APIs that allow it to do interactions
1866         across the users on the device, using singleton services and
1867         user-targeted broadcasts.  This permission is not available to
1868         third party applications. -->
1869    <permission android:name="android.permission.INTERACT_ACROSS_USERS"
1870        android:protectionLevel="signature|privileged|development" />
1871
1872    <!-- @SystemApi Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS}
1873         that removes restrictions on where broadcasts can be sent and allows other
1874         types of interactions
1875         @hide -->
1876    <permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL"
1877        android:protectionLevel="signature|installer" />
1878
1879    <!-- @SystemApi @hide Allows an application to call APIs that allow it to query and manage
1880         users on the device. This permission is not available to
1881         third party applications. -->
1882    <permission android:name="android.permission.MANAGE_USERS"
1883        android:protectionLevel="signature|privileged" />
1884
1885    <!-- @hide Allows an application to create, remove users and get the list of
1886         users on the device. Applications holding this permission can only create restricted,
1887         guest, managed, demo, and ephemeral users. For creating other kind of users,
1888         {@link android.Manifest.permission#MANAGE_USERS} is needed.
1889         This permission is not available to third party applications. -->
1890    <permission android:name="android.permission.CREATE_USERS"
1891        android:protectionLevel="signature" />
1892
1893    <!-- @hide Allows an application to set the profile owners and the device owner.
1894         This permission is not available to third party applications.-->
1895    <permission android:name="android.permission.MANAGE_PROFILE_AND_DEVICE_OWNERS"
1896        android:protectionLevel="signature"
1897        android:label="@string/permlab_manageProfileAndDeviceOwners"
1898        android:description="@string/permdesc_manageProfileAndDeviceOwners" />
1899
1900    <!-- Allows an application to get full detailed information about
1901         recently running tasks, with full fidelity to the real state.
1902         @hide -->
1903    <permission android:name="android.permission.GET_DETAILED_TASKS"
1904        android:protectionLevel="signature" />
1905
1906    <!-- Allows an application to change the Z-order of tasks.
1907         <p>Protection level: normal
1908    -->
1909    <permission android:name="android.permission.REORDER_TASKS"
1910        android:label="@string/permlab_reorderTasks"
1911        android:description="@string/permdesc_reorderTasks"
1912        android:protectionLevel="normal" />
1913
1914    <!-- @hide Allows an application to change to remove/kill tasks -->
1915    <permission android:name="android.permission.REMOVE_TASKS"
1916        android:protectionLevel="signature" />
1917
1918    <!-- @SystemApi @hide Allows an application to create/manage/remove stacks -->
1919    <permission android:name="android.permission.MANAGE_ACTIVITY_STACKS"
1920        android:protectionLevel="signature|privileged|development" />
1921
1922    <!-- @SystemApi @hide Allows an application to embed other activities -->
1923    <permission android:name="android.permission.ACTIVITY_EMBEDDING"
1924                android:protectionLevel="signature|privileged|development" />
1925
1926    <!-- Allows an application to start any activity, regardless of permission
1927         protection or exported state.
1928         @hide -->
1929    <permission android:name="android.permission.START_ANY_ACTIVITY"
1930        android:protectionLevel="signature" />
1931
1932    <!-- @deprecated The {@link android.app.ActivityManager#restartPackage}
1933        API is no longer supported. -->
1934    <permission android:name="android.permission.RESTART_PACKAGES"
1935        android:label="@string/permlab_killBackgroundProcesses"
1936        android:description="@string/permdesc_killBackgroundProcesses"
1937        android:protectionLevel="normal" />
1938
1939    <!-- Allows an application to call
1940        {@link android.app.ActivityManager#killBackgroundProcesses}.
1941         <p>Protection level: normal
1942    -->
1943    <permission android:name="android.permission.KILL_BACKGROUND_PROCESSES"
1944        android:label="@string/permlab_killBackgroundProcesses"
1945        android:description="@string/permdesc_killBackgroundProcesses"
1946        android:protectionLevel="normal" />
1947
1948    <!-- @SystemApi @hide Allows an application to query process states and current
1949         OOM adjustment scores.
1950         <p>Not for use by third-party applications. -->
1951    <permission android:name="android.permission.GET_PROCESS_STATE_AND_OOM_SCORE"
1952        android:protectionLevel="signature|privileged|development" />
1953
1954    <!-- Allows use of PendingIntent.getIntent().
1955         @hide -->
1956    <permission android:name="android.permission.GET_INTENT_SENDER_INTENT"
1957        android:protectionLevel="signature" />
1958
1959    <!-- ================================== -->
1960    <!-- Permissions affecting the display of other applications  -->
1961    <!-- ================================== -->
1962    <eat-comment />
1963
1964    <!-- Allows an app to create windows using the type
1965         {@link android.view.WindowManager.LayoutParams#TYPE_APPLICATION_OVERLAY},
1966         shown on top of all other apps.  Very few apps
1967         should use this permission; these windows are intended for
1968         system-level interaction with the user.
1969
1970         <p class="note"><strong>Note:</strong> If the app
1971         targets API level 23 or higher, the app user must explicitly grant
1972         this permission to the app through a permission management screen. The app requests
1973         the user's approval by sending an intent with action
1974         {@link android.provider.Settings#ACTION_MANAGE_OVERLAY_PERMISSION}.
1975         The app can check whether it has this authorization by calling
1976         {@link android.provider.Settings#canDrawOverlays
1977         Settings.canDrawOverlays()}.
1978         <p>Protection level: signature -->
1979    <permission android:name="android.permission.SYSTEM_ALERT_WINDOW"
1980        android:label="@string/permlab_systemAlertWindow"
1981        android:description="@string/permdesc_systemAlertWindow"
1982        android:protectionLevel="signature|preinstalled|appop|pre23|development" />
1983
1984    <!-- @deprecated Use {@link android.Manifest.permission#REQUEST_COMPANION_RUN_IN_BACKGROUND}
1985         @hide
1986    -->
1987    <permission android:name="android.permission.RUN_IN_BACKGROUND"
1988        android:label="@string/permlab_runInBackground"
1989        android:description="@string/permdesc_runInBackground"
1990        android:protectionLevel="signature" />
1991
1992    <!-- @deprecated Use
1993        {@link android.Manifest.permission#REQUEST_COMPANION_USE_DATA_IN_BACKGROUND}
1994         @hide
1995    -->
1996    <permission android:name="android.permission.USE_DATA_IN_BACKGROUND"
1997        android:label="@string/permlab_useDataInBackground"
1998        android:description="@string/permdesc_useDataInBackground"
1999        android:protectionLevel="signature" />
2000
2001    <!-- @hide Allows an application to set display offsets for the screen.
2002         This permission is not available to third party applications. -->
2003    <permission android:name="android.permission.SET_DISPLAY_OFFSET"
2004        android:protectionLevel="signature|privileged" />
2005
2006    <!-- Allows a companion app to run in the background.
2007         <p>Protection level: normal
2008    -->
2009    <permission android:name="android.permission.REQUEST_COMPANION_RUN_IN_BACKGROUND"
2010                android:label="@string/permlab_runInBackground"
2011                android:description="@string/permdesc_runInBackground"
2012                android:protectionLevel="normal" />
2013
2014    <!-- Allows a companion app to use data in the background.
2015         <p>Protection level: normal
2016    -->
2017    <permission android:name="android.permission.REQUEST_COMPANION_USE_DATA_IN_BACKGROUND"
2018                android:label="@string/permlab_useDataInBackground"
2019                android:description="@string/permdesc_useDataInBackground"
2020                android:protectionLevel="normal" />
2021
2022
2023    <!-- ================================== -->
2024    <!-- Permissions affecting the system wallpaper -->
2025    <!-- ================================== -->
2026    <eat-comment />
2027
2028    <!-- Allows applications to set the wallpaper.
2029         <p>Protection level: normal
2030     -->
2031    <permission android:name="android.permission.SET_WALLPAPER"
2032        android:label="@string/permlab_setWallpaper"
2033        android:description="@string/permdesc_setWallpaper"
2034        android:protectionLevel="normal" />
2035
2036    <!-- Allows applications to set the wallpaper hints.
2037         <p>Protection level: normal
2038    -->
2039    <permission android:name="android.permission.SET_WALLPAPER_HINTS"
2040        android:label="@string/permlab_setWallpaperHints"
2041        android:description="@string/permdesc_setWallpaperHints"
2042        android:protectionLevel="normal" />
2043
2044    <!-- Allow the app to read the system wallpaper image without
2045        holding the READ_EXTERNAL_STORAGE permission.
2046        <p>Not for use by third-party applications.
2047        @hide
2048        @SystemApi
2049    -->
2050    <permission android:name="android.permission.READ_WALLPAPER_INTERNAL"
2051        android:protectionLevel="signature|privileged" />
2052
2053    <!-- ============================================ -->
2054    <!-- Permissions for changing the system clock -->
2055    <!-- ============================================ -->
2056    <eat-comment />
2057
2058    <!-- @SystemApi Allows applications to set the system time.
2059    <p>Not for use by third-party applications. -->
2060    <permission android:name="android.permission.SET_TIME"
2061        android:protectionLevel="signature|privileged" />
2062
2063    <!-- Allows applications to set the system time zone.
2064         <p>Not for use by third-party applications.
2065    -->
2066    <permission android:name="android.permission.SET_TIME_ZONE"
2067        android:label="@string/permlab_setTimeZone"
2068        android:description="@string/permdesc_setTimeZone"
2069        android:protectionLevel="signature|privileged" />
2070
2071    <!-- ==================================================== -->
2072    <!-- Permissions related to changing status bar   -->
2073    <!-- ==================================================== -->
2074    <eat-comment />
2075
2076    <!-- Allows an application to expand or collapse the status bar.
2077         <p>Protection level: normal
2078    -->
2079    <permission android:name="android.permission.EXPAND_STATUS_BAR"
2080        android:label="@string/permlab_expandStatusBar"
2081        android:description="@string/permdesc_expandStatusBar"
2082        android:protectionLevel="normal" />
2083
2084    <!-- ============================================================== -->
2085    <!-- Permissions related to adding/removing shortcuts from Launcher -->
2086    <!-- ============================================================== -->
2087    <eat-comment />
2088
2089    <!-- Allows an application to install a shortcut in Launcher.
2090         <p>In Android O (API level 26) and higher, the <code>INSTALL_SHORTCUT</code> broadcast no
2091         longer has any effect on your app because it's a private, implicit
2092         broadcast. Instead, you should create an app shortcut by using the
2093         {@link android.content.pm.ShortcutManager#requestPinShortcut requestPinShortcut()}
2094         method from the {@link android.content.pm.ShortcutManager} class.
2095         <p>Protection level: normal
2096    -->
2097    <permission android:name="com.android.launcher.permission.INSTALL_SHORTCUT"
2098        android:label="@string/permlab_install_shortcut"
2099        android:description="@string/permdesc_install_shortcut"
2100        android:protectionLevel="normal"/>
2101
2102    <!--This permission is no longer supported.
2103    -->
2104    <permission android:name="com.android.launcher.permission.UNINSTALL_SHORTCUT"
2105        android:label="@string/permlab_uninstall_shortcut"
2106        android:description="@string/permdesc_uninstall_shortcut"
2107        android:protectionLevel="normal"/>
2108
2109    <!-- ==================================================== -->
2110    <!-- Permissions related to accessing sync settings   -->
2111    <!-- ==================================================== -->
2112    <eat-comment />
2113
2114    <!-- Allows applications to read the sync settings.
2115         <p>Protection level: normal
2116    -->
2117    <permission android:name="android.permission.READ_SYNC_SETTINGS"
2118        android:description="@string/permdesc_readSyncSettings"
2119        android:label="@string/permlab_readSyncSettings"
2120        android:protectionLevel="normal" />
2121
2122    <!-- Allows applications to write the sync settings.
2123         <p>Protection level: normal
2124    -->
2125    <permission android:name="android.permission.WRITE_SYNC_SETTINGS"
2126        android:description="@string/permdesc_writeSyncSettings"
2127        android:label="@string/permlab_writeSyncSettings"
2128        android:protectionLevel="normal" />
2129
2130    <!-- Allows applications to read the sync stats.
2131         <p>Protection level: normal
2132    -->
2133    <permission android:name="android.permission.READ_SYNC_STATS"
2134        android:description="@string/permdesc_readSyncStats"
2135        android:label="@string/permlab_readSyncStats"
2136        android:protectionLevel="normal" />
2137
2138    <!-- ============================================ -->
2139    <!-- Permissions for low-level system interaction -->
2140    <!-- ============================================ -->
2141    <eat-comment />
2142
2143    <!-- @SystemApi @hide Change the screen compatibility mode of applications -->
2144    <permission android:name="android.permission.SET_SCREEN_COMPATIBILITY"
2145        android:protectionLevel="signature" />
2146
2147    <!-- @SystemApi Allows an application to modify the current configuration, such
2148         as locale. -->
2149    <permission android:name="android.permission.CHANGE_CONFIGURATION"
2150        android:protectionLevel="signature|privileged|development" />
2151
2152    <!-- Allows an application to read or write the system settings.
2153
2154        <p class="note"><strong>Note:</strong> If the app targets API level 23
2155        or higher, the app user
2156        must explicitly grant this permission to the app through a permission management screen.
2157        The app requests the user's approval by sending an intent with action
2158        {@link android.provider.Settings#ACTION_MANAGE_WRITE_SETTINGS}. The app
2159        can check whether it has this authorization by calling {@link
2160        android.provider.Settings.System#canWrite Settings.System.canWrite()}.
2161
2162        <p>Protection level: signature
2163    -->
2164    <permission android:name="android.permission.WRITE_SETTINGS"
2165        android:label="@string/permlab_writeSettings"
2166        android:description="@string/permdesc_writeSettings"
2167        android:protectionLevel="signature|preinstalled|appop|pre23" />
2168
2169    <!-- @SystemApi Allows an application to modify the Google service map.
2170    <p>Not for use by third-party applications. -->
2171    <permission android:name="android.permission.WRITE_GSERVICES"
2172        android:protectionLevel="signature|privileged" />
2173
2174    <!-- @SystemApi Allows an application to call
2175        {@link android.app.ActivityManager#forceStopPackage}.
2176        @hide -->
2177    <permission android:name="android.permission.FORCE_STOP_PACKAGES"
2178        android:protectionLevel="signature|privileged" />
2179
2180    <!-- @SystemApi @hide Allows an application to retrieve the content of the active window
2181         An active window is the window that has fired an accessibility event. -->
2182    <permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT"
2183        android:protectionLevel="signature|privileged" />
2184
2185    <!-- @SystemApi Modify the global animation scaling factor.
2186    <p>Not for use by third-party applications. -->
2187    <permission android:name="android.permission.SET_ANIMATION_SCALE"
2188        android:protectionLevel="signature|privileged|development" />
2189
2190    <!-- @deprecated This functionality will be removed in the future; please do
2191         not use. Allow an application to make its activities persistent. -->
2192    <permission android:name="android.permission.PERSISTENT_ACTIVITY"
2193        android:label="@string/permlab_persistentActivity"
2194        android:description="@string/permdesc_persistentActivity"
2195        android:protectionLevel="normal" />
2196
2197    <!-- Allows an application to find out the space used by any package.
2198         <p>Protection level: normal
2199    -->
2200    <permission android:name="android.permission.GET_PACKAGE_SIZE"
2201        android:label="@string/permlab_getPackageSize"
2202        android:description="@string/permdesc_getPackageSize"
2203        android:protectionLevel="normal" />
2204
2205    <!-- @deprecated No longer useful, see
2206         {@link android.content.pm.PackageManager#addPackageToPreferred}
2207         for details. -->
2208    <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS"
2209        android:protectionLevel="signature|verifier" />
2210
2211    <!-- Allows an application to receive the
2212         {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is
2213         broadcast after the system finishes booting.  If you don't
2214         request this permission, you will not receive the broadcast at
2215         that time.  Though holding this permission does not have any
2216         security implications, it can have a negative impact on the
2217         user experience by increasing the amount of time it takes the
2218         system to start and allowing applications to have themselves
2219         running without the user being aware of them.  As such, you must
2220         explicitly declare your use of this facility to make that visible
2221         to the user.
2222         <p>Protection level: normal
2223    -->
2224    <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED"
2225        android:label="@string/permlab_receiveBootCompleted"
2226        android:description="@string/permdesc_receiveBootCompleted"
2227        android:protectionLevel="normal" />
2228
2229    <!-- Allows an application to broadcast sticky intents.  These are
2230         broadcasts whose data is held by the system after being finished,
2231         so that clients can quickly retrieve that data without having
2232         to wait for the next broadcast.
2233         <p>Protection level: normal
2234    -->
2235    <permission android:name="android.permission.BROADCAST_STICKY"
2236        android:label="@string/permlab_broadcastSticky"
2237        android:description="@string/permdesc_broadcastSticky"
2238        android:protectionLevel="normal" />
2239
2240    <!-- @SystemApi Allows mounting and unmounting file systems for removable storage.
2241    <p>Not for use by third-party applications.-->
2242    <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS"
2243        android:protectionLevel="signature|privileged" />
2244
2245    <!-- @SystemApi Allows formatting file systems for removable storage.
2246    <p>Not for use by third-party applications. -->
2247    <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS"
2248        android:protectionLevel="signature|privileged" />
2249
2250    <!-- @hide -->
2251    <permission android:name="android.permission.STORAGE_INTERNAL"
2252        android:protectionLevel="signature" />
2253
2254    <!-- Allows access to ASEC non-destructive API calls
2255         @hide  -->
2256    <permission android:name="android.permission.ASEC_ACCESS"
2257        android:protectionLevel="signature" />
2258
2259    <!-- Allows creation of ASEC volumes
2260         @hide  -->
2261    <permission android:name="android.permission.ASEC_CREATE"
2262        android:protectionLevel="signature" />
2263
2264    <!-- Allows destruction of ASEC volumes
2265         @hide  -->
2266    <permission android:name="android.permission.ASEC_DESTROY"
2267        android:protectionLevel="signature" />
2268
2269    <!-- Allows mount / unmount of ASEC volumes
2270         @hide  -->
2271    <permission android:name="android.permission.ASEC_MOUNT_UNMOUNT"
2272        android:protectionLevel="signature" />
2273
2274    <!-- Allows rename of ASEC volumes
2275         @hide  -->
2276    <permission android:name="android.permission.ASEC_RENAME"
2277        android:protectionLevel="signature" />
2278
2279    <!-- @SystemApi Allows applications to write the apn settings.
2280    <p>Not for use by third-party applications. -->
2281    <permission android:name="android.permission.WRITE_APN_SETTINGS"
2282        android:protectionLevel="signature|privileged" />
2283
2284    <!-- Allows applications to change network connectivity state.
2285         <p>Protection level: normal
2286    -->
2287    <permission android:name="android.permission.CHANGE_NETWORK_STATE"
2288        android:description="@string/permdesc_changeNetworkState"
2289        android:label="@string/permlab_changeNetworkState"
2290        android:protectionLevel="normal" />
2291
2292    <!-- Allows an application to clear the caches of all installed
2293         applications on the device.
2294         <p>Protection level: signature|privileged
2295    -->
2296    <permission android:name="android.permission.CLEAR_APP_CACHE"
2297        android:protectionLevel="signature|privileged" />
2298
2299    <!-- @SystemApi Allows an application to use any media decoder when decoding for playback
2300         @hide -->
2301    <permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK"
2302        android:protectionLevel="signature|privileged" />
2303
2304    <!-- @SystemApi Allows an application to install and/or uninstall CA certificates on
2305         behalf of the user.
2306         @hide -->
2307    <permission android:name="android.permission.MANAGE_CA_CERTIFICATES"
2308        android:protectionLevel="signature|privileged" />
2309
2310    <!-- @SystemApi Allows an application to do certain operations needed for
2311         interacting with the recovery (system update) system.
2312         @hide -->
2313    <permission android:name="android.permission.RECOVERY"
2314        android:protectionLevel="signature|privileged" />
2315
2316    <!-- Allows the system to bind to an application's task services
2317         @hide -->
2318    <permission android:name="android.permission.BIND_JOB_SERVICE"
2319        android:protectionLevel="signature" />
2320    <uses-permission android:name="android.permission.BIND_JOB_SERVICE"/>
2321
2322    <!-- Allows an application to initiate configuration updates
2323         <p>An application requesting this permission is responsible for
2324         verifying the source and integrity of any update before passing
2325         it off to the various individual installer components
2326         @hide -->
2327    <permission android:name="android.permission.UPDATE_CONFIG"
2328        android:protectionLevel="signature|privileged" />
2329
2330    <!-- Allows a time zone rule updater application to request
2331         the system installs / uninstalls timezone rules.
2332         <p>An application requesting this permission is responsible for
2333         verifying the source and integrity of the update before passing
2334         it off to the installer components.
2335         @SystemApi @hide -->
2336    <permission android:name="android.permission.UPDATE_TIME_ZONE_RULES"
2337        android:protectionLevel="signature|privileged" />
2338
2339    <!-- Must be required by a time zone rule updater application,
2340         to ensure that only the system can trigger it.
2341         @hide -->
2342    <permission android:name="android.permission.TRIGGER_TIME_ZONE_RULES_CHECK"
2343        android:protectionLevel="signature" />
2344    <uses-permission android:name="android.permission.TRIGGER_TIME_ZONE_RULES_CHECK"/>
2345
2346    <!-- Allows the system to reset throttling in shortcut manager.
2347         @hide -->
2348    <permission android:name="android.permission.RESET_SHORTCUT_MANAGER_THROTTLING"
2349        android:protectionLevel="signature" />
2350
2351    <!-- Allows the system to bind to the discovered Network Recommendation Service.
2352         @SystemApi @hide -->
2353    <permission android:name="android.permission.BIND_NETWORK_RECOMMENDATION_SERVICE"
2354        android:protectionLevel="signature" />
2355    <uses-permission android:name="android.permission.BIND_NETWORK_RECOMMENDATION_SERVICE"/>
2356
2357    <!-- Allows an application to enable, disable and change priority of
2358         runtime resource overlays.
2359         @hide -->
2360    <permission android:name="android.permission.CHANGE_OVERLAY_PACKAGES"
2361        android:protectionLevel="signature|privileged" />
2362
2363    <!-- ========================================= -->
2364    <!-- Permissions for special development tools -->
2365    <!-- ========================================= -->
2366    <eat-comment />
2367
2368    <!-- @SystemApi Allows an application to read or write the secure system settings.
2369    <p>Not for use by third-party applications. -->
2370    <permission android:name="android.permission.WRITE_SECURE_SETTINGS"
2371        android:protectionLevel="signature|privileged|development" />
2372
2373    <!-- @SystemApi Allows an application to retrieve state dump information from system services.
2374    <p>Not for use by third-party applications. -->
2375    <permission android:name="android.permission.DUMP"
2376        android:protectionLevel="signature|privileged|development" />
2377
2378    <!-- @SystemApi Allows an application to read the low-level system log files.
2379    <p>Not for use by third-party applications, because
2380    Log entries can contain the user's private information. -->
2381    <permission android:name="android.permission.READ_LOGS"
2382        android:protectionLevel="signature|privileged|development" />
2383
2384    <!-- @SystemApi Configure an application for debugging.
2385    <p>Not for use by third-party applications. -->
2386    <permission android:name="android.permission.SET_DEBUG_APP"
2387        android:protectionLevel="signature|privileged|development" />
2388
2389    <!-- @SystemApi Allows an application to set the maximum number of (not needed)
2390         application processes that can be running.
2391         <p>Not for use by third-party applications. -->
2392    <permission android:name="android.permission.SET_PROCESS_LIMIT"
2393        android:protectionLevel="signature|privileged|development" />
2394
2395    <!-- @SystemApi Allows an application to control whether activities are immediately
2396         finished when put in the background.
2397         <p>Not for use by third-party applications. -->
2398    <permission android:name="android.permission.SET_ALWAYS_FINISH"
2399        android:protectionLevel="signature|privileged|development" />
2400
2401    <!-- @SystemApi Allow an application to request that a signal be sent to all persistent processes.
2402    <p>Not for use by third-party applications. -->
2403    <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES"
2404        android:protectionLevel="signature|privileged|development" />
2405
2406    <!-- ==================================== -->
2407    <!-- Private permissions                  -->
2408    <!-- ==================================== -->
2409    <eat-comment />
2410
2411    <!-- @SystemApi Allows access to the list of accounts in the Accounts Service. -->
2412    <permission android:name="android.permission.GET_ACCOUNTS_PRIVILEGED"
2413        android:protectionLevel="signature|privileged" />
2414
2415    <!-- Allows but does not guarantee access to user passwords at the conclusion of add account
2416    @hide -->
2417    <permission android:name="android.permission.GET_PASSWORD"
2418        android:protectionLevel="signature" />
2419
2420    <!-- @SystemApi Allows applications to RW to diagnostic resources.
2421    <p>Not for use by third-party applications. -->
2422    <permission android:name="android.permission.DIAGNOSTIC"
2423        android:protectionLevel="signature" />
2424
2425    <!-- @SystemApi Allows an application to open, close, or disable the status bar
2426         and its icons.
2427         <p>Not for use by third-party applications. -->
2428    <permission android:name="android.permission.STATUS_BAR"
2429        android:protectionLevel="signature|privileged" />
2430
2431    <!-- Allows an application to be the status bar.  Currently used only by SystemUI.apk
2432    @hide -->
2433    <permission android:name="android.permission.STATUS_BAR_SERVICE"
2434        android:protectionLevel="signature" />
2435
2436    <!-- Allows an application to bind to third party quick settings tiles.
2437         <p>Should only be requested by the System, should be required by
2438         TileService declarations.-->
2439    <permission android:name="android.permission.BIND_QUICK_SETTINGS_TILE"
2440        android:protectionLevel="signature" />
2441
2442    <!-- @SystemApi Allows an application to force a BACK operation on whatever is the
2443         top activity.
2444         <p>Not for use by third-party applications.
2445         @hide
2446    -->
2447    <permission android:name="android.permission.FORCE_BACK"
2448        android:protectionLevel="signature" />
2449
2450    <!-- @SystemApi Allows an application to update device statistics.
2451    <p>Not for use by third-party applications. -->
2452    <permission android:name="android.permission.UPDATE_DEVICE_STATS"
2453        android:protectionLevel="signature|privileged" />
2454
2455    <!-- @SystemApi @hide Allows an application to collect application operation statistics.
2456         Not for use by third party apps. -->
2457    <permission android:name="android.permission.GET_APP_OPS_STATS"
2458        android:protectionLevel="signature|privileged|development" />
2459
2460    <!-- @SystemApi Allows an application to update application operation statistics. Not for
2461         use by third party apps.
2462         @hide -->
2463    <permission android:name="android.permission.UPDATE_APP_OPS_STATS"
2464        android:protectionLevel="signature|privileged|installer" />
2465
2466    <!-- @SystemApi Allows an application to update the user app op restrictions.
2467         Not for use by third party apps.
2468         @hide -->
2469    <permission android:name="android.permission.MANAGE_APP_OPS_RESTRICTIONS"
2470        android:protectionLevel="signature|installer" />
2471
2472    <!-- @SystemApi Allows an application to open windows that are for use by parts
2473         of the system user interface.
2474         <p>Not for use by third-party applications.
2475         @hide
2476    -->
2477    <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW"
2478        android:protectionLevel="signature" />
2479
2480    <!-- @SystemApi Allows an application to use
2481         {@link android.view.WindowManager.LayoutsParams#PRIVATE_FLAG_HIDE_NON_SYSTEM_OVERLAY_WINDOWS}
2482         to hide non-system-overlay windows.
2483         <p>Not for use by third-party applications.
2484         @hide
2485    -->
2486    <permission android:name="android.permission.HIDE_NON_SYSTEM_OVERLAY_WINDOWS"
2487                android:protectionLevel="signature|installer" />
2488
2489    <!-- @SystemApi Allows an application to manage (create, destroy,
2490         Z-order) application tokens in the window manager.
2491         <p>Not for use by third-party applications.
2492         @hide
2493    -->
2494    <permission android:name="android.permission.MANAGE_APP_TOKENS"
2495        android:protectionLevel="signature" />
2496
2497    <!-- Allows System UI to register listeners for events from Window Manager.
2498         @hide -->
2499    <permission android:name="android.permission.REGISTER_WINDOW_MANAGER_LISTENERS"
2500        android:protectionLevel="signature" />
2501
2502    <!-- @hide Allows the application to temporarily freeze the screen for a
2503         full-screen transition. -->
2504    <permission android:name="android.permission.FREEZE_SCREEN"
2505        android:protectionLevel="signature" />
2506
2507    <!-- @SystemApi Allows an application to inject user events (keys, touch, trackball)
2508         into the event stream and deliver them to ANY window.  Without this
2509         permission, you can only deliver events to windows in your own process.
2510         <p>Not for use by third-party applications.
2511         @hide
2512    -->
2513    <permission android:name="android.permission.INJECT_EVENTS"
2514        android:protectionLevel="signature" />
2515
2516    <!-- @hide Allows an application to register an input filter which filters the stream
2517         of user events (keys, touch, trackball) before they are dispatched to any window. -->
2518    <permission android:name="android.permission.FILTER_EVENTS"
2519        android:protectionLevel="signature" />
2520
2521    <!-- @hide Allows an application to retrieve the window token from the accessibility manager. -->
2522    <permission android:name="android.permission.RETRIEVE_WINDOW_TOKEN"
2523        android:protectionLevel="signature" />
2524
2525    <!-- @hide Allows an application to modify accessibility information from another app. -->
2526    <permission android:name="android.permission.MODIFY_ACCESSIBILITY_DATA"
2527                android:protectionLevel="signature" />
2528
2529    <!-- @hide Allows an application to change the accessibility volume. -->
2530    <permission android:name="android.permission.CHANGE_ACCESSIBILITY_VOLUME"
2531                android:protectionLevel="signature" />
2532
2533    <!-- @hide Allows an application to collect frame statistics -->
2534    <permission android:name="android.permission.FRAME_STATS"
2535         android:protectionLevel="signature" />
2536
2537    <!-- @hide Allows an application to temporary enable accessibility on the device. -->
2538    <permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY"
2539        android:protectionLevel="signature" />
2540
2541    <!-- @SystemApi Allows an application to watch and control how activities are
2542         started globally in the system.  Only for is in debugging
2543         (usually the monkey command).
2544         <p>Not for use by third-party applications.
2545         @hide
2546    -->
2547    <permission android:name="android.permission.SET_ACTIVITY_WATCHER"
2548        android:protectionLevel="signature" />
2549
2550    <!-- @SystemApi Allows an application to call the activity manager shutdown() API
2551         to put the higher-level system there into a shutdown state.
2552         @hide -->
2553    <permission android:name="android.permission.SHUTDOWN"
2554        android:protectionLevel="signature|privileged" />
2555
2556    <!-- @SystemApi Allows an application to tell the activity manager to temporarily
2557         stop application switches, putting it into a special mode that
2558         prevents applications from immediately switching away from some
2559         critical UI such as the home screen.
2560         @hide -->
2561    <permission android:name="android.permission.STOP_APP_SWITCHES"
2562        android:protectionLevel="signature|privileged" />
2563
2564    <!-- @SystemApi Allows an application to retrieve private information about
2565         the current top activity, such as any assist context it can provide.
2566         <p>Not for use by third-party applications.
2567         @hide
2568    -->
2569    <permission android:name="android.permission.GET_TOP_ACTIVITY_INFO"
2570        android:protectionLevel="signature" />
2571
2572    <!-- Allows an application to retrieve the current state of keys and
2573         switches.
2574         <p>Not for use by third-party applications.
2575         @deprecated The API that used this permission has been removed. -->
2576    <permission android:name="android.permission.READ_INPUT_STATE"
2577        android:protectionLevel="signature" />
2578
2579    <!-- Must be required by an {@link android.inputmethodservice.InputMethodService},
2580         to ensure that only the system can bind to it.
2581         <p>Protection level: signature
2582    -->
2583    <permission android:name="android.permission.BIND_INPUT_METHOD"
2584        android:protectionLevel="signature" />
2585
2586    <!-- Must be required by an {@link android.media.midi.MidiDeviceService},
2587         to ensure that only the system can bind to it.
2588         <p>Protection level: signature
2589    -->
2590    <permission android:name="android.permission.BIND_MIDI_DEVICE_SERVICE"
2591        android:protectionLevel="signature" />
2592
2593    <!-- Must be required by an {@link android.accessibilityservice.AccessibilityService},
2594         to ensure that only the system can bind to it.
2595         <p>Protection level: signature
2596    -->
2597    <permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE"
2598        android:protectionLevel="signature" />
2599
2600    <!-- Must be required by a {@link android.printservice.PrintService},
2601         to ensure that only the system can bind to it.
2602         <p>Protection level: signature
2603    -->
2604    <permission android:name="android.permission.BIND_PRINT_SERVICE"
2605        android:protectionLevel="signature" />
2606
2607    <!-- Must be required by a {@link android.printservice.recommendation.RecommendationService},
2608     to ensure that only the system can bind to it.
2609     @hide
2610     @SystemApi
2611     <p>Protection level: signature
2612    -->
2613    <permission android:name="android.permission.BIND_PRINT_RECOMMENDATION_SERVICE"
2614            android:protectionLevel="signature" />
2615
2616    <!-- Allows applications to get the installed and enabled print services.
2617         @hide
2618         @SystemApi
2619         <p>Protection level: signature|preinstalled
2620    -->
2621    <permission android:name="android.permission.READ_PRINT_SERVICES"
2622        android:protectionLevel="signature|preinstalled" />
2623
2624    <!-- Allows applications to get the currently recommended print services for printers.
2625         @hide
2626         @SystemApi
2627         <p>Protection level: signature|preinstalled
2628    -->
2629    <permission android:name="android.permission.READ_PRINT_SERVICE_RECOMMENDATIONS"
2630        android:protectionLevel="signature|preinstalled" />
2631
2632    <!-- Must be required by a {@link android.nfc.cardemulation.HostApduService}
2633         or {@link android.nfc.cardemulation.OffHostApduService} to ensure that only
2634         the system can bind to it.
2635         <p>Protection level: signature
2636    -->
2637    <permission android:name="android.permission.BIND_NFC_SERVICE"
2638        android:protectionLevel="signature" />
2639
2640    <!-- Must be required by the PrintSpooler to ensure that only the system can bind to it.
2641         @hide -->
2642    <permission android:name="android.permission.BIND_PRINT_SPOOLER_SERVICE"
2643        android:protectionLevel="signature" />
2644
2645    <!-- Must be required by the CompanionDeviceManager to ensure that only the system can bind to it.
2646         @hide -->
2647    <permission android:name="android.permission.BIND_COMPANION_DEVICE_MANAGER_SERVICE"
2648        android:protectionLevel="signature" />
2649
2650    <!-- @SystemApi Must be required by the RuntimePermissionPresenterService to ensure
2651         that only the system can bind to it.
2652         @hide -->
2653    <permission android:name="android.permission.BIND_RUNTIME_PERMISSION_PRESENTER_SERVICE"
2654        android:protectionLevel="signature" />
2655
2656    <!-- Must be required by a TextService (e.g. SpellCheckerService)
2657         to ensure that only the system can bind to it.
2658         <p>Protection level: signature
2659    -->
2660    <permission android:name="android.permission.BIND_TEXT_SERVICE"
2661        android:protectionLevel="signature" />
2662
2663    <!-- Must be required by a {@link android.net.VpnService},
2664         to ensure that only the system can bind to it.
2665         <p>Protection level: signature
2666    -->
2667    <permission android:name="android.permission.BIND_VPN_SERVICE"
2668        android:protectionLevel="signature" />
2669
2670    <!-- Must be required by a {@link android.service.wallpaper.WallpaperService},
2671         to ensure that only the system can bind to it.
2672         <p>Protection level: signature|privileged
2673    -->
2674    <permission android:name="android.permission.BIND_WALLPAPER"
2675        android:protectionLevel="signature|privileged" />
2676
2677    <!-- Must be required by a {@link android.service.voice.VoiceInteractionService},
2678         to ensure that only the system can bind to it.
2679         <p>Protection level: signature
2680    -->
2681    <permission android:name="android.permission.BIND_VOICE_INTERACTION"
2682        android:protectionLevel="signature" />
2683
2684    <!-- Must be required by a {@link android.service.autofill.AutofillService},
2685         to ensure that only the system can bind to it.
2686         <p>Protection level: signature
2687    -->
2688    <permission android:name="android.permission.BIND_AUTOFILL_SERVICE"
2689        android:protectionLevel="signature" />
2690
2691    <!-- Must be required by an {@link android.service.autofill.AutofillFieldClassificationService}
2692         to ensure that only the system can bind to it.
2693         @hide This is not a third-party API (intended for OEMs and system apps).
2694    -->
2695    <permission android:name="android.permission.BIND_AUTOFILL_FIELD_CLASSIFICATION_SERVICE"
2696                android:protectionLevel="signature" />
2697
2698    <!-- Must be required by hotword enrollment application,
2699         to ensure that only the system can interact with it.
2700         @hide <p>Not for use by third-party applications.</p> -->
2701    <permission android:name="android.permission.MANAGE_VOICE_KEYPHRASES"
2702        android:protectionLevel="signature|privileged" />
2703
2704    <!-- Must be required by a {@link com.android.media.remotedisplay.RemoteDisplayProvider},
2705         to ensure that only the system can bind to it.
2706         @hide -->
2707    <permission android:name="android.permission.BIND_REMOTE_DISPLAY"
2708        android:protectionLevel="signature" />
2709
2710    <!-- Must be required by a {@link android.media.tv.TvInputService}
2711         to ensure that only the system can bind to it.
2712         <p>Protection level: signature|privileged
2713    -->
2714    <permission android:name="android.permission.BIND_TV_INPUT"
2715        android:protectionLevel="signature|privileged" />
2716
2717    <!-- @SystemApi
2718         Must be required by a {@link com.android.media.tv.remoteprovider.TvRemoteProvider}
2719         to ensure that only the system can bind to it.
2720         <p>Protection level: signature|privileged
2721         <p>Not for use by third-party applications. </p>
2722         @hide  -->
2723    <permission android:name="android.permission.BIND_TV_REMOTE_SERVICE"
2724        android:protectionLevel="signature|privileged" />
2725
2726    <!-- @SystemApi
2727         Must be required for a virtual remote controller for TV.
2728         <p>Protection level: signature|privileged
2729         <p>Not for use by third-party applications. </p>
2730         @hide  -->
2731    <permission android:name="android.permission.TV_VIRTUAL_REMOTE_CONTROLLER"
2732        android:protectionLevel="signature|privileged" />
2733
2734    <!-- Allows an application to change HDMI CEC active source.
2735         <p>Not for use by third-party applications.
2736         @hide -->
2737    <permission android:name="android.permission.CHANGE_HDMI_CEC_ACTIVE_SOURCE"
2738        android:protectionLevel="signature|privileged" />
2739
2740    <!-- @SystemApi Allows an application to modify parental controls
2741         <p>Not for use by third-party applications.
2742         @hide -->
2743    <permission android:name="android.permission.MODIFY_PARENTAL_CONTROLS"
2744        android:protectionLevel="signature|privileged" />
2745
2746    <!-- @SystemApi Allows an application to read TvContentRatingSystemInfo
2747         <p>Not for use by third-party applications.
2748         @hide -->
2749    <permission android:name="android.permission.READ_CONTENT_RATING_SYSTEMS"
2750        android:protectionLevel="signature|privileged" />
2751
2752    <!-- @SystemApi Allows an application to notify TV inputs by sending broadcasts.
2753         <p>Protection level: signature|privileged
2754         <p>Not for use by third-party applications.
2755         @hide -->
2756    <permission android:name="android.permission.NOTIFY_TV_INPUTS"
2757         android:protectionLevel="signature|privileged" />
2758
2759    <!-- Must be required by a {@link android.media.routing.MediaRouteService}
2760         to ensure that only the system can interact with it.
2761         @hide -->
2762    <permission android:name="android.permission.BIND_ROUTE_PROVIDER"
2763        android:protectionLevel="signature" />
2764
2765    <!-- Must be required by device administration receiver, to ensure that only the
2766         system can interact with it.
2767         <p>Protection level: signature
2768    -->
2769    <permission android:name="android.permission.BIND_DEVICE_ADMIN"
2770        android:protectionLevel="signature" />
2771
2772    <!-- @SystemApi Required to add or remove another application as a device admin.
2773         <p>Not for use by third-party applications.
2774         @hide -->
2775    <permission android:name="android.permission.MANAGE_DEVICE_ADMINS"
2776        android:protectionLevel="signature|privileged" />
2777
2778    <!-- @SystemApi Allows low-level access to setting the orientation (actually
2779         rotation) of the screen.
2780         <p>Not for use by third-party applications.
2781         @hide
2782    -->
2783    <permission android:name="android.permission.SET_ORIENTATION"
2784        android:protectionLevel="signature" />
2785
2786    <!-- @SystemApi Allows low-level access to setting the pointer speed.
2787         <p>Not for use by third-party applications.
2788         @hide
2789    -->
2790    <permission android:name="android.permission.SET_POINTER_SPEED"
2791        android:protectionLevel="signature" />
2792
2793    <!-- Allows low-level access to setting input device calibration.
2794         <p>Not for use by normal applications.
2795         @hide -->
2796    <permission android:name="android.permission.SET_INPUT_CALIBRATION"
2797        android:protectionLevel="signature" />
2798
2799    <!-- Allows low-level access to setting the keyboard layout.
2800         <p>Not for use by third-party applications.
2801         @hide -->
2802    <permission android:name="android.permission.SET_KEYBOARD_LAYOUT"
2803        android:protectionLevel="signature" />
2804
2805    <!-- Allows an application to query tablet mode state and monitor changes
2806         in it.
2807         <p>Not for use by third-party applications.
2808         @hide -->
2809    <permission android:name="android.permission.TABLET_MODE"
2810        android:protectionLevel="signature" />
2811
2812    <!-- Allows an application to request installing packages. Apps
2813         targeting APIs greater than 25 must hold this permission in
2814         order to use {@link android.content.Intent#ACTION_INSTALL_PACKAGE}.
2815         <p>Protection level: signature
2816    -->
2817    <permission android:name="android.permission.REQUEST_INSTALL_PACKAGES"
2818        android:label="@string/permlab_requestInstallPackages"
2819        android:description="@string/permdesc_requestInstallPackages"
2820        android:protectionLevel="signature|appop" />
2821
2822    <!-- Allows an application to request deleting packages. Apps
2823         targeting APIs {@link android.os.Build.VERSION_CODES#P} or greater must hold this
2824         permission in order to use {@link android.content.Intent#ACTION_UNINSTALL_PACKAGE} or
2825         {@link android.content.pm.PackageInstaller#uninstall}.
2826         <p>Protection level: normal
2827    -->
2828    <permission android:name="android.permission.REQUEST_DELETE_PACKAGES"
2829        android:label="@string/permlab_requestDeletePackages"
2830        android:description="@string/permdesc_requestDeletePackages"
2831        android:protectionLevel="normal" />
2832
2833    <!-- @SystemApi Allows an application to install packages.
2834    <p>Not for use by third-party applications. -->
2835    <permission android:name="android.permission.INSTALL_PACKAGES"
2836      android:protectionLevel="signature|privileged" />
2837
2838    <!-- @SystemApi Allows an application to install self updates. This is a limited version
2839         of {@link android.Manifest.permission#INSTALL_PACKAGES}.
2840        <p>Not for use by third-party applications.
2841        @hide
2842    -->
2843    <permission android:name="android.permission.INSTALL_SELF_UPDATES"
2844        android:protectionLevel="signature|privileged" />
2845
2846    <!-- @SystemApi Allows an application to clear user data.
2847         <p>Not for use by third-party applications
2848         @hide
2849    -->
2850    <permission android:name="android.permission.CLEAR_APP_USER_DATA"
2851        android:protectionLevel="signature|installer" />
2852
2853    <!-- @hide Allows an application to get the URI permissions
2854         granted to another application.
2855         <p>Not for use by third-party applications
2856    -->
2857    <permission android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS"
2858        android:protectionLevel="signature" />
2859
2860    <!-- @hide Allows an application to clear the URI permissions
2861         granted to another application.
2862         <p>Not for use by third-party applications
2863    -->
2864    <permission
2865        android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS"
2866        android:protectionLevel="signature" />
2867
2868    <!-- @hide
2869         Allows an application to change the status of Scoped Access Directory requests granted or
2870         rejected by the user.
2871         <p>This permission should <em>only</em> be requested by the platform
2872         settings app.  This permission cannot be granted to third-party apps.
2873         <p>Protection level: signature
2874    -->
2875    <permission android:name="android.permission.MANAGE_SCOPED_ACCESS_DIRECTORY_PERMISSIONS"
2876        android:protectionLevel="signature" />
2877
2878    <!-- @SystemApi Allows an application to delete cache files.
2879    <p>Not for use by third-party applications. -->
2880    <permission android:name="android.permission.DELETE_CACHE_FILES"
2881        android:protectionLevel="signature|privileged" />
2882
2883    <!-- @SystemApi Allows an application to delete packages.
2884         <p>Not for use by third-party applications.
2885         <p>Starting in {@link android.os.Build.VERSION_CODES#N}, user confirmation is requested
2886         when the application deleting the package is not the same application that installed the
2887         package. -->
2888    <permission android:name="android.permission.DELETE_PACKAGES"
2889        android:protectionLevel="signature|privileged" />
2890
2891    <!-- @SystemApi Allows an application to move location of installed package.
2892         @hide -->
2893    <permission android:name="android.permission.MOVE_PACKAGE"
2894        android:protectionLevel="signature|privileged" />
2895
2896    <!-- @SystemApi Allows an application to change whether an application component (other than its own) is
2897         enabled or not.
2898         <p>Not for use by third-party applications. -->
2899    <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE"
2900        android:protectionLevel="signature|privileged" />
2901
2902    <!-- @SystemApi Allows an application to grant specific permissions.
2903         @hide -->
2904    <permission android:name="android.permission.GRANT_RUNTIME_PERMISSIONS"
2905        android:protectionLevel="signature|installer|verifier" />
2906
2907    <!-- @SystemApi Allows an app that has this permission and the permissions to install packages
2908         to request certain runtime permissions to be granted at installation.
2909         @hide -->
2910    <permission android:name="android.permission.INSTALL_GRANT_RUNTIME_PERMISSIONS"
2911        android:protectionLevel="signature|installer|verifier" />
2912
2913    <!-- @SystemApi Allows an application to revoke specific permissions.
2914        @hide -->
2915    <permission android:name="android.permission.REVOKE_RUNTIME_PERMISSIONS"
2916         android:protectionLevel="signature|installer|verifier" />
2917
2918    <!-- @hide Allows an application to observe permission changes. -->
2919    <permission android:name="android.permission.OBSERVE_GRANT_REVOKE_PERMISSIONS"
2920        android:protectionLevel="signature|privileged" />
2921
2922    <!-- @SystemApi Allows an application to use SurfaceFlinger's low level features.
2923         <p>Not for use by third-party applications.
2924         @hide
2925    -->
2926    <permission android:name="android.permission.ACCESS_SURFACE_FLINGER"
2927        android:protectionLevel="signature" />
2928
2929    <!-- @SystemApi Allows an application to take screen shots and more generally
2930         get access to the frame buffer data.
2931         <p>Not for use by third-party applications. -->
2932    <permission android:name="android.permission.READ_FRAME_BUFFER"
2933        android:protectionLevel="signature|privileged" />
2934
2935    <!-- Allows an application to use InputFlinger's low level features.
2936         @hide -->
2937    <permission android:name="android.permission.ACCESS_INPUT_FLINGER"
2938        android:protectionLevel="signature" />
2939
2940    <!-- Allows an application to disable/enable input devices.
2941         Could be used to prevent unwanted touch events
2942         on a touchscreen, for example during swimming or rain.
2943         @hide -->
2944    <permission android:name="android.permission.DISABLE_INPUT_DEVICE"
2945        android:protectionLevel="signature" />
2946
2947    <!-- Allows an application to configure and connect to Wifi displays
2948         @hide -->
2949    <permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY"
2950        android:protectionLevel="signature" />
2951
2952    <!-- Allows an application to control low-level features of Wifi displays
2953         such as opening an RTSP socket.  This permission should only be used
2954         by the display manager.
2955         @hide -->
2956    <permission android:name="android.permission.CONTROL_WIFI_DISPLAY"
2957        android:protectionLevel="signature" />
2958
2959    <!-- Allows an application to control the color modes set for displays system-wide.
2960         <p>Not for use by third-party applications.</p>
2961         @hide -->
2962    <permission android:name="android.permission.CONFIGURE_DISPLAY_COLOR_MODE"
2963        android:protectionLevel="signature" />
2964
2965    <!-- Allows an application to collect usage infomation about brightness slider changes.
2966         <p>Not for use by third-party applications.</p>
2967         @hide
2968         @SystemApi -->
2969    <permission android:name="android.permission.BRIGHTNESS_SLIDER_USAGE"
2970        android:protectionLevel="signature|privileged|development" />
2971
2972    <!-- Allows an application to modify the display brightness configuration
2973         @hide
2974         @SystemApi -->
2975    <permission android:name="android.permission.CONFIGURE_DISPLAY_BRIGHTNESS"
2976        android:protectionLevel="signature|privileged|development" />
2977
2978    <!-- @SystemApi Allows an application to control VPN.
2979         <p>Not for use by third-party applications.</p>
2980         @hide -->
2981    <permission android:name="android.permission.CONTROL_VPN"
2982        android:protectionLevel="signature|privileged" />
2983    <uses-permission android:name="android.permission.CONTROL_VPN" />
2984
2985    <!-- @SystemApi Allows an application to capture audio output.
2986         <p>Not for use by third-party applications.</p> -->
2987    <permission android:name="android.permission.CAPTURE_AUDIO_OUTPUT"
2988        android:protectionLevel="signature|privileged" />
2989
2990    <!-- @SystemApi Allows an application to capture audio for hotword detection.
2991         <p>Not for use by third-party applications.</p>
2992         @hide -->
2993    <permission android:name="android.permission.CAPTURE_AUDIO_HOTWORD"
2994        android:protectionLevel="signature|privileged" />
2995
2996    <!-- @SystemApi Allows an application to modify audio routing and override policy decisions.
2997         <p>Not for use by third-party applications.</p>
2998         @hide -->
2999    <permission android:name="android.permission.MODIFY_AUDIO_ROUTING"
3000        android:protectionLevel="signature|privileged" />
3001
3002    <!-- @SystemApi Allows an application to capture video output.
3003         <p>Not for use by third-party applications.</p> -->
3004    <permission android:name="android.permission.CAPTURE_VIDEO_OUTPUT"
3005        android:protectionLevel="signature|privileged" />
3006
3007    <!-- @SystemApi Allows an application to capture secure video output.
3008         <p>Not for use by third-party applications.</p> -->
3009    <permission android:name="android.permission.CAPTURE_SECURE_VIDEO_OUTPUT"
3010        android:protectionLevel="signature|privileged" />
3011
3012    <!-- @SystemApi Allows an application to know what content is playing and control its playback.
3013         <p>Not for use by third-party applications due to privacy of media consumption</p>  -->
3014    <permission android:name="android.permission.MEDIA_CONTENT_CONTROL"
3015        android:protectionLevel="signature|privileged" />
3016
3017    <!-- @SystemApi @hide Allows an application to set the volume key long-press listener.
3018         <p>When it's set, the application will receive the volume key long-press event
3019         instead of changing volume.</p>
3020         <p>Not for use by third-party applications</p> -->
3021    <permission android:name="android.permission.SET_VOLUME_KEY_LONG_PRESS_LISTENER"
3022        android:protectionLevel="signature|privileged|development" />
3023
3024    <!-- @SystemApi @hide Allows an application to set media key event listener.
3025         <p>When it's set, the application will receive the media key event before
3026         any other media sessions. If the event is handled by the listener, other sessions
3027         cannot get the event.</p>
3028         <p>Not for use by third-party applications</p> -->
3029    <permission android:name="android.permission.SET_MEDIA_KEY_LISTENER"
3030        android:protectionLevel="signature|privileged|development" />
3031
3032    <!-- @SystemApi Required to be able to disable the device (very dangerous!).
3033         <p>Not for use by third-party applications.
3034         @hide
3035    -->
3036    <permission android:name="android.permission.BRICK"
3037        android:protectionLevel="signature" />
3038
3039    <!-- @SystemApi Required to be able to reboot the device.
3040    <p>Not for use by third-party applications. -->
3041    <permission android:name="android.permission.REBOOT"
3042        android:protectionLevel="signature|privileged" />
3043
3044   <!-- @SystemApi Allows low-level access to power management.
3045        <p>Not for use by third-party applications.
3046        @hide
3047    -->
3048   <permission android:name="android.permission.DEVICE_POWER"
3049        android:protectionLevel="signature" />
3050
3051   <!-- Allows access to the PowerManager.userActivity function.
3052   <p>Not for use by third-party applications. @hide @SystemApi -->
3053    <permission android:name="android.permission.USER_ACTIVITY"
3054        android:protectionLevel="signature|privileged" />
3055
3056   <!-- @hide Allows low-level access to tun tap driver -->
3057    <permission android:name="android.permission.NET_TUNNELING"
3058        android:protectionLevel="signature" />
3059
3060    <!-- Run as a manufacturer test application, running as the root user.
3061         Only available when the device is running in manufacturer test mode.
3062         <p>Not for use by third-party applications.
3063    -->
3064    <permission android:name="android.permission.FACTORY_TEST"
3065        android:protectionLevel="signature" />
3066
3067    <!-- Allows an application to broadcast a notification that an application
3068         package has been removed.
3069         <p>Not for use by third-party applications.
3070    -->
3071    <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED"
3072        android:protectionLevel="signature" />
3073
3074    <!-- Allows an application to broadcast an SMS receipt notification.
3075         <p>Not for use by third-party applications.
3076    -->
3077    <permission android:name="android.permission.BROADCAST_SMS"
3078        android:protectionLevel="signature" />
3079
3080    <!-- Allows an application to broadcast a WAP PUSH receipt notification.
3081         <p>Not for use by third-party applications.
3082    -->
3083    <permission android:name="android.permission.BROADCAST_WAP_PUSH"
3084        android:protectionLevel="signature" />
3085
3086    <!-- @SystemApi Allows an application to broadcast privileged networking requests.
3087         <p>Not for use by third-party applications.
3088         @hide
3089         @deprecated Use {@link android.Manifest.permission#REQUEST_NETWORK_SCORES} instead
3090    -->
3091    <permission android:name="android.permission.BROADCAST_NETWORK_PRIVILEGED"
3092        android:protectionLevel="signature|privileged" />
3093
3094    <!-- @SystemApi Not for use by third-party applications. -->
3095    <permission android:name="android.permission.MASTER_CLEAR"
3096        android:protectionLevel="signature|privileged" />
3097
3098    <!-- @SystemApi Allows an application to call any phone number, including emergency
3099         numbers, without going through the Dialer user interface for the user
3100         to confirm the call being placed.
3101         <p>Not for use by third-party applications. -->
3102    <permission android:name="android.permission.CALL_PRIVILEGED"
3103        android:protectionLevel="signature|privileged" />
3104
3105    <!-- @SystemApi Allows an application to perform CDMA OTA provisioning @hide -->
3106    <permission android:name="android.permission.PERFORM_CDMA_PROVISIONING"
3107        android:protectionLevel="signature|privileged" />
3108
3109    <!-- @SystemApi Allows an application to perform SIM Activation @hide -->
3110    <permission android:name="android.permission.PERFORM_SIM_ACTIVATION"
3111        android:protectionLevel="signature|privileged" />
3112
3113    <!-- @SystemApi Allows enabling/disabling location update notifications from
3114         the radio.
3115         <p>Not for use by third-party applications. -->
3116    <permission android:name="android.permission.CONTROL_LOCATION_UPDATES"
3117        android:protectionLevel="signature|privileged" />
3118
3119    <!-- @SystemApi Allows read/write access to the "properties" table in the checkin
3120         database, to change values that get uploaded.
3121         <p>Not for use by third-party applications. -->
3122    <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES"
3123        android:protectionLevel="signature|privileged" />
3124
3125    <!-- @SystemApi Allows an application to collect component usage
3126         statistics
3127         <p>Declaring the permission implies intention to use the API and the user of the
3128         device can grant permission through the Settings application. -->
3129    <permission android:name="android.permission.PACKAGE_USAGE_STATS"
3130        android:protectionLevel="signature|privileged|development|appop" />
3131    <uses-permission android:name="android.permission.PACKAGE_USAGE_STATS" />
3132
3133    <!-- @hide @SystemApi Allows an application to change the app idle state of an app.
3134         <p>Not for use by third-party applications. -->
3135    <permission android:name="android.permission.CHANGE_APP_IDLE_STATE"
3136        android:protectionLevel="signature|privileged" />
3137
3138    <!-- @hide @SystemApi Allows an application to temporarily whitelist an inactive app to
3139         access the network and acquire wakelocks.
3140         <p>Not for use by third-party applications. -->
3141    <permission android:name="android.permission.CHANGE_DEVICE_IDLE_TEMP_WHITELIST"
3142        android:protectionLevel="signature|privileged" />
3143
3144    <!-- Permission an application must hold in order to use
3145         {@link android.provider.Settings#ACTION_REQUEST_IGNORE_BATTERY_OPTIMIZATIONS}.
3146         This is a normal permission: an app requesting it will always be granted the
3147         permission, without the user needing to approve or see it. -->
3148    <permission android:name="android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS"
3149        android:label="@string/permlab_requestIgnoreBatteryOptimizations"
3150        android:description="@string/permdesc_requestIgnoreBatteryOptimizations"
3151        android:protectionLevel="normal" />
3152
3153    <!-- @SystemApi Allows an application to collect battery statistics -->
3154    <permission android:name="android.permission.BATTERY_STATS"
3155        android:protectionLevel="signature|privileged|development" />
3156
3157    <!--Allows an application to manage statscompanion.
3158    <p>Not for use by third-party applications.
3159         @hide -->
3160    <permission android:name="android.permission.STATSCOMPANION"
3161        android:protectionLevel="signature" />
3162
3163    <!-- @SystemApi Allows an application to control the backup and restore process.
3164    <p>Not for use by third-party applications.
3165         @hide pending API council -->
3166    <permission android:name="android.permission.BACKUP"
3167        android:protectionLevel="signature|privileged" />
3168
3169    <!-- @SystemApi Allows application to manage RecoverableKeyStoreLoader.
3170    <p>Not for use by third-party applications.
3171         @hide -->
3172    <permission android:name="android.permission.RECOVER_KEYSTORE"
3173        android:protectionLevel="signature|privileged" />
3174
3175    <!-- Allows a package to launch the secure full-backup confirmation UI.
3176         ONLY the system process may hold this permission.
3177         @hide -->
3178    <permission android:name="android.permission.CONFIRM_FULL_BACKUP"
3179        android:protectionLevel="signature" />
3180
3181    <!-- @SystemApi Must be required by a {@link android.widget.RemoteViewsService},
3182         to ensure that only the system can bind to it. -->
3183    <permission android:name="android.permission.BIND_REMOTEVIEWS"
3184        android:protectionLevel="signature|privileged" />
3185
3186    <!-- @SystemApi Allows an application to tell the AppWidget service which application
3187         can access AppWidget's data.  The normal user flow is that a user
3188         picks an AppWidget to go into a particular host, thereby giving that
3189         host application access to the private data from the AppWidget app.
3190         An application that has this permission should honor that contract.
3191         <p>Not for use by third-party applications. -->
3192    <permission android:name="android.permission.BIND_APPWIDGET"
3193        android:protectionLevel="signature|privileged" />
3194
3195    <!-- @hide Allows sysui to manage user grants of slice permissions. -->
3196    <permission android:name="android.permission.MANAGE_SLICE_PERMISSIONS"
3197        android:protectionLevel="signature" />
3198
3199    <!-- Allows an application to bind app's slices and get their
3200         content. This content will be surfaced to the
3201         user and not to leave the device.
3202         <p>Not for use by third-party applications.-->
3203    <permission android:name="android.permission.BIND_SLICE"
3204        android:protectionLevel="signature|privileged|development" />
3205
3206    <!-- @SystemApi Private permission, to restrict who can bring up a dialog to add a new
3207         keyguard widget
3208         @hide -->
3209    <permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET"
3210        android:protectionLevel="signature|privileged" />
3211
3212    <!-- @SystemApi Internal permission allowing an application to query/set which
3213         applications can bind AppWidgets.
3214         @hide -->
3215    <permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS"
3216        android:protectionLevel="signature|privileged" />
3217
3218    <!-- Allows applications to change the background data setting.
3219    <p>Not for use by third-party applications.
3220         @hide pending API council -->
3221    <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING"
3222        android:protectionLevel="signature" />
3223
3224    <!-- @SystemApi This permission can be used on content providers to allow the global
3225         search system to access their data.  Typically it used when the
3226         provider has some permissions protecting it (which global search
3227         would not be expected to hold), and added as a read-only permission
3228         to the path in the provider where global search queries are
3229         performed.  This permission can not be held by regular applications;
3230         it is used by applications to protect themselves from everyone else
3231         besides global search. -->
3232    <permission android:name="android.permission.GLOBAL_SEARCH"
3233        android:protectionLevel="signature|privileged" />
3234
3235    <!-- Internal permission protecting access to the global search
3236         system: ensures that only the system can access the provider
3237         to perform queries (since this otherwise provides unrestricted
3238         access to a variety of content providers), and to write the
3239         search statistics (to keep applications from gaming the source
3240         ranking).
3241         @hide -->
3242    <permission android:name="android.permission.GLOBAL_SEARCH_CONTROL"
3243        android:protectionLevel="signature" />
3244
3245    <!-- @SystemApi Internal permission to allows an application to read indexable data.
3246        @hide -->
3247    <permission android:name="android.permission.READ_SEARCH_INDEXABLES"
3248        android:protectionLevel="signature|privileged" />
3249
3250    <!-- @SystemApi Internal permission to allows an application to bind to suggestion service.
3251        @hide -->
3252    <permission android:name="android.permission.BIND_SETTINGS_SUGGESTIONS_SERVICE"
3253                android:protectionLevel="signature" />
3254
3255    <!-- @SystemApi Allows applications to set a live wallpaper.
3256         @hide XXX Change to signature once the picker is moved to its
3257         own apk as Ghod Intended. -->
3258    <permission android:name="android.permission.SET_WALLPAPER_COMPONENT"
3259        android:protectionLevel="signature|privileged" />
3260
3261    <!-- @SystemApi Allows applications to read dream settings and dream state.
3262         @hide -->
3263    <permission android:name="android.permission.READ_DREAM_STATE"
3264        android:protectionLevel="signature|privileged" />
3265
3266    <!-- @SystemApi Allows applications to write dream settings, and start or stop dreaming.
3267         @hide -->
3268    <permission android:name="android.permission.WRITE_DREAM_STATE"
3269        android:protectionLevel="signature|privileged" />
3270
3271    <!-- @SystemApi Allow an application to read and write the cache partition.
3272         @hide -->
3273    <permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM"
3274        android:protectionLevel="signature|privileged" />
3275
3276    <!-- Must be required by default container service so that only
3277         the system can bind to it and use it to copy
3278         protected data to secure containers or files
3279         accessible to the system.
3280         @hide -->
3281    <permission android:name="android.permission.COPY_PROTECTED_DATA"
3282        android:protectionLevel="signature" />
3283
3284    <!-- @SystemApi Internal permission protecting access to the encryption methods
3285        @hide
3286    -->
3287    <permission android:name="android.permission.CRYPT_KEEPER"
3288        android:protectionLevel="signature|privileged" />
3289
3290    <!-- @SystemApi Allows an application to read historical network usage for
3291         specific networks and applications. @hide -->
3292    <permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY"
3293        android:protectionLevel="signature|privileged" />
3294
3295    <!-- Allows an application to manage network policies (such as warning and disable
3296         limits) and to define application-specific rules. @hide -->
3297    <permission android:name="android.permission.MANAGE_NETWORK_POLICY"
3298        android:protectionLevel="signature" />
3299
3300    <!-- @SystemApi @hide @deprecated use UPDATE_DEVICE_STATS instead -->
3301    <permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING"
3302        android:protectionLevel="signature|privileged" />
3303
3304    <!-- @SystemApi @hide Allows an application to manage carrier subscription plans. -->
3305    <permission android:name="android.permission.MANAGE_SUBSCRIPTION_PLANS"
3306        android:protectionLevel="signature|privileged" />
3307
3308    <!-- C2DM permission.
3309         @hide Used internally.
3310     -->
3311    <permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"
3312          android:protectionLevel="signature" />
3313    <uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/>
3314
3315    <!-- @SystemApi @hide Package verifier needs to have this permission before the PackageManager will
3316         trust it to verify packages.
3317    -->
3318    <permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT"
3319        android:protectionLevel="signature|privileged" />
3320
3321    <!-- Must be required by package verifier receiver, to ensure that only the
3322         system can interact with it.
3323         @hide
3324    -->
3325    <permission android:name="android.permission.BIND_PACKAGE_VERIFIER"
3326        android:protectionLevel="signature" />
3327
3328    <!-- @SystemApi @hide Allows an application to mark other applications as harmful -->
3329    <permission android:name="android.permission.SET_HARMFUL_APP_WARNINGS"
3330        android:protectionLevel="signature|verifier" />
3331
3332    <!-- @SystemApi @hide Intent filter verifier needs to have this permission before the
3333         PackageManager will trust it to verify intent filters.
3334    -->
3335    <permission android:name="android.permission.INTENT_FILTER_VERIFICATION_AGENT"
3336        android:protectionLevel="signature|privileged" />
3337
3338    <!-- Must be required by intent filter verifier receiver, to ensure that only the
3339         system can interact with it.
3340         @hide
3341    -->
3342    <permission android:name="android.permission.BIND_INTENT_FILTER_VERIFIER"
3343        android:protectionLevel="signature" />
3344
3345    <!-- @SystemApi Allows applications to access serial ports via the SerialManager.
3346         @hide -->
3347    <permission android:name="android.permission.SERIAL_PORT"
3348        android:protectionLevel="signature|privileged" />
3349
3350    <!-- Allows the holder to access content providers from outside an ApplicationThread.
3351         This permission is enforced by the ActivityManagerService on the corresponding APIs,
3352         in particular ActivityManagerService#getContentProviderExternal(String) and
3353         ActivityManagerService#removeContentProviderExternal(String).
3354         @hide
3355    -->
3356    <permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY"
3357        android:protectionLevel="signature" />
3358
3359    <!-- @SystemApi Allows an application to hold an UpdateLock, recommending that a headless
3360         OTA reboot *not* occur while the lock is held.
3361         @hide -->
3362    <permission android:name="android.permission.UPDATE_LOCK"
3363        android:protectionLevel="signature|privileged" />
3364
3365    <!-- @SystemApi Allows an application to read the current set of notifications, including
3366         any metadata and intents attached.
3367         @hide -->
3368    <permission android:name="android.permission.ACCESS_NOTIFICATIONS"
3369        android:protectionLevel="signature|privileged|appop" />
3370
3371    <!-- Marker permission for applications that wish to access notification policy.
3372         <p>Protection level: normal
3373    -->
3374    <permission android:name="android.permission.ACCESS_NOTIFICATION_POLICY"
3375        android:description="@string/permdesc_access_notification_policy"
3376        android:label="@string/permlab_access_notification_policy"
3377        android:protectionLevel="normal" />
3378
3379    <!-- Allows modification of do not disturb rules and policies. Only allowed for system
3380        processes.
3381        @hide -->
3382    <permission android:name="android.permission.MANAGE_NOTIFICATIONS"
3383                android:protectionLevel="signature" />
3384
3385    <!-- Allows notifications to be colorized
3386         <p>Not for use by third-party applications. @hide -->
3387    <permission android:name="android.permission.USE_COLORIZED_NOTIFICATIONS"
3388                android:protectionLevel="signature|setup" />
3389
3390    <!-- Allows access to keyguard secure storage.  Only allowed for system processes.
3391        @hide -->
3392    <permission android:name="android.permission.ACCESS_KEYGUARD_SECURE_STORAGE"
3393        android:protectionLevel="signature" />
3394
3395    <!-- Allows managing (adding, removing) fingerprint templates. Reserved for the system. @hide -->
3396    <permission android:name="android.permission.MANAGE_FINGERPRINT"
3397        android:protectionLevel="signature|privileged" />
3398
3399    <!-- Allows an app to reset fingerprint attempt counter. Reserved for the system. @hide -->
3400    <permission android:name="android.permission.RESET_FINGERPRINT_LOCKOUT"
3401        android:protectionLevel="signature" />
3402
3403    <!-- Allows an application to control keyguard.  Only allowed for system processes.
3404        @hide -->
3405    <permission android:name="android.permission.CONTROL_KEYGUARD"
3406        android:protectionLevel="signature" />
3407
3408    <!-- Allows an application to listen to trust changes.  Only allowed for system processes.
3409        @hide -->
3410    <permission android:name="android.permission.TRUST_LISTENER"
3411        android:protectionLevel="signature" />
3412
3413    <!-- @SystemApi Allows an application to provide a trust agent.
3414         @hide For security reasons, this is a platform-only permission. -->
3415    <permission android:name="android.permission.PROVIDE_TRUST_AGENT"
3416        android:protectionLevel="signature|privileged" />
3417
3418    <!-- @SystemApi Allows an application to show a message
3419         on the keyguard when asking to dismiss it.
3420         @hide For security reasons, this is a platform-only permission. -->
3421    <permission android:name="android.permission.SHOW_KEYGUARD_MESSAGE"
3422        android:protectionLevel="signature|privileged" />
3423
3424    <!-- Allows an application to launch the trust agent settings activity.
3425        @hide -->
3426    <permission android:name="android.permission.LAUNCH_TRUST_AGENT_SETTINGS"
3427        android:protectionLevel="signature|privileged" />
3428
3429    <!-- @SystemApi Must be required by an {@link
3430        android.service.trust.TrustAgentService},
3431        to ensure that only the system can bind to it.
3432        @hide -->
3433    <permission android:name="android.permission.BIND_TRUST_AGENT"
3434        android:protectionLevel="signature" />
3435
3436    <!-- Must be required by an {@link
3437         android.service.notification.NotificationListenerService},
3438         to ensure that only the system can bind to it.
3439         <p>Protection level: signature
3440    -->
3441    <permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE"
3442        android:protectionLevel="signature" />
3443
3444    <!-- @SystemApi Must be required by an {@link
3445         android.service.notification.NotificationAssistantService} to ensure that only the system
3446         can bind to it.
3447         <p>Protection level: signature
3448         @hide
3449    -->
3450    <permission android:name="android.permission.BIND_NOTIFICATION_ASSISTANT_SERVICE"
3451        android:protectionLevel="signature" />
3452
3453    <!-- Must be required by a {@link
3454         android.service.chooser.ChooserTargetService}, to ensure that
3455         only the system can bind to it.
3456         <p>Protection level: signature
3457    -->
3458    <permission android:name="android.permission.BIND_CHOOSER_TARGET_SERVICE"
3459        android:protectionLevel="signature" />
3460
3461    <!-- @SystemApi Must be held by services that extend
3462         {@link android.service.resolver.ResolverRankerService}.
3463         <p>Protection level: signature|privileged
3464         @hide
3465    -->
3466    <permission android:name="android.permission.PROVIDE_RESOLVER_RANKER_SERVICE"
3467                android:protectionLevel="signature|privileged" />
3468
3469    <!-- @SystemApi Must be required by services that extend
3470         {@link android.service.resolver.ResolverRankerService}, to ensure that only the system can
3471         bind to them.
3472         <p>Protection level: signature
3473         @hide
3474    -->
3475    <permission android:name="android.permission.BIND_RESOLVER_RANKER_SERVICE"
3476        android:protectionLevel="signature" />
3477
3478    <!-- Must be required by a {@link
3479         android.service.notification.ConditionProviderService},
3480         to ensure that only the system can bind to it.
3481         <p>Protection level: signature
3482         -->
3483    <permission android:name="android.permission.BIND_CONDITION_PROVIDER_SERVICE"
3484        android:protectionLevel="signature" />
3485
3486    <!-- Must be required by an {@link android.service.dreams.DreamService},
3487         to ensure that only the system can bind to it.
3488         <p>Protection level: signature
3489    -->
3490    <permission android:name="android.permission.BIND_DREAM_SERVICE"
3491        android:protectionLevel="signature" />
3492
3493    <!-- Must be required by an {@link android.app.usage.CacheQuotaService} to ensure that only the
3494         system can bind to it.
3495         @hide This is not a third-party API (intended for OEMs and system apps).
3496    -->
3497    <permission android:name="android.permission.BIND_CACHE_QUOTA_SERVICE"
3498                android:protectionLevel="signature" />
3499
3500    <!-- @SystemApi Allows an application to call into a carrier setup flow. It is up to the
3501         carrier setup application to enforce that this permission is required
3502         @hide This is not a third-party API (intended for OEMs and system apps). -->
3503    <permission android:name="android.permission.INVOKE_CARRIER_SETUP"
3504        android:protectionLevel="signature|privileged" />
3505
3506    <!-- @SystemApi Allows an application to listen for network condition observations.
3507         @hide This is not a third-party API (intended for system apps). -->
3508    <permission android:name="android.permission.ACCESS_NETWORK_CONDITIONS"
3509        android:protectionLevel="signature|privileged" />
3510
3511    <!-- @SystemApi Allows an application to provision and access DRM certificates
3512         @hide This is not a third-party API (intended for system apps). -->
3513    <permission android:name="android.permission.ACCESS_DRM_CERTIFICATES"
3514        android:protectionLevel="signature|privileged" />
3515
3516    <!-- Api Allows an application to manage media projection sessions.
3517         @hide This is not a third-party API (intended for system apps). -->
3518    <permission android:name="android.permission.MANAGE_MEDIA_PROJECTION"
3519        android:protectionLevel="signature" />
3520
3521    <!-- @SystemApi Allows an application to read install sessions
3522         @hide This is not a third-party API (intended for system apps). -->
3523    <permission android:name="android.permission.READ_INSTALL_SESSIONS"
3524        android:label="@string/permlab_readInstallSessions"
3525        android:description="@string/permdesc_readInstallSessions"
3526        android:protectionLevel="normal"/>
3527
3528    <!-- @SystemApi Allows an application to remove DRM certificates
3529         @hide This is not a third-party API (intended for system apps). -->
3530    <permission android:name="android.permission.REMOVE_DRM_CERTIFICATES"
3531        android:protectionLevel="signature|privileged" />
3532
3533    <!-- @deprecated Use {@link android.Manifest.permission#BIND_CARRIER_SERVICES} instead -->
3534    <permission android:name="android.permission.BIND_CARRIER_MESSAGING_SERVICE"
3535        android:protectionLevel="signature|privileged" />
3536
3537    <!-- Allows an application to interact with the currently active
3538         {@link android.service.voice.VoiceInteractionService}.
3539         @hide -->
3540    <permission android:name="android.permission.ACCESS_VOICE_INTERACTION_SERVICE"
3541        android:protectionLevel="signature" />
3542
3543    <!-- The system process that is allowed to bind to services in carrier apps will
3544         have this permission. Carrier apps should use this permission to protect
3545         their services that only the system is allowed to bind to.
3546         <p>Protection level: signature|privileged
3547    -->
3548    <permission android:name="android.permission.BIND_CARRIER_SERVICES"
3549        android:label="@string/permlab_bindCarrierServices"
3550        android:description="@string/permdesc_bindCarrierServices"
3551        android:protectionLevel="signature|privileged" />
3552
3553    <!-- Allows an application to query whether DO_NOT_ASK_CREDENTIALS_ON_BOOT
3554         flag is set.
3555         @hide -->
3556    <permission android:name="android.permission.QUERY_DO_NOT_ASK_CREDENTIALS_ON_BOOT"
3557                android:protectionLevel="signature" />
3558
3559    <!-- @SystemApi Allows applications to kill UIDs.
3560        <p>Not for use by third-party applications.
3561         @hide -->
3562    <permission android:name="android.permission.KILL_UID"
3563                android:protectionLevel="signature|installer" />
3564
3565    <!-- @SystemApi Allows applications to read the local WiFi and Bluetooth MAC address.
3566        @hide -->
3567    <permission android:name="android.permission.LOCAL_MAC_ADDRESS"
3568                android:protectionLevel="signature|privileged" />
3569    <uses-permission android:name="android.permission.LOCAL_MAC_ADDRESS"/>
3570
3571    <!-- @SystemApi Allows access to MAC addresses of WiFi and Bluetooth peer devices.
3572        @hide -->
3573    <permission android:name="android.permission.PEERS_MAC_ADDRESS"
3574                android:protectionLevel="signature|setup" />
3575
3576    <!-- Allows the Nfc stack to dispatch Nfc messages to applications. Applications
3577        can use this permission to ensure incoming Nfc messages are from the Nfc stack
3578        and not simulated by another application.
3579        @hide -->
3580    <permission android:name="android.permission.DISPATCH_NFC_MESSAGE"
3581                android:protectionLevel="signature|privileged" />
3582
3583    <!-- @SystemApi Allows changing day / night mode when system is configured with
3584         config_lockDayNightMode set to true. If requesting app does not have permission,
3585         it will be ignored.
3586        @hide -->
3587    <permission android:name="android.permission.MODIFY_DAY_NIGHT_MODE"
3588                android:protectionLevel="signature|privileged" />
3589
3590    <!-- The system process is explicitly the only one allowed to launch the
3591         confirmation UI for full backup/restore -->
3592    <uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/>
3593
3594    <!-- Allows the holder to access and manage instant applications on the device.
3595    @hide -->
3596    <permission android:name="android.permission.ACCESS_INSTANT_APPS"
3597            android:protectionLevel="signature|installer|verifier" />
3598    <uses-permission android:name="android.permission.ACCESS_INSTANT_APPS"/>
3599
3600    <!-- Allows the holder to view the instant applications on the device.
3601    @hide -->
3602    <permission android:name="android.permission.VIEW_INSTANT_APPS"
3603                android:protectionLevel="signature|preinstalled" />
3604
3605    <!-- Allows the holder to manage whether the system can bind to services
3606         provided by instant apps. This permission is intended to protect
3607         test/development fucntionality and should be used only in such cases.
3608    @hide -->
3609    <permission android:name="android.permission.MANAGE_BIND_INSTANT_SERVICE"
3610                android:protectionLevel="signature" />
3611
3612    <!-- Allows receiving the usage of media resource e.g. video/audio codec and
3613         graphic memory.
3614         @hide -->
3615    <permission android:name="android.permission.RECEIVE_MEDIA_RESOURCE_USAGE"
3616                android:protectionLevel="signature|privileged" />
3617
3618    <!-- Must be required by system/priv apps when accessing the sound trigger
3619         APIs given by {@link SoundTriggerManager}.
3620         @hide <p>Not for use by third-party applications.</p> -->
3621    <permission android:name="android.permission.MANAGE_SOUND_TRIGGER"
3622        android:protectionLevel="signature|privileged" />
3623
3624    <!-- @SystemApi Allows trusted applications to dispatch managed provisioning message to Managed
3625         Provisioning app. If requesting app does not have permission, it will be ignored.
3626         @hide -->
3627    <permission android:name="android.permission.DISPATCH_PROVISIONING_MESSAGE"
3628                android:protectionLevel="signature|privileged" />
3629
3630    <!-- Allows the holder to read blocked numbers. See
3631         {@link android.provider.BlockedNumberContract}.
3632         @hide -->
3633    <permission android:name="android.permission.READ_BLOCKED_NUMBERS"
3634                android:protectionLevel="signature" />
3635
3636    <!-- Allows the holder to write blocked numbers. See
3637         {@link android.provider.BlockedNumberContract}.
3638         @hide -->
3639    <permission android:name="android.permission.WRITE_BLOCKED_NUMBERS"
3640                android:protectionLevel="signature" />
3641
3642    <!-- Must be required by an {@link android.service.vr.VrListenerService}, to ensure that only
3643         the system can bind to it.
3644         <p>Protection level: signature -->
3645    <permission android:name="android.permission.BIND_VR_LISTENER_SERVICE"
3646        android:protectionLevel="signature" />
3647
3648    <!-- Must be required by system apps when accessing restricted VR APIs.
3649         @hide
3650         @SystemApi
3651         <p>Protection level: signature -->
3652    <permission android:name="android.permission.RESTRICTED_VR_ACCESS"
3653        android:protectionLevel="signature|preinstalled" />
3654
3655    <!-- Required to make calls to {@link android.service.vr.IVrManager}.
3656         @hide -->
3657    <permission android:name="android.permission.ACCESS_VR_MANAGER"
3658            android:protectionLevel="signature" />
3659
3660    <!-- Required to access VR-Mode state and state change events via {android.app.VrStateCallback}
3661         @hide -->
3662    <permission android:name="android.permission.ACCESS_VR_STATE"
3663        android:protectionLevel="signature|preinstalled" />
3664
3665    <!-- Allows an application to whitelist tasks during lock task mode
3666         @hide <p>Not for use by third-party applications.</p> -->
3667    <permission android:name="android.permission.UPDATE_LOCK_TASK_PACKAGES"
3668        android:protectionLevel="signature|setup" />
3669
3670    <!-- @SystemApi Allows an application to replace the app name displayed alongside notifications
3671         in the N-release and later.
3672         @hide  <p>Not for use by third-party applications.</p> -->
3673    <permission android:name="android.permission.SUBSTITUTE_NOTIFICATION_APP_NAME"
3674                android:protectionLevel="signature|privileged" />
3675
3676    <!-- @SystemApi Allows an application to show notifications before the device is provisioned.
3677         @hide  <p>Not for use by third-party applications.</p> -->
3678    <permission android:name="android.permission.NOTIFICATION_DURING_SETUP"
3679                android:protectionLevel="signature|privileged" />
3680
3681    <!-- @SystemApi Allows an application to manage auto-fill sessions.
3682         @hide  <p>Not for use by third-party applications.</p> -->
3683    <permission android:name="android.permission.MANAGE_AUTO_FILL"
3684        android:protectionLevel="signature" />
3685
3686    <!-- Allows an app to set the theme overlay in /vendor/overlay
3687         being used.
3688         @hide  <p>Not for use by third-party applications.</p> -->
3689    <permission android:name="android.permission.MODIFY_THEME_OVERLAY"
3690                android:protectionLevel="signature" />
3691
3692    <!-- Allows an instant app to create foreground services. -->
3693    <permission android:name="android.permission.INSTANT_APP_FOREGROUND_SERVICE"
3694        android:protectionLevel="signature|development|instant|appop" />
3695
3696    <!-- @hide Allows system components to access all app shortcuts. -->
3697    <permission android:name="android.permission.ACCESS_SHORTCUTS"
3698        android:protectionLevel="signature" />
3699
3700    <!-- @SystemApi Allows an application to read the runtime profiles of other apps.
3701         @hide <p>Not for use by third-party applications. -->
3702    <permission android:name="android.permission.READ_RUNTIME_PROFILES"
3703                android:protectionLevel="signature|privileged" />
3704
3705    <!-- @hide Allows audio policy management. -->
3706    <permission android:name="android.permission.MANAGE_AUDIO_POLICY"
3707        android:protectionLevel="signature" />
3708
3709    <!-- @SystemApi Allows an application to turn on / off quiet mode.
3710         @hide <p>Not for use by third-party applications. -->
3711    <permission android:name="android.permission.MODIFY_QUIET_MODE"
3712                android:protectionLevel="signature|privileged" />
3713
3714    <!-- Allows internal management of the camera framework
3715         @hide -->
3716    <permission android:name="android.permission.MANAGE_CAMERA"
3717        android:protectionLevel="signature" />
3718
3719    <!-- Allows an application to control remote animations. See
3720         {@link ActivityOptions#makeRemoteAnimation}
3721         @hide <p>Not for use by third-party applications. -->
3722    <permission android:name="android.permission.CONTROL_REMOTE_APP_TRANSITION_ANIMATIONS"
3723        android:protectionLevel="signature|privileged" />
3724
3725    <application android:process="system"
3726                 android:persistent="true"
3727                 android:hasCode="false"
3728                 android:label="@string/android_system_label"
3729                 android:allowClearUserData="false"
3730                 android:backupAgent="com.android.server.backup.SystemBackupAgent"
3731                 android:killAfterRestore="false"
3732                 android:icon="@drawable/ic_launcher_android"
3733                 android:supportsRtl="true"
3734                 android:theme="@style/Theme.DeviceDefault.Light.DarkActionBar"
3735                 android:defaultToDeviceProtectedStorage="true"
3736                 android:directBootAware="true">
3737        <activity android:name="com.android.internal.app.ChooserActivity"
3738                android:theme="@style/Theme.DeviceDefault.Resolver"
3739                android:finishOnCloseSystemDialogs="true"
3740                android:excludeFromRecents="true"
3741                android:documentLaunchMode="never"
3742                android:relinquishTaskIdentity="true"
3743                android:configChanges="screenSize|smallestScreenSize|screenLayout|orientation|keyboard|keyboardHidden"
3744                android:process=":ui"
3745                android:visibleToInstantApps="true">
3746            <intent-filter>
3747                <action android:name="android.intent.action.CHOOSER" />
3748                <category android:name="android.intent.category.DEFAULT" />
3749                <category android:name="android.intent.category.VOICE" />
3750            </intent-filter>
3751        </activity>
3752        <activity android:name="com.android.internal.app.AccessibilityButtonChooserActivity"
3753                  android:exported="false"
3754                  android:theme="@style/Theme.DeviceDefault.Resolver"
3755                  android:finishOnCloseSystemDialogs="true"
3756                  android:excludeFromRecents="true"
3757                  android:documentLaunchMode="never"
3758                  android:relinquishTaskIdentity="true"
3759                  android:configChanges="screenSize|smallestScreenSize|screenLayout|orientation|keyboard|keyboardHidden"
3760                  android:process=":ui"
3761                  android:visibleToInstantApps="true">
3762            <intent-filter>
3763                <action android:name="com.android.internal.intent.action.CHOOSE_ACCESSIBILITY_BUTTON" />
3764                <category android:name="android.intent.category.DEFAULT" />
3765            </intent-filter>
3766        </activity>
3767        <activity android:name="com.android.internal.app.IntentForwarderActivity"
3768                android:finishOnCloseSystemDialogs="true"
3769                android:theme="@style/Theme.NoDisplay"
3770                android:excludeFromRecents="true"
3771                android:label="@string/user_owner_label"
3772                android:exported="true"
3773                >
3774        </activity>
3775        <activity-alias android:name="com.android.internal.app.ForwardIntentToParent"
3776                android:targetActivity="com.android.internal.app.IntentForwarderActivity"
3777                android:exported="true"
3778                android:label="@string/user_owner_label">
3779        </activity-alias>
3780        <activity-alias android:name="com.android.internal.app.ForwardIntentToManagedProfile"
3781                android:targetActivity="com.android.internal.app.IntentForwarderActivity"
3782                android:icon="@drawable/ic_corp_badge"
3783                android:exported="true"
3784                android:label="@string/managed_profile_label">
3785        </activity-alias>
3786        <activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity"
3787                android:theme="@style/Theme.DeviceDefault.Light.Dialog"
3788                android:label="@string/heavy_weight_switcher_title"
3789                android:finishOnCloseSystemDialogs="true"
3790                android:excludeFromRecents="true"
3791                android:process=":ui">
3792        </activity>
3793        <activity android:name="com.android.internal.app.PlatLogoActivity"
3794                android:theme="@style/Theme.Wallpaper.NoTitleBar.Fullscreen"
3795                android:configChanges="orientation|keyboardHidden"
3796                android:process=":ui">
3797        </activity>
3798        <activity android:name="com.android.internal.app.DisableCarModeActivity"
3799                android:theme="@style/Theme.NoDisplay"
3800                android:excludeFromRecents="true"
3801                android:process=":ui">
3802        </activity>
3803        <activity android:name="com.android.internal.app.DumpHeapActivity"
3804                android:theme="@style/Theme.Translucent.NoTitleBar"
3805                android:label="@string/dump_heap_title"
3806                android:finishOnCloseSystemDialogs="true"
3807                android:noHistory="true"
3808                android:excludeFromRecents="true"
3809                android:process=":ui">
3810        </activity>
3811        <provider android:name="com.android.server.am.DumpHeapProvider"
3812                android:authorities="com.android.server.heapdump"
3813                android:grantUriPermissions="true"
3814                android:multiprocess="false"
3815                android:singleUser="true" />
3816
3817        <activity android:name="android.accounts.ChooseAccountActivity"
3818                android:excludeFromRecents="true"
3819                android:exported="true"
3820                android:theme="@style/Theme.DeviceDefault.Light.Dialog"
3821                android:label="@string/choose_account_label"
3822                android:process=":ui"
3823                android:visibleToInstantApps="true">
3824        </activity>
3825
3826        <activity android:name="android.accounts.ChooseTypeAndAccountActivity"
3827                android:excludeFromRecents="true"
3828                android:exported="true"
3829                android:theme="@style/Theme.DeviceDefault.Light.Dialog"
3830                android:label="@string/choose_account_label"
3831                android:process=":ui"
3832                android:visibleToInstantApps="true">
3833        </activity>
3834
3835        <activity android:name="android.accounts.ChooseAccountTypeActivity"
3836                android:excludeFromRecents="true"
3837                android:theme="@style/Theme.DeviceDefault.Light.Dialog"
3838                android:label="@string/choose_account_label"
3839                android:process=":ui"
3840                android:visibleToInstantApps="true">
3841        </activity>
3842
3843        <activity android:name="android.accounts.CantAddAccountActivity"
3844                android:excludeFromRecents="true"
3845                android:exported="true"
3846                android:theme="@style/Theme.DeviceDefault.Light.Dialog.NoActionBar"
3847                android:process=":ui">
3848        </activity>
3849
3850        <activity android:name="android.accounts.GrantCredentialsPermissionActivity"
3851                android:excludeFromRecents="true"
3852                android:exported="true"
3853                android:theme="@style/Theme.DeviceDefault.Light.DialogWhenLarge"
3854                android:process=":ui"
3855                android:visibleToInstantApps="true">
3856        </activity>
3857
3858        <activity android:name="android.content.SyncActivityTooManyDeletes"
3859               android:theme="@style/Theme.DeviceDefault.Light.Dialog"
3860               android:label="@string/sync_too_many_deletes"
3861               android:process=":ui">
3862        </activity>
3863
3864        <activity android:name="com.android.internal.app.ShutdownActivity"
3865            android:permission="android.permission.SHUTDOWN"
3866            android:theme="@style/Theme.NoDisplay"
3867            android:excludeFromRecents="true">
3868            <intent-filter>
3869                <action android:name="com.android.internal.intent.action.REQUEST_SHUTDOWN" />
3870                <category android:name="android.intent.category.DEFAULT" />
3871            </intent-filter>
3872            <intent-filter>
3873                <action android:name="android.intent.action.REBOOT" />
3874                <category android:name="android.intent.category.DEFAULT" />
3875            </intent-filter>
3876        </activity>
3877
3878        <activity android:name="com.android.internal.app.NetInitiatedActivity"
3879                android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert"
3880                android:excludeFromRecents="true"
3881                android:process=":ui">
3882        </activity>
3883
3884        <activity android:name="com.android.internal.app.SystemUserHomeActivity"
3885                  android:enabled="false"
3886                  android:process=":ui"
3887                  android:systemUserOnly="true"
3888                  android:theme="@style/Theme.Translucent.NoTitleBar">
3889            <intent-filter android:priority="-100">
3890                <action android:name="android.intent.action.MAIN" />
3891                <category android:name="android.intent.category.HOME" />
3892            </intent-filter>
3893        </activity>
3894
3895        <!-- Activity to prompt user if it's ok to create a new user sandbox for a
3896             specified account. -->
3897        <activity android:name="com.android.internal.app.ConfirmUserCreationActivity"
3898                android:excludeFromRecents="true"
3899                android:process=":ui"
3900                android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert">
3901            <intent-filter android:priority="1000">
3902                <action android:name="android.os.action.CREATE_USER" />
3903                <category android:name="android.intent.category.DEFAULT" />
3904            </intent-filter>
3905        </activity>
3906
3907        <activity android:name="com.android.internal.app.UnlaunchableAppActivity"
3908                android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert"
3909                android:excludeFromRecents="true"
3910                android:process=":ui">
3911        </activity>
3912
3913        <activity android:name="com.android.settings.notification.NotificationAccessConfirmationActivity"
3914                  android:theme="@android:style/Theme.DeviceDefault.Light.Dialog.Alert"
3915                  android:excludeFromRecents="true">
3916        </activity>
3917
3918        <activity android:name="com.android.internal.app.HarmfulAppWarningActivity"
3919                  android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert"
3920                  android:excludeFromRecents="true"
3921                  android:process=":ui"
3922                  android:exported="false">
3923        </activity>
3924
3925        <receiver android:name="com.android.server.BootReceiver"
3926                android:systemUserOnly="true">
3927            <intent-filter android:priority="1000">
3928                <action android:name="android.intent.action.BOOT_COMPLETED" />
3929            </intent-filter>
3930        </receiver>
3931
3932        <receiver android:name="com.android.server.updates.CertPinInstallReceiver"
3933                android:permission="android.permission.UPDATE_CONFIG">
3934            <intent-filter>
3935                <action android:name="android.intent.action.UPDATE_PINS" />
3936                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3937            </intent-filter>
3938        </receiver>
3939
3940        <receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver"
3941                android:permission="android.permission.UPDATE_CONFIG">
3942            <intent-filter>
3943                <action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" />
3944                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3945            </intent-filter>
3946        </receiver>
3947
3948        <receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver"
3949                android:permission="android.permission.UPDATE_CONFIG">
3950            <intent-filter>
3951                <action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" />
3952                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3953            </intent-filter>
3954        </receiver>
3955
3956        <receiver android:name="com.android.server.updates.NetworkWatchlistInstallReceiver"
3957                  android:permission="android.permission.UPDATE_CONFIG">
3958            <intent-filter>
3959                <action android:name="android.intent.action.UPDATE_NETWORK_WATCHLIST" />
3960                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3961            </intent-filter>
3962        </receiver>
3963
3964        <receiver android:name="com.android.server.updates.ApnDbInstallReceiver"
3965                android:permission="android.permission.UPDATE_CONFIG">
3966            <intent-filter>
3967                <action android:name="com.android.internal.intent.action.UPDATE_APN_DB" />
3968                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3969            </intent-filter>
3970        </receiver>
3971
3972        <receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver"
3973                android:permission="android.permission.UPDATE_CONFIG">
3974            <intent-filter>
3975                <action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" />
3976                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3977            </intent-filter>
3978        </receiver>
3979
3980        <receiver android:name="com.android.server.updates.CertificateTransparencyLogInstallReceiver"
3981                android:permission="android.permission.UPDATE_CONFIG">
3982            <intent-filter>
3983                <action android:name="android.intent.action.UPDATE_CT_LOGS" />
3984                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3985            </intent-filter>
3986        </receiver>
3987
3988        <receiver android:name="com.android.server.updates.LangIdInstallReceiver"
3989                android:permission="android.permission.UPDATE_CONFIG">
3990            <intent-filter>
3991                <action android:name="android.intent.action.UPDATE_LANG_ID" />
3992                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3993            </intent-filter>
3994        </receiver>
3995
3996        <receiver android:name="com.android.server.updates.SmartSelectionInstallReceiver"
3997                android:permission="android.permission.UPDATE_CONFIG">
3998            <intent-filter>
3999                <action android:name="android.intent.action.UPDATE_SMART_SELECTION" />
4000                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
4001            </intent-filter>
4002        </receiver>
4003
4004        <receiver android:name="com.android.server.updates.CarrierIdInstallReceiver"
4005                  android:permission="android.permission.UPDATE_CONFIG">
4006            <intent-filter>
4007                <action android:name="com.android.internal.intent.action.UPDATE_CARRIER_ID_DB" />
4008                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
4009            </intent-filter>
4010        </receiver>
4011
4012        <receiver android:name="com.android.server.MasterClearReceiver"
4013            android:permission="android.permission.MASTER_CLEAR">
4014            <intent-filter
4015                    android:priority="100" >
4016                <!-- For Checkin, Settings, etc.: action=FACTORY_RESET -->
4017                <action android:name="android.intent.action.FACTORY_RESET" />
4018                <!-- As above until all the references to the deprecated MASTER_CLEAR get updated to
4019                     FACTORY_RESET. -->
4020                <action android:name="android.intent.action.MASTER_CLEAR" />
4021
4022                <!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR -->
4023                <action android:name="com.google.android.c2dm.intent.RECEIVE" />
4024                <category android:name="android.intent.category.MASTER_CLEAR" />
4025            </intent-filter>
4026        </receiver>
4027
4028        <receiver android:name="com.android.server.stats.StatsCompanionService$AnomalyAlarmReceiver"
4029                  android:permission="android.permission.STATSCOMPANION"
4030                  android:exported="false">
4031        </receiver>
4032
4033        <receiver android:name="com.android.server.stats.StatsCompanionService$PollingAlarmReceiver"
4034                  android:permission="android.permission.STATSCOMPANION"
4035                  android:exported="false">
4036        </receiver>
4037
4038        <service android:name="android.hardware.location.GeofenceHardwareService"
4039            android:permission="android.permission.LOCATION_HARDWARE"
4040            android:exported="false" />
4041
4042        <service android:name="com.android.internal.backup.LocalTransportService"
4043                android:permission="android.permission.CONFIRM_FULL_BACKUP"
4044                android:exported="false">
4045            <intent-filter>
4046                <action android:name="android.backup.TRANSPORT_HOST" />
4047            </intent-filter>
4048        </service>
4049
4050        <service android:name="com.android.server.MountServiceIdler"
4051                 android:exported="true"
4052                 android:permission="android.permission.BIND_JOB_SERVICE" >
4053        </service>
4054
4055        <service android:name="com.android.server.backup.FullBackupJob"
4056                 android:exported="true"
4057                 android:permission="android.permission.BIND_JOB_SERVICE" >
4058        </service>
4059
4060        <service android:name="com.android.server.backup.KeyValueBackupJob"
4061                 android:permission="android.permission.BIND_JOB_SERVICE" >
4062        </service>
4063
4064        <service android:name="com.android.server.content.SyncJobService"
4065                 android:permission="android.permission.BIND_JOB_SERVICE" >
4066        </service>
4067
4068        <service android:name="com.android.server.pm.BackgroundDexOptService"
4069                 android:exported="true"
4070                 android:permission="android.permission.BIND_JOB_SERVICE">
4071        </service>
4072
4073        <service android:name="com.android.server.PruneInstantAppsJobService"
4074                 android:permission="android.permission.BIND_JOB_SERVICE" >
4075        </service>
4076
4077        <service android:name="com.android.server.storage.DiskStatsLoggingService"
4078                 android:permission="android.permission.BIND_JOB_SERVICE" >
4079        </service>
4080
4081        <service android:name="com.android.server.PreloadsFileCacheExpirationJobService"
4082                 android:permission="android.permission.BIND_JOB_SERVICE" >
4083        </service>
4084
4085        <service android:name="com.android.server.camera.CameraStatsJobService"
4086                 android:permission="android.permission.BIND_JOB_SERVICE" >
4087        </service>
4088
4089        <service android:name="com.android.server.timezone.TimeZoneUpdateIdler"
4090                 android:permission="android.permission.BIND_JOB_SERVICE" >
4091        </service>
4092
4093        <service android:name="com.android.server.net.watchlist.ReportWatchlistJobService"
4094                 android:permission="android.permission.BIND_JOB_SERVICE" >
4095        </service>
4096
4097        <service android:name="com.android.server.display.BrightnessIdleJob"
4098                 android:permission="android.permission.BIND_JOB_SERVICE" >
4099        </service>
4100</application>
4101
4102</manifest>
4103