AndroidManifest.xml revision b8c0e7a85b64b4328b503893730bd0b642a7592d
1<?xml version="1.0" encoding="utf-8"?> 2<!-- 3/* //device/apps/common/AndroidManifest.xml 4** 5** Copyright 2006, The Android Open Source Project 6** 7** Licensed under the Apache License, Version 2.0 (the "License"); 8** you may not use this file except in compliance with the License. 9** You may obtain a copy of the License at 10** 11** http://www.apache.org/licenses/LICENSE-2.0 12** 13** Unless required by applicable law or agreed to in writing, software 14** distributed under the License is distributed on an "AS IS" BASIS, 15** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 16** See the License for the specific language governing permissions and 17** limitations under the License. 18*/ 19--> 20<manifest xmlns:android="http://schemas.android.com/apk/res/android" 21 package="android" coreApp="true" android:sharedUserId="android.uid.system" 22 android:sharedUserLabel="@string/android_system_label"> 23 24 <!-- ================================================ --> 25 <!-- Special broadcasts that only the system can send --> 26 <!-- ================================================ --> 27 <eat-comment /> 28 29 <protected-broadcast android:name="android.intent.action.SCREEN_OFF" /> 30 <protected-broadcast android:name="android.intent.action.SCREEN_ON" /> 31 <protected-broadcast android:name="android.intent.action.USER_PRESENT" /> 32 <protected-broadcast android:name="android.intent.action.TIME_SET" /> 33 <protected-broadcast android:name="android.intent.action.TIME_TICK" /> 34 <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" /> 35 <protected-broadcast android:name="android.intent.action.DATE_CHANGED" /> 36 <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" /> 37 <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" /> 38 <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" /> 39 <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" /> 40 <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" /> 41 <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" /> 42 <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" /> 43 <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" /> 44 <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" /> 45 <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" /> 46 <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" /> 47 <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" /> 48 <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" /> 49 <protected-broadcast android:name="android.intent.action.UID_REMOVED" /> 50 <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" /> 51 <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" /> 52 <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" /> 53 <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" /> 54 <protected-broadcast android:name="android.intent.action.BATTERY_LOW" /> 55 <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" /> 56 <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" /> 57 <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" /> 58 <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" /> 59 <protected-broadcast android:name="android.intent.action.CHARGING" /> 60 <protected-broadcast android:name="android.intent.action.DISCHARGING" /> 61 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" /> 62 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" /> 63 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" /> 64 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" /> 65 <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" /> 66 <protected-broadcast android:name="android.intent.action.REBOOT" /> 67 <protected-broadcast android:name="android.intent.action.DOCK_EVENT" /> 68 <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" /> 69 <protected-broadcast android:name="android.intent.action.USER_ADDED" /> 70 <protected-broadcast android:name="android.intent.action.USER_REMOVED" /> 71 <protected-broadcast android:name="android.intent.action.USER_STARTING" /> 72 <protected-broadcast android:name="android.intent.action.USER_STARTED" /> 73 <protected-broadcast android:name="android.intent.action.USER_STOPPING" /> 74 <protected-broadcast android:name="android.intent.action.USER_STOPPED" /> 75 <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" /> 76 <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" /> 77 <protected-broadcast android:name="android.intent.action.USER_SWITCHED" /> 78 <protected-broadcast android:name="android.intent.action.INTENT_FILTER_NEEDS_VERIFICATION" /> 79 80 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED" /> 81 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGING" /> 82 <protected-broadcast android:name="android.os.action.DEVICE_IDLE_MODE_CHANGED" /> 83 <protected-broadcast android:name="android.os.action.POWER_SAVE_WHITELIST_CHANGED" /> 84 <protected-broadcast android:name="android.os.action.POWER_SAVE_TEMP_WHITELIST_CHANGED" /> 85 86 <protected-broadcast android:name="android.os.action.SCREEN_BRIGHTNESS_BOOST_CHANGED" /> 87 88 <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" /> 89 <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" /> 90 <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" /> 91 <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" /> 92 <protected-broadcast android:name="android.app.action.NEXT_ALARM_CLOCK_CHANGED" /> 93 94 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" /> 95 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" /> 96 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" /> 97 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" /> 98 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_HOST_RESTORED" /> 99 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_RESTORED" /> 100 101 <protected-broadcast android:name="android.os.action.SETTING_RESTORED" /> 102 103 <protected-broadcast android:name="android.backup.intent.RUN" /> 104 <protected-broadcast android:name="android.backup.intent.CLEAR" /> 105 <protected-broadcast android:name="android.backup.intent.INIT" /> 106 107 <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" /> 108 <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" /> 109 <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" /> 110 <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" /> 111 <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" /> 112 <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" /> 113 <protected-broadcast android:name="android.bluetooth.device.action.UUID" /> 114 <protected-broadcast android:name="android.bluetooth.device.action.MAS_INSTANCE" /> 115 <protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" /> 116 <protected-broadcast android:name="android.bluetooth.device.action.FOUND" /> 117 <protected-broadcast android:name="android.bluetooth.device.action.DISAPPEARED" /> 118 <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" /> 119 <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" /> 120 <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" /> 121 <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" /> 122 <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" /> 123 <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" /> 124 <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" /> 125 <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" /> 126 <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" /> 127 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" /> 128 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" /> 129 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" /> 130 <protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" /> 131 <protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" /> 132 <protected-broadcast 133 android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" /> 134 <protected-broadcast 135 android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" /> 136 <protected-broadcast 137 android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" /> 138 <protected-broadcast 139 android:name="android.bluetooth.headsetclient.profile.action.CONNECTION_STATE_CHANGED" /> 140 <protected-broadcast 141 android:name="android.bluetooth.headsetclient.profile.action.AUDIO_STATE_CHANGED" /> 142 <protected-broadcast 143 android:name="android.bluetooth.headsetclient.profile.action.AG_EVENT" /> 144 <protected-broadcast 145 android:name="android.bluetooth.headsetclient.profile.action.AG_CALL_CHANGED" /> 146 <protected-broadcast 147 android:name="android.bluetooth.headsetclient.profile.action.RESULT" /> 148 <protected-broadcast 149 android:name="android.bluetooth.headsetclient.profile.action.LAST_VTAG" /> 150 <protected-broadcast 151 android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" /> 152 <protected-broadcast 153 android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" /> 154 <protected-broadcast 155 android:name="android.bluetooth.a2dp-sink.profile.action.CONNECTION_STATE_CHANGED" /> 156 <protected-broadcast 157 android:name="android.bluetooth.a2dp-sink.profile.action.PLAYING_STATE_CHANGED" /> 158 <protected-broadcast 159 android:name="android.bluetooth.a2dp-sink.profile.action.AUDIO_CONFIG_CHANGED" /> 160 <protected-broadcast 161 android:name="android.bluetooth.avrcp-controller.profile.action.CONNECTION_STATE_CHANGED" /> 162 <protected-broadcast 163 android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" /> 164 <protected-broadcast 165 android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" /> 166 <protected-broadcast 167 android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" /> 168 <protected-broadcast 169 android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" /> 170 <protected-broadcast android:name="android.bluetooth.pbap.intent.action.PBAP_STATE_CHANGED" /> 171 <protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" /> 172 <protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" /> 173 <protected-broadcast android:name="android.btopp.intent.action.LIST" /> 174 <protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" /> 175 <protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" /> 176 <protected-broadcast android:name="android.btopp.intent.action.CONFIRM" /> 177 <protected-broadcast android:name="android.btopp.intent.action.HIDE" /> 178 <protected-broadcast android:name="android.btopp.intent.action.RETRY" /> 179 <protected-broadcast android:name="android.btopp.intent.action.OPEN" /> 180 <protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" /> 181 <protected-broadcast android:name="com.android.bluetooth.pbap.authchall" /> 182 <protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" /> 183 <protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" /> 184 <protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" /> 185 186 <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" /> 187 188 <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" /> 189 <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" /> 190 <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" /> 191 <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" /> 192 <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" /> 193 194 <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" /> 195 <protected-broadcast android:name="android.media.action.HDMI_AUDIO_PLUG" /> 196 197 <protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" /> 198 <protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" /> 199 <protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" /> 200 <protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" /> 201 <protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" /> 202 <protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" /> 203 <protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" /> 204 <protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" /> 205 206 <protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" /> 207 <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" /> 208 <protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" /> 209 <protected-broadcast android:name="android.intent.action.MEDIA_NOFS" /> 210 <protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" /> 211 <protected-broadcast android:name="android.intent.action.MEDIA_SHARED" /> 212 <protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" /> 213 <protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" /> 214 <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" /> 215 <protected-broadcast android:name="android.intent.action.MEDIA_EJECT" /> 216 217 <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL" /> 218 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" /> 219 <!-- @deprecated. Only {@link android.net.ConnectivityManager.CONNECTIVITY_ACTION} is sent. --> 220 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" /> 221 <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" /> 222 <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" /> 223 <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" /> 224 225 <protected-broadcast android:name="android.net.nsd.STATE_CHANGED" /> 226 227 <protected-broadcast android:name="android.nfc.action.LLCP_LINK_STATE_CHANGED" /> 228 <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" /> 229 <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" /> 230 <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" /> 231 232 <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" /> 233 234 <protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" /> 235 <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" /> 236 237 <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" /> 238 239 <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" /> 240 <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" /> 241 <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" /> 242 <protected-broadcast android:name="android.intent.action.DATA_CONNECTION_CONNECTED_TO_PROVISIONING_APN" /> 243 244 <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" /> 245 <protected-broadcast android:name="com.android.server.WifiManager.action.START_PNO" /> 246 <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" /> 247 <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" /> 248 <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" /> 249 <protected-broadcast android:name="android.net.wifi.WIFI_CREDENTIAL_CHANGED" /> 250 <protected-broadcast android:name="android.net.wifi.WIFI_SCAN_AVAILABLE" /> 251 <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" /> 252 <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" /> 253 <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" /> 254 <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" /> 255 <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" /> 256 <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" /> 257 <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" /> 258 <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" /> 259 <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" /> 260 <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" /> 261 <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" /> 262 <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" /> 263 <protected-broadcast android:name="android.net.wifi.p2p.PERSISTENT_GROUPS_CHANGED" /> 264 <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" /> 265 <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" /> 266 <protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" /> 267 <protected-broadcast 268 android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" /> 269 <protected-broadcast android:name="android.net.scoring.SCORE_NETWORKS" /> 270 <protected-broadcast android:name="android.net.scoring.SCORER_CHANGED" /> 271 <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" /> 272 <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" /> 273 <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" /> 274 <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" /> 275 <protected-broadcast android:name="android.intent.action.APPLICATION_RESTRICTIONS_CHANGED" /> 276 <protected-broadcast android:name="android.intent.action.BUGREPORT_FINISHED" /> 277 278 <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" /> 279 <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" /> 280 281 <protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" /> 282 283 <protected-broadcast android:name="android.intent.action.PHONE_STATE" /> 284 285 <protected-broadcast android:name="android.intent.action.SUB_DEFAULT_CHANGED" /> 286 287 <protected-broadcast android:name="android.location.GPS_ENABLED_CHANGE" /> 288 <protected-broadcast android:name="android.location.PROVIDERS_CHANGED" /> 289 <protected-broadcast android:name="android.location.MODE_CHANGED" /> 290 <protected-broadcast android:name="android.location.GPS_FIX_CHANGE" /> 291 <protected-broadcast android:name="android.net.proxy.PAC_REFRESH" /> 292 293 <protected-broadcast android:name="android.telecom.action.DEFAULT_DIALER_CHANGED" /> 294 295 <protected-broadcast 296 android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" /> 297 298 <!-- Defined in RestrictionsManager --> 299 <protected-broadcast 300 android:name="android.intent.action.PERMISSION_RESPONSE_RECEIVED" /> 301 <!-- Defined in RestrictionsManager --> 302 303 <protected-broadcast android:name="android.intent.action.REQUEST_PERMISSION" /> 304 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_STARTED" /> 305 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" /> 306 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_PROGRESS" /> 307 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" /> 308 309 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_SUBSCRIPTION_CHANGED" /> 310 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_SMS_SUBSCRIPTION_CHANGED" /> 311 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_DATA_SUBSCRIPTION_CHANGED" /> 312 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_VOICE_SUBSCRIPTION_CHANGED" /> 313 <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_CONTENT_CHANGE" /> 314 <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_RECORD_UPDATED" /> 315 316 <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_DONE" /> 317 <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_FAILED" /> 318 319 <protected-broadcast android:name="android.internal.policy.action.BURN_IN_PROTECTION" /> 320 <protected-broadcast android:name="android.app.action.SYSTEM_UPDATE_POLICY_CHANGED" /> 321 <!-- ====================================================================== --> 322 <!-- RUNTIME PERMISSIONS --> 323 <!-- ====================================================================== --> 324 <eat-comment /> 325 326 <!-- ====================================================================== --> 327 <!-- Permissions for accessing user's contacts including personal profile --> 328 <!-- ====================================================================== --> 329 <eat-comment /> 330 331 <!-- Used for runtime permissions related to user's contacts and profile. --> 332 <permission-group android:name="android.permission-group.CONTACTS" 333 android:icon="@drawable/perm_group_social_info" 334 android:label="@string/permgrouplab_contacts" 335 android:description="@string/permgroupdesc_contacts" 336 android:priority="100" /> 337 338 <!-- Allows an application to read the user's contacts data. --> 339 <permission android:name="android.permission.READ_CONTACTS" 340 android:permissionGroup="android.permission-group.CONTACTS" 341 android:label="@string/permlab_readContacts" 342 android:description="@string/permdesc_readContacts" 343 android:protectionLevel="dangerous" /> 344 345 <!-- Allows an application to write the user's contacts data. --> 346 <permission android:name="android.permission.WRITE_CONTACTS" 347 android:permissionGroup="android.permission-group.CONTACTS" 348 android:label="@string/permlab_writeContacts" 349 android:description="@string/permdesc_writeContacts" 350 android:protectionLevel="dangerous" /> 351 352 <!-- @deprecated No longer enforced. This was last enforced in API version 22. --> 353 <permission android:name="android.permission.READ_PROFILE" 354 android:permissionGroup="android.permission-group.CONTACTS" 355 android:label="@string/permlab_readProfile" 356 android:description="@string/permdesc_readProfile" 357 android:protectionLevel="dangerous" /> 358 359 <!-- @deprecated No longer enforced. This was last enforced in API version 22. --> 360 <permission android:name="android.permission.WRITE_PROFILE" 361 android:permissionGroup="android.permission-group.CONTACTS" 362 android:label="@string/permlab_writeProfile" 363 android:description="@string/permdesc_writeProfile" 364 android:protectionLevel="dangerous" /> 365 366 <!-- ====================================================================== --> 367 <!-- Permissions for accessing user's calendar --> 368 <!-- ====================================================================== --> 369 <eat-comment /> 370 371 <!-- Used for runtime permissions related to user's calendar. --> 372 <permission-group android:name="android.permission-group.CALENDAR" 373 android:icon="@drawable/perm_group_calendar" 374 android:label="@string/permgrouplab_calendar" 375 android:description="@string/permgroupdesc_calendar" 376 android:priority="200" /> 377 378 <!-- Allows an application to read the user's calendar data. --> 379 <permission android:name="android.permission.READ_CALENDAR" 380 android:permissionGroup="android.permission-group.CALENDAR" 381 android:label="@string/permlab_readCalendar" 382 android:description="@string/permdesc_readCalendar" 383 android:protectionLevel="dangerous" /> 384 385 <!-- Allows an application to write the user's calendar data. --> 386 <permission android:name="android.permission.WRITE_CALENDAR" 387 android:permissionGroup="android.permission-group.CALENDAR" 388 android:label="@string/permlab_writeCalendar" 389 android:description="@string/permdesc_writeCalendar" 390 android:protectionLevel="dangerous" /> 391 392 <!-- ====================================================================== --> 393 <!-- Permissions for accessing and modifying user's SMS messages --> 394 <!-- ====================================================================== --> 395 <eat-comment /> 396 397 <!-- Used for runtime permissions related to user's SMS messages. --> 398 <permission-group android:name="android.permission-group.SMS" 399 android:icon="@drawable/perm_group_messages" 400 android:label="@string/permgrouplab_sms" 401 android:description="@string/permgroupdesc_sms" 402 android:priority="300" /> 403 404 <!-- Allows an application to send SMS messages. --> 405 <permission android:name="android.permission.SEND_SMS" 406 android:permissionGroup="android.permission-group.SMS" 407 android:label="@string/permlab_sendSms" 408 android:description="@string/permdesc_sendSms" 409 android:permissionFlags="costsMoney" 410 android:protectionLevel="dangerous" /> 411 412 <!-- Allows an application to receive SMS messages. --> 413 <permission android:name="android.permission.RECEIVE_SMS" 414 android:permissionGroup="android.permission-group.SMS" 415 android:label="@string/permlab_receiveSms" 416 android:description="@string/permdesc_receiveSms" 417 android:protectionLevel="dangerous"/> 418 419 <!-- Allows an application to read SMS messages. --> 420 <permission android:name="android.permission.READ_SMS" 421 android:permissionGroup="android.permission-group.SMS" 422 android:label="@string/permlab_readSms" 423 android:description="@string/permdesc_readSms" 424 android:protectionLevel="dangerous" /> 425 426 <!-- Allows an application to receive WAP push messages. --> 427 <permission android:name="android.permission.RECEIVE_WAP_PUSH" 428 android:permissionGroup="android.permission-group.SMS" 429 android:label="@string/permlab_receiveWapPush" 430 android:description="@string/permdesc_receiveWapPush" 431 android:protectionLevel="dangerous" /> 432 433 <!-- Allows an application to monitor incoming MMS messages. --> 434 <permission android:name="android.permission.RECEIVE_MMS" 435 android:permissionGroup="android.permission-group.SMS" 436 android:label="@string/permlab_receiveMms" 437 android:description="@string/permdesc_receiveMms" 438 android:protectionLevel="dangerous" /> 439 440 <!-- Allows an application to read previously received cell broadcast 441 messages and to register a content observer to get notifications when 442 a cell broadcast has been received and added to the database. For 443 emergency alerts, the database is updated immediately after the 444 alert dialog and notification sound/vibration/speech are presented. 445 The "read" column is then updated after the user dismisses the alert. 446 This enables supplementary emergency assistance apps to start loading 447 additional emergency information (if Internet access is available) 448 when the alert is first received, and to delay presenting the info 449 to the user until after the initial alert dialog is dismissed. 450 @hide Pending API council approval --> 451 <permission android:name="android.permission.READ_CELL_BROADCASTS" 452 android:permissionGroup="android.permission-group.SMS" 453 android:label="@string/permlab_readCellBroadcasts" 454 android:description="@string/permdesc_readCellBroadcasts" 455 android:protectionLevel="dangerous" /> 456 457 <!-- ====================================================================== --> 458 <!-- Permissions for accessing external storage --> 459 <!-- ====================================================================== --> 460 <eat-comment /> 461 462 <!-- Used for runtime permissions related to the shared external storage. --> 463 <permission-group android:name="android.permission-group.STORAGE" 464 android:icon="@drawable/perm_group_storage" 465 android:label="@string/permgrouplab_storage" 466 android:description="@string/permgroupdesc_storage" 467 android:priority="900" /> 468 469 <!-- Allows an application to read from external storage. 470 <p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly 471 granted this permission.</p> 472 <p>This permission is enforced starting in API level 19. Before API level 19, this 473 permission is not enforced and all apps still have access to read from external storage. 474 You can test your app with the permission enforced by enabling <em>Protect USB 475 storage</em> under Developer options in the Settings app on a device running Android 4.1 or 476 higher.</p> 477 <p>Also starting in API level 19, this permission is <em>not</em> required to 478 read/write files in your application-specific directories returned by 479 {@link android.content.Context#getExternalFilesDir} and 480 {@link android.content.Context#getExternalCacheDir}. 481 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 482 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 483 minSdkVersion}</a> and <a 484 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 485 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 486 grants your app this permission. If you don't need this permission, be sure your <a 487 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 488 targetSdkVersion}</a> is 4 or higher.--> 489 <permission android:name="android.permission.READ_EXTERNAL_STORAGE" 490 android:permissionGroup="android.permission-group.STORAGE" 491 android:label="@string/permlab_sdcardRead" 492 android:description="@string/permdesc_sdcardRead" 493 android:protectionLevel="normal" /> 494 495 <!-- Allows an application to write to external storage. 496 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 497 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 498 minSdkVersion}</a> and <a 499 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 500 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 501 grants your app this permission. If you don't need this permission, be sure your <a 502 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 503 targetSdkVersion}</a> is 4 or higher. 504 <p>Starting in API level 19, this permission is <em>not</em> required to 505 read/write files in your application-specific directories returned by 506 {@link android.content.Context#getExternalFilesDir} and 507 {@link android.content.Context#getExternalCacheDir}. --> 508 <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE" 509 android:permissionGroup="android.permission-group.STORAGE" 510 android:label="@string/permlab_sdcardWrite" 511 android:description="@string/permdesc_sdcardWrite" 512 android:protectionLevel="dangerous" /> 513 514 <!-- =============================================================== --> 515 <!-- Permissions for accessing social info --> 516 <!-- =============================================================== --> 517 <eat-comment /> 518 519 <!-- Used for permissions that provide access to the user's social connections, 520 such as contacts, call logs, social stream, etc. This includes 521 both reading and writing of this data (which should generally be 522 expressed as two distinct permissions). --> 523 524 <permission-group android:name="android.permission-group.SOCIAL_INFO" 525 android:label="@string/permgrouplab_socialInfo" 526 android:icon="@drawable/perm_group_social_info" 527 android:description="@string/permgroupdesc_socialInfo" 528 android:permissionGroupFlags="personalInfo" 529 android:priority="1200" /> 530 531 <!-- Allows an application to read from the user's social stream. 532 @deprecated This functionality will be unsupported in the future; cursors returned 533 will be empty. Please do not use. --> 534 <permission android:name="android.permission.READ_SOCIAL_STREAM" 535 android:permissionGroup="android.permission-group.SOCIAL_INFO" 536 android:protectionLevel="dangerous" 537 android:label="@string/permlab_readSocialStream" 538 android:description="@string/permdesc_readSocialStream" /> 539 540 <!-- Allows an application to write (but not read) the user's 541 social stream data. 542 @deprecated This functionality will be unsupported in the future; cursors returned 543 will be empty. Please do not use. --> 544 <permission android:name="android.permission.WRITE_SOCIAL_STREAM" 545 android:permissionGroup="android.permission-group.SOCIAL_INFO" 546 android:protectionLevel="dangerous" 547 android:label="@string/permlab_writeSocialStream" 548 android:description="@string/permdesc_writeSocialStream" /> 549 550 <!-- ====================================================================== --> 551 <!-- Permissions for accessing the device location --> 552 <!-- ====================================================================== --> 553 <eat-comment /> 554 555 <!-- Used for permissions that allow accessing the device location. --> 556 <permission-group android:name="android.permission-group.LOCATION" 557 android:icon="@drawable/perm_group_location" 558 android:label="@string/permgrouplab_location" 559 android:description="@string/permgroupdesc_location" 560 android:priority="400" /> 561 562 <!-- Allows an app to access precise location. --> 563 <permission android:name="android.permission.ACCESS_FINE_LOCATION" 564 android:permissionGroup="android.permission-group.LOCATION" 565 android:label="@string/permlab_accessFineLocation" 566 android:description="@string/permdesc_accessFineLocation" 567 android:protectionLevel="dangerous" /> 568 569 <!-- Allows an app to access approximate location. --> 570 <permission android:name="android.permission.ACCESS_COARSE_LOCATION" 571 android:permissionGroup="android.permission-group.LOCATION" 572 android:label="@string/permlab_accessCoarseLocation" 573 android:description="@string/permdesc_accessCoarseLocation" 574 android:protectionLevel="dangerous" /> 575 576 <!-- ====================================================================== --> 577 <!-- Permissions for accessing the device telephony --> 578 <!-- ====================================================================== --> 579 <eat-comment /> 580 581 <!-- Used for permissions that are associated telephony features. --> 582 <permission-group android:name="android.permission-group.PHONE" 583 android:icon="@drawable/perm_group_phone_calls" 584 android:label="@string/permgrouplab_phone" 585 android:description="@string/permgroupdesc_phone" 586 android:priority="500" /> 587 588 <!-- Allows read only access to phone state. 589 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 590 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 591 minSdkVersion}</a> and <a 592 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 593 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 594 grants your app this permission. If you don't need this permission, be sure your <a 595 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 596 targetSdkVersion}</a> is 4 or higher. --> 597 <permission android:name="android.permission.READ_PHONE_STATE" 598 android:permissionGroup="android.permission-group.PHONE" 599 android:label="@string/permlab_readPhoneState" 600 android:description="@string/permdesc_readPhoneState" 601 android:protectionLevel="dangerous" /> 602 603 <!-- Allows an application to initiate a phone call without going through 604 the Dialer user interface for the user to confirm the call. --> 605 <permission android:name="android.permission.CALL_PHONE" 606 android:permissionGroup="android.permission-group.PHONE" 607 android:permissionFlags="costsMoney" 608 android:label="@string/permlab_callPhone" 609 android:description="@string/permdesc_callPhone" 610 android:protectionLevel="dangerous" /> 611 612 <!-- Allows an application to read the user's call log. 613 <p class="note"><strong>Note:</strong> If your app uses the 614 {@link #READ_CONTACTS} permission and <em>both</em> your <a 615 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 616 minSdkVersion}</a> and <a 617 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 618 targetSdkVersion}</a> values are set to 15 or lower, the system implicitly 619 grants your app this permission. If you don't need this permission, be sure your <a 620 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 621 targetSdkVersion}</a> is 16 or higher.</p> --> 622 <permission android:name="android.permission.READ_CALL_LOG" 623 android:permissionGroup="android.permission-group.PHONE" 624 android:label="@string/permlab_readCallLog" 625 android:description="@string/permdesc_readCallLog" 626 android:protectionLevel="dangerous" /> 627 628 <!-- Allows an application to write (but not read) the user's 629 contacts data. 630 <p class="note"><strong>Note:</strong> If your app uses the 631 {@link #WRITE_CONTACTS} permission and <em>both</em> your <a 632 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 633 minSdkVersion}</a> and <a 634 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 635 targetSdkVersion}</a> values are set to 15 or lower, the system implicitly 636 grants your app this permission. If you don't need this permission, be sure your <a 637 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 638 targetSdkVersion}</a> is 16 or higher.</p> --> 639 <permission android:name="android.permission.WRITE_CALL_LOG" 640 android:permissionGroup="android.permission-group.PHONE" 641 android:label="@string/permlab_writeCallLog" 642 android:description="@string/permdesc_writeCallLog" 643 android:protectionLevel="dangerous" /> 644 645 <!-- Allows an application to add voicemails into the system. --> 646 <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL" 647 android:permissionGroup="android.permission-group.PHONE" 648 android:label="@string/permlab_addVoicemail" 649 android:description="@string/permdesc_addVoicemail" 650 android:protectionLevel="dangerous" /> 651 652 <!-- Allows an application to use SIP service. --> 653 <permission android:name="android.permission.USE_SIP" 654 android:permissionGroup="android.permission-group.PHONE" 655 android:description="@string/permdesc_use_sip" 656 android:label="@string/permlab_use_sip" 657 android:protectionLevel="dangerous"/> 658 659 <!-- Allows an application to see the number being dialed during an outgoing 660 call with the option to redirect the call to a different number or 661 abort the call altogether. --> 662 <permission android:name="android.permission.PROCESS_OUTGOING_CALLS" 663 android:permissionGroup="android.permission-group.PHONE" 664 android:label="@string/permlab_processOutgoingCalls" 665 android:description="@string/permdesc_processOutgoingCalls" 666 android:protectionLevel="dangerous" /> 667 668 <!-- ====================================================================== --> 669 <!-- Permissions for accessing the device microphone --> 670 <!-- ====================================================================== --> 671 <eat-comment /> 672 673 <!-- Used for permissions that are associated with accessing 674 microphone audio from the device. Note that phone calls also capture audio 675 but are in a separate (more visible) permission group. --> 676 <permission-group android:name="android.permission-group.MICROPHONE" 677 android:icon="@drawable/perm_group_microphone" 678 android:label="@string/permgrouplab_microphone" 679 android:description="@string/permgroupdesc_microphone" 680 android:priority="600" /> 681 682 <!-- Allows an application to record audio. --> 683 <permission android:name="android.permission.RECORD_AUDIO" 684 android:permissionGroup="android.permission-group.MICROPHONE" 685 android:label="@string/permlab_recordAudio" 686 android:description="@string/permdesc_recordAudio" 687 android:protectionLevel="dangerous"/> 688 689 <!-- ====================================================================== --> 690 <!-- Permissions for accessing the device camera --> 691 <!-- ====================================================================== --> 692 <eat-comment /> 693 694 <!-- Used for permissions that are associated with accessing 695 camera or capturing images/video from the device. --> 696 <permission-group android:name="android.permission-group.CAMERA" 697 android:icon="@drawable/perm_group_camera" 698 android:label="@string/permgrouplab_camera" 699 android:description="@string/permgroupdesc_camera" 700 android:priority="700" /> 701 702 <!-- Required to be able to access the camera device. 703 <p>This will automatically enforce the <a 704 href="{@docRoot}guide/topics/manifest/uses-feature-element.html">{@code 705 <uses-feature>}</a> manifest element for <em>all</em> camera features. 706 If you do not require all camera features or can properly operate if a camera 707 is not available, then you must modify your manifest as appropriate in order to 708 install on devices that don't support all camera features.</p> --> 709 <permission android:name="android.permission.CAMERA" 710 android:permissionGroup="android.permission-group.CAMERA" 711 android:label="@string/permlab_camera" 712 android:description="@string/permdesc_camera" 713 android:protectionLevel="dangerous" /> 714 715 716 <!-- ====================================================================== --> 717 <!-- Permissions for accessing the device sensors --> 718 <!-- ====================================================================== --> 719 <eat-comment /> 720 721 <!-- Used for permissions that are associated with accessing 722 camera or capturing images/video from the device. --> 723 <permission-group android:name="android.permission-group.SENSORS" 724 android:label="@string/permgrouplab_sensors" 725 android:description="@string/permgroupdesc_sensors" 726 android:priority="800" /> 727 728 <!-- Allows an application to access data from sensors that the user uses to 729 measure what is happening inside his/her body, such as heart rate. --> 730 <permission android:name="android.permission.BODY_SENSORS" 731 android:permissionGroup="android.permission-group.SENSORS" 732 android:label="@string/permlab_bodySensors" 733 android:description="@string/permdesc_bodySensors" 734 android:protectionLevel="dangerous" /> 735 736 <!-- Allows an app to use fingerprint hardware. --> 737 <permission android:name="android.permission.USE_FINGERPRINT" 738 android:permissionGroup="android.permission-group.SENSORS" 739 android:label="@string/permlab_useFingerprint" 740 android:description="@string/permdesc_useFingerprint" 741 android:protectionLevel="normal" /> 742 743 <!-- ====================================================================== --> 744 <!-- INSTALLTIME PERMISSIONS --> 745 <!-- ====================================================================== --> 746 747` <!-- =========================================== --> 748 <!-- Permissions for accessing contact metadata --> 749 <!-- =========================================== --> 750 <eat-comment /> 751 752 <!-- @SystemApi Allows an application to read/write contact metadata. 753 <p>Not for use by third-party applications. --> 754 <permission android:name="android.permission.READ_WRITE_CONTACT_METADATA" 755 android:protectionLevel="signature|system" /> 756 757 <!-- ================================== --> 758 <!-- Permissions for accessing messages --> 759 <!-- ================================== --> 760 <eat-comment /> 761 762 <!-- @SystemApi Allows an application (Phone) to send a request to other applications 763 to handle the respond-via-message action during incoming calls. 764 <p>Not for use by third-party applications. --> 765 <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE" 766 android:protectionLevel="signature|system" /> 767 768 <!-- Allows an application to filter carrier specific sms. 769 @hide --> 770 <permission android:name="android.permission.CARRIER_FILTER_SMS" 771 android:protectionLevel="signature|system" /> 772 773 <!-- @SystemApi Allows an application to receive emergency cell broadcast messages, 774 to record or display them to the user. 775 <p>Not for use by third-party applications. 776 @hide Pending API council approval --> 777 <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST" 778 android:protectionLevel="signature|system" /> 779 780 <!-- Allows an application to monitor incoming Bluetooth MAP messages, to record 781 or perform processing on them. --> 782 <!-- @hide --> 783 <permission android:name="android.permission.RECEIVE_BLUETOOTH_MAP" 784 android:protectionLevel="signature|system" /> 785 786 <!-- @SystemApi @hide Allows an application to execute contacts directory search. 787 This should only be used by ContactsProvider. 788 <p>Not for use by third-party applications. --> 789 <permission android:name="android.permission.BIND_DIRECTORY_SEARCH" 790 android:protectionLevel="signature|system" /> 791 792 <!-- =============================================================== --> 793 <!-- Permissions for accessing the user dictionary--> 794 <!-- =============================================================== --> 795 <eat-comment /> 796 797 <!-- Used for permissions that provide access to the user 798 calendar to create / view events.--> 799 <permission-group android:name="android.permission-group.USER_DICTIONARY" 800 android:label="@string/permgrouplab_dictionary" 801 android:icon="@drawable/perm_group_user_dictionary" 802 android:description="@string/permgroupdesc_dictionary" 803 android:permissionGroupFlags="personalInfo" 804 android:priority="1100" /> 805 806 <!-- Allows an application to read the user dictionary. This should 807 really only be required by an IME, or a dictionary editor like 808 the Settings app. --> 809 <permission android:name="android.permission.READ_USER_DICTIONARY" 810 android:permissionGroup="android.permission-group.USER_DICTIONARY" 811 android:label="@string/permlab_readDictionary" 812 android:description="@string/permdesc_readDictionary" 813 android:protectionLevel="dangerous"/> 814 815 <!-- Allows an application to write to the user dictionary. --> 816 <permission android:name="android.permission.WRITE_USER_DICTIONARY" 817 android:permissionGroup="android.permission-group.USER_DICTIONARY" 818 android:label="@string/permlab_writeDictionary" 819 android:description="@string/permdesc_writeDictionary" 820 android:protectionLevel="normal"/> 821 822 <!-- =============================================================== --> 823 <!-- Permissions for setting the device alarm --> 824 <!-- =============================================================== --> 825 <eat-comment /> 826 827 <!-- Allows an application to broadcast an Intent to set an alarm for the user. --> 828 <permission android:name="com.android.alarm.permission.SET_ALARM" 829 android:label="@string/permlab_setAlarm" 830 android:description="@string/permdesc_setAlarm" 831 android:protectionLevel="normal" /> 832 833 <!-- =============================================================== --> 834 <!-- Permissions for accessing the user voicemail --> 835 <!-- =============================================================== --> 836 <eat-comment /> 837 838 <!-- Allows an application to modify and remove existing voicemails in the system --> 839 <permission android:name="com.android.voicemail.permission.WRITE_VOICEMAIL" 840 android:protectionLevel="system|signature" /> 841 842 <!-- Allows an application to read voicemails in the system. --> 843 <permission android:name="com.android.voicemail.permission.READ_VOICEMAIL" 844 android:protectionLevel="system|signature" /> 845 846 <!-- ======================================= --> 847 <!-- Permissions for accessing location info --> 848 <!-- ======================================= --> 849 <eat-comment /> 850 851 <!-- Allows an application to access extra location provider commands --> 852 <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS" 853 android:label="@string/permlab_accessLocationExtraCommands" 854 android:description="@string/permdesc_accessLocationExtraCommands" 855 android:protectionLevel="normal" /> 856 857 <!-- @SystemApi Allows an application to install a location provider into the Location Manager. 858 <p>Not for use by third-party applications. --> 859 <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER" 860 android:protectionLevel="signature|system" /> 861 862 <!-- @SystemApi @hide Allows HDMI-CEC service to access device and configuration files. 863 This should only be used by HDMI-CEC service. 864 --> 865 <permission android:name="android.permission.HDMI_CEC" 866 android:protectionLevel="signatureOrSystem" /> 867 868 <!-- @SystemApi Allows an application to use location features in hardware, 869 such as the geofencing api. 870 <p>Not for use by third-party applications. --> 871 <permission android:name="android.permission.LOCATION_HARDWARE" 872 android:protectionLevel="signature|system" /> 873 <uses-permission android:name="android.permission.LOCATION_HARDWARE"/> 874 875 <!-- Allows an application to create mock location providers for testing. --> 876 <permission android:name="android.permission.ACCESS_MOCK_LOCATION" 877 android:protectionLevel="signature" /> 878 879 <!-- ======================================= --> 880 <!-- Permissions for accessing networks --> 881 <!-- ======================================= --> 882 <eat-comment /> 883 884 <!-- Allows applications to open network sockets. --> 885 <permission android:name="android.permission.INTERNET" 886 android:description="@string/permdesc_createNetworkSockets" 887 android:label="@string/permlab_createNetworkSockets" 888 android:protectionLevel="normal" /> 889 890 <!-- Allows applications to access information about networks --> 891 <permission android:name="android.permission.ACCESS_NETWORK_STATE" 892 android:description="@string/permdesc_accessNetworkState" 893 android:label="@string/permlab_accessNetworkState" 894 android:protectionLevel="normal" /> 895 896 <!-- Allows applications to access information about Wi-Fi networks --> 897 <permission android:name="android.permission.ACCESS_WIFI_STATE" 898 android:description="@string/permdesc_accessWifiState" 899 android:label="@string/permlab_accessWifiState" 900 android:protectionLevel="normal" /> 901 902 <!-- Allows applications to change Wi-Fi connectivity state --> 903 <permission android:name="android.permission.CHANGE_WIFI_STATE" 904 android:description="@string/permdesc_changeWifiState" 905 android:label="@string/permlab_changeWifiState" 906 android:protectionLevel="normal" /> 907 908 <!-- @SystemApi @hide Allows applications to read Wi-Fi credential. 909 <p>Not for use by third-party applications. --> 910 <permission android:name="android.permission.READ_WIFI_CREDENTIAL" 911 android:protectionLevel="signature|system" /> 912 913 <!-- @SystemApi @hide Allow system apps to receive broadcast 914 when a wifi network credential is changed. 915 <p>Not for use by third-party applications. --> 916 <permission android:name="android.permission.RECEIVE_WIFI_CREDENTIAL_CHANGE" 917 android:protectionLevel="signature|system" /> 918 919 <!-- @SystemApi @hide Allows an application to modify any wifi configuration, even if created 920 by another application. Once reconfigured the original creator cannot make any further 921 modifications. 922 <p>Not for use by third-party applications. --> 923 <permission android:name="android.permission.OVERRIDE_WIFI_CONFIG" 924 android:protectionLevel="signature|system" /> 925 926 <!-- @hide --> 927 <permission android:name="android.permission.ACCESS_WIMAX_STATE" 928 android:description="@string/permdesc_accessWimaxState" 929 android:label="@string/permlab_accessWimaxState" 930 android:protectionLevel="normal" /> 931 932 <!-- @hide --> 933 <permission android:name="android.permission.CHANGE_WIMAX_STATE" 934 android:description="@string/permdesc_changeWimaxState" 935 android:label="@string/permlab_changeWimaxState" 936 android:protectionLevel="normal" /> 937 938 <!--@SystemApi Allows applications to the the local WiFi and Bluetooth MAC address. 939 @hide 940 --> 941 <permission android:name="android.permission.SCORE_NETWORKS" 942 android:protectionLevel="signature|system" /> 943 944 <!-- ======================================= --> 945 <!-- Permissions for short range, peripheral networks --> 946 <!-- ======================================= --> 947 <eat-comment /> 948 949 <!-- Allows applications to connect to paired bluetooth devices --> 950 <permission android:name="android.permission.BLUETOOTH" 951 android:description="@string/permdesc_bluetooth" 952 android:label="@string/permlab_bluetooth" 953 android:protectionLevel="normal" /> 954 955 <!-- Allows applications to discover and pair bluetooth devices --> 956 <permission android:name="android.permission.BLUETOOTH_ADMIN" 957 android:description="@string/permdesc_bluetoothAdmin" 958 android:label="@string/permlab_bluetoothAdmin" 959 android:protectionLevel="normal" /> 960 961 <!-- @SystemApi Allows applications to pair bluetooth devices without user interaction, and to 962 allow or disallow phonebook access or message access. 963 This is not available to third party applications. --> 964 <permission android:name="android.permission.BLUETOOTH_PRIVILEGED" 965 android:protectionLevel="system|signature" /> 966 967 <!-- Control access to email providers exclusively for Bluetooth 968 @hide 969 --> 970 <permission android:name="android.permission.BLUETOOTH_MAP" 971 android:protectionLevel="signature" /> 972 973 <!-- Allows bluetooth stack to access files 974 @hide This should only be used by Bluetooth apk. 975 --> 976 <permission android:name="android.permission.BLUETOOTH_STACK" 977 android:protectionLevel="signature" /> 978 979 <!-- Allows applications to perform I/O operations over NFC --> 980 <permission android:name="android.permission.NFC" 981 android:description="@string/permdesc_nfc" 982 android:label="@string/permlab_nfc" 983 android:protectionLevel="normal" /> 984 985 <!-- @SystemApi Allows an internal user to use privileged ConnectivityManager APIs. 986 @hide --> 987 <permission android:name="android.permission.CONNECTIVITY_INTERNAL" 988 android:protectionLevel="signature|system" /> 989 990 <!-- @SystemApi 991 @hide --> 992 <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE" 993 android:protectionLevel="signature|system" /> 994 995 <!-- @SystemApi Allows access to the loop radio (Android@Home mesh network) device. 996 @hide --> 997 <permission android:name="android.permission.LOOP_RADIO" 998 android:protectionLevel="signature|system" /> 999 1000 <!-- Allows sending and receiving handover transfer status from Wifi and Bluetooth 1001 @hide --> 1002 <permission android:name="android.permission.NFC_HANDOVER_STATUS" 1003 android:protectionLevel="signature|system" /> 1004 1005 <!-- ================================== --> 1006 <!-- Permissions for accessing accounts --> 1007 <!-- ================================== --> 1008 <eat-comment /> 1009 1010 <!-- Permissions for direct access to the accounts managed 1011 by the Account Manager. --> 1012 <permission-group android:name="android.permission-group.ACCOUNTS" 1013 android:label="@string/permgrouplab_accounts" 1014 android:icon="@drawable/perm_group_accounts" 1015 android:description="@string/permgroupdesc_accounts" 1016 android:permissionGroupFlags="personalInfo" 1017 android:priority="1000" /> 1018 1019 <!-- Allows access to the list of accounts in the Accounts Service --> 1020 <permission android:name="android.permission.GET_ACCOUNTS" 1021 android:permissionGroup="android.permission-group.CONTACTS" 1022 android:protectionLevel="normal" 1023 android:description="@string/permdesc_getAccounts" 1024 android:label="@string/permlab_getAccounts" /> 1025 1026 <!-- @SystemApi Allows applications to call into AccountAuthenticators. 1027 <p>Not for use by third-party applications. --> 1028 <permission android:name="android.permission.ACCOUNT_MANAGER" 1029 android:permissionGroup="android.permission-group.ACCOUNTS" 1030 android:protectionLevel="signature" /> 1031 1032 <!-- ================================== --> 1033 <!-- Permissions for accessing hardware that may effect battery life--> 1034 <!-- ================================== --> 1035 <eat-comment /> 1036 1037 <!-- Allows applications to enter Wi-Fi Multicast mode --> 1038 <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE" 1039 android:description="@string/permdesc_changeWifiMulticastState" 1040 android:label="@string/permlab_changeWifiMulticastState" 1041 android:protectionLevel="normal" /> 1042 1043 <!-- Allows access to the vibrator --> 1044 <permission android:name="android.permission.VIBRATE" 1045 android:label="@string/permlab_vibrate" 1046 android:description="@string/permdesc_vibrate" 1047 android:protectionLevel="normal" /> 1048 1049 <!-- Allows access to the flashlight --> 1050 <permission android:name="android.permission.FLASHLIGHT" 1051 android:label="@string/permlab_flashlight" 1052 android:description="@string/permdesc_flashlight" 1053 android:protectionLevel="normal" /> 1054 1055 <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen 1056 from dimming --> 1057 <permission android:name="android.permission.WAKE_LOCK" 1058 android:label="@string/permlab_wakeLock" 1059 android:description="@string/permdesc_wakeLock" 1060 android:protectionLevel="normal" /> 1061 1062 <!-- Allows using the device's IR transmitter, if available --> 1063 <permission android:name="android.permission.TRANSMIT_IR" 1064 android:label="@string/permlab_transmitIr" 1065 android:description="@string/permdesc_transmitIr" 1066 android:protectionLevel="normal" /> 1067 1068 <!-- ==================================================== --> 1069 <!-- Permissions related to changing audio settings --> 1070 <!-- ==================================================== --> 1071 <eat-comment /> 1072 1073 <!-- Allows an application to modify global audio settings --> 1074 <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS" 1075 android:label="@string/permlab_modifyAudioSettings" 1076 android:description="@string/permdesc_modifyAudioSettings" 1077 android:protectionLevel="normal" /> 1078 1079 <!-- ================================== --> 1080 <!-- Permissions for accessing hardware --> 1081 <!-- ================================== --> 1082 <eat-comment /> 1083 1084 <!-- @SystemApi Allows an application to manage preferences and permissions for USB devices 1085 @hide --> 1086 <permission android:name="android.permission.MANAGE_USB" 1087 android:protectionLevel="signature|system" /> 1088 1089 <!-- @SystemApi Allows an application to access the MTP USB kernel driver. 1090 For use only by the device side MTP implementation. 1091 @hide --> 1092 <permission android:name="android.permission.ACCESS_MTP" 1093 android:protectionLevel="signature|system" /> 1094 1095 <!-- Allows access to hardware peripherals. Intended only for hardware testing. 1096 <p>Not for use by third-party applications. --> 1097 <permission android:name="android.permission.HARDWARE_TEST" 1098 android:protectionLevel="signature" /> 1099 1100 <!-- @SystemApi Allows access to FM 1101 @hide This is not a third-party API (intended for system apps).--> 1102 <permission android:name="android.permission.ACCESS_FM_RADIO" 1103 android:protectionLevel="signature|system" /> 1104 1105 <!-- Allows access to configure network interfaces, configure/use IPSec, etc. 1106 @hide --> 1107 <permission android:name="android.permission.NET_ADMIN" 1108 android:protectionLevel="signature" /> 1109 1110 <!-- Allows registration for remote audio playback. @hide --> 1111 <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK" 1112 android:protectionLevel="signature" /> 1113 1114 <!-- @SystemApi Allows TvInputService to access underlying TV input hardware such as 1115 built-in tuners and HDMI-in's. 1116 @hide This should only be used by OEM's TvInputService's. 1117 --> 1118 <permission android:name="android.permission.TV_INPUT_HARDWARE" 1119 android:protectionLevel="signatureOrSystem" /> 1120 1121 <!-- @SystemApi Allows to capture a frame of TV input hardware such as 1122 built-in tuners and HDMI-in's. 1123 @hide <p>Not for use by third-party applications. 1124 --> 1125 <permission android:name="android.permission.CAPTURE_TV_INPUT" 1126 android:protectionLevel="signatureOrSystem" /> 1127 1128 <!-- @hide Allows TvInputService to access DVB device. 1129 <p>Not for use by third-party applications. --> 1130 <permission android:name="android.permission.DVB_DEVICE" 1131 android:protectionLevel="signatureOrSystem" /> 1132 1133 <!-- @hide Allows enabling/disabling OEM unlock 1134 <p>Not for use by third-party applications. --> 1135 <permission android:name="android.permission.OEM_UNLOCK_STATE" 1136 android:protectionLevel="signature" /> 1137 1138 <!-- @hide Allows querying state of PersistentDataBlock 1139 <p>Not for use by third-party applications. --> 1140 <permission android:name="android.permission.ACCESS_PDB_STATE" 1141 android:protectionLevel="signature" /> 1142 1143 <!-- @hide Allows system update service to notify device owner about pending updates. 1144 <p>Not for use by third-party applications. --> 1145 <permission android:name="android.permission.NOTIFY_PENDING_SYSTEM_UPDATE" 1146 android:protectionLevel="signatureOrSystem" /> 1147 1148 <!-- =========================================== --> 1149 <!-- Permissions associated with camera and image capture --> 1150 <!-- =========================================== --> 1151 <eat-comment /> 1152 1153 <!-- @SystemApi Allows disabling the transmit-indicator LED that is normally on when 1154 a camera is in use by an application. 1155 @hide --> 1156 <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED" 1157 android:protectionLevel="signature|system" /> 1158 1159 <!-- Allows sending the camera service notifications about system-wide events. 1160 @hide --> 1161 <permission android:name="android.permission.CAMERA_SEND_SYSTEM_EVENTS" 1162 android:protectionLevel="signature|system" /> 1163 1164 <!-- =========================================== --> 1165 <!-- Permissions associated with telephony state --> 1166 <!-- =========================================== --> 1167 <eat-comment /> 1168 1169 <!-- @SystemApi Allows modification of the telephony state - power on, mmi, etc. 1170 Does not include placing calls. 1171 <p>Not for use by third-party applications. --> 1172 <permission android:name="android.permission.MODIFY_PHONE_STATE" 1173 android:protectionLevel="signature|system" /> 1174 1175 <!-- Allows read only access to precise phone state. 1176 @hide Pending API council approval --> 1177 <permission android:name="android.permission.READ_PRECISE_PHONE_STATE" 1178 android:protectionLevel="signature|system" /> 1179 1180 <!-- @SystemApi Allows read access to privileged phone state. 1181 @hide Used internally. --> 1182 <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE" 1183 android:protectionLevel="signature|system" /> 1184 1185 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1186 PhoneAccount#CAPABILITY_SIM_SUBSCRIPTION. This capability indicates that the PhoneAccount 1187 corresponds to a device SIM. 1188 @hide --> 1189 <permission android:name="android.permission.REGISTER_SIM_SUBSCRIPTION" 1190 android:protectionLevel="system|signature" /> 1191 1192 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1193 PhoneAccount#CAPABILITY_CALL_PROVIDER. 1194 @hide --> 1195 <permission android:name="android.permission.REGISTER_CALL_PROVIDER" 1196 android:protectionLevel="system|signature" /> 1197 1198 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1199 PhoneAccount#CAPABILITY_CONNECTION_MANAGER 1200 @hide --> 1201 <permission android:name="android.permission.REGISTER_CONNECTION_MANAGER" 1202 android:protectionLevel="system|signature" /> 1203 1204 <!-- Must be required by a {@link android.telecom.InCallService}, 1205 to ensure that only the system can bind to it. --> 1206 <permission android:name="android.permission.BIND_INCALL_SERVICE" 1207 android:protectionLevel="system|signature" /> 1208 1209 <!-- Must be required by a {@link android.telecom.ConnectionService}, 1210 to ensure that only the system can bind to it. 1211 @deprecated {@link android.telecom.ConnectionService}s should require 1212 android.permission.BIND_TELECOM_CONNECTION_SERVICE instead. 1213 @SystemApi 1214 @hide --> 1215 <permission android:name="android.permission.BIND_CONNECTION_SERVICE" 1216 android:protectionLevel="system|signature" /> 1217 1218 <!-- Must be required by a {@link android.telecom.ConnectionService}, 1219 to ensure that only the system can bind to it. --> 1220 <permission android:name="android.permission.BIND_TELECOM_CONNECTION_SERVICE" 1221 android:protectionLevel="system|signature" /> 1222 1223 <!-- @SystemApi Allows an application to control the in-call experience. 1224 @hide --> 1225 <permission android:name="android.permission.CONTROL_INCALL_EXPERIENCE" 1226 android:protectionLevel="system|signature" /> 1227 1228 <!-- Allows an application to receive STK related commands. 1229 @hide --> 1230 <permission android:name="android.permission.RECEIVE_STK_COMMANDS" 1231 android:protectionLevel="system|signature" /> 1232 1233 <!-- ================================== --> 1234 <!-- Permissions for sdcard interaction --> 1235 <!-- ================================== --> 1236 <eat-comment /> 1237 1238 <!-- @SystemApi Allows an application to write to internal media storage 1239 @hide --> 1240 <permission android:name="android.permission.WRITE_MEDIA_STORAGE" 1241 android:protectionLevel="signature|system" /> 1242 1243 <!-- Allows an application to manage access to documents, usually as part 1244 of a document picker. --> 1245 <permission android:name="android.permission.MANAGE_DOCUMENTS" 1246 android:protectionLevel="signature" /> 1247 1248 <!-- ================================== --> 1249 <!-- Permissions for screenlock --> 1250 <!-- ================================== --> 1251 <eat-comment /> 1252 1253 <!-- Allows applications to disable the keyguard if it is not secure. --> 1254 <permission android:name="android.permission.DISABLE_KEYGUARD" 1255 android:description="@string/permdesc_disableKeyguard" 1256 android:label="@string/permlab_disableKeyguard" 1257 android:protectionLevel="normal" /> 1258 1259 <!-- ================================== --> 1260 <!-- Permissions to access other installed applications --> 1261 <!-- ================================== --> 1262 <eat-comment /> 1263 1264 <!-- @deprecated No longer enforced. --> 1265 <permission android:name="android.permission.GET_TASKS" 1266 android:label="@string/permlab_getTasks" 1267 android:description="@string/permdesc_getTasks" 1268 android:protectionLevel="normal" /> 1269 1270 <!-- New version of GET_TASKS that apps can request, since GET_TASKS doesn't really 1271 give access to task information. We need this new one because there are 1272 many existing apps that use add libraries and such that have validation 1273 code to ensure the app has requested the GET_TASKS permission by seeing 1274 if it has been granted the permission... if it hasn't, it kills the app 1275 with a message about being upset. So we need to have it continue to look 1276 like the app is getting that permission, even though it will never be 1277 checked, and new privileged apps can now request this one for real access. 1278 @hide 1279 @SystemApi --> 1280 <permission android:name="android.permission.REAL_GET_TASKS" 1281 android:protectionLevel="signature|system" /> 1282 1283 <!-- Allows an application to start a task from a ActivityManager#RecentTaskInfo. 1284 @hide --> 1285 <permission android:name="android.permission.START_TASKS_FROM_RECENTS" 1286 android:protectionLevel="signature|system" /> 1287 1288 <!-- @SystemApi @hide Allows an application to call APIs that allow it to do interactions 1289 across the users on the device, using singleton services and 1290 user-targeted broadcasts. This permission is not available to 1291 third party applications. --> 1292 <permission android:name="android.permission.INTERACT_ACROSS_USERS" 1293 android:protectionLevel="signature|system|development" /> 1294 1295 <!-- @hide Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS} 1296 that removes restrictions on where broadcasts can be sent and allows other 1297 types of interactions. --> 1298 <permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL" 1299 android:protectionLevel="signature" /> 1300 1301 <!-- @SystemApi @hide Allows an application to call APIs that allow it to query and manage 1302 users on the device. This permission is not available to 1303 third party applications. --> 1304 <permission android:name="android.permission.MANAGE_USERS" 1305 android:protectionLevel="signature|system" /> 1306 1307 <!-- @hide Allows an application to set the profile owners and the device owner. 1308 This permission is not available to third party applications.--> 1309 <permission android:name="android.permission.MANAGE_PROFILE_AND_DEVICE_OWNERS" 1310 android:protectionLevel="signature" 1311 android:label="@string/permlab_manageProfileAndDeviceOwners" 1312 android:description="@string/permdesc_manageProfileAndDeviceOwners" /> 1313 1314 <!-- Allows an application to get full detailed information about 1315 recently running tasks, with full fidelity to the real state. 1316 @hide --> 1317 <permission android:name="android.permission.GET_DETAILED_TASKS" 1318 android:protectionLevel="signature" /> 1319 1320 <!-- Allows an application to change the Z-order of tasks --> 1321 <permission android:name="android.permission.REORDER_TASKS" 1322 android:label="@string/permlab_reorderTasks" 1323 android:description="@string/permdesc_reorderTasks" 1324 android:protectionLevel="normal" /> 1325 1326 <!-- @hide Allows an application to change to remove/kill tasks --> 1327 <permission android:name="android.permission.REMOVE_TASKS" 1328 android:protectionLevel="signature" /> 1329 1330 <!-- @SystemApi @hide Allows an application to create/manage/remove stacks --> 1331 <permission android:name="android.permission.MANAGE_ACTIVITY_STACKS" 1332 android:protectionLevel="signature|system" /> 1333 1334 <!-- Allows an application to start any activity, regardless of permission 1335 protection or exported state. 1336 @hide --> 1337 <permission android:name="android.permission.START_ANY_ACTIVITY" 1338 android:protectionLevel="signature" /> 1339 1340 <!-- @deprecated The {@link android.app.ActivityManager#restartPackage} 1341 API is no longer supported. --> 1342 <permission android:name="android.permission.RESTART_PACKAGES" 1343 android:label="@string/permlab_killBackgroundProcesses" 1344 android:description="@string/permdesc_killBackgroundProcesses" 1345 android:protectionLevel="normal" /> 1346 1347 <!-- Allows an application to call 1348 {@link android.app.ActivityManager#killBackgroundProcesses}. --> 1349 <permission android:name="android.permission.KILL_BACKGROUND_PROCESSES" 1350 android:label="@string/permlab_killBackgroundProcesses" 1351 android:description="@string/permdesc_killBackgroundProcesses" 1352 android:protectionLevel="normal" /> 1353 1354 <!-- @SystemApi @hide Allows an application to retrieve a package's importance. 1355 This permission is not available to third party applications. --> 1356 <permission android:name="android.permission.GET_PACKAGE_IMPORTANCE" 1357 android:protectionLevel="signature|system" /> 1358 1359 <!-- ================================== --> 1360 <!-- Permissions affecting the display of other applications --> 1361 <!-- ================================== --> 1362 <eat-comment /> 1363 1364 <!-- Allows an application to open windows using the type 1365 {@link android.view.WindowManager.LayoutParams#TYPE_SYSTEM_ALERT}, 1366 shown on top of all other applications. Very few applications 1367 should use this permission; these windows are intended for 1368 system-level interaction with the user. --> 1369 <permission android:name="android.permission.SYSTEM_ALERT_WINDOW" 1370 android:label="@string/permlab_systemAlertWindow" 1371 android:description="@string/permdesc_systemAlertWindow" 1372 android:protectionLevel="dangerous" /> 1373 1374 <!-- ================================== --> 1375 <!-- Permissions affecting the system wallpaper --> 1376 <!-- ================================== --> 1377 <eat-comment /> 1378 1379 <!-- Allows applications to set the wallpaper --> 1380 <permission android:name="android.permission.SET_WALLPAPER" 1381 android:label="@string/permlab_setWallpaper" 1382 android:description="@string/permdesc_setWallpaper" 1383 android:protectionLevel="normal" /> 1384 1385 <!-- Allows applications to set the wallpaper hints --> 1386 <permission android:name="android.permission.SET_WALLPAPER_HINTS" 1387 android:label="@string/permlab_setWallpaperHints" 1388 android:description="@string/permdesc_setWallpaperHints" 1389 android:protectionLevel="normal" /> 1390 1391 <!-- ============================================ --> 1392 <!-- Permissions for changing the system clock --> 1393 <!-- ============================================ --> 1394 <eat-comment /> 1395 1396 <!-- @SystemApi Allows applications to set the system time. 1397 <p>Not for use by third-party applications. --> 1398 <permission android:name="android.permission.SET_TIME" 1399 android:protectionLevel="signature|system" /> 1400 1401 <!-- Allows applications to set the system time zone --> 1402 <permission android:name="android.permission.SET_TIME_ZONE" 1403 android:label="@string/permlab_setTimeZone" 1404 android:description="@string/permdesc_setTimeZone" 1405 android:protectionLevel="normal" /> 1406 1407 <!-- ==================================================== --> 1408 <!-- Permissions related to changing status bar --> 1409 <!-- ==================================================== --> 1410 <eat-comment /> 1411 1412 <!-- Allows an application to expand or collapse the status bar. --> 1413 <permission android:name="android.permission.EXPAND_STATUS_BAR" 1414 android:label="@string/permlab_expandStatusBar" 1415 android:description="@string/permdesc_expandStatusBar" 1416 android:protectionLevel="normal" /> 1417 1418 <!-- ============================================================== --> 1419 <!-- Permissions related to adding/removing shortcuts from Launcher --> 1420 <!-- ============================================================== --> 1421 <eat-comment /> 1422 1423 <!-- Allows an application to install a shortcut in Launcher --> 1424 <permission android:name="com.android.launcher.permission.INSTALL_SHORTCUT" 1425 android:label="@string/permlab_install_shortcut" 1426 android:description="@string/permdesc_install_shortcut" 1427 android:protectionLevel="normal"/> 1428 1429 <!-- Allows an application to uninstall a shortcut in Launcher --> 1430 <permission android:name="com.android.launcher.permission.UNINSTALL_SHORTCUT" 1431 android:label="@string/permlab_uninstall_shortcut" 1432 android:description="@string/permdesc_uninstall_shortcut" 1433 android:protectionLevel="normal"/> 1434 1435 <!-- ==================================================== --> 1436 <!-- Permissions related to accessing sync settings --> 1437 <!-- ==================================================== --> 1438 <eat-comment /> 1439 1440 <!-- Allows applications to read the sync settings --> 1441 <permission android:name="android.permission.READ_SYNC_SETTINGS" 1442 android:description="@string/permdesc_readSyncSettings" 1443 android:label="@string/permlab_readSyncSettings" 1444 android:protectionLevel="normal" /> 1445 1446 <!-- Allows applications to write the sync settings --> 1447 <permission android:name="android.permission.WRITE_SYNC_SETTINGS" 1448 android:description="@string/permdesc_writeSyncSettings" 1449 android:label="@string/permlab_writeSyncSettings" 1450 android:protectionLevel="normal" /> 1451 1452 <!-- Allows applications to read the sync stats --> 1453 <permission android:name="android.permission.READ_SYNC_STATS" 1454 android:description="@string/permdesc_readSyncStats" 1455 android:label="@string/permlab_readSyncStats" 1456 android:protectionLevel="normal" /> 1457 1458 <!-- ============================================ --> 1459 <!-- Permissions for low-level system interaction --> 1460 <!-- ============================================ --> 1461 <eat-comment /> 1462 1463 <!-- @SystemApi @hide Change the screen compatibility mode of applications --> 1464 <permission android:name="android.permission.SET_SCREEN_COMPATIBILITY" 1465 android:protectionLevel="signature" /> 1466 1467 <!-- Allows an application to access all multi-user external storage @hide --> 1468 <permission android:name="android.permission.ACCESS_ALL_EXTERNAL_STORAGE" 1469 android:protectionLevel="signature" /> 1470 1471 <!-- @SystemApi Allows an application to modify the current configuration, such 1472 as locale. --> 1473 <permission android:name="android.permission.CHANGE_CONFIGURATION" 1474 android:protectionLevel="signature|system|development" /> 1475 1476 <!-- Allows an application to read or write the system settings. --> 1477 <permission android:name="android.permission.WRITE_SETTINGS" 1478 android:label="@string/permlab_writeSettings" 1479 android:description="@string/permdesc_writeSettings" 1480 android:protectionLevel="dangerous" /> 1481 1482 <!-- @SystemApi Allows an application to modify the Google service map. 1483 <p>Not for use by third-party applications. --> 1484 <permission android:name="android.permission.WRITE_GSERVICES" 1485 android:protectionLevel="signature|system" /> 1486 1487 <!-- @SystemApi Allows an application to call 1488 {@link android.app.ActivityManager#forceStopPackage}. 1489 @hide --> 1490 <permission android:name="android.permission.FORCE_STOP_PACKAGES" 1491 android:protectionLevel="signature|system" /> 1492 1493 <!-- @SystemApi @hide Allows an application to retrieve the content of the active window 1494 An active window is the window that has fired an accessibility event. --> 1495 <permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT" 1496 android:protectionLevel="signature|system" /> 1497 1498 <!-- @SystemApi Modify the global animation scaling factor. 1499 <p>Not for use by third-party applications. --> 1500 <permission android:name="android.permission.SET_ANIMATION_SCALE" 1501 android:protectionLevel="signature|system|development" /> 1502 1503 <!-- @deprecated This functionality will be removed in the future; please do 1504 not use. Allow an application to make its activities persistent. --> 1505 <permission android:name="android.permission.PERSISTENT_ACTIVITY" 1506 android:label="@string/permlab_persistentActivity" 1507 android:description="@string/permdesc_persistentActivity" 1508 android:protectionLevel="normal" /> 1509 1510 <!-- Allows an application to find out the space used by any package. --> 1511 <permission android:name="android.permission.GET_PACKAGE_SIZE" 1512 android:label="@string/permlab_getPackageSize" 1513 android:description="@string/permdesc_getPackageSize" 1514 android:protectionLevel="normal" /> 1515 1516 <!-- @deprecated No longer useful, see 1517 {@link android.content.pm.PackageManager#addPackageToPreferred} 1518 for details. --> 1519 <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS" 1520 android:protectionLevel="signature" /> 1521 1522 <!-- Allows an application to receive the 1523 {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is 1524 broadcast after the system finishes booting. If you don't 1525 request this permission, you will not receive the broadcast at 1526 that time. Though holding this permission does not have any 1527 security implications, it can have a negative impact on the 1528 user experience by increasing the amount of time it takes the 1529 system to start and allowing applications to have themselves 1530 running without the user being aware of them. As such, you must 1531 explicitly declare your use of this facility to make that visible 1532 to the user. --> 1533 <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED" 1534 android:label="@string/permlab_receiveBootCompleted" 1535 android:description="@string/permdesc_receiveBootCompleted" 1536 android:protectionLevel="normal" /> 1537 1538 <!-- Allows an application to broadcast sticky intents. These are 1539 broadcasts whose data is held by the system after being finished, 1540 so that clients can quickly retrieve that data without having 1541 to wait for the next broadcast. --> 1542 <permission android:name="android.permission.BROADCAST_STICKY" 1543 android:label="@string/permlab_broadcastSticky" 1544 android:description="@string/permdesc_broadcastSticky" 1545 android:protectionLevel="normal" /> 1546 1547 <!-- @SystemApi Allows mounting and unmounting file systems for removable storage. 1548 <p>Not for use by third-party applications.--> 1549 <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS" 1550 android:protectionLevel="system|signature" /> 1551 1552 <!-- @SystemApi Allows formatting file systems for removable storage. 1553 <p>Not for use by third-party applications. --> 1554 <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS" 1555 android:protectionLevel="system|signature" /> 1556 1557 <!-- Allows access to ASEC non-destructive API calls 1558 @hide --> 1559 <permission android:name="android.permission.ASEC_ACCESS" 1560 android:protectionLevel="signature" /> 1561 1562 <!-- Allows creation of ASEC volumes 1563 @hide --> 1564 <permission android:name="android.permission.ASEC_CREATE" 1565 android:protectionLevel="signature" /> 1566 1567 <!-- Allows destruction of ASEC volumes 1568 @hide --> 1569 <permission android:name="android.permission.ASEC_DESTROY" 1570 android:protectionLevel="signature" /> 1571 1572 <!-- Allows mount / unmount of ASEC volumes 1573 @hide --> 1574 <permission android:name="android.permission.ASEC_MOUNT_UNMOUNT" 1575 android:protectionLevel="signature" /> 1576 1577 <!-- Allows rename of ASEC volumes 1578 @hide --> 1579 <permission android:name="android.permission.ASEC_RENAME" 1580 android:protectionLevel="signature" /> 1581 1582 <!-- @SystemApi Allows applications to write the apn settings. 1583 <p>Not for use by third-party applications. --> 1584 <permission android:name="android.permission.WRITE_APN_SETTINGS" 1585 android:protectionLevel="signature|system" /> 1586 1587 <!-- Allows applications to change network connectivity state --> 1588 <permission android:name="android.permission.CHANGE_NETWORK_STATE" 1589 android:description="@string/permdesc_changeNetworkState" 1590 android:label="@string/permlab_changeNetworkState" 1591 android:protectionLevel="normal" /> 1592 1593 <!-- Allows an application to clear the caches of all installed 1594 applications on the device. --> 1595 <permission android:name="android.permission.CLEAR_APP_CACHE" 1596 android:protectionLevel="signatureOrSystem" /> 1597 1598 <!-- @SystemApi Allows an application to use any media decoder when decoding for playback 1599 @hide --> 1600 <permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK" 1601 android:protectionLevel="signature|system" /> 1602 1603 <!-- @SystemApi Allows an application to install and/or uninstall CA certificates on 1604 behalf of the user. 1605 @hide --> 1606 <permission android:name="android.permission.MANAGE_CA_CERTIFICATES" 1607 android:protectionLevel="signature|system" /> 1608 1609 <!-- @SystemApi Allows an application to do certain operations needed for 1610 interacting with the recovery (system update) system. 1611 @hide --> 1612 <permission android:name="android.permission.RECOVERY" 1613 android:protectionLevel="signature|system" /> 1614 1615 <!-- Allows the system to bind to an application's task services 1616 @hide --> 1617 <permission android:name="android.permission.BIND_JOB_SERVICE" 1618 android:protectionLevel="signature" /> 1619 <uses-permission android:name="android.permission.BIND_JOB_SERVICE"/> 1620 1621 <!-- Allows an application to initiate configuration updates 1622 <p>An application requesting this permission is responsible for 1623 verifying the source and integrity of any update before passing 1624 it off to the various individual installer components 1625 @hide --> 1626 <permission android:name="android.permission.UPDATE_CONFIG" 1627 android:protectionLevel="signature|system" /> 1628 1629 <!-- ========================================= --> 1630 <!-- Permissions for special development tools --> 1631 <!-- ========================================= --> 1632 <eat-comment /> 1633 1634 <!-- @SystemApi Allows an application to read or write the secure system settings. 1635 <p>Not for use by third-party applications. --> 1636 <permission android:name="android.permission.WRITE_SECURE_SETTINGS" 1637 android:protectionLevel="signature|system|development" /> 1638 1639 <!-- @SystemApi Allows an application to retrieve state dump information from system services. 1640 <p>Not for use by third-party applications. --> 1641 <permission android:name="android.permission.DUMP" 1642 android:protectionLevel="signature|system|development" /> 1643 1644 <!-- @SystemApi Allows an application to read the low-level system log files. 1645 <p>Not for use by third-party applications, because 1646 Log entries can contain the user's private information. --> 1647 <permission android:name="android.permission.READ_LOGS" 1648 android:protectionLevel="signature|system|development" /> 1649 1650 <!-- @SystemApi Configure an application for debugging. 1651 <p>Not for use by third-party applications. --> 1652 <permission android:name="android.permission.SET_DEBUG_APP" 1653 android:protectionLevel="signature|system|development" /> 1654 1655 <!-- @SystemApi Allows an application to set the maximum number of (not needed) 1656 application processes that can be running. 1657 <p>Not for use by third-party applications. --> 1658 <permission android:name="android.permission.SET_PROCESS_LIMIT" 1659 android:protectionLevel="signature|system|development" /> 1660 1661 <!-- @SystemApi Allows an application to control whether activities are immediately 1662 finished when put in the background. 1663 <p>Not for use by third-party applications. --> 1664 <permission android:name="android.permission.SET_ALWAYS_FINISH" 1665 android:protectionLevel="signature|system|development" /> 1666 1667 <!-- @SystemApi Allow an application to request that a signal be sent to all persistent processes. 1668 <p>Not for use by third-party applications. --> 1669 <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES" 1670 android:protectionLevel="signature|system|development" /> 1671 1672 <!-- ==================================== --> 1673 <!-- Private permissions --> 1674 <!-- ==================================== --> 1675 <eat-comment /> 1676 1677 <!-- @SystemApi Allows applications to RW to diagnostic resources. 1678 <p>Not for use by third-party applications. --> 1679 <permission android:name="android.permission.DIAGNOSTIC" 1680 android:protectionLevel="signature" /> 1681 1682 <!-- @SystemApi Allows an application to open, close, or disable the status bar 1683 and its icons. 1684 <p>Not for use by third-party applications. --> 1685 <permission android:name="android.permission.STATUS_BAR" 1686 android:protectionLevel="signature|system" /> 1687 1688 <!-- Allows an application to be the status bar. Currently used only by SystemUI.apk 1689 @hide --> 1690 <permission android:name="android.permission.STATUS_BAR_SERVICE" 1691 android:protectionLevel="signature" /> 1692 1693 <!-- Allows an application to force a BACK operation on whatever is the 1694 top activity. 1695 <p>Not for use by third-party applications. --> 1696 <permission android:name="android.permission.FORCE_BACK" 1697 android:protectionLevel="signature" /> 1698 1699 <!-- @SystemApi Allows an application to update device statistics. 1700 <p>Not for use by third-party applications. --> 1701 <permission android:name="android.permission.UPDATE_DEVICE_STATS" 1702 android:protectionLevel="signature|system" /> 1703 1704 <!-- @SystemApi @hide Allows an application to collect battery statistics --> 1705 <permission android:name="android.permission.GET_APP_OPS_STATS" 1706 android:protectionLevel="signature|system|development" /> 1707 1708 <!-- @SystemApi Allows an application to update application operation statistics. Not for 1709 use by third party apps. @hide --> 1710 <permission android:name="android.permission.UPDATE_APP_OPS_STATS" 1711 android:protectionLevel="signature|system" /> 1712 1713 <!-- Allows an application to open windows that are for use by parts 1714 of the system user interface. 1715 <p>Not for use by third-party applications. --> 1716 <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW" 1717 android:protectionLevel="signature" /> 1718 1719 <!-- Allows an application to manage (create, destroy, 1720 Z-order) application tokens in the window manager. 1721 <p>Not for use by third-party applications. --> 1722 <permission android:name="android.permission.MANAGE_APP_TOKENS" 1723 android:protectionLevel="signature" /> 1724 1725 <!-- @hide Allows the application to temporarily freeze the screen for a 1726 full-screen transition. --> 1727 <permission android:name="android.permission.FREEZE_SCREEN" 1728 android:protectionLevel="signature" /> 1729 1730 <!-- Allows an application to inject user events (keys, touch, trackball) 1731 into the event stream and deliver them to ANY window. Without this 1732 permission, you can only deliver events to windows in your own process. 1733 <p>Not for use by third-party applications. --> 1734 <permission android:name="android.permission.INJECT_EVENTS" 1735 android:protectionLevel="signature" /> 1736 1737 <!-- @hide Allows an application to register an input filter which filters the stream 1738 of user events (keys, touch, trackball) before they are dispatched to any window. --> 1739 <permission android:name="android.permission.FILTER_EVENTS" 1740 android:protectionLevel="signature" /> 1741 1742 <!-- @hide Allows an application to retrieve the window token from the accessibility manager. --> 1743 <permission android:name="android.permission.RETRIEVE_WINDOW_TOKEN" 1744 android:protectionLevel="signature" /> 1745 1746 <!-- @hide Allows an application to collect frame statistics --> 1747 <permission android:name="android.permission.FRAME_STATS" 1748 android:protectionLevel="signature" /> 1749 1750 <!-- @hide Allows an application to temporary enable accessibility on the device. --> 1751 <permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY" 1752 android:protectionLevel="signature" /> 1753 1754 <!-- Allows an application to watch and control how activities are 1755 started globally in the system. Only for is in debugging 1756 (usually the monkey command). 1757 <p>Not for use by third-party applications. --> 1758 <permission android:name="android.permission.SET_ACTIVITY_WATCHER" 1759 android:protectionLevel="signature" /> 1760 1761 <!-- @SystemApi Allows an application to call the activity manager shutdown() API 1762 to put the higher-level system there into a shutdown state. 1763 @hide --> 1764 <permission android:name="android.permission.SHUTDOWN" 1765 android:protectionLevel="signature|system" /> 1766 1767 <!-- @SystemApi Allows an application to tell the activity manager to temporarily 1768 stop application switches, putting it into a special mode that 1769 prevents applications from immediately switching away from some 1770 critical UI such as the home screen. 1771 @hide --> 1772 <permission android:name="android.permission.STOP_APP_SWITCHES" 1773 android:protectionLevel="signature|system" /> 1774 1775 <!-- Allows an application to retrieve private information about 1776 the current top activity, such as any assist context it can provide. 1777 <p>Not for use by third-party applications. --> 1778 <permission android:name="android.permission.GET_TOP_ACTIVITY_INFO" 1779 android:protectionLevel="signature" /> 1780 1781 <!-- Allows an application to retrieve the current state of keys and 1782 switches. 1783 <p>Not for use by third-party applications. 1784 @deprecated The API that used this permission has been removed. --> 1785 <permission android:name="android.permission.READ_INPUT_STATE" 1786 android:protectionLevel="signature" /> 1787 1788 <!-- Must be required by an {@link android.inputmethodservice.InputMethodService}, 1789 to ensure that only the system can bind to it. --> 1790 <permission android:name="android.permission.BIND_INPUT_METHOD" 1791 android:protectionLevel="signature" /> 1792 1793 <!-- Must be required by an {@link android.media.midi.MidiDeviceService}, 1794 to ensure that only the system can bind to it. --> 1795 <permission android:name="android.permission.BIND_MIDI_DEVICE_SERVICE" 1796 android:protectionLevel="signature" /> 1797 1798 <!-- Must be required by an {@link android.accessibilityservice.AccessibilityService}, 1799 to ensure that only the system can bind to it. --> 1800 <permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE" 1801 android:protectionLevel="signature" /> 1802 1803 <!-- Must be required by a {@link android.printservice.PrintService}, 1804 to ensure that only the system can bind to it. --> 1805 <permission android:name="android.permission.BIND_PRINT_SERVICE" 1806 android:protectionLevel="signature" /> 1807 1808 <!-- Must be required by a {@link android.nfc.cardemulation.HostApduService} 1809 or {@link android.nfc.cardemulation.OffHostApduService} to ensure that only 1810 the system can bind to it. --> 1811 <permission android:name="android.permission.BIND_NFC_SERVICE" 1812 android:protectionLevel="signature" /> 1813 1814 <!-- Must be required by the PrintSpooler to ensure that only the system can bind to it. 1815 @hide --> 1816 <permission android:name="android.permission.BIND_PRINT_SPOOLER_SERVICE" 1817 android:protectionLevel="signature" /> 1818 1819 <!-- Must be required by a TextService (e.g. SpellCheckerService) 1820 to ensure that only the system can bind to it. --> 1821 <permission android:name="android.permission.BIND_TEXT_SERVICE" 1822 android:protectionLevel="signature" /> 1823 1824 <!-- Must be required by a {@link android.net.VpnService}, 1825 to ensure that only the system can bind to it. --> 1826 <permission android:name="android.permission.BIND_VPN_SERVICE" 1827 android:protectionLevel="signature" /> 1828 1829 <!-- Must be required by a {@link android.service.wallpaper.WallpaperService}, 1830 to ensure that only the system can bind to it. --> 1831 <permission android:name="android.permission.BIND_WALLPAPER" 1832 android:protectionLevel="signature|system" /> 1833 1834 <!-- Must be required by a {@link android.service.voice.VoiceInteractionService}, 1835 to ensure that only the system can bind to it. --> 1836 <permission android:name="android.permission.BIND_VOICE_INTERACTION" 1837 android:protectionLevel="signature" /> 1838 1839 <!-- Must be required by hotword enrollment application, 1840 to ensure that only the system can interact with it. 1841 @hide <p>Not for use by third-party applications.</p> --> 1842 <permission android:name="android.permission.MANAGE_VOICE_KEYPHRASES" 1843 android:protectionLevel="signature|system" /> 1844 1845 <!-- Must be required by a {@link com.android.media.remotedisplay.RemoteDisplayProvider}, 1846 to ensure that only the system can bind to it. 1847 @hide --> 1848 <permission android:name="android.permission.BIND_REMOTE_DISPLAY" 1849 android:protectionLevel="signature" /> 1850 1851 <!-- Must be required by a {@link android.media.tv.TvInputService} 1852 to ensure that only the system can bind to it. --> 1853 <permission android:name="android.permission.BIND_TV_INPUT" 1854 android:protectionLevel="signature|system" /> 1855 1856 <!-- @SystemApi Allows an application to modify parental controls 1857 <p>Not for use by third-party applications. 1858 @hide --> 1859 <permission android:name="android.permission.MODIFY_PARENTAL_CONTROLS" 1860 android:protectionLevel="signature|system" /> 1861 1862 <!-- Must be required by a {@link android.media.routing.MediaRouteService} 1863 to ensure that only the system can interact with it. 1864 @hide --> 1865 <permission android:name="android.permission.BIND_ROUTE_PROVIDER" 1866 android:protectionLevel="signature" /> 1867 1868 <!-- Must be required by device administration receiver, to ensure that only the 1869 system can interact with it. --> 1870 <permission android:name="android.permission.BIND_DEVICE_ADMIN" 1871 android:protectionLevel="signature" /> 1872 1873 <!-- @SystemApi Required to add or remove another application as a device admin. 1874 <p>Not for use by third-party applications. 1875 @hide --> 1876 <permission android:name="android.permission.MANAGE_DEVICE_ADMINS" 1877 android:protectionLevel="signature|system" /> 1878 1879 <!-- Allows low-level access to setting the orientation (actually 1880 rotation) of the screen. 1881 <p>Not for use by third-party applications. --> 1882 <permission android:name="android.permission.SET_ORIENTATION" 1883 android:protectionLevel="signature" /> 1884 1885 <!-- Allows low-level access to setting the pointer speed. 1886 <p>Not for use by third-party applications. --> 1887 <permission android:name="android.permission.SET_POINTER_SPEED" 1888 android:protectionLevel="signature" /> 1889 1890 <!-- Allows low-level access to setting input device calibration. 1891 <p>Not for use by normal applications. 1892 @hide --> 1893 <permission android:name="android.permission.SET_INPUT_CALIBRATION" 1894 android:protectionLevel="signature" /> 1895 1896 <!-- Allows low-level access to setting the keyboard layout. 1897 <p>Not for use by third-party applications. 1898 @hide --> 1899 <permission android:name="android.permission.SET_KEYBOARD_LAYOUT" 1900 android:protectionLevel="signature" /> 1901 1902 <!-- Allows an application to request installing packages. Apps 1903 targeting APIs greater than 22 must hold this permission in 1904 order to use {@link android.content.Intent#ACTION_INSTALL_PACKAGE}.--> 1905 <permission android:name="android.permission.REQUEST_INSTALL_PACKAGES" 1906 android:label="@string/permlab_requestInstallPackages" 1907 android:description="@string/permdesc_requestInstallPackages" 1908 android:protectionLevel="normal" /> 1909 1910 <!-- @SystemApi Allows an application to install packages. 1911 <p>Not for use by third-party applications. --> 1912 <permission android:name="android.permission.INSTALL_PACKAGES" 1913 android:protectionLevel="signature|system" /> 1914 1915 <!-- Allows an application to clear user data. 1916 <p>Not for use by third-party applications. --> 1917 <permission android:name="android.permission.CLEAR_APP_USER_DATA" 1918 android:protectionLevel="signature" /> 1919 1920 <!-- @SystemApi Allows an application to delete cache files. 1921 <p>Not for use by third-party applications. --> 1922 <permission android:name="android.permission.DELETE_CACHE_FILES" 1923 android:protectionLevel="signature|system" /> 1924 1925 <!-- @SystemApi Allows an application to delete packages. 1926 <p>Not for use by third-party applications. --> 1927 <permission android:name="android.permission.DELETE_PACKAGES" 1928 android:protectionLevel="signature|system" /> 1929 1930 <!-- @SystemApi Allows an application to move location of installed package. 1931 @hide --> 1932 <permission android:name="android.permission.MOVE_PACKAGE" 1933 android:protectionLevel="signature|system" /> 1934 1935 <!-- @SystemApi Allows an application to change whether an application component (other than its own) is 1936 enabled or not. 1937 <p>Not for use by third-party applications. --> 1938 <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE" 1939 android:protectionLevel="signature|system" /> 1940 1941 <!-- @hide Allows an application to grant or revoke specific permissions. --> 1942 <permission android:name="android.permission.GRANT_REVOKE_PERMISSIONS" 1943 android:protectionLevel="signature" /> 1944 1945 <!-- @hide Allows an application to observe permission changes. --> 1946 <permission android:name="android.permission.OBSERVE_GRANT_REVOKE_PERMISSIONS" 1947 android:protectionLevel="signatureOrSystem" /> 1948 1949 <!-- Allows an application to use SurfaceFlinger's low level features. 1950 <p>Not for use by third-party applications. --> 1951 <permission android:name="android.permission.ACCESS_SURFACE_FLINGER" 1952 android:protectionLevel="signature" /> 1953 1954 <!-- @SystemApi Allows an application to take screen shots and more generally 1955 get access to the frame buffer data. 1956 <p>Not for use by third-party applications. --> 1957 <permission android:name="android.permission.READ_FRAME_BUFFER" 1958 android:protectionLevel="signature|system" /> 1959 1960 <!-- Allows an application to use InputFlinger's low level features. 1961 @hide --> 1962 <permission android:name="android.permission.ACCESS_INPUT_FLINGER" 1963 android:protectionLevel="signature" /> 1964 1965 <!-- Allows an application to configure and connect to Wifi displays 1966 @hide --> 1967 <permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY" 1968 android:protectionLevel="signature" /> 1969 1970 <!-- Allows an application to control low-level features of Wifi displays 1971 such as opening an RTSP socket. This permission should only be used 1972 by the display manager. 1973 @hide --> 1974 <permission android:name="android.permission.CONTROL_WIFI_DISPLAY" 1975 android:protectionLevel="signature" /> 1976 1977 <!-- @SystemApi Allows an application to control VPN. 1978 <p>Not for use by third-party applications.</p> 1979 @hide --> 1980 <permission android:name="android.permission.CONTROL_VPN" 1981 android:protectionLevel="signature|system" /> 1982 <uses-permission android:name="android.permission.CONTROL_VPN" /> 1983 1984 <!-- @SystemApi Allows an application to capture audio output. 1985 <p>Not for use by third-party applications.</p> --> 1986 <permission android:name="android.permission.CAPTURE_AUDIO_OUTPUT" 1987 android:protectionLevel="signature|system" /> 1988 1989 <!-- @SystemApi Allows an application to capture audio for hotword detection. 1990 <p>Not for use by third-party applications.</p> 1991 @hide --> 1992 <permission android:name="android.permission.CAPTURE_AUDIO_HOTWORD" 1993 android:protectionLevel="signature|system" /> 1994 1995 <!-- @SystemApi Allows an application to modify audio routing and override policy decisions. 1996 <p>Not for use by third-party applications.</p> 1997 @hide --> 1998 <permission android:name="android.permission.MODIFY_AUDIO_ROUTING" 1999 android:protectionLevel="signature|system" /> 2000 2001 <!-- @SystemApi Allows an application to capture video output. 2002 <p>Not for use by third-party applications.</p> --> 2003 <permission android:name="android.permission.CAPTURE_VIDEO_OUTPUT" 2004 android:protectionLevel="signature|system" /> 2005 2006 <!-- @SystemApi Allows an application to capture secure video output. 2007 <p>Not for use by third-party applications.</p> --> 2008 <permission android:name="android.permission.CAPTURE_SECURE_VIDEO_OUTPUT" 2009 android:protectionLevel="signature|system" /> 2010 2011 <!-- @SystemApi Allows an application to know what content is playing and control its playback. 2012 <p>Not for use by third-party applications due to privacy of media consumption</p> --> 2013 <permission android:name="android.permission.MEDIA_CONTENT_CONTROL" 2014 android:protectionLevel="signature|system" /> 2015 2016 <!-- Required to be able to disable the device (very dangerous!). 2017 <p>Not for use by third-party applications.. --> 2018 <permission android:name="android.permission.BRICK" 2019 android:protectionLevel="signature" /> 2020 2021 <!-- @SystemApi Required to be able to reboot the device. 2022 <p>Not for use by third-party applications. --> 2023 <permission android:name="android.permission.REBOOT" 2024 android:protectionLevel="signature|system" /> 2025 2026 <!-- Allows low-level access to power management. 2027 <p>Not for use by third-party applications. --> 2028 <permission android:name="android.permission.DEVICE_POWER" 2029 android:protectionLevel="signature" /> 2030 2031 <!-- Allows access to the PowerManager.userActivity function. 2032 <p>Not for use by third-party applications. @hide @SystemApi --> 2033 <permission android:name="android.permission.USER_ACTIVITY" 2034 android:protectionLevel="signature|system" /> 2035 2036 <!-- @hide Allows low-level access to tun tap driver --> 2037 <permission android:name="android.permission.NET_TUNNELING" 2038 android:protectionLevel="signature" /> 2039 2040 <!-- Run as a manufacturer test application, running as the root user. 2041 Only available when the device is running in manufacturer test mode. 2042 <p>Not for use by third-party applications. --> 2043 <permission android:name="android.permission.FACTORY_TEST" 2044 android:protectionLevel="signature" /> 2045 2046 <!-- Allows an application to broadcast a notification that an application 2047 package has been removed. 2048 <p>Not for use by third-party applications. --> 2049 <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED" 2050 android:protectionLevel="signature" /> 2051 2052 <!-- Allows an application to broadcast an SMS receipt notification. 2053 <p>Not for use by third-party applications. --> 2054 <permission android:name="android.permission.BROADCAST_SMS" 2055 android:protectionLevel="signature" /> 2056 2057 <!-- Allows an application to broadcast a WAP PUSH receipt notification. 2058 <p>Not for use by third-party applications. --> 2059 <permission android:name="android.permission.BROADCAST_WAP_PUSH" 2060 android:protectionLevel="signature" /> 2061 2062 <!-- @SystemApi Allows an application to broadcast privileged networking requests. 2063 <p>Not for use by third-party applications. @hide --> 2064 <permission android:name="android.permission.BROADCAST_NETWORK_PRIVILEGED" 2065 android:protectionLevel="signature|system" /> 2066 2067 <!-- @SystemApi Not for use by third-party applications. --> 2068 <permission android:name="android.permission.MASTER_CLEAR" 2069 android:protectionLevel="signature|system" /> 2070 2071 <!-- @SystemApi Allows an application to call any phone number, including emergency 2072 numbers, without going through the Dialer user interface for the user 2073 to confirm the call being placed. 2074 <p>Not for use by third-party applications. --> 2075 <permission android:name="android.permission.CALL_PRIVILEGED" 2076 android:protectionLevel="signature|system" /> 2077 2078 <!-- @SystemApi Allows an application to perform CDMA OTA provisioning @hide --> 2079 <permission android:name="android.permission.PERFORM_CDMA_PROVISIONING" 2080 android:protectionLevel="signature|system" /> 2081 2082 <!-- @SystemApi Allows an application to perform SIM Activation @hide --> 2083 <permission android:name="android.permission.PERFORM_SIM_ACTIVATION" 2084 android:protectionLevel="signature|system" /> 2085 2086 <!-- @SystemApi Allows enabling/disabling location update notifications from 2087 the radio. 2088 <p>Not for use by third-party applications. --> 2089 <permission android:name="android.permission.CONTROL_LOCATION_UPDATES" 2090 android:protectionLevel="signature|system" /> 2091 2092 <!-- @SystemApi Allows read/write access to the "properties" table in the checkin 2093 database, to change values that get uploaded. 2094 <p>Not for use by third-party applications. --> 2095 <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES" 2096 android:protectionLevel="signature|system" /> 2097 2098 <!-- @SystemApi Allows an application to collect component usage 2099 statistics 2100 <p>Declaring the permission implies intention to use the API and the user of the 2101 device can grant permission through the Settings application. --> 2102 <permission android:name="android.permission.PACKAGE_USAGE_STATS" 2103 android:protectionLevel="signature|development|appop" /> 2104 <uses-permission android:name="android.permission.PACKAGE_USAGE_STATS" /> 2105 2106 <!-- @hide Allows an application to change the app idle state of an app. 2107 <p>Not for use by third-party applications. --> 2108 <permission android:name="android.permission.CHANGE_APP_IDLE_STATE" 2109 android:protectionLevel="signature" /> 2110 2111 <!-- @hide @SystemApi Allows an application to temporarily whitelist an inactive app to 2112 access the network and acquire wakelocks. 2113 <p>Not for use by third-party applications. --> 2114 <permission android:name="android.permission.CHANGE_DEVICE_IDLE_TEMP_WHITELIST" 2115 android:protectionLevel="system|signature" /> 2116 2117 <!-- @SystemApi Allows an application to collect battery statistics --> 2118 <permission android:name="android.permission.BATTERY_STATS" 2119 android:protectionLevel="signature|system|development" /> 2120 2121 <!-- @SystemApi Allows an application to control the backup and restore process. 2122 <p>Not for use by third-party applications. 2123 @hide pending API council --> 2124 <permission android:name="android.permission.BACKUP" 2125 android:protectionLevel="signature|system" /> 2126 2127 <!-- Allows a package to launch the secure full-backup confirmation UI. 2128 ONLY the system process may hold this permission. 2129 @hide --> 2130 <permission android:name="android.permission.CONFIRM_FULL_BACKUP" 2131 android:protectionLevel="signature" /> 2132 2133 <!-- @SystemApi Must be required by a {@link android.widget.RemoteViewsService}, 2134 to ensure that only the system can bind to it. --> 2135 <permission android:name="android.permission.BIND_REMOTEVIEWS" 2136 android:protectionLevel="signature|system" /> 2137 2138 <!-- @SystemApi Allows an application to tell the AppWidget service which application 2139 can access AppWidget's data. The normal user flow is that a user 2140 picks an AppWidget to go into a particular host, thereby giving that 2141 host application access to the private data from the AppWidget app. 2142 An application that has this permission should honor that contract. 2143 <p>Not for use by third-party applications. --> 2144 <permission android:name="android.permission.BIND_APPWIDGET" 2145 android:protectionLevel="signature|system" /> 2146 2147 <!-- @SystemApi Private permission, to restrict who can bring up a dialog to add a new 2148 keyguard widget 2149 @hide --> 2150 <permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET" 2151 android:protectionLevel="signature|system" /> 2152 2153 <!-- @SystemApi Internal permission allowing an application to query/set which 2154 applications can bind AppWidgets. 2155 @hide --> 2156 <permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS" 2157 android:protectionLevel="signature|system" /> 2158 2159 <!-- Allows applications to change the background data setting. 2160 <p>Not for use by third-party applications. 2161 @hide pending API council --> 2162 <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING" 2163 android:protectionLevel="signature" /> 2164 2165 <!-- @SystemApi This permission can be used on content providers to allow the global 2166 search system to access their data. Typically it used when the 2167 provider has some permissions protecting it (which global search 2168 would not be expected to hold), and added as a read-only permission 2169 to the path in the provider where global search queries are 2170 performed. This permission can not be held by regular applications; 2171 it is used by applications to protect themselves from everyone else 2172 besides global search. --> 2173 <permission android:name="android.permission.GLOBAL_SEARCH" 2174 android:protectionLevel="signature|system" /> 2175 2176 <!-- Internal permission protecting access to the global search 2177 system: ensures that only the system can access the provider 2178 to perform queries (since this otherwise provides unrestricted 2179 access to a variety of content providers), and to write the 2180 search statistics (to keep applications from gaming the source 2181 ranking). 2182 @hide --> 2183 <permission android:name="android.permission.GLOBAL_SEARCH_CONTROL" 2184 android:protectionLevel="signature" /> 2185 2186 <!-- @SystemApi Internal permission to allows an application to read indexable data. 2187 @hide --> 2188 <permission android:name="android.permission.READ_SEARCH_INDEXABLES" 2189 android:protectionLevel="signature|system" /> 2190 2191 <!-- @SystemApi Allows applications to set a live wallpaper. 2192 @hide XXX Change to signature once the picker is moved to its 2193 own apk as Ghod Intended. --> 2194 <permission android:name="android.permission.SET_WALLPAPER_COMPONENT" 2195 android:protectionLevel="signature|system" /> 2196 2197 <!-- @SystemApi Allows applications to read dream settings and dream state. 2198 @hide --> 2199 <permission android:name="android.permission.READ_DREAM_STATE" 2200 android:protectionLevel="signature|system" /> 2201 2202 <!-- @SystemApi Allows applications to write dream settings, and start or stop dreaming. 2203 @hide --> 2204 <permission android:name="android.permission.WRITE_DREAM_STATE" 2205 android:protectionLevel="signature|system" /> 2206 2207 <!-- @SystemApi Allow an application to read and write the cache partition. 2208 @hide --> 2209 <permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM" 2210 android:protectionLevel="signature|system" /> 2211 2212 <!-- Must be required by default container service so that only 2213 the system can bind to it and use it to copy 2214 protected data to secure containers or files 2215 accessible to the system. 2216 @hide --> 2217 <permission android:name="android.permission.COPY_PROTECTED_DATA" 2218 android:protectionLevel="signature" /> 2219 2220 <!-- @SystemApi Internal permission protecting access to the encryption methods 2221 @hide 2222 --> 2223 <permission android:name="android.permission.CRYPT_KEEPER" 2224 android:protectionLevel="signature|system" /> 2225 2226 <!-- @SystemApi Allows an application to read historical network usage for 2227 specific networks and applications. @hide --> 2228 <permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY" 2229 android:protectionLevel="signature|system" /> 2230 2231 <!-- Allows an application to manage network policies (such as warning and disable 2232 limits) and to define application-specific rules. @hide --> 2233 <permission android:name="android.permission.MANAGE_NETWORK_POLICY" 2234 android:protectionLevel="signature" /> 2235 2236 <!-- @SystemApi Allows an application to account its network traffic against other UIDs. Used 2237 by system services like download manager and media server. Not for use by 2238 third party apps. @hide --> 2239 <permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING" 2240 android:protectionLevel="signature|system" /> 2241 2242 <!-- C2DM permission. 2243 @hide Used internally. 2244 --> 2245 <permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE" 2246 android:protectionLevel="signature" /> 2247 <uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/> 2248 2249 <!-- @SystemApi @hide Package verifier needs to have this permission before the PackageManager will 2250 trust it to verify packages. 2251 --> 2252 <permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT" 2253 android:protectionLevel="signature|system" /> 2254 2255 <!-- Must be required by package verifier receiver, to ensure that only the 2256 system can interact with it. 2257 @hide 2258 --> 2259 <permission android:name="android.permission.BIND_PACKAGE_VERIFIER" 2260 android:protectionLevel="signature" /> 2261 2262 <!-- @SystemApi @hide Intent filter verifier needs to have this permission before the 2263 PackageManager will trust it to verify intent filters. 2264 --> 2265 <permission android:name="android.permission.INTENT_FILTER_VERIFICATION_AGENT" 2266 android:protectionLevel="signature|system" /> 2267 2268 <!-- Must be required by intent filter verifier receiver, to ensure that only the 2269 system can interact with it. 2270 @hide 2271 --> 2272 <permission android:name="android.permission.BIND_INTENT_FILTER_VERIFIER" 2273 android:protectionLevel="signature" /> 2274 2275 <!-- @SystemApi Allows applications to access serial ports via the SerialManager. 2276 @hide --> 2277 <permission android:name="android.permission.SERIAL_PORT" 2278 android:protectionLevel="signature|system" /> 2279 2280 <!-- Allows the holder to access content providers from outside an ApplicationThread. 2281 This permission is enforced by the ActivityManagerService on the corresponding APIs, 2282 in particular ActivityManagerService#getContentProviderExternal(String) and 2283 ActivityManagerService#removeContentProviderExternal(String). 2284 @hide 2285 --> 2286 <permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY" 2287 android:protectionLevel="signature" /> 2288 2289 <!-- @SystemApi Allows an application to hold an UpdateLock, recommending that a headless 2290 OTA reboot *not* occur while the lock is held. 2291 @hide --> 2292 <permission android:name="android.permission.UPDATE_LOCK" 2293 android:protectionLevel="signatureOrSystem" /> 2294 2295 <!-- @SystemApi Allows an application to read the current set of notifications, including 2296 any metadata and intents attached. 2297 @hide --> 2298 <permission android:name="android.permission.ACCESS_NOTIFICATIONS" 2299 android:protectionLevel="signature|system" /> 2300 2301 <!-- Marker permission for applications that wish to access notification policy. --> 2302 <permission android:name="android.permission.ACCESS_NOTIFICATION_POLICY" 2303 android:description="@string/permdesc_access_notification_policy" 2304 android:label="@string/permlab_access_notification_policy" 2305 android:protectionLevel="normal" /> 2306 2307 <!-- Allows access to keyguard secure storage. Only allowed for system processes. 2308 @hide --> 2309 <permission android:name="android.permission.ACCESS_KEYGUARD_SECURE_STORAGE" 2310 android:protectionLevel="signature" /> 2311 2312 <!-- Allows managing (adding, removing) fingerprint templates. Reserved for the system. @hide --> 2313 <permission android:name="android.permission.MANAGE_FINGERPRINT" 2314 android:protectionLevel="signature" /> 2315 2316 <!-- Allows an application to control keyguard. Only allowed for system processes. 2317 @hide --> 2318 <permission android:name="android.permission.CONTROL_KEYGUARD" 2319 android:protectionLevel="signature" /> 2320 2321 <!-- Allows an application to listen to trust changes. Only allowed for system processes. 2322 @hide --> 2323 <permission android:name="android.permission.TRUST_LISTENER" 2324 android:protectionLevel="signature" /> 2325 2326 <!-- @SystemApi Allows an application to provide a trust agent. 2327 @hide For security reasons, this is a platform-only permission. --> 2328 <permission android:name="android.permission.PROVIDE_TRUST_AGENT" 2329 android:protectionLevel="signatureOrSystem" /> 2330 2331 <!-- Allows an application to launch the trust agent settings activity. 2332 @hide --> 2333 <permission android:name="android.permission.LAUNCH_TRUST_AGENT_SETTINGS" 2334 android:protectionLevel="signatureOrSystem" /> 2335 2336 <!-- @SystemApi Must be required by an {@link 2337 android.service.trust.TrustAgentService}, 2338 to ensure that only the system can bind to it. 2339 @hide --> 2340 <permission android:name="android.permission.BIND_TRUST_AGENT" 2341 android:protectionLevel="signature" /> 2342 2343 <!-- Must be required by an {@link 2344 android.service.notification.NotificationListenerService}, 2345 to ensure that only the system can bind to it. --> 2346 <permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE" 2347 android:protectionLevel="signature" /> 2348 2349 <!-- Must be required by a {@link 2350 android.service.chooser.ChooserTargetService}, to ensure that 2351 only the system can bind to it. --> 2352 <permission android:name="android.permission.BIND_CHOOSER_TARGET_SERVICE" 2353 android:protectionLevel="signature" /> 2354 2355 <!-- @SystemApi Must be required by a {@link 2356 android.service.notification.ConditionProviderService}, 2357 to ensure that only the system can bind to it. 2358 @hide --> 2359 <permission android:name="android.permission.BIND_CONDITION_PROVIDER_SERVICE" 2360 android:protectionLevel="signature" /> 2361 2362 <!-- Must be required by an {@link android.service.dreams.DreamService}, 2363 to ensure that only the system can bind to it. --> 2364 <permission android:name="android.permission.BIND_DREAM_SERVICE" 2365 android:protectionLevel="signature" /> 2366 2367 <!-- @SystemApi Allows an application to call into a carrier setup flow. It is up to the 2368 carrier setup application to enforce that this permission is required 2369 @hide This is not a third-party API (intended for OEMs and system apps). --> 2370 <permission android:name="android.permission.INVOKE_CARRIER_SETUP" 2371 android:protectionLevel="signature|system" /> 2372 2373 <!-- @SystemApi Allows an application to listen for network condition observations. 2374 @hide This is not a third-party API (intended for system apps). --> 2375 <permission android:name="android.permission.ACCESS_NETWORK_CONDITIONS" 2376 android:protectionLevel="signature|system" /> 2377 2378 <!-- @SystemApi Allows an application to provision and access DRM certificates 2379 @hide This is not a third-party API (intended for system apps). --> 2380 <permission android:name="android.permission.ACCESS_DRM_CERTIFICATES" 2381 android:protectionLevel="signature|system" /> 2382 2383 <!-- Api Allows an application to manage media projection sessions. 2384 @hide This is not a third-party API (intended for system apps). --> 2385 <permission android:name="android.permission.MANAGE_MEDIA_PROJECTION" 2386 android:protectionLevel="signature" /> 2387 2388 <!-- @SystemApi Allows an application to read install sessions 2389 @hide This is not a third-party API (intended for system apps). --> 2390 <permission android:name="android.permission.READ_INSTALL_SESSIONS" 2391 android:label="@string/permlab_readInstallSessions" 2392 android:description="@string/permdesc_readInstallSessions" 2393 android:protectionLevel="normal"/> 2394 2395 <!-- @SystemApi Allows an application to remove DRM certificates 2396 @hide This is not a third-party API (intended for system apps). --> 2397 <permission android:name="android.permission.REMOVE_DRM_CERTIFICATES" 2398 android:protectionLevel="signature|system" /> 2399 2400 <!-- @deprecated Use {@link android.Manifest.permission#BIND_CARRIER_SERVICES} instead --> 2401 <permission android:name="android.permission.BIND_CARRIER_MESSAGING_SERVICE" 2402 android:protectionLevel="signature|system" /> 2403 2404 <!-- Allows an application to interact with the currently active 2405 {@link android.service.voice.VoiceInteractionService}. 2406 @hide --> 2407 <permission android:name="android.permission.ACCESS_VOICE_INTERACTION_SERVICE" 2408 android:protectionLevel="signature" /> 2409 2410 <!-- Allows an app that has this permission and a permissions to install packages 2411 to request all runtime permissions to be granted at installation. 2412 @hide --> 2413 <permission android:name="android.permission.INSTALL_GRANT_RUNTIME_PERMISSIONS" 2414 android:protectionLevel="signature" /> 2415 2416 <!-- The system process that is allowed to bind to services in carrier apps will 2417 have this permission. Carrier apps should use this permission to protect 2418 their services that only the system is allowed to bind to. --> 2419 <permission android:name="android.permission.BIND_CARRIER_SERVICES" 2420 android:label="@string/permlab_bindCarrierServices" 2421 android:description="@string/permdesc_bindCarrierServices" 2422 android:protectionLevel="signature|system" /> 2423 2424 <!-- Allows an application to query whether DO_NOT_ASK_CREDENTIALS_ON_BOOT 2425 flag is set. 2426 @hide --> 2427 <permission android:name="android.permission.QUERY_DO_NOT_ASK_CREDENTIALS_ON_BOOT" 2428 android:protectionLevel="signature" /> 2429 2430 <!-- @SystemApi Allows applications to kill UIDs. 2431 <p>Not for use by third-party applications. 2432 @hide --> 2433 <permission android:name="android.permission.KILL_UID" 2434 android:protectionLevel="signature" /> 2435 2436 <!-- Allows applications to act as network scorers. @hide @SystemApi--> 2437 <permission android:name="android.permission.LOCAL_MAC_ADDRESS" 2438 android:protectionLevel="signatureOrSystem" /> 2439 2440 <!-- The system process is explicitly the only one allowed to launch the 2441 confirmation UI for full backup/restore --> 2442 <uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/> 2443 2444 <application android:process="system" 2445 android:persistent="true" 2446 android:hasCode="false" 2447 android:label="@string/android_system_label" 2448 android:allowClearUserData="false" 2449 android:backupAgent="com.android.server.backup.SystemBackupAgent" 2450 android:killAfterRestore="false" 2451 android:icon="@drawable/ic_launcher_android" 2452 android:supportsRtl="true" 2453 android:theme="@style/Theme.Material.DayNight.DarkActionBar"> 2454 <activity android:name="com.android.internal.app.ChooserActivity" 2455 android:theme="@style/Theme.DeviceDefault.Resolver" 2456 android:finishOnCloseSystemDialogs="true" 2457 android:excludeFromRecents="true" 2458 android:documentLaunchMode="never" 2459 android:relinquishTaskIdentity="true" 2460 android:process=":ui"> 2461 <intent-filter> 2462 <action android:name="android.intent.action.CHOOSER" /> 2463 <category android:name="android.intent.category.DEFAULT" /> 2464 </intent-filter> 2465 </activity> 2466 <activity android:name="com.android.internal.app.IntentForwarderActivity" 2467 android:finishOnCloseSystemDialogs="true" 2468 android:theme="@style/Theme.NoDisplay" 2469 android:excludeFromRecents="true" 2470 android:label="@string/user_owner_label" 2471 android:exported="true" 2472 > 2473 </activity> 2474 <activity-alias android:name="com.android.internal.app.ForwardIntentToUserOwner" 2475 android:targetActivity="com.android.internal.app.IntentForwarderActivity" 2476 android:exported="true" 2477 android:label="@string/user_owner_label"> 2478 </activity-alias> 2479 <activity-alias android:name="com.android.internal.app.ForwardIntentToManagedProfile" 2480 android:targetActivity="com.android.internal.app.IntentForwarderActivity" 2481 android:icon="@drawable/ic_corp_icon" 2482 android:exported="true" 2483 android:label="@string/managed_profile_label"> 2484 </activity-alias> 2485 <activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity" 2486 android:theme="@style/Theme.Material.DayNight.Dialog" 2487 android:label="@string/heavy_weight_switcher_title" 2488 android:finishOnCloseSystemDialogs="true" 2489 android:excludeFromRecents="true" 2490 android:process=":ui"> 2491 </activity> 2492 <activity android:name="com.android.internal.app.PlatLogoActivity" 2493 android:theme="@style/Theme.Wallpaper.NoTitleBar.Fullscreen" 2494 android:configChanges="orientation|keyboardHidden" 2495 android:process=":ui"> 2496 </activity> 2497 <activity android:name="com.android.internal.app.DisableCarModeActivity" 2498 android:theme="@style/Theme.NoDisplay" 2499 android:excludeFromRecents="true" 2500 android:process=":ui"> 2501 </activity> 2502 <activity android:name="com.android.internal.app.DumpHeapActivity" 2503 android:theme="@style/Theme.Translucent.NoTitleBar" 2504 android:label="@string/dump_heap_title" 2505 android:finishOnCloseSystemDialogs="true" 2506 android:noHistory="true" 2507 android:excludeFromRecents="true" 2508 android:process=":ui"> 2509 </activity> 2510 <provider android:name="com.android.server.am.DumpHeapProvider" 2511 android:authorities="com.android.server.heapdump" 2512 android:grantUriPermissions="true" 2513 android:multiprocess="false" 2514 android:singleUser="true" /> 2515 2516 <activity android:name="android.accounts.ChooseAccountActivity" 2517 android:excludeFromRecents="true" 2518 android:exported="true" 2519 android:theme="@style/Theme.Material.DayNight.Dialog" 2520 android:label="@string/choose_account_label" 2521 android:process=":ui"> 2522 </activity> 2523 2524 <activity android:name="android.accounts.ChooseTypeAndAccountActivity" 2525 android:excludeFromRecents="true" 2526 android:exported="true" 2527 android:theme="@style/Theme.Material.DayNight.Dialog" 2528 android:label="@string/choose_account_label" 2529 android:process=":ui"> 2530 </activity> 2531 2532 <activity android:name="android.accounts.ChooseAccountTypeActivity" 2533 android:excludeFromRecents="true" 2534 android:theme="@style/Theme.Material.DayNight.Dialog" 2535 android:label="@string/choose_account_label" 2536 android:process=":ui"> 2537 </activity> 2538 2539 <activity android:name="android.accounts.CantAddAccountActivity" 2540 android:excludeFromRecents="true" 2541 android:exported="true" 2542 android:theme="@style/Theme.Material.DayNight.Dialog.NoActionBar" 2543 android:process=":ui"> 2544 </activity> 2545 2546 <activity android:name="android.accounts.GrantCredentialsPermissionActivity" 2547 android:excludeFromRecents="true" 2548 android:exported="true" 2549 android:theme="@style/Theme.Material.DayNight.DialogWhenLarge" 2550 android:process=":ui"> 2551 </activity> 2552 2553 <activity android:name="android.content.SyncActivityTooManyDeletes" 2554 android:theme="@style/Theme.Material.DayNight.Dialog" 2555 android:label="@string/sync_too_many_deletes" 2556 android:process=":ui"> 2557 </activity> 2558 2559 <activity android:name="com.android.internal.app.ShutdownActivity" 2560 android:permission="android.permission.SHUTDOWN" 2561 android:theme="@style/Theme.NoDisplay" 2562 android:excludeFromRecents="true"> 2563 <intent-filter> 2564 <action android:name="android.intent.action.ACTION_REQUEST_SHUTDOWN" /> 2565 <category android:name="android.intent.category.DEFAULT" /> 2566 </intent-filter> 2567 <intent-filter> 2568 <action android:name="android.intent.action.REBOOT" /> 2569 <category android:name="android.intent.category.DEFAULT" /> 2570 </intent-filter> 2571 </activity> 2572 2573 <activity android:name="com.android.internal.app.NetInitiatedActivity" 2574 android:theme="@style/Theme.Material.DayNight.Dialog.Alert" 2575 android:excludeFromRecents="true" 2576 android:process=":ui"> 2577 </activity> 2578 2579 <receiver android:name="com.android.server.BootReceiver" 2580 android:primaryUserOnly="true"> 2581 <intent-filter android:priority="1000"> 2582 <action android:name="android.intent.action.BOOT_COMPLETED" /> 2583 </intent-filter> 2584 </receiver> 2585 2586 <receiver android:name="com.android.server.updates.CertPinInstallReceiver" 2587 android:permission="android.permission.UPDATE_CONFIG"> 2588 <intent-filter> 2589 <action android:name="android.intent.action.UPDATE_PINS" /> 2590 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 2591 </intent-filter> 2592 </receiver> 2593 2594 <receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver" 2595 android:permission="android.permission.UPDATE_CONFIG"> 2596 <intent-filter> 2597 <action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" /> 2598 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 2599 </intent-filter> 2600 </receiver> 2601 2602 <receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver" 2603 android:permission="android.permission.UPDATE_CONFIG"> 2604 <intent-filter> 2605 <action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" /> 2606 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 2607 </intent-filter> 2608 </receiver> 2609 2610 <receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver" 2611 android:permission="android.permission.UPDATE_CONFIG"> 2612 <intent-filter> 2613 <action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" /> 2614 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 2615 </intent-filter> 2616 </receiver> 2617 2618 <receiver android:name="com.android.server.updates.TzDataInstallReceiver" 2619 android:permission="android.permission.UPDATE_CONFIG"> 2620 <intent-filter> 2621 <action android:name="android.intent.action.UPDATE_TZDATA" /> 2622 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 2623 </intent-filter> 2624 </receiver> 2625 2626 <receiver android:name="com.android.server.updates.SELinuxPolicyInstallReceiver" 2627 android:permission="android.permission.UPDATE_CONFIG"> 2628 <intent-filter> 2629 <action android:name="android.intent.action.UPDATE_SEPOLICY" /> 2630 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 2631 </intent-filter> 2632 </receiver> 2633 2634 <receiver android:name="com.android.server.MasterClearReceiver" 2635 android:permission="android.permission.MASTER_CLEAR"> 2636 <intent-filter 2637 android:priority="100" > 2638 <!-- For Checkin, Settings, etc.: action=MASTER_CLEAR --> 2639 <action android:name="android.intent.action.MASTER_CLEAR" /> 2640 2641 <!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR --> 2642 <action android:name="com.google.android.c2dm.intent.RECEIVE" /> 2643 <category android:name="android.intent.category.MASTER_CLEAR" /> 2644 </intent-filter> 2645 </receiver> 2646 2647 <service android:name="com.android.internal.os.storage.ExternalStorageFormatter" 2648 android:permission="android.permission.MASTER_CLEAR" 2649 android:exported="true" /> 2650 2651 <service android:name="android.hardware.location.GeofenceHardwareService" 2652 android:permission="android.permission.LOCATION_HARDWARE" 2653 android:exported="false" /> 2654 2655 <service android:name="com.android.internal.backup.LocalTransportService" 2656 android:permission="android.permission.CONFIRM_FULL_BACKUP" 2657 android:exported="false"> 2658 <intent-filter> 2659 <action android:name="android.backup.TRANSPORT_HOST" /> 2660 </intent-filter> 2661 </service> 2662 2663 <service android:name="com.android.server.MountServiceIdler" 2664 android:exported="true" 2665 android:permission="android.permission.BIND_JOB_SERVICE" > 2666 </service> 2667 2668 <service android:name="com.android.server.backup.FullBackupJob" 2669 android:exported="true" 2670 android:permission="android.permission.BIND_JOB_SERVICE" > 2671 </service> 2672 2673 <service android:name="com.android.server.backup.KeyValueBackupJob" 2674 android:permission="android.permission.BIND_JOB_SERVICE" > 2675 </service> 2676 2677 <service 2678 android:name="com.android.server.pm.BackgroundDexOptService" 2679 android:exported="true" 2680 android:permission="android.permission.BIND_JOB_SERVICE"> 2681 </service> 2682 2683 </application> 2684 2685</manifest> 2686