AndroidManifest.xml revision ed92d5b55b09c51f2d583292f4afaff96b531660
1<?xml version="1.0" encoding="utf-8"?> 2<!-- 3/* //device/apps/common/AndroidManifest.xml 4** 5** Copyright 2006, The Android Open Source Project 6** 7** Licensed under the Apache License, Version 2.0 (the "License"); 8** you may not use this file except in compliance with the License. 9** You may obtain a copy of the License at 10** 11** http://www.apache.org/licenses/LICENSE-2.0 12** 13** Unless required by applicable law or agreed to in writing, software 14** distributed under the License is distributed on an "AS IS" BASIS, 15** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 16** See the License for the specific language governing permissions and 17** limitations under the License. 18*/ 19--> 20<manifest xmlns:android="http://schemas.android.com/apk/res/android" 21 package="android" coreApp="true" android:sharedUserId="android.uid.system" 22 android:sharedUserLabel="@string/android_system_label"> 23 24 <!-- ================================================ --> 25 <!-- Special broadcasts that only the system can send --> 26 <!-- ================================================ --> 27 <eat-comment /> 28 29 <protected-broadcast android:name="android.intent.action.SCREEN_OFF" /> 30 <protected-broadcast android:name="android.intent.action.SCREEN_ON" /> 31 <protected-broadcast android:name="android.intent.action.USER_PRESENT" /> 32 <protected-broadcast android:name="android.intent.action.TIME_SET" /> 33 <protected-broadcast android:name="android.intent.action.TIME_TICK" /> 34 <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" /> 35 <protected-broadcast android:name="android.intent.action.DATE_CHANGED" /> 36 <protected-broadcast android:name="android.intent.action.PRE_BOOT_COMPLETED" /> 37 <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" /> 38 <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" /> 39 <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" /> 40 <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" /> 41 <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" /> 42 <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" /> 43 <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" /> 44 <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" /> 45 <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" /> 46 <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" /> 47 <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" /> 48 <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" /> 49 <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" /> 50 <protected-broadcast android:name="android.intent.action.PACKAGES_SUSPENDED" /> 51 <protected-broadcast android:name="android.intent.action.PACKAGES_UNSUSPENDED" /> 52 <protected-broadcast android:name="android.intent.action.ACTION_PREFERRED_ACTIVITY_CHANGED" /> 53 <protected-broadcast android:name="android.intent.action.UID_REMOVED" /> 54 <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" /> 55 <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" /> 56 <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" /> 57 <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" /> 58 <protected-broadcast android:name="android.intent.action.BATTERY_LOW" /> 59 <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" /> 60 <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" /> 61 <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" /> 62 <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" /> 63 <protected-broadcast android:name="android.intent.action.CHARGING" /> 64 <protected-broadcast android:name="android.intent.action.DISCHARGING" /> 65 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" /> 66 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" /> 67 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" /> 68 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" /> 69 <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" /> 70 <protected-broadcast android:name="android.intent.action.REBOOT" /> 71 <protected-broadcast android:name="android.intent.action.DOCK_EVENT" /> 72 <protected-broadcast android:name="android.intent.action.THERMAL_EVENT" /> 73 <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" /> 74 <protected-broadcast android:name="android.intent.action.USER_ADDED" /> 75 <protected-broadcast android:name="android.intent.action.USER_REMOVED" /> 76 <protected-broadcast android:name="android.intent.action.USER_STARTING" /> 77 <protected-broadcast android:name="android.intent.action.USER_STARTED" /> 78 <protected-broadcast android:name="android.intent.action.USER_STOPPING" /> 79 <protected-broadcast android:name="android.intent.action.USER_STOPPED" /> 80 <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" /> 81 <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" /> 82 <protected-broadcast android:name="android.intent.action.USER_SWITCHED" /> 83 <protected-broadcast android:name="android.intent.action.USER_INITIALIZE" /> 84 <protected-broadcast android:name="android.intent.action.INTENT_FILTER_NEEDS_VERIFICATION" /> 85 86 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED" /> 87 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGING" /> 88 <protected-broadcast android:name="android.os.action.DEVICE_IDLE_MODE_CHANGED" /> 89 <protected-broadcast android:name="android.os.action.POWER_SAVE_WHITELIST_CHANGED" /> 90 <protected-broadcast android:name="android.os.action.POWER_SAVE_TEMP_WHITELIST_CHANGED" /> 91 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED_INTERNAL" /> 92 93 <protected-broadcast android:name="android.os.action.SCREEN_BRIGHTNESS_BOOST_CHANGED" /> 94 95 <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" /> 96 <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" /> 97 <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" /> 98 <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" /> 99 <protected-broadcast android:name="android.app.action.NEXT_ALARM_CLOCK_CHANGED" /> 100 101 <protected-broadcast android:name="android.app.action.BUGREPORT_SHARING_DECLINED" /> 102 <protected-broadcast android:name="android.app.action.BUGREPORT_FAILED" /> 103 <protected-broadcast android:name="android.app.action.BUGREPORT_SHARE" /> 104 <protected-broadcast android:name="android.app.action.SHOW_DEVICE_MONITORING_DIALOG" /> 105 106 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" /> 107 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" /> 108 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" /> 109 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" /> 110 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_HOST_RESTORED" /> 111 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_RESTORED" /> 112 113 <protected-broadcast android:name="android.os.action.SETTING_RESTORED" /> 114 115 <protected-broadcast android:name="android.app.backup.intent.RUN" /> 116 <protected-broadcast android:name="android.app.backup.intent.CLEAR" /> 117 <protected-broadcast android:name="android.app.backup.intent.INIT" /> 118 119 <protected-broadcast android:name="android.bluetooth.intent.DISCOVERABLE_TIMEOUT" /> 120 <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" /> 121 <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" /> 122 <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" /> 123 <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" /> 124 <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" /> 125 <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" /> 126 <protected-broadcast android:name="android.bluetooth.device.action.UUID" /> 127 <protected-broadcast android:name="android.bluetooth.device.action.MAS_INSTANCE" /> 128 <protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" /> 129 <protected-broadcast android:name="android.bluetooth.device.action.FOUND" /> 130 <protected-broadcast android:name="android.bluetooth.device.action.DISAPPEARED" /> 131 <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" /> 132 <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" /> 133 <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" /> 134 <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" /> 135 <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" /> 136 <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" /> 137 <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" /> 138 <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" /> 139 <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" /> 140 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" /> 141 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" /> 142 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" /> 143 <protected-broadcast android:name="android.bluetooth.device.action.SDP_RECORD" /> 144 <protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" /> 145 <protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" /> 146 <protected-broadcast 147 android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" /> 148 <protected-broadcast 149 android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" /> 150 <protected-broadcast 151 android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" /> 152 <protected-broadcast 153 android:name="android.bluetooth.headset.action.HF_INDICATORS_VALUE_CHANGED" /> 154 <protected-broadcast 155 android:name="android.bluetooth.headsetclient.profile.action.CONNECTION_STATE_CHANGED" /> 156 <protected-broadcast 157 android:name="android.bluetooth.headsetclient.profile.action.AUDIO_STATE_CHANGED" /> 158 <protected-broadcast 159 android:name="android.bluetooth.headsetclient.profile.action.AG_EVENT" /> 160 <protected-broadcast 161 android:name="android.bluetooth.headsetclient.profile.action.AG_CALL_CHANGED" /> 162 <protected-broadcast 163 android:name="android.bluetooth.headsetclient.profile.action.RESULT" /> 164 <protected-broadcast 165 android:name="android.bluetooth.headsetclient.profile.action.LAST_VTAG" /> 166 <protected-broadcast 167 android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" /> 168 <protected-broadcast 169 android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" /> 170 <protected-broadcast 171 android:name="android.bluetooth.a2dp.profile.action.CODEC_CONFIG_CHANGED" /> 172 <protected-broadcast 173 android:name="android.bluetooth.a2dp-sink.profile.action.CONNECTION_STATE_CHANGED" /> 174 <protected-broadcast 175 android:name="android.bluetooth.a2dp-sink.profile.action.PLAYING_STATE_CHANGED" /> 176 <protected-broadcast 177 android:name="android.bluetooth.a2dp-sink.profile.action.AUDIO_CONFIG_CHANGED" /> 178 <protected-broadcast 179 android:name="android.bluetooth.avrcp-controller.profile.action.CONNECTION_STATE_CHANGED" /> 180 <protected-broadcast 181 android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" /> 182 <protected-broadcast 183 android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" /> 184 <protected-broadcast 185 android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" /> 186 <protected-broadcast 187 android:name="android.bluetooth.inputhost.profile.action.CONNECTION_STATE_CHANGED" /> 188 <protected-broadcast 189 android:name="android.bluetooth.map.profile.action.CONNECTION_STATE_CHANGED" /> 190 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.CONNECTION_STATE_CHANGED" /> 191 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_RECEIVED" /> 192 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_SENT_SUCCESSFULLY" /> 193 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_DELIVERED_SUCCESSFULLY" /> 194 <protected-broadcast 195 android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_SENT" /> 196 <protected-broadcast 197 android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_DELIVERY" /> 198 <protected-broadcast 199 android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" /> 200 <protected-broadcast android:name="android.bluetooth.pbap.intent.action.PBAP_STATE_CHANGED" /> 201 <protected-broadcast android:name="android.bluetooth.pbap.profile.action.CONNECTION_STATE_CHANGED" /> 202 <protected-broadcast android:name="android.bluetooth.sap.profile.action.CONNECTION_STATE_CHANGED" /> 203 <protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" /> 204 <protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" /> 205 <protected-broadcast android:name="android.btopp.intent.action.LIST" /> 206 <protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" /> 207 <protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" /> 208 <protected-broadcast android:name="android.btopp.intent.action.CONFIRM" /> 209 <protected-broadcast android:name="android.btopp.intent.action.HIDE" /> 210 <protected-broadcast android:name="android.btopp.intent.action.RETRY" /> 211 <protected-broadcast android:name="android.btopp.intent.action.OPEN" /> 212 <protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" /> 213 <protected-broadcast android:name="android.btopp.intent.action.TRANSFER_COMPLETE" /> 214 <protected-broadcast android:name="android.btopp.intent.action.ACCEPT" /> 215 <protected-broadcast android:name="com.android.bluetooth.gatt.REFRESH_BATCHED_SCAN" /> 216 <protected-broadcast android:name="com.android.bluetooth.pbap.authchall" /> 217 <protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" /> 218 <protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" /> 219 <protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" /> 220 <protected-broadcast android:name="com.android.bluetooth.sap.USER_CONFIRM_TIMEOUT" /> 221 <protected-broadcast android:name="com.android.bluetooth.sap.action.DISCONNECT_ACTION" /> 222 223 <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" /> 224 225 <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" /> 226 <protected-broadcast android:name="android.hardware.usb.action.USB_PORT_CHANGED" /> 227 <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" /> 228 <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_DETACHED" /> 229 <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" /> 230 <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" /> 231 232 <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" /> 233 <protected-broadcast android:name="android.media.action.HDMI_AUDIO_PLUG" /> 234 235 <protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" /> 236 <protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" /> 237 <protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" /> 238 <protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" /> 239 <protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" /> 240 <protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" /> 241 <protected-broadcast android:name="android.media.MASTER_MONO_CHANGED_ACTION" /> 242 <protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" /> 243 <protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" /> 244 245 <protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" /> 246 <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" /> 247 <protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" /> 248 <protected-broadcast android:name="android.intent.action.MEDIA_NOFS" /> 249 <protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" /> 250 <protected-broadcast android:name="android.intent.action.MEDIA_SHARED" /> 251 <protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" /> 252 <protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" /> 253 <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" /> 254 <protected-broadcast android:name="android.intent.action.MEDIA_EJECT" /> 255 256 <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL" /> 257 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" /> 258 <!-- @deprecated. Only {@link android.net.ConnectivityManager.CONNECTIVITY_ACTION} is sent. --> 259 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" /> 260 <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" /> 261 <protected-broadcast android:name="android.net.conn.RESTRICT_BACKGROUND_CHANGED" /> 262 <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" /> 263 <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" /> 264 265 <protected-broadcast android:name="android.net.nsd.STATE_CHANGED" /> 266 267 <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" /> 268 <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" /> 269 <protected-broadcast android:name="com.android.nfc.action.LLCP_UP" /> 270 <protected-broadcast android:name="com.android.nfc.action.LLCP_DOWN" /> 271 <protected-broadcast android:name="com.android.nfc.cardemulation.action.CLOSE_TAP_DIALOG" /> 272 <protected-broadcast android:name="com.android.nfc.handover.action.ALLOW_CONNECT" /> 273 <protected-broadcast android:name="com.android.nfc.handover.action.DENY_CONNECT" /> 274 <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" /> 275 <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" /> 276 <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" /> 277 <!-- For NFC to BT handover --> 278 <protected-broadcast android:name="android.btopp.intent.action.WHITELIST_DEVICE" /> 279 <protected-broadcast android:name="android.btopp.intent.action.STOP_HANDOVER_TRANSFER" /> 280 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND" /> 281 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND_MULTIPLE" /> 282 283 <protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" /> 284 <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" /> 285 286 <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" /> 287 288 <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" /> 289 <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" /> 290 <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" /> 291 292 <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" /> 293 <protected-broadcast android:name="com.android.server.WifiManager.action.START_PNO" /> 294 <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" /> 295 <protected-broadcast android:name="com.android.server.WifiManager.action.DEVICE_IDLE" /> 296 <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_ACCEPTED" /> 297 <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_DECLINED" /> 298 <protected-broadcast android:name="com.android.server.usb.ACTION_OPEN_IN_APPS" /> 299 <protected-broadcast android:name="com.android.server.am.DELETE_DUMPHEAP" /> 300 <protected-broadcast android:name="com.android.server.net.action.SNOOZE_WARNING" /> 301 <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" /> 302 <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" /> 303 <protected-broadcast android:name="android.net.wifi.WIFI_CREDENTIAL_CHANGED" /> 304 <protected-broadcast android:name="android.net.wifi.WIFI_SCAN_AVAILABLE" /> 305 <protected-broadcast android:name="android.net.wifi.aware.action.WIFI_AWARE_STATE_CHANGED" /> 306 <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" /> 307 <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" /> 308 <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" /> 309 <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" /> 310 <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" /> 311 <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" /> 312 <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" /> 313 <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" /> 314 <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" /> 315 <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" /> 316 <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" /> 317 <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" /> 318 <protected-broadcast android:name="android.net.wifi.p2p.PERSISTENT_GROUPS_CHANGED" /> 319 <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" /> 320 <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" /> 321 <protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" /> 322 <protected-broadcast 323 android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" /> 324 <protected-broadcast android:name="android.net.scoring.SCORE_NETWORKS" /> 325 <protected-broadcast android:name="android.net.scoring.SCORER_CHANGED" /> 326 <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" /> 327 <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" /> 328 <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" /> 329 <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" /> 330 <protected-broadcast android:name="android.intent.action.APPLICATION_RESTRICTIONS_CHANGED" /> 331 332 <!-- Legacy --> 333 <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" /> 334 <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" /> 335 336 <protected-broadcast android:name="com.android.server.ACTION_TRIGGER_IDLE" /> 337 338 <protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" /> 339 340 <protected-broadcast android:name="android.intent.action.PHONE_STATE" /> 341 342 <protected-broadcast android:name="android.intent.action.SUB_DEFAULT_CHANGED" /> 343 344 <protected-broadcast android:name="android.location.GPS_ENABLED_CHANGE" /> 345 <protected-broadcast android:name="android.location.PROVIDERS_CHANGED" /> 346 <protected-broadcast android:name="android.location.MODE_CHANGED" /> 347 <protected-broadcast android:name="android.location.GPS_FIX_CHANGE" /> 348 <protected-broadcast android:name="android.net.proxy.PAC_REFRESH" /> 349 350 <protected-broadcast android:name="android.telecom.action.DEFAULT_DIALER_CHANGED" /> 351 <protected-broadcast android:name="android.provider.action.DEFAULT_SMS_PACKAGE_CHANGED" /> 352 <protected-broadcast android:name="android.intent.action.CONTENT_CHANGED" /> 353 <protected-broadcast android:name="android.provider.Telephony.MMS_DOWNLOADED" /> 354 355 <protected-broadcast 356 android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" /> 357 358 <!-- Defined in RestrictionsManager --> 359 <protected-broadcast 360 android:name="android.intent.action.PERMISSION_RESPONSE_RECEIVED" /> 361 <!-- Defined in RestrictionsManager --> 362 363 <protected-broadcast android:name="android.intent.action.REQUEST_PERMISSION" /> 364 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_STARTED" /> 365 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" /> 366 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_PROGRESS" /> 367 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" /> 368 369 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_SUBSCRIPTION_CHANGED" /> 370 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_SMS_SUBSCRIPTION_CHANGED" /> 371 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_DATA_SUBSCRIPTION_CHANGED" /> 372 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_VOICE_SUBSCRIPTION_CHANGED" /> 373 <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_CONTENT_CHANGE" /> 374 <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_RECORD_UPDATED" /> 375 376 <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_DONE" /> 377 <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_FAILED" /> 378 379 <protected-broadcast android:name="android.internal.policy.action.BURN_IN_PROTECTION" /> 380 <protected-broadcast android:name="android.app.action.SYSTEM_UPDATE_POLICY_CHANGED" /> 381 <protected-broadcast android:name="android.app.action.DEVICE_OWNER_CHANGED" /> 382 383 <!-- Added in N --> 384 <protected-broadcast android:name="android.intent.action.ANR" /> 385 <protected-broadcast android:name="android.intent.action.CALL" /> 386 <protected-broadcast android:name="android.intent.action.CALL_PRIVILEGED" /> 387 <protected-broadcast android:name="android.intent.action.DROPBOX_ENTRY_ADDED" /> 388 <protected-broadcast android:name="android.intent.action.INPUT_METHOD_CHANGED" /> 389 <protected-broadcast android:name="android.intent.action.internal_sim_state_changed" /> 390 <protected-broadcast android:name="android.intent.action.LOCKED_BOOT_COMPLETED" /> 391 <protected-broadcast android:name="android.intent.action.PRECISE_CALL_STATE" /> 392 <protected-broadcast android:name="android.intent.action.PRECISE_DATA_CONNECTION_STATE_CHANGED" /> 393 <protected-broadcast android:name="android.intent.action.SUBSCRIPTION_PHONE_STATE" /> 394 <protected-broadcast android:name="android.intent.action.USER_INFO_CHANGED" /> 395 <protected-broadcast android:name="android.intent.action.USER_UNLOCKED" /> 396 <protected-broadcast android:name="android.intent.action.WALLPAPER_CHANGED" /> 397 398 <protected-broadcast android:name="android.app.action.DEVICE_POLICY_MANAGER_STATE_CHANGED" /> 399 <protected-broadcast android:name="android.app.action.CHOOSE_PRIVATE_KEY_ALIAS" /> 400 <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLED" /> 401 <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLE_REQUESTED" /> 402 <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_ENABLED" /> 403 <protected-broadcast android:name="android.app.action.LOCK_TASK_ENTERING" /> 404 <protected-broadcast android:name="android.app.action.LOCK_TASK_EXITING" /> 405 <protected-broadcast android:name="android.app.action.NOTIFY_PENDING_SYSTEM_UPDATE" /> 406 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_CHANGED" /> 407 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_EXPIRING" /> 408 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_FAILED" /> 409 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_SUCCEEDED" /> 410 <protected-broadcast android:name="com.android.server.ACTION_EXPIRED_PASSWORD_NOTIFICATION" /> 411 412 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_ADDED" /> 413 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNLOCKED" /> 414 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_REMOVED" /> 415 416 <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_STATE_CHANGED" /> 417 <protected-broadcast android:name="com.android.bluetooth.map.USER_CONFIRM_TIMEOUT" /> 418 <protected-broadcast android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_SENT" /> 419 <protected-broadcast android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_DELIVERY" /> 420 <protected-broadcast android:name="android.content.jobscheduler.JOB_DELAY_EXPIRED" /> 421 <protected-broadcast android:name="android.content.syncmanager.SYNC_ALARM" /> 422 <protected-broadcast android:name="android.media.INTERNAL_RINGER_MODE_CHANGED_ACTION" /> 423 <protected-broadcast android:name="android.media.STREAM_DEVICES_CHANGED_ACTION" /> 424 <protected-broadcast android:name="android.media.STREAM_MUTE_CHANGED_ACTION" /> 425 <protected-broadcast android:name="android.net.sip.SIP_SERVICE_UP" /> 426 <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" /> 427 <protected-broadcast android:name="android.os.action.CHARGING" /> 428 <protected-broadcast android:name="android.os.action.DISCHARGING" /> 429 <protected-broadcast android:name="android.search.action.SEARCHABLES_CHANGED" /> 430 <protected-broadcast android:name="android.security.STORAGE_CHANGED" /> 431 <protected-broadcast android:name="android.security.action.TRUST_STORE_CHANGED" /> 432 <protected-broadcast android:name="android.security.action.KEYCHAIN_CHANGED" /> 433 <protected-broadcast android:name="android.security.action.KEY_ACCESS_CHANGED" /> 434 <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_REGISTERED" /> 435 <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_UNREGISTERED" /> 436 <protected-broadcast android:name="android.telecom.action.SHOW_MISSED_CALLS_NOTIFICATION" /> 437 <protected-broadcast android:name="android.telephony.action.CARRIER_CONFIG_CHANGED" /> 438 439 <protected-broadcast android:name="com.android.bluetooth.btservice.action.ALARM_WAKEUP" /> 440 <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_POLL" /> 441 <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_UPDATED" /> 442 <protected-broadcast android:name="com.android.server.NetworkTimeUpdateService.action.POLL" /> 443 <protected-broadcast android:name="com.android.server.telecom.intent.action.CALLS_ADD_ENTRY" /> 444 <protected-broadcast android:name="com.android.settings.location.MODE_CHANGING" /> 445 446 <protected-broadcast android:name="ScheduleConditionProvider.EVALUATE" /> 447 <protected-broadcast android:name="EventConditionProvider.EVALUATE" /> 448 <protected-broadcast android:name="SnoozeHelper.EVALUATE" /> 449 <protected-broadcast android:name="wifi_scan_available" /> 450 451 <protected-broadcast android:name="action.cne.started" /> 452 <protected-broadcast android:name="android.content.jobscheduler.JOB_DEADLINE_EXPIRED" /> 453 <protected-broadcast android:name="android.intent.action.ACTION_UNSOL_RESPONSE_OEM_HOOK_RAW" /> 454 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_SUPL" /> 455 <protected-broadcast android:name="android.os.action.ACTION_EFFECTS_SUPPRESSOR_CHANGED" /> 456 <protected-broadcast android:name="android.os.action.LIGHT_DEVICE_IDLE_MODE_CHANGED" /> 457 <protected-broadcast android:name="android.os.storage.action.VOLUME_STATE_CHANGED" /> 458 <protected-broadcast android:name="android.os.storage.action.DISK_SCANNED" /> 459 <protected-broadcast android:name="com.android.server.action.UPDATE_TWILIGHT_STATE" /> 460 <protected-broadcast android:name="com.android.server.action.RESET_TWILIGHT_AUTO" /> 461 <protected-broadcast android:name="com.android.server.device_idle.STEP_IDLE_STATE" /> 462 <protected-broadcast android:name="com.android.server.device_idle.STEP_LIGHT_IDLE_STATE" /> 463 <protected-broadcast android:name="com.android.server.Wifi.action.TOGGLE_PNO" /> 464 <protected-broadcast android:name="intent.action.ACTION_RF_BAND_INFO" /> 465 <protected-broadcast android:name="android.intent.action.MEDIA_RESOURCE_GRANTED" /> 466 <protected-broadcast android:name="android.app.action.NETWORK_LOGS_AVAILABLE" /> 467 <protected-broadcast android:name="android.app.action.SECURITY_LOGS_AVAILABLE" /> 468 469 <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED" /> 470 <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED_INTERNAL" /> 471 <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_CHANGED" /> 472 <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_ACCESS_GRANTED_CHANGED" /> 473 <protected-broadcast android:name="android.os.action.ACTION_EFFECTS_SUPPRESSOR_CHANGED" /> 474 475 <protected-broadcast android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS" /> 476 <protected-broadcast android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS" /> 477 478 <protected-broadcast android:name="android.intent.action.DYNAMIC_SENSOR_CHANGED" /> 479 480 <protected-broadcast android:name="android.intent.action.ACTION_RADIO_OFF" /> 481 482 <protected-broadcast android:name="android.accounts.LOGIN_ACCOUNTS_CHANGED" /> 483 <protected-broadcast android:name="android.accounts.action.VISIBLE_ACCOUNTS_CHANGED" /> 484 <protected-broadcast android:name="android.accounts.action.ACCOUNTS_LISTENER_PACKAGE_INSTALLED" /> 485 486 <protected-broadcast android:name="com.android.sync.SYNC_CONN_STATUS_CHANGED" /> 487 488 <protected-broadcast android:name="com.android.phone.SIP_INCOMING_CALL" /> 489 <protected-broadcast android:name="com.android.phone.SIP_ADD_PHONE" /> 490 <protected-broadcast android:name="com.android.phone.SIP_REMOVE_PHONE" /> 491 <protected-broadcast android:name="com.android.phone.SIP_CALL_OPTION_CHANGED" /> 492 493 <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_CONNECTED" /> 494 <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_DISCONNECTED" /> 495 496 <protected-broadcast android:name="android.bluetooth.input.profile.action.HANDSHAKE" /> 497 <protected-broadcast android:name="android.bluetooth.input.profile.action.REPORT" /> 498 499 <protected-broadcast android:name="android.intent.action.TWILIGHT_CHANGED" /> 500 501 <protected-broadcast android:name="com.android.server.fingerprint.ACTION_LOCKOUT_RESET" /> 502 <protected-broadcast android:name="android.net.wifi.PASSPOINT_ICON_RECEIVED" /> 503 <protected-broadcast android:name="com.android.server.notification.CountdownConditionProvider" /> 504 505 <protected-broadcast android:name="com.android.internal.location.ALARM_WAKEUP" /> 506 <protected-broadcast android:name="com.android.internal.location.ALARM_TIMEOUT" /> 507 <protected-broadcast android:name="android.intent.action.GLOBAL_BUTTON" /> 508 509 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_AVAILABLE" /> 510 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNAVAILABLE" /> 511 <protected-broadcast android:name="com.android.server.pm.DISABLE_QUIET_MODE_AFTER_UNLOCK" /> 512 513 <protected-broadcast android:name="com.android.server.retaildemo.ACTION_RESET_DEMO" /> 514 515 <protected-broadcast android:name="android.intent.action.DEVICE_LOCKED_CHANGED" /> 516 517 <!-- Added in O --> 518 <!-- TODO: temporary broadcast used by AutoFillManagerServiceImpl; will be removed --> 519 <protected-broadcast android:name="com.android.internal.autofill.action.REQUEST_AUTOFILL" /> 520 521 <!-- ====================================================================== --> 522 <!-- RUNTIME PERMISSIONS --> 523 <!-- ====================================================================== --> 524 <eat-comment /> 525 526 <!-- ====================================================================== --> 527 <!-- Permissions for accessing user's contacts including personal profile --> 528 <!-- ====================================================================== --> 529 <eat-comment /> 530 531 <!-- Used for runtime permissions related to contacts and profiles on this 532 device. --> 533 <permission-group android:name="android.permission-group.CONTACTS" 534 android:icon="@drawable/perm_group_contacts" 535 android:label="@string/permgrouplab_contacts" 536 android:description="@string/permgroupdesc_contacts" 537 android:priority="100" /> 538 539 <!-- Allows an application to read the user's contacts data. 540 <p>Protection level: dangerous 541 --> 542 <permission android:name="android.permission.READ_CONTACTS" 543 android:permissionGroup="android.permission-group.CONTACTS" 544 android:label="@string/permlab_readContacts" 545 android:description="@string/permdesc_readContacts" 546 android:protectionLevel="dangerous" /> 547 548 <!-- Allows an application to write the user's contacts data. 549 <p>Protection level: dangerous 550 --> 551 <permission android:name="android.permission.WRITE_CONTACTS" 552 android:permissionGroup="android.permission-group.CONTACTS" 553 android:label="@string/permlab_writeContacts" 554 android:description="@string/permdesc_writeContacts" 555 android:protectionLevel="dangerous" /> 556 557 <!-- ====================================================================== --> 558 <!-- Permissions for accessing user's calendar --> 559 <!-- ====================================================================== --> 560 <eat-comment /> 561 562 <!-- Used for runtime permissions related to user's calendar. --> 563 <permission-group android:name="android.permission-group.CALENDAR" 564 android:icon="@drawable/perm_group_calendar" 565 android:label="@string/permgrouplab_calendar" 566 android:description="@string/permgroupdesc_calendar" 567 android:priority="200" /> 568 569 <!-- Allows an application to read the user's calendar data. 570 <p>Protection level: dangerous 571 --> 572 <permission android:name="android.permission.READ_CALENDAR" 573 android:permissionGroup="android.permission-group.CALENDAR" 574 android:label="@string/permlab_readCalendar" 575 android:description="@string/permdesc_readCalendar" 576 android:protectionLevel="dangerous" /> 577 578 <!-- Allows an application to write the user's calendar data. 579 <p>Protection level: dangerous 580 --> 581 <permission android:name="android.permission.WRITE_CALENDAR" 582 android:permissionGroup="android.permission-group.CALENDAR" 583 android:label="@string/permlab_writeCalendar" 584 android:description="@string/permdesc_writeCalendar" 585 android:protectionLevel="dangerous" /> 586 587 <!-- ====================================================================== --> 588 <!-- Permissions for accessing and modifying user's SMS messages --> 589 <!-- ====================================================================== --> 590 <eat-comment /> 591 592 <!-- Used for runtime permissions related to user's SMS messages. --> 593 <permission-group android:name="android.permission-group.SMS" 594 android:icon="@drawable/perm_group_sms" 595 android:label="@string/permgrouplab_sms" 596 android:description="@string/permgroupdesc_sms" 597 android:priority="300" /> 598 599 <!-- Allows an application to send SMS messages. 600 <p>Protection level: dangerous 601 --> 602 <permission android:name="android.permission.SEND_SMS" 603 android:permissionGroup="android.permission-group.SMS" 604 android:label="@string/permlab_sendSms" 605 android:description="@string/permdesc_sendSms" 606 android:permissionFlags="costsMoney" 607 android:protectionLevel="dangerous" /> 608 609 <!-- Allows an application to receive SMS messages. 610 <p>Protection level: dangerous 611 --> 612 <permission android:name="android.permission.RECEIVE_SMS" 613 android:permissionGroup="android.permission-group.SMS" 614 android:label="@string/permlab_receiveSms" 615 android:description="@string/permdesc_receiveSms" 616 android:protectionLevel="dangerous"/> 617 618 <!-- Allows an application to read SMS messages. 619 <p>Protection level: dangerous 620 --> 621 <permission android:name="android.permission.READ_SMS" 622 android:permissionGroup="android.permission-group.SMS" 623 android:label="@string/permlab_readSms" 624 android:description="@string/permdesc_readSms" 625 android:protectionLevel="dangerous" /> 626 627 <!-- Allows an application to receive WAP push messages. 628 <p>Protection level: dangerous 629 --> 630 <permission android:name="android.permission.RECEIVE_WAP_PUSH" 631 android:permissionGroup="android.permission-group.SMS" 632 android:label="@string/permlab_receiveWapPush" 633 android:description="@string/permdesc_receiveWapPush" 634 android:protectionLevel="dangerous" /> 635 636 <!-- Allows an application to monitor incoming MMS messages. 637 <p>Protection level: dangerous 638 --> 639 <permission android:name="android.permission.RECEIVE_MMS" 640 android:permissionGroup="android.permission-group.SMS" 641 android:label="@string/permlab_receiveMms" 642 android:description="@string/permdesc_receiveMms" 643 android:protectionLevel="dangerous" /> 644 645 <!-- Allows an application to read previously received cell broadcast 646 messages and to register a content observer to get notifications when 647 a cell broadcast has been received and added to the database. For 648 emergency alerts, the database is updated immediately after the 649 alert dialog and notification sound/vibration/speech are presented. 650 The "read" column is then updated after the user dismisses the alert. 651 This enables supplementary emergency assistance apps to start loading 652 additional emergency information (if Internet access is available) 653 when the alert is first received, and to delay presenting the info 654 to the user until after the initial alert dialog is dismissed. 655 <p>Protection level: dangerous 656 @hide Pending API council approval --> 657 <permission android:name="android.permission.READ_CELL_BROADCASTS" 658 android:permissionGroup="android.permission-group.SMS" 659 android:label="@string/permlab_readCellBroadcasts" 660 android:description="@string/permdesc_readCellBroadcasts" 661 android:protectionLevel="dangerous" /> 662 663 <!-- ====================================================================== --> 664 <!-- Permissions for accessing external storage --> 665 <!-- ====================================================================== --> 666 <eat-comment /> 667 668 <!-- Used for runtime permissions related to the shared external storage. --> 669 <permission-group android:name="android.permission-group.STORAGE" 670 android:icon="@drawable/perm_group_storage" 671 android:label="@string/permgrouplab_storage" 672 android:description="@string/permgroupdesc_storage" 673 android:priority="900" /> 674 675 <!-- Allows an application to read from external storage. 676 <p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly 677 granted this permission.</p> 678 <p>This permission is enforced starting in API level 19. Before API level 19, this 679 permission is not enforced and all apps still have access to read from external storage. 680 You can test your app with the permission enforced by enabling <em>Protect USB 681 storage</em> under Developer options in the Settings app on a device running Android 4.1 or 682 higher.</p> 683 <p>Also starting in API level 19, this permission is <em>not</em> required to 684 read/write files in your application-specific directories returned by 685 {@link android.content.Context#getExternalFilesDir} and 686 {@link android.content.Context#getExternalCacheDir}. 687 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 688 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 689 minSdkVersion}</a> and <a 690 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 691 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 692 grants your app this permission. If you don't need this permission, be sure your <a 693 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 694 targetSdkVersion}</a> is 4 or higher. 695 <p>Protection level: dangerous 696 --> 697 <permission android:name="android.permission.READ_EXTERNAL_STORAGE" 698 android:permissionGroup="android.permission-group.STORAGE" 699 android:label="@string/permlab_sdcardRead" 700 android:description="@string/permdesc_sdcardRead" 701 android:protectionLevel="dangerous" /> 702 703 <!-- Allows an application to write to external storage. 704 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 705 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 706 minSdkVersion}</a> and <a 707 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 708 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 709 grants your app this permission. If you don't need this permission, be sure your <a 710 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 711 targetSdkVersion}</a> is 4 or higher. 712 <p>Starting in API level 19, this permission is <em>not</em> required to 713 read/write files in your application-specific directories returned by 714 {@link android.content.Context#getExternalFilesDir} and 715 {@link android.content.Context#getExternalCacheDir}. 716 <p>Protection level: dangerous 717 --> 718 <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE" 719 android:permissionGroup="android.permission-group.STORAGE" 720 android:label="@string/permlab_sdcardWrite" 721 android:description="@string/permdesc_sdcardWrite" 722 android:protectionLevel="dangerous" /> 723 724 <!-- ====================================================================== --> 725 <!-- Permissions for accessing the device location --> 726 <!-- ====================================================================== --> 727 <eat-comment /> 728 729 <!-- Used for permissions that allow accessing the device location. --> 730 <permission-group android:name="android.permission-group.LOCATION" 731 android:icon="@drawable/perm_group_location" 732 android:label="@string/permgrouplab_location" 733 android:description="@string/permgroupdesc_location" 734 android:priority="400" /> 735 736 <!-- Allows an app to access precise location. 737 Alternatively, you might want {@link #ACCESS_COARSE_LOCATION}. 738 <p>Protection level: dangerous 739 --> 740 <permission android:name="android.permission.ACCESS_FINE_LOCATION" 741 android:permissionGroup="android.permission-group.LOCATION" 742 android:label="@string/permlab_accessFineLocation" 743 android:description="@string/permdesc_accessFineLocation" 744 android:protectionLevel="dangerous|ephemeral" /> 745 746 <!-- Allows an app to access approximate location. 747 Alternatively, you might want {@link #ACCESS_FINE_LOCATION}. 748 <p>Protection level: dangerous 749 --> 750 <permission android:name="android.permission.ACCESS_COARSE_LOCATION" 751 android:permissionGroup="android.permission-group.LOCATION" 752 android:label="@string/permlab_accessCoarseLocation" 753 android:description="@string/permdesc_accessCoarseLocation" 754 android:protectionLevel="dangerous|ephemeral" /> 755 756 <!-- ====================================================================== --> 757 <!-- Permissions for accessing the device telephony --> 758 <!-- ====================================================================== --> 759 <eat-comment /> 760 761 <!-- Used for permissions that are associated telephony features. --> 762 <permission-group android:name="android.permission-group.PHONE" 763 android:icon="@drawable/perm_group_phone_calls" 764 android:label="@string/permgrouplab_phone" 765 android:description="@string/permgroupdesc_phone" 766 android:priority="500" /> 767 768 <!-- Allows read only access to phone state, including the phone number of the device, 769 current cellular network information, the status of any ongoing calls, and a list of any 770 {@link android.telecom.PhoneAccount}s registered on the device. 771 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 772 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 773 minSdkVersion}</a> and <a 774 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 775 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 776 grants your app this permission. If you don't need this permission, be sure your <a 777 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 778 targetSdkVersion}</a> is 4 or higher. 779 <p>Protection level: dangerous 780 --> 781 <permission android:name="android.permission.READ_PHONE_STATE" 782 android:permissionGroup="android.permission-group.PHONE" 783 android:label="@string/permlab_readPhoneState" 784 android:description="@string/permdesc_readPhoneState" 785 android:protectionLevel="dangerous" /> 786 787 <!-- Allows read access to the device's phone number. This is a subset of the capabilities 788 granted by {@link #READ_PHONE_STATE} but is exposed to ephemeral applications. 789 <p>Protection level: dangerous--> 790 <permission android:name="android.permission.READ_PHONE_NUMBER" 791 android:permissionGroup="android.permission-group.PHONE" 792 android:label="@string/permlab_readPhoneNumber" 793 android:description="@string/permdesc_readPhoneNumber" 794 android:protectionLevel="dangerous|ephemeral" /> 795 796 <!-- Allows an application to initiate a phone call without going through 797 the Dialer user interface for the user to confirm the call. 798 <p>Protection level: dangerous 799 --> 800 <permission android:name="android.permission.CALL_PHONE" 801 android:permissionGroup="android.permission-group.PHONE" 802 android:permissionFlags="costsMoney" 803 android:label="@string/permlab_callPhone" 804 android:description="@string/permdesc_callPhone" 805 android:protectionLevel="dangerous" /> 806 807 <!-- Allows an application to access the IMS call service: making and 808 modifying a call 809 <p>Protection level: signature|privileged 810 @hide 811 --> 812 <permission android:name="android.permission.ACCESS_IMS_CALL_SERVICE" 813 android:permissionGroup="android.permission-group.PHONE" 814 android:label="@string/permlab_accessImsCallService" 815 android:description="@string/permdesc_accessImsCallService" 816 android:protectionLevel="signature|privileged" /> 817 818 <!-- Allows an application to read the user's call log. 819 <p class="note"><strong>Note:</strong> If your app uses the 820 {@link #READ_CONTACTS} permission and <em>both</em> your <a 821 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 822 minSdkVersion}</a> and <a 823 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 824 targetSdkVersion}</a> values are set to 15 or lower, the system implicitly 825 grants your app this permission. If you don't need this permission, be sure your <a 826 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 827 targetSdkVersion}</a> is 16 or higher.</p> 828 <p>Protection level: dangerous 829 --> 830 <permission android:name="android.permission.READ_CALL_LOG" 831 android:permissionGroup="android.permission-group.PHONE" 832 android:label="@string/permlab_readCallLog" 833 android:description="@string/permdesc_readCallLog" 834 android:protectionLevel="dangerous" /> 835 836 <!-- Allows an application to write (but not read) the user's 837 call log data. 838 <p class="note"><strong>Note:</strong> If your app uses the 839 {@link #WRITE_CONTACTS} permission and <em>both</em> your <a 840 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 841 minSdkVersion}</a> and <a 842 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 843 targetSdkVersion}</a> values are set to 15 or lower, the system implicitly 844 grants your app this permission. If you don't need this permission, be sure your <a 845 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 846 targetSdkVersion}</a> is 16 or higher.</p> 847 <p>Protection level: dangerous 848 --> 849 <permission android:name="android.permission.WRITE_CALL_LOG" 850 android:permissionGroup="android.permission-group.PHONE" 851 android:label="@string/permlab_writeCallLog" 852 android:description="@string/permdesc_writeCallLog" 853 android:protectionLevel="dangerous" /> 854 855 <!-- Allows an application to add voicemails into the system. 856 <p>Protection level: dangerous 857 --> 858 <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL" 859 android:permissionGroup="android.permission-group.PHONE" 860 android:label="@string/permlab_addVoicemail" 861 android:description="@string/permdesc_addVoicemail" 862 android:protectionLevel="dangerous" /> 863 864 <!-- Allows an application to use SIP service. 865 <p>Protection level: dangerous 866 --> 867 <permission android:name="android.permission.USE_SIP" 868 android:permissionGroup="android.permission-group.PHONE" 869 android:description="@string/permdesc_use_sip" 870 android:label="@string/permlab_use_sip" 871 android:protectionLevel="dangerous"/> 872 873 <!-- Allows an application to see the number being dialed during an outgoing 874 call with the option to redirect the call to a different number or 875 abort the call altogether. 876 <p>Protection level: dangerous 877 --> 878 <permission android:name="android.permission.PROCESS_OUTGOING_CALLS" 879 android:permissionGroup="android.permission-group.PHONE" 880 android:label="@string/permlab_processOutgoingCalls" 881 android:description="@string/permdesc_processOutgoingCalls" 882 android:protectionLevel="dangerous" /> 883 884 <!-- ====================================================================== --> 885 <!-- Permissions for accessing the device microphone --> 886 <!-- ====================================================================== --> 887 <eat-comment /> 888 889 <!-- Used for permissions that are associated with accessing 890 microphone audio from the device. Note that phone calls also capture audio 891 but are in a separate (more visible) permission group. --> 892 <permission-group android:name="android.permission-group.MICROPHONE" 893 android:icon="@drawable/perm_group_microphone" 894 android:label="@string/permgrouplab_microphone" 895 android:description="@string/permgroupdesc_microphone" 896 android:priority="600" /> 897 898 <!-- Allows an application to record audio. 899 <p>Protection level: dangerous 900 --> 901 <permission android:name="android.permission.RECORD_AUDIO" 902 android:permissionGroup="android.permission-group.MICROPHONE" 903 android:label="@string/permlab_recordAudio" 904 android:description="@string/permdesc_recordAudio" 905 android:protectionLevel="dangerous"/> 906 907 <!-- ====================================================================== --> 908 <!-- Permissions for accessing the UCE Service --> 909 <!-- ====================================================================== --> 910 911 <!-- @hide Allows an application to Access UCE-Presence. 912 <p>Protection level: dangerous 913 --> 914 <permission android:name="android.permission.ACCESS_UCE_PRESENCE_SERVICE" 915 android:permissionGroup="android.permission-group.PHONE" 916 android:protectionLevel="signatureOrSystem"/> 917 918 <!-- @hide Allows an application to Access UCE-OPTIONS. 919 <p>Protection level: dangerous 920 --> 921 <permission android:name="android.permission.ACCESS_UCE_OPTIONS_SERVICE" 922 android:permissionGroup="android.permission-group.PHONE" 923 android:protectionLevel="signatureOrSystem"/> 924 925 926 927 <!-- ====================================================================== --> 928 <!-- Permissions for accessing the device camera --> 929 <!-- ====================================================================== --> 930 <eat-comment /> 931 932 <!-- Used for permissions that are associated with accessing 933 camera or capturing images/video from the device. --> 934 <permission-group android:name="android.permission-group.CAMERA" 935 android:icon="@drawable/perm_group_camera" 936 android:label="@string/permgrouplab_camera" 937 android:description="@string/permgroupdesc_camera" 938 android:priority="700" /> 939 940 <!-- Required to be able to access the camera device. 941 <p>This will automatically enforce the <a 942 href="{@docRoot}guide/topics/manifest/uses-feature-element.html"> 943 <uses-feature>}</a> manifest element for <em>all</em> camera features. 944 If you do not require all camera features or can properly operate if a camera 945 is not available, then you must modify your manifest as appropriate in order to 946 install on devices that don't support all camera features.</p> 947 <p>Protection level: dangerous 948 --> 949 <permission android:name="android.permission.CAMERA" 950 android:permissionGroup="android.permission-group.CAMERA" 951 android:label="@string/permlab_camera" 952 android:description="@string/permdesc_camera" 953 android:protectionLevel="dangerous|ephemeral" /> 954 955 956 <!-- ====================================================================== --> 957 <!-- Permissions for accessing the device sensors --> 958 <!-- ====================================================================== --> 959 <eat-comment /> 960 961 <!-- Used for permissions that are associated with accessing 962 camera or capturing images/video from the device. --> 963 <permission-group android:name="android.permission-group.SENSORS" 964 android:icon="@drawable/perm_group_sensors" 965 android:label="@string/permgrouplab_sensors" 966 android:description="@string/permgroupdesc_sensors" 967 android:priority="800" /> 968 969 <!-- Allows an application to access data from sensors that the user uses to 970 measure what is happening inside his/her body, such as heart rate. 971 <p>Protection level: dangerous --> 972 <permission android:name="android.permission.BODY_SENSORS" 973 android:permissionGroup="android.permission-group.SENSORS" 974 android:label="@string/permlab_bodySensors" 975 android:description="@string/permdesc_bodySensors" 976 android:protectionLevel="dangerous" /> 977 978 <!-- Allows an app to use fingerprint hardware. 979 <p>Protection level: normal 980 --> 981 <permission android:name="android.permission.USE_FINGERPRINT" 982 android:permissionGroup="android.permission-group.SENSORS" 983 android:label="@string/permlab_useFingerprint" 984 android:description="@string/permdesc_useFingerprint" 985 android:protectionLevel="normal" /> 986 987 <!-- ====================================================================== --> 988 <!-- REMOVED PERMISSIONS --> 989 <!-- ====================================================================== --> 990 991 <!-- @hide We need to keep this around for backwards compatibility --> 992 <permission android:name="android.permission.READ_PROFILE" 993 android:protectionLevel="normal" 994 android:permissionFlags="removed"/> 995 996 <!-- @hide We need to keep this around for backwards compatibility --> 997 <permission android:name="android.permission.WRITE_PROFILE" 998 android:protectionLevel="normal" 999 android:permissionFlags="removed"/> 1000 1001 <!-- @hide We need to keep this around for backwards compatibility --> 1002 <permission android:name="android.permission.READ_SOCIAL_STREAM" 1003 android:protectionLevel="normal" 1004 android:permissionFlags="removed"/> 1005 1006 <!-- @hide We need to keep this around for backwards compatibility --> 1007 <permission android:name="android.permission.WRITE_SOCIAL_STREAM" 1008 android:protectionLevel="normal" 1009 android:permissionFlags="removed"/> 1010 1011 <!-- @hide We need to keep this around for backwards compatibility --> 1012 <permission android:name="android.permission.READ_USER_DICTIONARY" 1013 android:protectionLevel="normal" 1014 android:permissionFlags="removed"/> 1015 1016 <!-- @hide We need to keep this around for backwards compatibility --> 1017 <permission android:name="android.permission.WRITE_USER_DICTIONARY" 1018 android:protectionLevel="normal" 1019 android:permissionFlags="removed"/> 1020 1021 <!-- @hide We need to keep this around for backwards compatibility --> 1022 <permission android:name="android.permission.WRITE_SMS" 1023 android:protectionLevel="normal" 1024 android:permissionFlags="removed"/> 1025 1026 <!-- @hide We need to keep this around for backwards compatibility --> 1027 <permission android:name="com.android.browser.permission.READ_HISTORY_BOOKMARKS" 1028 android:protectionLevel="normal" 1029 android:permissionFlags="removed"/> 1030 1031 <!-- @hide We need to keep this around for backwards compatibility --> 1032 <permission android:name="com.android.browser.permission.WRITE_HISTORY_BOOKMARKS" 1033 android:protectionLevel="normal" 1034 android:permissionFlags="removed"/> 1035 1036 <!-- @hide We need to keep this around for backwards compatibility --> 1037 <permission android:name="android.permission.AUTHENTICATE_ACCOUNTS" 1038 android:protectionLevel="normal" 1039 android:permissionFlags="removed"/> 1040 1041 <!-- @hide We need to keep this around for backwards compatibility --> 1042 <permission android:name="android.permission.MANAGE_ACCOUNTS" 1043 android:protectionLevel="normal" 1044 android:permissionFlags="removed"/> 1045 1046 <!-- @hide We need to keep this around for backwards compatibility --> 1047 <permission android:name="android.permission.USE_CREDENTIALS" 1048 android:protectionLevel="normal" 1049 android:permissionFlags="removed"/> 1050 1051 <!-- @hide We need to keep this around for backwards compatibility --> 1052 <permission android:name="android.permission.SUBSCRIBED_FEEDS_READ" 1053 android:protectionLevel="normal" 1054 android:permissionFlags="removed"/> 1055 1056 <!-- @hide We need to keep this around for backwards compatibility --> 1057 <permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE" 1058 android:protectionLevel="normal" 1059 android:permissionFlags="removed"/> 1060 1061 <!-- @hide We need to keep this around for backwards compatibility --> 1062 <permission android:name="android.permission.FLASHLIGHT" 1063 android:protectionLevel="normal" 1064 android:permissionFlags="removed"/> 1065 1066 <!-- ====================================================================== --> 1067 <!-- INSTALL PERMISSIONS --> 1068 <!-- ====================================================================== --> 1069 1070 <!-- ================================== --> 1071 <!-- Permissions for accessing messages --> 1072 <!-- ================================== --> 1073 <eat-comment /> 1074 1075 <!-- @SystemApi Allows an application (Phone) to send a request to other applications 1076 to handle the respond-via-message action during incoming calls. 1077 <p>Not for use by third-party applications. --> 1078 <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE" 1079 android:protectionLevel="signature|privileged" /> 1080 1081 <!-- @SystemApi Allows an application to send SMS to premium shortcodes without user permission. 1082 <p>Not for use by third-party applications. 1083 @hide --> 1084 <permission android:name="android.permission.SEND_SMS_NO_CONFIRMATION" 1085 android:protectionLevel="signature|privileged" /> 1086 1087 <!-- Allows an application to filter carrier specific sms. 1088 @hide --> 1089 <permission android:name="android.permission.CARRIER_FILTER_SMS" 1090 android:protectionLevel="signature|privileged" /> 1091 1092 <!-- @SystemApi Allows an application to receive emergency cell broadcast messages, 1093 to record or display them to the user. 1094 <p>Not for use by third-party applications. 1095 @hide --> 1096 <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST" 1097 android:protectionLevel="signature|privileged" /> 1098 1099 <!-- Allows an application to monitor incoming Bluetooth MAP messages, to record 1100 or perform processing on them. --> 1101 <!-- @hide --> 1102 <permission android:name="android.permission.RECEIVE_BLUETOOTH_MAP" 1103 android:protectionLevel="signature|privileged" /> 1104 1105 <!-- @SystemApi @hide Allows an application to execute contacts directory search. 1106 This should only be used by ContactsProvider. 1107 <p>Not for use by third-party applications. --> 1108 <permission android:name="android.permission.BIND_DIRECTORY_SEARCH" 1109 android:protectionLevel="signature|privileged" /> 1110 1111 <!-- @SystemApi @hide Allows an application to modify cell broadcasts through the content provider. 1112 <p>Not for use by third-party applications. --> 1113 <permission android:name="android.permission.MODIFY_CELL_BROADCASTS" 1114 android:protectionLevel="signature|privileged" /> 1115 1116 <!-- =============================================================== --> 1117 <!-- Permissions for setting the device alarm --> 1118 <!-- =============================================================== --> 1119 <eat-comment /> 1120 1121 <!-- Allows an application to broadcast an Intent to set an alarm for the user. 1122 <p>Protection level: normal 1123 --> 1124 <permission android:name="com.android.alarm.permission.SET_ALARM" 1125 android:label="@string/permlab_setAlarm" 1126 android:description="@string/permdesc_setAlarm" 1127 android:protectionLevel="normal" /> 1128 1129 <!-- =============================================================== --> 1130 <!-- Permissions for accessing the user voicemail --> 1131 <!-- =============================================================== --> 1132 <eat-comment /> 1133 1134 <!-- Allows an application to modify and remove existing voicemails in the system. 1135 <p>Protection level: signature|privileged 1136 --> 1137 <permission android:name="com.android.voicemail.permission.WRITE_VOICEMAIL" 1138 android:protectionLevel="signature|privileged" /> 1139 1140 <!-- Allows an application to read voicemails in the system. 1141 <p>Protection level: signature|privileged 1142 --> 1143 <permission android:name="com.android.voicemail.permission.READ_VOICEMAIL" 1144 android:protectionLevel="signature|privileged" /> 1145 1146 <!-- ======================================= --> 1147 <!-- Permissions for accessing location info --> 1148 <!-- ======================================= --> 1149 <eat-comment /> 1150 1151 <!-- Allows an application to access extra location provider commands. 1152 <p>Protection level: normal 1153 --> 1154 <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS" 1155 android:label="@string/permlab_accessLocationExtraCommands" 1156 android:description="@string/permdesc_accessLocationExtraCommands" 1157 android:protectionLevel="normal" /> 1158 1159 <!-- @SystemApi Allows an application to install a location provider into the Location Manager. 1160 <p>Not for use by third-party applications. --> 1161 <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER" 1162 android:protectionLevel="signature|privileged" /> 1163 1164 <!-- @SystemApi @hide Allows HDMI-CEC service to access device and configuration files. 1165 This should only be used by HDMI-CEC service. 1166 --> 1167 <permission android:name="android.permission.HDMI_CEC" 1168 android:protectionLevel="signature|privileged" /> 1169 1170 <!-- @SystemApi Allows an application to use location features in hardware, 1171 such as the geofencing api. 1172 <p>Not for use by third-party applications. --> 1173 <permission android:name="android.permission.LOCATION_HARDWARE" 1174 android:protectionLevel="signature|privileged" /> 1175 <uses-permission android:name="android.permission.LOCATION_HARDWARE"/> 1176 1177 <!-- @SystemApi Allows an application to create mock location providers for testing. 1178 <p>Protection level: signature 1179 @hide 1180 --> 1181 <permission android:name="android.permission.ACCESS_MOCK_LOCATION" 1182 android:protectionLevel="signature" /> 1183 1184 <!-- ======================================= --> 1185 <!-- Permissions for accessing networks --> 1186 <!-- ======================================= --> 1187 <eat-comment /> 1188 1189 <!-- Allows applications to open network sockets. 1190 <p>Protection level: normal 1191 --> 1192 <permission android:name="android.permission.INTERNET" 1193 android:description="@string/permdesc_createNetworkSockets" 1194 android:label="@string/permlab_createNetworkSockets" 1195 android:protectionLevel="normal|ephemeral" /> 1196 1197 <!-- Allows applications to access information about networks. 1198 <p>Protection level: normal 1199 --> 1200 <permission android:name="android.permission.ACCESS_NETWORK_STATE" 1201 android:description="@string/permdesc_accessNetworkState" 1202 android:label="@string/permlab_accessNetworkState" 1203 android:protectionLevel="normal|ephemeral" /> 1204 1205 <!-- Allows applications to access information about Wi-Fi networks. 1206 <p>Protection level: normal 1207 --> 1208 <permission android:name="android.permission.ACCESS_WIFI_STATE" 1209 android:description="@string/permdesc_accessWifiState" 1210 android:label="@string/permlab_accessWifiState" 1211 android:protectionLevel="normal" /> 1212 1213 <!-- Allows applications to change Wi-Fi connectivity state. 1214 <p>Protection level: normal 1215 --> 1216 <permission android:name="android.permission.CHANGE_WIFI_STATE" 1217 android:description="@string/permdesc_changeWifiState" 1218 android:label="@string/permlab_changeWifiState" 1219 android:protectionLevel="normal" /> 1220 1221 <!-- @SystemApi @hide Allows applications to read Wi-Fi credential. 1222 <p>Not for use by third-party applications. --> 1223 <permission android:name="android.permission.READ_WIFI_CREDENTIAL" 1224 android:protectionLevel="signature|privileged" /> 1225 1226 <!-- @SystemApi @hide Allows applications to change tether state and run 1227 tether carrier provisioning. 1228 <p>Not for use by third-party applications. --> 1229 <permission android:name="android.permission.TETHER_PRIVILEGED" 1230 android:protectionLevel="signature|privileged" /> 1231 1232 <!-- @SystemApi @hide Allow system apps to receive broadcast 1233 when a wifi network credential is changed. 1234 <p>Not for use by third-party applications. --> 1235 <permission android:name="android.permission.RECEIVE_WIFI_CREDENTIAL_CHANGE" 1236 android:protectionLevel="signature|privileged" /> 1237 1238 <!-- @SystemApi @hide Allows an application to modify any wifi configuration, even if created 1239 by another application. Once reconfigured the original creator cannot make any further 1240 modifications. 1241 <p>Not for use by third-party applications. --> 1242 <permission android:name="android.permission.OVERRIDE_WIFI_CONFIG" 1243 android:protectionLevel="signature|privileged" /> 1244 1245 <!-- @hide --> 1246 <permission android:name="android.permission.ACCESS_WIMAX_STATE" 1247 android:description="@string/permdesc_accessWimaxState" 1248 android:label="@string/permlab_accessWimaxState" 1249 android:protectionLevel="normal" /> 1250 1251 <!-- @hide --> 1252 <permission android:name="android.permission.CHANGE_WIMAX_STATE" 1253 android:description="@string/permdesc_changeWimaxState" 1254 android:label="@string/permlab_changeWimaxState" 1255 android:protectionLevel="normal" /> 1256 1257 <!-- Allows applications to act as network scorers. @hide @SystemApi--> 1258 <permission android:name="android.permission.SCORE_NETWORKS" 1259 android:protectionLevel="signature|privileged" /> 1260 1261 <!-- @SystemApi Allows applications to request network 1262 recommendations and scores from the NetworkScoreService. 1263 <p>Not for use by third-party applications. @hide --> 1264 <permission android:name="android.permission.REQUEST_NETWORK_SCORES" 1265 android:protectionLevel="signature|privileged" /> 1266 1267 <!-- ======================================= --> 1268 <!-- Permissions for short range, peripheral networks --> 1269 <!-- ======================================= --> 1270 <eat-comment /> 1271 1272 <!-- Allows applications to connect to paired bluetooth devices. 1273 <p>Protection level: normal 1274 --> 1275 <permission android:name="android.permission.BLUETOOTH" 1276 android:description="@string/permdesc_bluetooth" 1277 android:label="@string/permlab_bluetooth" 1278 android:protectionLevel="normal" /> 1279 1280 <!-- Allows applications to discover and pair bluetooth devices. 1281 <p>Protection level: normal 1282 --> 1283 <permission android:name="android.permission.BLUETOOTH_ADMIN" 1284 android:description="@string/permdesc_bluetoothAdmin" 1285 android:label="@string/permlab_bluetoothAdmin" 1286 android:protectionLevel="normal" /> 1287 1288 <!-- @SystemApi Allows applications to pair bluetooth devices without user interaction, and to 1289 allow or disallow phonebook access or message access. 1290 This is not available to third party applications. --> 1291 <permission android:name="android.permission.BLUETOOTH_PRIVILEGED" 1292 android:protectionLevel="signature|privileged" /> 1293 1294 <!-- Control access to email providers exclusively for Bluetooth 1295 @hide 1296 --> 1297 <permission android:name="android.permission.BLUETOOTH_MAP" 1298 android:protectionLevel="signature" /> 1299 1300 <!-- Allows bluetooth stack to access files 1301 @hide This should only be used by Bluetooth apk. 1302 --> 1303 <permission android:name="android.permission.BLUETOOTH_STACK" 1304 android:protectionLevel="signature" /> 1305 1306 <!-- Allows applications to perform I/O operations over NFC. 1307 <p>Protection level: normal 1308 --> 1309 <permission android:name="android.permission.NFC" 1310 android:description="@string/permdesc_nfc" 1311 android:label="@string/permlab_nfc" 1312 android:protectionLevel="normal" /> 1313 1314 <!-- @SystemApi Allows an internal user to use privileged ConnectivityManager APIs. 1315 @hide --> 1316 <permission android:name="android.permission.CONNECTIVITY_INTERNAL" 1317 android:protectionLevel="signature|privileged" /> 1318 1319 <!-- Allows an internal user to use restricted Networks. 1320 @hide --> 1321 <permission android:name="android.permission.CONNECTIVITY_USE_RESTRICTED_NETWORKS" 1322 android:protectionLevel="signature|privileged" /> 1323 1324 <!-- Allows a system application to access hardware packet offload capabilities. 1325 @hide --> 1326 <permission android:name="android.permission.PACKET_KEEPALIVE_OFFLOAD" 1327 android:protectionLevel="signature|privileged" /> 1328 1329 <!-- @SystemApi 1330 @hide --> 1331 <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE" 1332 android:protectionLevel="signature|privileged" /> 1333 1334 <!-- @SystemApi Allows access to the loop radio (Android@Home mesh network) device. 1335 @hide --> 1336 <permission android:name="android.permission.LOOP_RADIO" 1337 android:protectionLevel="signature|privileged" /> 1338 1339 <!-- Allows sending and receiving handover transfer status from Wifi and Bluetooth 1340 @hide --> 1341 <permission android:name="android.permission.NFC_HANDOVER_STATUS" 1342 android:protectionLevel="signature|privileged" /> 1343 1344 <!-- ================================== --> 1345 <!-- Permissions for accessing accounts --> 1346 <!-- ================================== --> 1347 <eat-comment /> 1348 1349 <!-- Allows access to the list of accounts in the Accounts Service. 1350 1351 <p class="note"><strong>Note:</strong> Beginning with Android 6.0 (API level 1352 23), if an app shares the signature of the authenticator that manages an 1353 account, it does not need <code>"GET_ACCOUNTS"</code> permission to read 1354 information about that account. On Android 5.1 and lower, all apps need 1355 <code>"GET_ACCOUNTS"</code> permission to read information about any 1356 account.</p> 1357 1358 <p>Protection level: dangerous 1359 --> 1360 <permission android:name="android.permission.GET_ACCOUNTS" 1361 android:permissionGroup="android.permission-group.CONTACTS" 1362 android:protectionLevel="dangerous" 1363 android:description="@string/permdesc_getAccounts" 1364 android:label="@string/permlab_getAccounts" /> 1365 <uses-permission android:name="android.permission.GET_ACCOUNTS"/> 1366 1367 <!-- @SystemApi Allows applications to call into AccountAuthenticators. 1368 <p>Not for use by third-party applications. --> 1369 <permission android:name="android.permission.ACCOUNT_MANAGER" 1370 android:protectionLevel="signature" /> 1371 1372 <!-- ================================== --> 1373 <!-- Permissions for accessing hardware that may effect battery life--> 1374 <!-- ================================== --> 1375 <eat-comment /> 1376 1377 <!-- Allows applications to enter Wi-Fi Multicast mode. 1378 <p>Protection level: normal 1379 --> 1380 <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE" 1381 android:description="@string/permdesc_changeWifiMulticastState" 1382 android:label="@string/permlab_changeWifiMulticastState" 1383 android:protectionLevel="normal" /> 1384 1385 <!-- Allows access to the vibrator. 1386 <p>Protection level: normal 1387 --> 1388 <permission android:name="android.permission.VIBRATE" 1389 android:label="@string/permlab_vibrate" 1390 android:description="@string/permdesc_vibrate" 1391 android:protectionLevel="normal|ephemeral" /> 1392 1393 <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen 1394 from dimming. 1395 <p>Protection level: normal 1396 --> 1397 <permission android:name="android.permission.WAKE_LOCK" 1398 android:label="@string/permlab_wakeLock" 1399 android:description="@string/permdesc_wakeLock" 1400 android:protectionLevel="normal|ephemeral" /> 1401 1402 <!-- Allows using the device's IR transmitter, if available. 1403 <p>Protection level: normal 1404 --> 1405 <permission android:name="android.permission.TRANSMIT_IR" 1406 android:label="@string/permlab_transmitIr" 1407 android:description="@string/permdesc_transmitIr" 1408 android:protectionLevel="normal" /> 1409 1410 <!-- ==================================================== --> 1411 <!-- Permissions related to changing audio settings --> 1412 <!-- ==================================================== --> 1413 <eat-comment /> 1414 1415 <!-- Allows an application to modify global audio settings. 1416 <p>Protection level: normal 1417 --> 1418 <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS" 1419 android:label="@string/permlab_modifyAudioSettings" 1420 android:description="@string/permdesc_modifyAudioSettings" 1421 android:protectionLevel="normal" /> 1422 1423 <!-- ================================== --> 1424 <!-- Permissions for accessing hardware --> 1425 <!-- ================================== --> 1426 <eat-comment /> 1427 1428 <!-- @SystemApi Allows an application to manage preferences and permissions for USB devices 1429 @hide --> 1430 <permission android:name="android.permission.MANAGE_USB" 1431 android:protectionLevel="signature|privileged" /> 1432 1433 <!-- @SystemApi Allows an application to access the MTP USB kernel driver. 1434 For use only by the device side MTP implementation. 1435 @hide --> 1436 <permission android:name="android.permission.ACCESS_MTP" 1437 android:protectionLevel="signature|privileged" /> 1438 1439 <!-- @SystemApi Allows access to hardware peripherals. Intended only for hardware testing. 1440 <p>Not for use by third-party applications. 1441 @hide 1442 --> 1443 <permission android:name="android.permission.HARDWARE_TEST" 1444 android:protectionLevel="signature" /> 1445 1446 <!-- @SystemApi Allows access to FM 1447 @hide This is not a third-party API (intended for system apps).--> 1448 <permission android:name="android.permission.ACCESS_FM_RADIO" 1449 android:protectionLevel="signature|privileged" /> 1450 1451 <!-- Allows access to configure network interfaces, configure/use IPSec, etc. 1452 @hide --> 1453 <permission android:name="android.permission.NET_ADMIN" 1454 android:protectionLevel="signature" /> 1455 1456 <!-- Allows registration for remote audio playback. @hide --> 1457 <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK" 1458 android:protectionLevel="signature" /> 1459 1460 <!-- @SystemApi Allows TvInputService to access underlying TV input hardware such as 1461 built-in tuners and HDMI-in's. 1462 @hide This should only be used by OEM's TvInputService's. 1463 --> 1464 <permission android:name="android.permission.TV_INPUT_HARDWARE" 1465 android:protectionLevel="signature|privileged" /> 1466 1467 <!-- @SystemApi Allows to capture a frame of TV input hardware such as 1468 built-in tuners and HDMI-in's. 1469 @hide <p>Not for use by third-party applications. 1470 --> 1471 <permission android:name="android.permission.CAPTURE_TV_INPUT" 1472 android:protectionLevel="signature|privileged" /> 1473 1474 <!-- @hide Allows TvInputService to access DVB device. 1475 <p>Not for use by third-party applications. --> 1476 <permission android:name="android.permission.DVB_DEVICE" 1477 android:protectionLevel="signature|privileged" /> 1478 1479 <!-- @SystemApi Allows reading the OEM unlock state 1480 @hide <p>Not for use by third-party applications. --> 1481 <permission android:name="android.permission.READ_OEM_UNLOCK_STATE" 1482 android:protectionLevel="signature|privileged" /> 1483 1484 <!-- @hide Allows enabling/disabling OEM unlock 1485 <p>Not for use by third-party applications. --> 1486 <permission android:name="android.permission.OEM_UNLOCK_STATE" 1487 android:protectionLevel="signature" /> 1488 1489 <!-- @hide Allows querying state of PersistentDataBlock 1490 <p>Not for use by third-party applications. --> 1491 <permission android:name="android.permission.ACCESS_PDB_STATE" 1492 android:protectionLevel="signature" /> 1493 1494 <!-- @hide Allows system update service to notify device owner about pending updates. 1495 <p>Not for use by third-party applications. --> 1496 <permission android:name="android.permission.NOTIFY_PENDING_SYSTEM_UPDATE" 1497 android:protectionLevel="signature|privileged" /> 1498 1499 <!-- =========================================== --> 1500 <!-- Permissions associated with camera and image capture --> 1501 <!-- =========================================== --> 1502 <eat-comment /> 1503 1504 <!-- @SystemApi Allows disabling the transmit-indicator LED that is normally on when 1505 a camera is in use by an application. 1506 @hide --> 1507 <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED" 1508 android:protectionLevel="signature|privileged" /> 1509 1510 <!-- Allows sending the camera service notifications about system-wide events. 1511 @hide --> 1512 <permission android:name="android.permission.CAMERA_SEND_SYSTEM_EVENTS" 1513 android:protectionLevel="signature|privileged" /> 1514 1515 <!-- =========================================== --> 1516 <!-- Permissions associated with telephony state --> 1517 <!-- =========================================== --> 1518 <eat-comment /> 1519 1520 <!-- @SystemApi Allows modification of the telephony state - power on, mmi, etc. 1521 Does not include placing calls. 1522 <p>Not for use by third-party applications. --> 1523 <permission android:name="android.permission.MODIFY_PHONE_STATE" 1524 android:protectionLevel="signature|privileged" /> 1525 1526 <!-- Allows read only access to precise phone state. 1527 @hide Pending API council approval --> 1528 <permission android:name="android.permission.READ_PRECISE_PHONE_STATE" 1529 android:protectionLevel="signature|privileged" /> 1530 1531 <!-- @SystemApi Allows read access to privileged phone state. 1532 @hide Used internally. --> 1533 <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE" 1534 android:protectionLevel="signature|privileged" /> 1535 1536 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1537 PhoneAccount#CAPABILITY_SIM_SUBSCRIPTION. This capability indicates that the PhoneAccount 1538 corresponds to a device SIM. 1539 @hide --> 1540 <permission android:name="android.permission.REGISTER_SIM_SUBSCRIPTION" 1541 android:protectionLevel="signature|privileged" /> 1542 1543 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1544 PhoneAccount#CAPABILITY_CALL_PROVIDER. 1545 @hide --> 1546 <permission android:name="android.permission.REGISTER_CALL_PROVIDER" 1547 android:protectionLevel="signature|privileged" /> 1548 1549 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1550 PhoneAccount#CAPABILITY_CONNECTION_MANAGER 1551 @hide --> 1552 <permission android:name="android.permission.REGISTER_CONNECTION_MANAGER" 1553 android:protectionLevel="signature|privileged" /> 1554 1555 <!-- Must be required by a {@link android.telecom.InCallService}, 1556 to ensure that only the system can bind to it. 1557 <p>Protection level: signature|privileged 1558 --> 1559 <permission android:name="android.permission.BIND_INCALL_SERVICE" 1560 android:protectionLevel="signature|privileged" /> 1561 1562 <!-- Must be required by a link {@link android.telephony.VisualVoicemailService} to ensure that 1563 only the system can bind to it. 1564 <p>Protection level: signature|privileged 1565 --> 1566 <permission 1567 android:name="android.permission.BIND_VISUAL_VOICEMAIL_SERVICE" 1568 android:protectionLevel="signature|privileged"/> 1569 1570 <!-- Must be required by a {@link android.telecom.CallScreeningService}, 1571 to ensure that only the system can bind to it. 1572 <p>Protection level: signature|privileged 1573 --> 1574 <permission android:name="android.permission.BIND_SCREENING_SERVICE" 1575 android:protectionLevel="signature|privileged" /> 1576 1577 <!-- Must be required by a {@link android.telecom.ConnectionService}, 1578 to ensure that only the system can bind to it. 1579 @deprecated {@link android.telecom.ConnectionService}s should require 1580 android.permission.BIND_TELECOM_CONNECTION_SERVICE instead. 1581 @SystemApi 1582 @hide --> 1583 <permission android:name="android.permission.BIND_CONNECTION_SERVICE" 1584 android:protectionLevel="signature|privileged" /> 1585 1586 <!-- Must be required by a {@link android.telecom.ConnectionService}, 1587 to ensure that only the system can bind to it. 1588 <p>Protection level: signature|privileged 1589 --> 1590 <permission android:name="android.permission.BIND_TELECOM_CONNECTION_SERVICE" 1591 android:protectionLevel="signature|privileged" /> 1592 1593 <!-- @SystemApi Allows an application to control the in-call experience. 1594 @hide --> 1595 <permission android:name="android.permission.CONTROL_INCALL_EXPERIENCE" 1596 android:protectionLevel="signature|privileged" /> 1597 1598 <!-- Allows an application to receive STK related commands. 1599 @hide --> 1600 <permission android:name="android.permission.RECEIVE_STK_COMMANDS" 1601 android:protectionLevel="signature|privileged" /> 1602 1603 <!-- ================================== --> 1604 <!-- Permissions for sdcard interaction --> 1605 <!-- ================================== --> 1606 <eat-comment /> 1607 1608 <!-- @SystemApi Allows an application to write to internal media storage 1609 @hide --> 1610 <permission android:name="android.permission.WRITE_MEDIA_STORAGE" 1611 android:protectionLevel="signature|privileged" /> 1612 1613 <!-- Allows an application to manage access to documents, usually as part 1614 of a document picker. 1615 <p>This permission should <em>only</em> be requested by the platform 1616 document management app. This permission cannot be granted to 1617 third-party apps. 1618 <p>Protection level: signature 1619 --> 1620 <permission android:name="android.permission.MANAGE_DOCUMENTS" 1621 android:protectionLevel="signature" /> 1622 1623 <!-- @hide Allows an application to cache content. 1624 <p>Not for use by third-party applications. 1625 <p>Protection level: signature 1626 --> 1627 <permission android:name="android.permission.CACHE_CONTENT" 1628 android:protectionLevel="signature" /> 1629 1630 <!-- ================================== --> 1631 <!-- Permissions for screenlock --> 1632 <!-- ================================== --> 1633 <eat-comment /> 1634 1635 <!-- Allows applications to disable the keyguard if it is not secure. 1636 <p>Protection level: normal 1637 --> 1638 <permission android:name="android.permission.DISABLE_KEYGUARD" 1639 android:description="@string/permdesc_disableKeyguard" 1640 android:label="@string/permlab_disableKeyguard" 1641 android:protectionLevel="normal" /> 1642 1643 <!-- ================================== --> 1644 <!-- Permissions to access other installed applications --> 1645 <!-- ================================== --> 1646 <eat-comment /> 1647 1648 <!-- @deprecated No longer enforced. --> 1649 <permission android:name="android.permission.GET_TASKS" 1650 android:label="@string/permlab_getTasks" 1651 android:description="@string/permdesc_getTasks" 1652 android:protectionLevel="normal" /> 1653 1654 <!-- New version of GET_TASKS that apps can request, since GET_TASKS doesn't really 1655 give access to task information. We need this new one because there are 1656 many existing apps that use add libraries and such that have validation 1657 code to ensure the app has requested the GET_TASKS permission by seeing 1658 if it has been granted the permission... if it hasn't, it kills the app 1659 with a message about being upset. So we need to have it continue to look 1660 like the app is getting that permission, even though it will never be 1661 checked, and new privileged apps can now request this one for real access. 1662 @hide 1663 @SystemApi --> 1664 <permission android:name="android.permission.REAL_GET_TASKS" 1665 android:protectionLevel="signature|privileged" /> 1666 1667 <!-- Allows an application to start a task from a ActivityManager#RecentTaskInfo. 1668 @hide --> 1669 <permission android:name="android.permission.START_TASKS_FROM_RECENTS" 1670 android:protectionLevel="signature|privileged" /> 1671 1672 <!-- @SystemApi @hide Allows an application to call APIs that allow it to do interactions 1673 across the users on the device, using singleton services and 1674 user-targeted broadcasts. This permission is not available to 1675 third party applications. --> 1676 <permission android:name="android.permission.INTERACT_ACROSS_USERS" 1677 android:protectionLevel="signature|privileged|development" /> 1678 1679 <!-- @SystemApi Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS} 1680 that removes restrictions on where broadcasts can be sent and allows other 1681 types of interactions 1682 @hide --> 1683 <permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL" 1684 android:protectionLevel="signature|installer" /> 1685 1686 <!-- @SystemApi @hide Allows an application to call APIs that allow it to query and manage 1687 users on the device. This permission is not available to 1688 third party applications. --> 1689 <permission android:name="android.permission.MANAGE_USERS" 1690 android:protectionLevel="signature|privileged" /> 1691 1692 <!-- @hide Allows an application to create, remove users and get the list of 1693 users on the device. Applications holding this permission can only create restricted, 1694 guest, managed, demo, and ephemeral users. For creating other kind of users, 1695 {@link android.Manifest.permission#MANAGE_USERS} is needed. 1696 This permission is not available to third party applications. --> 1697 <permission android:name="android.permission.CREATE_USERS" 1698 android:protectionLevel="signature" /> 1699 1700 <!-- @hide Allows an application to set the profile owners and the device owner. 1701 This permission is not available to third party applications.--> 1702 <permission android:name="android.permission.MANAGE_PROFILE_AND_DEVICE_OWNERS" 1703 android:protectionLevel="signature" 1704 android:label="@string/permlab_manageProfileAndDeviceOwners" 1705 android:description="@string/permdesc_manageProfileAndDeviceOwners" /> 1706 1707 <!-- Allows an application to get full detailed information about 1708 recently running tasks, with full fidelity to the real state. 1709 @hide --> 1710 <permission android:name="android.permission.GET_DETAILED_TASKS" 1711 android:protectionLevel="signature" /> 1712 1713 <!-- Allows an application to change the Z-order of tasks. 1714 <p>Protection level: normal 1715 --> 1716 <permission android:name="android.permission.REORDER_TASKS" 1717 android:label="@string/permlab_reorderTasks" 1718 android:description="@string/permdesc_reorderTasks" 1719 android:protectionLevel="normal" /> 1720 1721 <!-- @hide Allows an application to change to remove/kill tasks --> 1722 <permission android:name="android.permission.REMOVE_TASKS" 1723 android:protectionLevel="signature" /> 1724 1725 <!-- @SystemApi @hide Allows an application to create/manage/remove stacks --> 1726 <permission android:name="android.permission.MANAGE_ACTIVITY_STACKS" 1727 android:protectionLevel="signature|privileged" /> 1728 1729 <!-- Allows an application to start any activity, regardless of permission 1730 protection or exported state. 1731 @hide --> 1732 <permission android:name="android.permission.START_ANY_ACTIVITY" 1733 android:protectionLevel="signature" /> 1734 1735 <!-- @deprecated The {@link android.app.ActivityManager#restartPackage} 1736 API is no longer supported. --> 1737 <permission android:name="android.permission.RESTART_PACKAGES" 1738 android:label="@string/permlab_killBackgroundProcesses" 1739 android:description="@string/permdesc_killBackgroundProcesses" 1740 android:protectionLevel="normal" /> 1741 1742 <!-- Allows an application to call 1743 {@link android.app.ActivityManager#killBackgroundProcesses}. 1744 <p>Protection level: normal 1745 --> 1746 <permission android:name="android.permission.KILL_BACKGROUND_PROCESSES" 1747 android:label="@string/permlab_killBackgroundProcesses" 1748 android:description="@string/permdesc_killBackgroundProcesses" 1749 android:protectionLevel="normal" /> 1750 1751 <!-- @SystemApi @hide Allows an application to query process states and current 1752 OOM adjustment scores. 1753 <p>Not for use by third-party applications. --> 1754 <permission android:name="android.permission.GET_PROCESS_STATE_AND_OOM_SCORE" 1755 android:protectionLevel="signature|privileged|development" /> 1756 1757 <!-- Allows use of PendingIntent.getIntent(). 1758 @hide --> 1759 <permission android:name="android.permission.GET_INTENT_SENDER_INTENT" 1760 android:protectionLevel="signature" /> 1761 1762 <!-- ================================== --> 1763 <!-- Permissions affecting the display of other applications --> 1764 <!-- ================================== --> 1765 <eat-comment /> 1766 1767 <!-- Allows an app to create windows using the type 1768 {@link android.view.WindowManager.LayoutParams#TYPE_SYSTEM_ALERT}, 1769 shown on top of all other apps. Very few apps 1770 should use this permission; these windows are intended for 1771 system-level interaction with the user. 1772 1773 <p class="note"><strong>Note:</strong> If the app 1774 targets API level 23 or higher, the app user must explicitly grant 1775 this permission to the app through a permission management screen. The app requests 1776 the user's approval by sending an intent with action 1777 {@link android.provider.Settings#ACTION_MANAGE_OVERLAY_PERMISSION}. 1778 The app can check whether it has this authorization by calling 1779 {@link android.provider.Settings#canDrawOverlays 1780 Settings.canDrawOverlays()}. 1781 <p>Protection level: signature --> 1782 <permission android:name="android.permission.SYSTEM_ALERT_WINDOW" 1783 android:label="@string/permlab_systemAlertWindow" 1784 android:description="@string/permdesc_systemAlertWindow" 1785 android:protectionLevel="signature|preinstalled|appop|pre23|development" /> 1786 1787 <!-- ================================== --> 1788 <!-- Permissions affecting the system wallpaper --> 1789 <!-- ================================== --> 1790 <eat-comment /> 1791 1792 <!-- Allows applications to set the wallpaper. 1793 <p>Protection level: normal 1794 --> 1795 <permission android:name="android.permission.SET_WALLPAPER" 1796 android:label="@string/permlab_setWallpaper" 1797 android:description="@string/permdesc_setWallpaper" 1798 android:protectionLevel="normal" /> 1799 1800 <!-- Allows applications to set the wallpaper hints. 1801 <p>Protection level: normal 1802 --> 1803 <permission android:name="android.permission.SET_WALLPAPER_HINTS" 1804 android:label="@string/permlab_setWallpaperHints" 1805 android:description="@string/permdesc_setWallpaperHints" 1806 android:protectionLevel="normal" /> 1807 1808 <!-- ============================================ --> 1809 <!-- Permissions for changing the system clock --> 1810 <!-- ============================================ --> 1811 <eat-comment /> 1812 1813 <!-- @SystemApi Allows applications to set the system time. 1814 <p>Not for use by third-party applications. --> 1815 <permission android:name="android.permission.SET_TIME" 1816 android:protectionLevel="signature|privileged" /> 1817 1818 <!-- Allows applications to set the system time zone. 1819 <p>Not for use by third-party applications. 1820 --> 1821 <permission android:name="android.permission.SET_TIME_ZONE" 1822 android:label="@string/permlab_setTimeZone" 1823 android:description="@string/permdesc_setTimeZone" 1824 android:protectionLevel="signature|privileged" /> 1825 1826 <!-- ==================================================== --> 1827 <!-- Permissions related to changing status bar --> 1828 <!-- ==================================================== --> 1829 <eat-comment /> 1830 1831 <!-- Allows an application to expand or collapse the status bar. 1832 <p>Protection level: normal 1833 --> 1834 <permission android:name="android.permission.EXPAND_STATUS_BAR" 1835 android:label="@string/permlab_expandStatusBar" 1836 android:description="@string/permdesc_expandStatusBar" 1837 android:protectionLevel="normal" /> 1838 1839 <!-- ============================================================== --> 1840 <!-- Permissions related to adding/removing shortcuts from Launcher --> 1841 <!-- ============================================================== --> 1842 <eat-comment /> 1843 1844 <!-- Allows an application to install a shortcut in Launcher. 1845 <p>Protection level: normal 1846 --> 1847 <permission android:name="com.android.launcher.permission.INSTALL_SHORTCUT" 1848 android:label="@string/permlab_install_shortcut" 1849 android:description="@string/permdesc_install_shortcut" 1850 android:protectionLevel="normal"/> 1851 1852 <!--This permission is no longer supported. 1853 --> 1854 <permission android:name="com.android.launcher.permission.UNINSTALL_SHORTCUT" 1855 android:label="@string/permlab_uninstall_shortcut" 1856 android:description="@string/permdesc_uninstall_shortcut" 1857 android:protectionLevel="normal"/> 1858 1859 <!-- ==================================================== --> 1860 <!-- Permissions related to accessing sync settings --> 1861 <!-- ==================================================== --> 1862 <eat-comment /> 1863 1864 <!-- Allows applications to read the sync settings. 1865 <p>Protection level: normal 1866 --> 1867 <permission android:name="android.permission.READ_SYNC_SETTINGS" 1868 android:description="@string/permdesc_readSyncSettings" 1869 android:label="@string/permlab_readSyncSettings" 1870 android:protectionLevel="normal" /> 1871 1872 <!-- Allows applications to write the sync settings. 1873 <p>Protection level: normal 1874 --> 1875 <permission android:name="android.permission.WRITE_SYNC_SETTINGS" 1876 android:description="@string/permdesc_writeSyncSettings" 1877 android:label="@string/permlab_writeSyncSettings" 1878 android:protectionLevel="normal" /> 1879 1880 <!-- Allows applications to read the sync stats. 1881 <p>Protection level: normal 1882 --> 1883 <permission android:name="android.permission.READ_SYNC_STATS" 1884 android:description="@string/permdesc_readSyncStats" 1885 android:label="@string/permlab_readSyncStats" 1886 android:protectionLevel="normal" /> 1887 1888 <!-- ============================================ --> 1889 <!-- Permissions for low-level system interaction --> 1890 <!-- ============================================ --> 1891 <eat-comment /> 1892 1893 <!-- @SystemApi @hide Change the screen compatibility mode of applications --> 1894 <permission android:name="android.permission.SET_SCREEN_COMPATIBILITY" 1895 android:protectionLevel="signature" /> 1896 1897 <!-- @SystemApi Allows an application to modify the current configuration, such 1898 as locale. --> 1899 <permission android:name="android.permission.CHANGE_CONFIGURATION" 1900 android:protectionLevel="signature|privileged|development" /> 1901 1902 <!-- Allows an application to read or write the system settings. 1903 1904 <p class="note"><strong>Note:</strong> If the app targets API level 23 1905 or higher, the app user 1906 must explicitly grant this permission to the app through a permission management screen. 1907 The app requests the user's approval by sending an intent with action 1908 {@link android.provider.Settings#ACTION_MANAGE_WRITE_SETTINGS}. The app 1909 can check whether it has this authorization by calling {@link 1910 android.provider.Settings.System#canWrite Settings.System.canWrite()}. 1911 1912 <p>Protection level: signature 1913 --> 1914 <permission android:name="android.permission.WRITE_SETTINGS" 1915 android:label="@string/permlab_writeSettings" 1916 android:description="@string/permdesc_writeSettings" 1917 android:protectionLevel="signature|preinstalled|appop|pre23" /> 1918 1919 <!-- @SystemApi Allows an application to modify the Google service map. 1920 <p>Not for use by third-party applications. --> 1921 <permission android:name="android.permission.WRITE_GSERVICES" 1922 android:protectionLevel="signature|privileged" /> 1923 1924 <!-- @SystemApi Allows an application to call 1925 {@link android.app.ActivityManager#forceStopPackage}. 1926 @hide --> 1927 <permission android:name="android.permission.FORCE_STOP_PACKAGES" 1928 android:protectionLevel="signature|privileged" /> 1929 1930 <!-- @SystemApi @hide Allows an application to retrieve the content of the active window 1931 An active window is the window that has fired an accessibility event. --> 1932 <permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT" 1933 android:protectionLevel="signature|privileged" /> 1934 1935 <!-- @SystemApi Modify the global animation scaling factor. 1936 <p>Not for use by third-party applications. --> 1937 <permission android:name="android.permission.SET_ANIMATION_SCALE" 1938 android:protectionLevel="signature|privileged|development" /> 1939 1940 <!-- @deprecated This functionality will be removed in the future; please do 1941 not use. Allow an application to make its activities persistent. --> 1942 <permission android:name="android.permission.PERSISTENT_ACTIVITY" 1943 android:label="@string/permlab_persistentActivity" 1944 android:description="@string/permdesc_persistentActivity" 1945 android:protectionLevel="normal" /> 1946 1947 <!-- Allows an application to find out the space used by any package. 1948 <p>Protection level: normal 1949 --> 1950 <permission android:name="android.permission.GET_PACKAGE_SIZE" 1951 android:label="@string/permlab_getPackageSize" 1952 android:description="@string/permdesc_getPackageSize" 1953 android:protectionLevel="normal" /> 1954 1955 <!-- @deprecated No longer useful, see 1956 {@link android.content.pm.PackageManager#addPackageToPreferred} 1957 for details. --> 1958 <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS" 1959 android:protectionLevel="signature" /> 1960 1961 <!-- Allows an application to receive the 1962 {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is 1963 broadcast after the system finishes booting. If you don't 1964 request this permission, you will not receive the broadcast at 1965 that time. Though holding this permission does not have any 1966 security implications, it can have a negative impact on the 1967 user experience by increasing the amount of time it takes the 1968 system to start and allowing applications to have themselves 1969 running without the user being aware of them. As such, you must 1970 explicitly declare your use of this facility to make that visible 1971 to the user. 1972 <p>Protection level: normal 1973 --> 1974 <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED" 1975 android:label="@string/permlab_receiveBootCompleted" 1976 android:description="@string/permdesc_receiveBootCompleted" 1977 android:protectionLevel="normal" /> 1978 1979 <!-- Allows an application to broadcast sticky intents. These are 1980 broadcasts whose data is held by the system after being finished, 1981 so that clients can quickly retrieve that data without having 1982 to wait for the next broadcast. 1983 <p>Protection level: normal 1984 --> 1985 <permission android:name="android.permission.BROADCAST_STICKY" 1986 android:label="@string/permlab_broadcastSticky" 1987 android:description="@string/permdesc_broadcastSticky" 1988 android:protectionLevel="normal" /> 1989 1990 <!-- @SystemApi Allows mounting and unmounting file systems for removable storage. 1991 <p>Not for use by third-party applications.--> 1992 <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS" 1993 android:protectionLevel="signature|privileged" /> 1994 1995 <!-- @SystemApi Allows formatting file systems for removable storage. 1996 <p>Not for use by third-party applications. --> 1997 <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS" 1998 android:protectionLevel="signature|privileged" /> 1999 2000 <!-- @hide --> 2001 <permission android:name="android.permission.STORAGE_INTERNAL" 2002 android:protectionLevel="signature" /> 2003 2004 <!-- Allows access to ASEC non-destructive API calls 2005 @hide --> 2006 <permission android:name="android.permission.ASEC_ACCESS" 2007 android:protectionLevel="signature" /> 2008 2009 <!-- Allows creation of ASEC volumes 2010 @hide --> 2011 <permission android:name="android.permission.ASEC_CREATE" 2012 android:protectionLevel="signature" /> 2013 2014 <!-- Allows destruction of ASEC volumes 2015 @hide --> 2016 <permission android:name="android.permission.ASEC_DESTROY" 2017 android:protectionLevel="signature" /> 2018 2019 <!-- Allows mount / unmount of ASEC volumes 2020 @hide --> 2021 <permission android:name="android.permission.ASEC_MOUNT_UNMOUNT" 2022 android:protectionLevel="signature" /> 2023 2024 <!-- Allows rename of ASEC volumes 2025 @hide --> 2026 <permission android:name="android.permission.ASEC_RENAME" 2027 android:protectionLevel="signature" /> 2028 2029 <!-- @SystemApi Allows applications to write the apn settings. 2030 <p>Not for use by third-party applications. --> 2031 <permission android:name="android.permission.WRITE_APN_SETTINGS" 2032 android:protectionLevel="signature|privileged" /> 2033 2034 <!-- Allows applications to change network connectivity state. 2035 <p>Protection level: normal 2036 --> 2037 <permission android:name="android.permission.CHANGE_NETWORK_STATE" 2038 android:description="@string/permdesc_changeNetworkState" 2039 android:label="@string/permlab_changeNetworkState" 2040 android:protectionLevel="normal" /> 2041 2042 <!-- Allows an application to clear the caches of all installed 2043 applications on the device. 2044 <p>Protection level: system|signature 2045 --> 2046 <permission android:name="android.permission.CLEAR_APP_CACHE" 2047 android:protectionLevel="signature|privileged" /> 2048 2049 <!-- @SystemApi Allows an application to use any media decoder when decoding for playback 2050 @hide --> 2051 <permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK" 2052 android:protectionLevel="signature|privileged" /> 2053 2054 <!-- @SystemApi Allows an application to install and/or uninstall CA certificates on 2055 behalf of the user. 2056 @hide --> 2057 <permission android:name="android.permission.MANAGE_CA_CERTIFICATES" 2058 android:protectionLevel="signature|privileged" /> 2059 2060 <!-- @SystemApi Allows an application to do certain operations needed for 2061 interacting with the recovery (system update) system. 2062 @hide --> 2063 <permission android:name="android.permission.RECOVERY" 2064 android:protectionLevel="signature|privileged" /> 2065 2066 <!-- Allows the system to bind to an application's task services 2067 @hide --> 2068 <permission android:name="android.permission.BIND_JOB_SERVICE" 2069 android:protectionLevel="signature" /> 2070 <uses-permission android:name="android.permission.BIND_JOB_SERVICE"/> 2071 2072 <!-- Allows an application to initiate configuration updates 2073 <p>An application requesting this permission is responsible for 2074 verifying the source and integrity of any update before passing 2075 it off to the various individual installer components 2076 @hide --> 2077 <permission android:name="android.permission.UPDATE_CONFIG" 2078 android:protectionLevel="signature|privileged" /> 2079 2080 <!-- Allows the system to reset throttling in shortcut manager. 2081 @hide --> 2082 <permission android:name="android.permission.RESET_SHORTCUT_MANAGER_THROTTLING" 2083 android:protectionLevel="signature" /> 2084 2085 <!-- Allows the system to bind to the discovered Network Recommendation Service. 2086 @SystemApi @hide --> 2087 <permission android:name="android.permission.BIND_NETWORK_RECOMMENDATION_SERVICE" 2088 android:protectionLevel="signature" /> 2089 <uses-permission android:name="android.permission.BIND_NETWORK_RECOMMENDATION_SERVICE"/> 2090 2091 <!-- ========================================= --> 2092 <!-- Permissions for special development tools --> 2093 <!-- ========================================= --> 2094 <eat-comment /> 2095 2096 <!-- @SystemApi Allows an application to read or write the secure system settings. 2097 <p>Not for use by third-party applications. --> 2098 <permission android:name="android.permission.WRITE_SECURE_SETTINGS" 2099 android:protectionLevel="signature|privileged|development" /> 2100 2101 <!-- @SystemApi Allows an application to retrieve state dump information from system services. 2102 <p>Not for use by third-party applications. --> 2103 <permission android:name="android.permission.DUMP" 2104 android:protectionLevel="signature|privileged|development" /> 2105 2106 <!-- @SystemApi Allows an application to read the low-level system log files. 2107 <p>Not for use by third-party applications, because 2108 Log entries can contain the user's private information. --> 2109 <permission android:name="android.permission.READ_LOGS" 2110 android:protectionLevel="signature|privileged|development" /> 2111 2112 <!-- @SystemApi Configure an application for debugging. 2113 <p>Not for use by third-party applications. --> 2114 <permission android:name="android.permission.SET_DEBUG_APP" 2115 android:protectionLevel="signature|privileged|development" /> 2116 2117 <!-- @SystemApi Allows an application to set the maximum number of (not needed) 2118 application processes that can be running. 2119 <p>Not for use by third-party applications. --> 2120 <permission android:name="android.permission.SET_PROCESS_LIMIT" 2121 android:protectionLevel="signature|privileged|development" /> 2122 2123 <!-- @SystemApi Allows an application to control whether activities are immediately 2124 finished when put in the background. 2125 <p>Not for use by third-party applications. --> 2126 <permission android:name="android.permission.SET_ALWAYS_FINISH" 2127 android:protectionLevel="signature|privileged|development" /> 2128 2129 <!-- @SystemApi Allow an application to request that a signal be sent to all persistent processes. 2130 <p>Not for use by third-party applications. --> 2131 <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES" 2132 android:protectionLevel="signature|privileged|development" /> 2133 2134 <!-- ==================================== --> 2135 <!-- Private permissions --> 2136 <!-- ==================================== --> 2137 <eat-comment /> 2138 2139 <!-- @SystemApi Allows access to the list of accounts in the Accounts Service. --> 2140 <permission android:name="android.permission.GET_ACCOUNTS_PRIVILEGED" 2141 android:protectionLevel="signature|privileged" /> 2142 2143 <!-- Allows but does not guarantee access to user passwords at the conclusion of add account 2144 @hide --> 2145 <permission android:name="android.permission.GET_PASSWORD" 2146 android:protectionLevel="signature" /> 2147 2148 <!-- @SystemApi Allows applications to RW to diagnostic resources. 2149 <p>Not for use by third-party applications. --> 2150 <permission android:name="android.permission.DIAGNOSTIC" 2151 android:protectionLevel="signature" /> 2152 2153 <!-- @SystemApi Allows an application to open, close, or disable the status bar 2154 and its icons. 2155 <p>Not for use by third-party applications. --> 2156 <permission android:name="android.permission.STATUS_BAR" 2157 android:protectionLevel="signature|privileged" /> 2158 2159 <!-- Allows an application to be the status bar. Currently used only by SystemUI.apk 2160 @hide --> 2161 <permission android:name="android.permission.STATUS_BAR_SERVICE" 2162 android:protectionLevel="signature" /> 2163 2164 <!-- Allows an application to bind to third party quick settings tiles. 2165 <p>Should only be requested by the System, should be required by 2166 TileService declarations.--> 2167 <permission android:name="android.permission.BIND_QUICK_SETTINGS_TILE" 2168 android:protectionLevel="signature" /> 2169 2170 <!-- @SystemApi Allows an application to force a BACK operation on whatever is the 2171 top activity. 2172 <p>Not for use by third-party applications. 2173 @hide 2174 --> 2175 <permission android:name="android.permission.FORCE_BACK" 2176 android:protectionLevel="signature" /> 2177 2178 <!-- @SystemApi Allows an application to update device statistics. 2179 <p>Not for use by third-party applications. --> 2180 <permission android:name="android.permission.UPDATE_DEVICE_STATS" 2181 android:protectionLevel="signature|privileged" /> 2182 2183 <!-- @SystemApi @hide Allows an application to collect battery statistics --> 2184 <permission android:name="android.permission.GET_APP_OPS_STATS" 2185 android:protectionLevel="signature|privileged|development" /> 2186 2187 <!-- @SystemApi Allows an application to update application operation statistics. Not for 2188 use by third party apps. 2189 @hide --> 2190 <permission android:name="android.permission.UPDATE_APP_OPS_STATS" 2191 android:protectionLevel="signature|privileged|installer" /> 2192 2193 <!-- @SystemApi Allows an application to update the user app op restrictions. 2194 Not for use by third party apps. 2195 @hide --> 2196 <permission android:name="android.permission.MANAGE_APP_OPS_RESTRICTIONS" 2197 android:protectionLevel="signature|installer" /> 2198 2199 <!-- @SystemApi Allows an application to open windows that are for use by parts 2200 of the system user interface. 2201 <p>Not for use by third-party applications. 2202 @hide 2203 --> 2204 <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW" 2205 android:protectionLevel="signature" /> 2206 2207 <!-- @SystemApi Allows an application to manage (create, destroy, 2208 Z-order) application tokens in the window manager. 2209 <p>Not for use by third-party applications. 2210 @hide 2211 --> 2212 <permission android:name="android.permission.MANAGE_APP_TOKENS" 2213 android:protectionLevel="signature" /> 2214 2215 <!-- Allows System UI to register listeners for events from Window Manager. 2216 @hide --> 2217 <permission android:name="android.permission.REGISTER_WINDOW_MANAGER_LISTENERS" 2218 android:protectionLevel="signature" /> 2219 2220 <!-- @hide Allows the application to temporarily freeze the screen for a 2221 full-screen transition. --> 2222 <permission android:name="android.permission.FREEZE_SCREEN" 2223 android:protectionLevel="signature" /> 2224 2225 <!-- @SystemApi Allows an application to inject user events (keys, touch, trackball) 2226 into the event stream and deliver them to ANY window. Without this 2227 permission, you can only deliver events to windows in your own process. 2228 <p>Not for use by third-party applications. 2229 @hide 2230 --> 2231 <permission android:name="android.permission.INJECT_EVENTS" 2232 android:protectionLevel="signature" /> 2233 2234 <!-- @hide Allows an application to register an input filter which filters the stream 2235 of user events (keys, touch, trackball) before they are dispatched to any window. --> 2236 <permission android:name="android.permission.FILTER_EVENTS" 2237 android:protectionLevel="signature" /> 2238 2239 <!-- @hide Allows an application to retrieve the window token from the accessibility manager. --> 2240 <permission android:name="android.permission.RETRIEVE_WINDOW_TOKEN" 2241 android:protectionLevel="signature" /> 2242 2243 <!-- @hide Allows an application to collect frame statistics --> 2244 <permission android:name="android.permission.FRAME_STATS" 2245 android:protectionLevel="signature" /> 2246 2247 <!-- @hide Allows an application to temporary enable accessibility on the device. --> 2248 <permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY" 2249 android:protectionLevel="signature" /> 2250 2251 <!-- @SystemApi Allows an application to watch and control how activities are 2252 started globally in the system. Only for is in debugging 2253 (usually the monkey command). 2254 <p>Not for use by third-party applications. 2255 @hide 2256 --> 2257 <permission android:name="android.permission.SET_ACTIVITY_WATCHER" 2258 android:protectionLevel="signature" /> 2259 2260 <!-- @SystemApi Allows an application to call the activity manager shutdown() API 2261 to put the higher-level system there into a shutdown state. 2262 @hide --> 2263 <permission android:name="android.permission.SHUTDOWN" 2264 android:protectionLevel="signature|privileged" /> 2265 2266 <!-- @SystemApi Allows an application to tell the activity manager to temporarily 2267 stop application switches, putting it into a special mode that 2268 prevents applications from immediately switching away from some 2269 critical UI such as the home screen. 2270 @hide --> 2271 <permission android:name="android.permission.STOP_APP_SWITCHES" 2272 android:protectionLevel="signature|privileged" /> 2273 2274 <!-- @SystemApi Allows an application to retrieve private information about 2275 the current top activity, such as any assist context it can provide. 2276 <p>Not for use by third-party applications. 2277 @hide 2278 --> 2279 <permission android:name="android.permission.GET_TOP_ACTIVITY_INFO" 2280 android:protectionLevel="signature" /> 2281 2282 <!-- Allows an application to retrieve the current state of keys and 2283 switches. 2284 <p>Not for use by third-party applications. 2285 @deprecated The API that used this permission has been removed. --> 2286 <permission android:name="android.permission.READ_INPUT_STATE" 2287 android:protectionLevel="signature" /> 2288 2289 <!-- Must be required by an {@link android.inputmethodservice.InputMethodService}, 2290 to ensure that only the system can bind to it. 2291 <p>Protection level: signature 2292 --> 2293 <permission android:name="android.permission.BIND_INPUT_METHOD" 2294 android:protectionLevel="signature" /> 2295 2296 <!-- Must be required by an {@link android.media.midi.MidiDeviceService}, 2297 to ensure that only the system can bind to it. 2298 <p>Protection level: signature 2299 --> 2300 <permission android:name="android.permission.BIND_MIDI_DEVICE_SERVICE" 2301 android:protectionLevel="signature" /> 2302 2303 <!-- Must be required by an {@link android.accessibilityservice.AccessibilityService}, 2304 to ensure that only the system can bind to it. 2305 <p>Protection level: signature 2306 --> 2307 <permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE" 2308 android:protectionLevel="signature" /> 2309 2310 <!-- Must be required by a {@link android.printservice.PrintService}, 2311 to ensure that only the system can bind to it. 2312 <p>Protection level: signature 2313 --> 2314 <permission android:name="android.permission.BIND_PRINT_SERVICE" 2315 android:protectionLevel="signature" /> 2316 2317 <!-- Must be required by a {@link android.printservice.recommendation.RecommendationService}, 2318 to ensure that only the system can bind to it. 2319 @hide 2320 @SystemApi 2321 <p>Protection level: signature 2322 --> 2323 <permission android:name="android.permission.BIND_PRINT_RECOMMENDATION_SERVICE" 2324 android:protectionLevel="signature" /> 2325 2326 <!-- Must be required by a {@link android.nfc.cardemulation.HostApduService} 2327 or {@link android.nfc.cardemulation.OffHostApduService} to ensure that only 2328 the system can bind to it. 2329 <p>Protection level: signature 2330 --> 2331 <permission android:name="android.permission.BIND_NFC_SERVICE" 2332 android:protectionLevel="signature" /> 2333 2334 <!-- Must be required by the PrintSpooler to ensure that only the system can bind to it. 2335 @hide --> 2336 <permission android:name="android.permission.BIND_PRINT_SPOOLER_SERVICE" 2337 android:protectionLevel="signature" /> 2338 2339 <!-- @SystemApi Must be required by the RuntimePermissionPresenterService to ensure 2340 that only the system can bind to it. 2341 @hide --> 2342 <permission android:name="android.permission.BIND_RUNTIME_PERMISSION_PRESENTER_SERVICE" 2343 android:protectionLevel="signature" /> 2344 2345 <!-- Must be required by a TextService (e.g. SpellCheckerService) 2346 to ensure that only the system can bind to it. 2347 <p>Protection level: signature 2348 --> 2349 <permission android:name="android.permission.BIND_TEXT_SERVICE" 2350 android:protectionLevel="signature" /> 2351 2352 <!-- Must be required by a {@link android.net.VpnService}, 2353 to ensure that only the system can bind to it. 2354 <p>Protection level: signature 2355 --> 2356 <permission android:name="android.permission.BIND_VPN_SERVICE" 2357 android:protectionLevel="signature" /> 2358 2359 <!-- Must be required by a {@link android.service.wallpaper.WallpaperService}, 2360 to ensure that only the system can bind to it. 2361 <p>Protection level: system|signature 2362 --> 2363 <permission android:name="android.permission.BIND_WALLPAPER" 2364 android:protectionLevel="signature|privileged" /> 2365 2366 <!-- Must be required by a {@link android.service.voice.VoiceInteractionService}, 2367 to ensure that only the system can bind to it. 2368 <p>Protection level: signature 2369 --> 2370 <permission android:name="android.permission.BIND_VOICE_INTERACTION" 2371 android:protectionLevel="signature" /> 2372 2373 <!-- Must be required by a {@link android.service.autofill.AutoFillService}, 2374 to ensure that only the system can bind to it. 2375 <p>Protection level: signature 2376 --> 2377 <permission android:name="android.permission.BIND_AUTO_FILL" 2378 android:protectionLevel="signature" /> 2379 2380 <!-- Must be required by hotword enrollment application, 2381 to ensure that only the system can interact with it. 2382 @hide <p>Not for use by third-party applications.</p> --> 2383 <permission android:name="android.permission.MANAGE_VOICE_KEYPHRASES" 2384 android:protectionLevel="signature|privileged" /> 2385 2386 <!-- Must be required by a {@link com.android.media.remotedisplay.RemoteDisplayProvider}, 2387 to ensure that only the system can bind to it. 2388 @hide --> 2389 <permission android:name="android.permission.BIND_REMOTE_DISPLAY" 2390 android:protectionLevel="signature" /> 2391 2392 <!-- Must be required by a {@link android.media.tv.TvInputService} 2393 to ensure that only the system can bind to it. 2394 <p>Protection level: signature 2395 --> 2396 <permission android:name="android.permission.BIND_TV_INPUT" 2397 android:protectionLevel="signature|privileged" /> 2398 2399 <!-- @SystemApi 2400 Must be required by a {@link com.android.media.tv.remoteprovider.TvRemoteProvider} 2401 to ensure that only the system can bind to it. 2402 <p>Protection level: signature|privileged 2403 <p>Not for use by third-party applications. </p> 2404 @hide --> 2405 <permission android:name="android.permission.BIND_TV_REMOTE_SERVICE" 2406 android:protectionLevel="signature|privileged" /> 2407 2408 <!-- @SystemApi 2409 Must be required for a virtual remote controller for TV. 2410 <p>Protection level: signature|privileged 2411 <p>Not for use by third-party applications. </p> 2412 @hide --> 2413 <permission android:name="android.permission.TV_VIRTUAL_REMOTE_CONTROLLER" 2414 android:protectionLevel="signature|privileged" /> 2415 2416 <!-- @SystemApi Allows an application to modify parental controls 2417 <p>Not for use by third-party applications. 2418 @hide --> 2419 <permission android:name="android.permission.MODIFY_PARENTAL_CONTROLS" 2420 android:protectionLevel="signature|privileged" /> 2421 2422 <!-- Must be required by a {@link android.media.routing.MediaRouteService} 2423 to ensure that only the system can interact with it. 2424 @hide --> 2425 <permission android:name="android.permission.BIND_ROUTE_PROVIDER" 2426 android:protectionLevel="signature" /> 2427 2428 <!-- Must be required by device administration receiver, to ensure that only the 2429 system can interact with it. 2430 <p>Protection level: signature 2431 --> 2432 <permission android:name="android.permission.BIND_DEVICE_ADMIN" 2433 android:protectionLevel="signature" /> 2434 2435 <!-- @SystemApi Required to add or remove another application as a device admin. 2436 <p>Not for use by third-party applications. 2437 @hide --> 2438 <permission android:name="android.permission.MANAGE_DEVICE_ADMINS" 2439 android:protectionLevel="signature|privileged" /> 2440 2441 <!-- @SystemApi Allows low-level access to setting the orientation (actually 2442 rotation) of the screen. 2443 <p>Not for use by third-party applications. 2444 @hide 2445 --> 2446 <permission android:name="android.permission.SET_ORIENTATION" 2447 android:protectionLevel="signature" /> 2448 2449 <!-- @SystemApi Allows low-level access to setting the pointer speed. 2450 <p>Not for use by third-party applications. 2451 @hide 2452 --> 2453 <permission android:name="android.permission.SET_POINTER_SPEED" 2454 android:protectionLevel="signature" /> 2455 2456 <!-- Allows low-level access to setting input device calibration. 2457 <p>Not for use by normal applications. 2458 @hide --> 2459 <permission android:name="android.permission.SET_INPUT_CALIBRATION" 2460 android:protectionLevel="signature" /> 2461 2462 <!-- Allows low-level access to setting the keyboard layout. 2463 <p>Not for use by third-party applications. 2464 @hide --> 2465 <permission android:name="android.permission.SET_KEYBOARD_LAYOUT" 2466 android:protectionLevel="signature" /> 2467 2468 <!-- Allows an application to query tablet mode state and monitor changes 2469 in it. 2470 <p>Not for use by third-party applications. 2471 @hide --> 2472 <permission android:name="android.permission.TABLET_MODE" 2473 android:protectionLevel="signature" /> 2474 2475 <!-- Allows an application to request installing packages. Apps 2476 targeting APIs greater than 22 must hold this permission in 2477 order to use {@link android.content.Intent#ACTION_INSTALL_PACKAGE}. 2478 <p>Protection level: normal 2479 --> 2480 <permission android:name="android.permission.REQUEST_INSTALL_PACKAGES" 2481 android:label="@string/permlab_requestInstallPackages" 2482 android:description="@string/permdesc_requestInstallPackages" 2483 android:protectionLevel="normal" /> 2484 2485 <!-- @SystemApi Allows an application to install packages. 2486 <p>Not for use by third-party applications. --> 2487 <permission android:name="android.permission.INSTALL_PACKAGES" 2488 android:protectionLevel="signature|privileged" /> 2489 2490 <!-- @SystemApi Allows an application to clear user data. 2491 <p>Not for use by third-party applications 2492 @hide 2493 --> 2494 <permission android:name="android.permission.CLEAR_APP_USER_DATA" 2495 android:protectionLevel="signature|installer" /> 2496 2497 <!-- @hide Allows an application to get the URI permissions 2498 granted to another application. 2499 <p>Not for use by third-party applications 2500 --> 2501 <permission android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS" 2502 android:protectionLevel="signature" /> 2503 2504 <!-- @hide Allows an application to clear the URI permissions 2505 granted to another application. 2506 <p>Not for use by third-party applications 2507 --> 2508 <permission 2509 android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS" 2510 android:protectionLevel="signature" /> 2511 2512 <!-- @SystemApi Allows an application to delete cache files. 2513 <p>Not for use by third-party applications. --> 2514 <permission android:name="android.permission.DELETE_CACHE_FILES" 2515 android:protectionLevel="signature|privileged" /> 2516 2517 <!-- @SystemApi Allows an application to delete packages. 2518 <p>Not for use by third-party applications. 2519 <p>Starting in {@link android.os.Build.VERSION_CODES#N}, user confirmation is requested 2520 when the application deleting the package is not the same application that installed the 2521 package. --> 2522 <permission android:name="android.permission.DELETE_PACKAGES" 2523 android:protectionLevel="signature|privileged" /> 2524 2525 <!-- @SystemApi Allows an application to move location of installed package. 2526 @hide --> 2527 <permission android:name="android.permission.MOVE_PACKAGE" 2528 android:protectionLevel="signature|privileged" /> 2529 2530 <!-- @SystemApi Allows an application to change whether an application component (other than its own) is 2531 enabled or not. 2532 <p>Not for use by third-party applications. --> 2533 <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE" 2534 android:protectionLevel="signature|privileged" /> 2535 2536 <!-- @SystemApi Allows an application to grant specific permissions. 2537 @hide --> 2538 <permission android:name="android.permission.GRANT_RUNTIME_PERMISSIONS" 2539 android:protectionLevel="signature|installer|verifier" /> 2540 2541 <!-- @SystemApi Allows an app that has this permission and the permissions to install packages 2542 to request certain runtime permissions to be granted at installation. 2543 @hide --> 2544 <permission android:name="android.permission.INSTALL_GRANT_RUNTIME_PERMISSIONS" 2545 android:protectionLevel="signature|installer|verifier" /> 2546 2547 <!-- @SystemApi Allows an application to revoke specific permissions. 2548 @hide --> 2549 <permission android:name="android.permission.REVOKE_RUNTIME_PERMISSIONS" 2550 android:protectionLevel="signature|installer|verifier" /> 2551 2552 <!-- @hide Allows an application to observe permission changes. --> 2553 <permission android:name="android.permission.OBSERVE_GRANT_REVOKE_PERMISSIONS" 2554 android:protectionLevel="signature|privileged" /> 2555 2556 <!-- @SystemApi Allows an application to use SurfaceFlinger's low level features. 2557 <p>Not for use by third-party applications. 2558 @hide 2559 --> 2560 <permission android:name="android.permission.ACCESS_SURFACE_FLINGER" 2561 android:protectionLevel="signature" /> 2562 2563 <!-- @SystemApi Allows an application to take screen shots and more generally 2564 get access to the frame buffer data. 2565 <p>Not for use by third-party applications. --> 2566 <permission android:name="android.permission.READ_FRAME_BUFFER" 2567 android:protectionLevel="signature|privileged" /> 2568 2569 <!-- Allows an application to use InputFlinger's low level features. 2570 @hide --> 2571 <permission android:name="android.permission.ACCESS_INPUT_FLINGER" 2572 android:protectionLevel="signature" /> 2573 2574 <!-- Allows an application to configure and connect to Wifi displays 2575 @hide --> 2576 <permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY" 2577 android:protectionLevel="signature" /> 2578 2579 <!-- Allows an application to control low-level features of Wifi displays 2580 such as opening an RTSP socket. This permission should only be used 2581 by the display manager. 2582 @hide --> 2583 <permission android:name="android.permission.CONTROL_WIFI_DISPLAY" 2584 android:protectionLevel="signature" /> 2585 2586 <!-- Allows an application to control the color modes set for displays system-wide. 2587 <p>Not for use by third-party applications.</p> 2588 @hide --> 2589 <permission android:name="android.permission.CONFIGURE_DISPLAY_COLOR_MODE" 2590 android:protectionLevel="signature" /> 2591 2592 <!-- @SystemApi Allows an application to control VPN. 2593 <p>Not for use by third-party applications.</p> 2594 @hide --> 2595 <permission android:name="android.permission.CONTROL_VPN" 2596 android:protectionLevel="signature|privileged" /> 2597 <uses-permission android:name="android.permission.CONTROL_VPN" /> 2598 2599 <!-- @SystemApi Allows an application to capture audio output. 2600 <p>Not for use by third-party applications.</p> --> 2601 <permission android:name="android.permission.CAPTURE_AUDIO_OUTPUT" 2602 android:protectionLevel="signature|privileged" /> 2603 2604 <!-- @SystemApi Allows an application to capture audio for hotword detection. 2605 <p>Not for use by third-party applications.</p> 2606 @hide --> 2607 <permission android:name="android.permission.CAPTURE_AUDIO_HOTWORD" 2608 android:protectionLevel="signature|privileged" /> 2609 2610 <!-- @SystemApi Allows an application to modify audio routing and override policy decisions. 2611 <p>Not for use by third-party applications.</p> 2612 @hide --> 2613 <permission android:name="android.permission.MODIFY_AUDIO_ROUTING" 2614 android:protectionLevel="signature|privileged" /> 2615 2616 <!-- @SystemApi Allows an application to capture video output. 2617 <p>Not for use by third-party applications.</p> --> 2618 <permission android:name="android.permission.CAPTURE_VIDEO_OUTPUT" 2619 android:protectionLevel="signature|privileged" /> 2620 2621 <!-- @SystemApi Allows an application to capture secure video output. 2622 <p>Not for use by third-party applications.</p> --> 2623 <permission android:name="android.permission.CAPTURE_SECURE_VIDEO_OUTPUT" 2624 android:protectionLevel="signature|privileged" /> 2625 2626 <!-- @SystemApi Allows an application to know what content is playing and control its playback. 2627 <p>Not for use by third-party applications due to privacy of media consumption</p> --> 2628 <permission android:name="android.permission.MEDIA_CONTENT_CONTROL" 2629 android:protectionLevel="signature|privileged" /> 2630 2631 <!-- @SystemApi Required to be able to disable the device (very dangerous!). 2632 <p>Not for use by third-party applications. 2633 @hide 2634 --> 2635 <permission android:name="android.permission.BRICK" 2636 android:protectionLevel="signature" /> 2637 2638 <!-- @SystemApi Required to be able to reboot the device. 2639 <p>Not for use by third-party applications. --> 2640 <permission android:name="android.permission.REBOOT" 2641 android:protectionLevel="signature|privileged" /> 2642 2643 <!-- @SystemApi Allows low-level access to power management. 2644 <p>Not for use by third-party applications. 2645 @hide 2646 --> 2647 <permission android:name="android.permission.DEVICE_POWER" 2648 android:protectionLevel="signature" /> 2649 2650 <!-- Allows access to the PowerManager.userActivity function. 2651 <p>Not for use by third-party applications. @hide @SystemApi --> 2652 <permission android:name="android.permission.USER_ACTIVITY" 2653 android:protectionLevel="signature|privileged" /> 2654 2655 <!-- @hide Allows low-level access to tun tap driver --> 2656 <permission android:name="android.permission.NET_TUNNELING" 2657 android:protectionLevel="signature" /> 2658 2659 <!-- Run as a manufacturer test application, running as the root user. 2660 Only available when the device is running in manufacturer test mode. 2661 <p>Not for use by third-party applications. 2662 --> 2663 <permission android:name="android.permission.FACTORY_TEST" 2664 android:protectionLevel="signature" /> 2665 2666 <!-- Allows an application to broadcast a notification that an application 2667 package has been removed. 2668 <p>Not for use by third-party applications. 2669 --> 2670 <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED" 2671 android:protectionLevel="signature" /> 2672 2673 <!-- Allows an application to broadcast an SMS receipt notification. 2674 <p>Not for use by third-party applications. 2675 --> 2676 <permission android:name="android.permission.BROADCAST_SMS" 2677 android:protectionLevel="signature" /> 2678 2679 <!-- Allows an application to broadcast a WAP PUSH receipt notification. 2680 <p>Not for use by third-party applications. 2681 --> 2682 <permission android:name="android.permission.BROADCAST_WAP_PUSH" 2683 android:protectionLevel="signature" /> 2684 2685 <!-- @SystemApi Allows an application to broadcast privileged networking requests. 2686 <p>Not for use by third-party applications. 2687 @hide 2688 @deprecated Use {@link android.Manifest.permission#REQUEST_NETWORK_SCORES} instead 2689 --> 2690 <permission android:name="android.permission.BROADCAST_NETWORK_PRIVILEGED" 2691 android:protectionLevel="signature|privileged" /> 2692 2693 <!-- @SystemApi Not for use by third-party applications. --> 2694 <permission android:name="android.permission.MASTER_CLEAR" 2695 android:protectionLevel="signature|privileged" /> 2696 2697 <!-- @SystemApi Allows an application to call any phone number, including emergency 2698 numbers, without going through the Dialer user interface for the user 2699 to confirm the call being placed. 2700 <p>Not for use by third-party applications. --> 2701 <permission android:name="android.permission.CALL_PRIVILEGED" 2702 android:protectionLevel="signature|privileged" /> 2703 2704 <!-- @SystemApi Allows an application to perform CDMA OTA provisioning @hide --> 2705 <permission android:name="android.permission.PERFORM_CDMA_PROVISIONING" 2706 android:protectionLevel="signature|privileged" /> 2707 2708 <!-- @SystemApi Allows an application to perform SIM Activation @hide --> 2709 <permission android:name="android.permission.PERFORM_SIM_ACTIVATION" 2710 android:protectionLevel="signature|privileged" /> 2711 2712 <!-- @SystemApi Allows enabling/disabling location update notifications from 2713 the radio. 2714 <p>Not for use by third-party applications. --> 2715 <permission android:name="android.permission.CONTROL_LOCATION_UPDATES" 2716 android:protectionLevel="signature|privileged" /> 2717 2718 <!-- @SystemApi Allows read/write access to the "properties" table in the checkin 2719 database, to change values that get uploaded. 2720 <p>Not for use by third-party applications. --> 2721 <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES" 2722 android:protectionLevel="signature|privileged" /> 2723 2724 <!-- @SystemApi Allows an application to collect component usage 2725 statistics 2726 <p>Declaring the permission implies intention to use the API and the user of the 2727 device can grant permission through the Settings application. --> 2728 <permission android:name="android.permission.PACKAGE_USAGE_STATS" 2729 android:protectionLevel="signature|privileged|development|appop" /> 2730 <uses-permission android:name="android.permission.PACKAGE_USAGE_STATS" /> 2731 2732 <!-- @hide Allows an application to change the app idle state of an app. 2733 <p>Not for use by third-party applications. --> 2734 <permission android:name="android.permission.CHANGE_APP_IDLE_STATE" 2735 android:protectionLevel="signature" /> 2736 2737 <!-- @hide @SystemApi Allows an application to temporarily whitelist an inactive app to 2738 access the network and acquire wakelocks. 2739 <p>Not for use by third-party applications. --> 2740 <permission android:name="android.permission.CHANGE_DEVICE_IDLE_TEMP_WHITELIST" 2741 android:protectionLevel="signature|privileged" /> 2742 2743 <!-- Permission an application must hold in order to use 2744 {@link android.provider.Settings#ACTION_REQUEST_IGNORE_BATTERY_OPTIMIZATIONS}. 2745 This is a normal permission: an app requesting it will always be granted the 2746 permission, without the user needing to approve or see it. --> 2747 <permission android:name="android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS" 2748 android:label="@string/permlab_requestIgnoreBatteryOptimizations" 2749 android:description="@string/permdesc_requestIgnoreBatteryOptimizations" 2750 android:protectionLevel="normal" /> 2751 2752 <!-- @SystemApi Allows an application to collect battery statistics --> 2753 <permission android:name="android.permission.BATTERY_STATS" 2754 android:protectionLevel="signature|privileged|development" /> 2755 2756 <!-- @SystemApi Allows an application to control the backup and restore process. 2757 <p>Not for use by third-party applications. 2758 @hide pending API council --> 2759 <permission android:name="android.permission.BACKUP" 2760 android:protectionLevel="signature|privileged" /> 2761 2762 <!-- Allows a package to launch the secure full-backup confirmation UI. 2763 ONLY the system process may hold this permission. 2764 @hide --> 2765 <permission android:name="android.permission.CONFIRM_FULL_BACKUP" 2766 android:protectionLevel="signature" /> 2767 2768 <!-- @SystemApi Must be required by a {@link android.widget.RemoteViewsService}, 2769 to ensure that only the system can bind to it. --> 2770 <permission android:name="android.permission.BIND_REMOTEVIEWS" 2771 android:protectionLevel="signature|privileged" /> 2772 2773 <!-- @SystemApi Allows an application to tell the AppWidget service which application 2774 can access AppWidget's data. The normal user flow is that a user 2775 picks an AppWidget to go into a particular host, thereby giving that 2776 host application access to the private data from the AppWidget app. 2777 An application that has this permission should honor that contract. 2778 <p>Not for use by third-party applications. --> 2779 <permission android:name="android.permission.BIND_APPWIDGET" 2780 android:protectionLevel="signature|privileged" /> 2781 2782 <!-- @SystemApi Private permission, to restrict who can bring up a dialog to add a new 2783 keyguard widget 2784 @hide --> 2785 <permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET" 2786 android:protectionLevel="signature|privileged" /> 2787 2788 <!-- @SystemApi Internal permission allowing an application to query/set which 2789 applications can bind AppWidgets. 2790 @hide --> 2791 <permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS" 2792 android:protectionLevel="signature|privileged" /> 2793 2794 <!-- Allows applications to change the background data setting. 2795 <p>Not for use by third-party applications. 2796 @hide pending API council --> 2797 <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING" 2798 android:protectionLevel="signature" /> 2799 2800 <!-- @SystemApi This permission can be used on content providers to allow the global 2801 search system to access their data. Typically it used when the 2802 provider has some permissions protecting it (which global search 2803 would not be expected to hold), and added as a read-only permission 2804 to the path in the provider where global search queries are 2805 performed. This permission can not be held by regular applications; 2806 it is used by applications to protect themselves from everyone else 2807 besides global search. --> 2808 <permission android:name="android.permission.GLOBAL_SEARCH" 2809 android:protectionLevel="signature|privileged" /> 2810 2811 <!-- Internal permission protecting access to the global search 2812 system: ensures that only the system can access the provider 2813 to perform queries (since this otherwise provides unrestricted 2814 access to a variety of content providers), and to write the 2815 search statistics (to keep applications from gaming the source 2816 ranking). 2817 @hide --> 2818 <permission android:name="android.permission.GLOBAL_SEARCH_CONTROL" 2819 android:protectionLevel="signature" /> 2820 2821 <!-- @SystemApi Internal permission to allows an application to read indexable data. 2822 @hide --> 2823 <permission android:name="android.permission.READ_SEARCH_INDEXABLES" 2824 android:protectionLevel="signature|privileged" /> 2825 2826 <!-- @SystemApi Allows applications to set a live wallpaper. 2827 @hide XXX Change to signature once the picker is moved to its 2828 own apk as Ghod Intended. --> 2829 <permission android:name="android.permission.SET_WALLPAPER_COMPONENT" 2830 android:protectionLevel="signature|privileged" /> 2831 2832 <!-- @SystemApi Allows applications to read dream settings and dream state. 2833 @hide --> 2834 <permission android:name="android.permission.READ_DREAM_STATE" 2835 android:protectionLevel="signature|privileged" /> 2836 2837 <!-- @SystemApi Allows applications to write dream settings, and start or stop dreaming. 2838 @hide --> 2839 <permission android:name="android.permission.WRITE_DREAM_STATE" 2840 android:protectionLevel="signature|privileged" /> 2841 2842 <!-- @SystemApi Allow an application to read and write the cache partition. 2843 @hide --> 2844 <permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM" 2845 android:protectionLevel="signature|privileged" /> 2846 2847 <!-- Must be required by default container service so that only 2848 the system can bind to it and use it to copy 2849 protected data to secure containers or files 2850 accessible to the system. 2851 @hide --> 2852 <permission android:name="android.permission.COPY_PROTECTED_DATA" 2853 android:protectionLevel="signature" /> 2854 2855 <!-- @SystemApi Internal permission protecting access to the encryption methods 2856 @hide 2857 --> 2858 <permission android:name="android.permission.CRYPT_KEEPER" 2859 android:protectionLevel="signature|privileged" /> 2860 2861 <!-- @SystemApi Allows an application to read historical network usage for 2862 specific networks and applications. @hide --> 2863 <permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY" 2864 android:protectionLevel="signature|privileged" /> 2865 2866 <!-- Allows an application to manage network policies (such as warning and disable 2867 limits) and to define application-specific rules. @hide --> 2868 <permission android:name="android.permission.MANAGE_NETWORK_POLICY" 2869 android:protectionLevel="signature" /> 2870 2871 <!-- @SystemApi Allows an application to account its network traffic against other UIDs. Used 2872 by system services like download manager and media server. Not for use by 2873 third party apps. @hide --> 2874 <permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING" 2875 android:protectionLevel="signature|privileged" /> 2876 2877 <!-- C2DM permission. 2878 @hide Used internally. 2879 --> 2880 <permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE" 2881 android:protectionLevel="signature" /> 2882 <uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/> 2883 2884 <!-- @SystemApi @hide Package verifier needs to have this permission before the PackageManager will 2885 trust it to verify packages. 2886 --> 2887 <permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT" 2888 android:protectionLevel="signature|privileged" /> 2889 2890 <!-- Must be required by package verifier receiver, to ensure that only the 2891 system can interact with it. 2892 @hide 2893 --> 2894 <permission android:name="android.permission.BIND_PACKAGE_VERIFIER" 2895 android:protectionLevel="signature" /> 2896 2897 <!-- @SystemApi @hide Intent filter verifier needs to have this permission before the 2898 PackageManager will trust it to verify intent filters. 2899 --> 2900 <permission android:name="android.permission.INTENT_FILTER_VERIFICATION_AGENT" 2901 android:protectionLevel="signature|privileged" /> 2902 2903 <!-- Must be required by intent filter verifier receiver, to ensure that only the 2904 system can interact with it. 2905 @hide 2906 --> 2907 <permission android:name="android.permission.BIND_INTENT_FILTER_VERIFIER" 2908 android:protectionLevel="signature" /> 2909 2910 <!-- @SystemApi Allows applications to access serial ports via the SerialManager. 2911 @hide --> 2912 <permission android:name="android.permission.SERIAL_PORT" 2913 android:protectionLevel="signature|privileged" /> 2914 2915 <!-- Allows the holder to access content providers from outside an ApplicationThread. 2916 This permission is enforced by the ActivityManagerService on the corresponding APIs, 2917 in particular ActivityManagerService#getContentProviderExternal(String) and 2918 ActivityManagerService#removeContentProviderExternal(String). 2919 @hide 2920 --> 2921 <permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY" 2922 android:protectionLevel="signature" /> 2923 2924 <!-- @SystemApi Allows an application to hold an UpdateLock, recommending that a headless 2925 OTA reboot *not* occur while the lock is held. 2926 @hide --> 2927 <permission android:name="android.permission.UPDATE_LOCK" 2928 android:protectionLevel="signature|privileged" /> 2929 2930 <!-- @SystemApi Allows an application to read the current set of notifications, including 2931 any metadata and intents attached. 2932 @hide --> 2933 <permission android:name="android.permission.ACCESS_NOTIFICATIONS" 2934 android:protectionLevel="signature|privileged" /> 2935 2936 <!-- Marker permission for applications that wish to access notification policy. 2937 <p>Protection level: normal 2938 --> 2939 <permission android:name="android.permission.ACCESS_NOTIFICATION_POLICY" 2940 android:description="@string/permdesc_access_notification_policy" 2941 android:label="@string/permlab_access_notification_policy" 2942 android:protectionLevel="normal" /> 2943 2944 <!-- Allows modification of do not disturb rules and policies. Only allowed for system 2945 processes. 2946 @hide --> 2947 <permission android:name="android.permission.MANAGE_NOTIFICATIONS" 2948 android:protectionLevel="signature" /> 2949 2950 <!-- Allows access to keyguard secure storage. Only allowed for system processes. 2951 @hide --> 2952 <permission android:name="android.permission.ACCESS_KEYGUARD_SECURE_STORAGE" 2953 android:protectionLevel="signature" /> 2954 2955 <!-- Allows managing (adding, removing) fingerprint templates. Reserved for the system. @hide --> 2956 <permission android:name="android.permission.MANAGE_FINGERPRINT" 2957 android:protectionLevel="signature|privileged" /> 2958 2959 <!-- Allows an app to reset fingerprint attempt counter. Reserved for the system. @hide --> 2960 <permission android:name="android.permission.RESET_FINGERPRINT_LOCKOUT" 2961 android:protectionLevel="signature" /> 2962 2963 <!-- Allows an application to control keyguard. Only allowed for system processes. 2964 @hide --> 2965 <permission android:name="android.permission.CONTROL_KEYGUARD" 2966 android:protectionLevel="signature" /> 2967 2968 <!-- Allows an application to listen to trust changes. Only allowed for system processes. 2969 @hide --> 2970 <permission android:name="android.permission.TRUST_LISTENER" 2971 android:protectionLevel="signature" /> 2972 2973 <!-- @SystemApi Allows an application to provide a trust agent. 2974 @hide For security reasons, this is a platform-only permission. --> 2975 <permission android:name="android.permission.PROVIDE_TRUST_AGENT" 2976 android:protectionLevel="signature|privileged" /> 2977 2978 <!-- Allows an application to launch the trust agent settings activity. 2979 @hide --> 2980 <permission android:name="android.permission.LAUNCH_TRUST_AGENT_SETTINGS" 2981 android:protectionLevel="signature|privileged" /> 2982 2983 <!-- @SystemApi Must be required by an {@link 2984 android.service.trust.TrustAgentService}, 2985 to ensure that only the system can bind to it. 2986 @hide --> 2987 <permission android:name="android.permission.BIND_TRUST_AGENT" 2988 android:protectionLevel="signature" /> 2989 2990 <!-- Must be required by an {@link 2991 android.service.notification.NotificationListenerService}, 2992 to ensure that only the system can bind to it. 2993 <p>Protection level: signature 2994 --> 2995 <permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE" 2996 android:protectionLevel="signature" /> 2997 2998 <!-- Must be required by an {@link 2999 android.service.notification.NotificationAssistantService to ensure that only the system 3000 can bind to it. 3001 <p>Protection level: signature 3002 --> 3003 <permission android:name="android.permission.BIND_NOTIFICATION_ASSISTANT_SERVICE" 3004 android:protectionLevel="signature" /> 3005 3006 <!-- Must be required by a {@link 3007 android.service.chooser.ChooserTargetService}, to ensure that 3008 only the system can bind to it. 3009 <p>Protection level: signature 3010 --> 3011 <permission android:name="android.permission.BIND_CHOOSER_TARGET_SERVICE" 3012 android:protectionLevel="signature" /> 3013 3014 <!-- Must be required by a {@link 3015 android.service.notification.ConditionProviderService}, 3016 to ensure that only the system can bind to it. 3017 <p>Protection level: signature 3018 --> 3019 <permission android:name="android.permission.BIND_CONDITION_PROVIDER_SERVICE" 3020 android:protectionLevel="signature" /> 3021 3022 <!-- Must be required by an {@link android.service.dreams.DreamService}, 3023 to ensure that only the system can bind to it. 3024 <p>Protection level: signature 3025 --> 3026 <permission android:name="android.permission.BIND_DREAM_SERVICE" 3027 android:protectionLevel="signature" /> 3028 3029 <!-- @SystemApi Allows an application to call into a carrier setup flow. It is up to the 3030 carrier setup application to enforce that this permission is required 3031 @hide This is not a third-party API (intended for OEMs and system apps). --> 3032 <permission android:name="android.permission.INVOKE_CARRIER_SETUP" 3033 android:protectionLevel="signature|privileged" /> 3034 3035 <!-- @SystemApi Allows an application to listen for network condition observations. 3036 @hide This is not a third-party API (intended for system apps). --> 3037 <permission android:name="android.permission.ACCESS_NETWORK_CONDITIONS" 3038 android:protectionLevel="signature|privileged" /> 3039 3040 <!-- @SystemApi Allows an application to provision and access DRM certificates 3041 @hide This is not a third-party API (intended for system apps). --> 3042 <permission android:name="android.permission.ACCESS_DRM_CERTIFICATES" 3043 android:protectionLevel="signature|privileged" /> 3044 3045 <!-- Api Allows an application to manage media projection sessions. 3046 @hide This is not a third-party API (intended for system apps). --> 3047 <permission android:name="android.permission.MANAGE_MEDIA_PROJECTION" 3048 android:protectionLevel="signature" /> 3049 3050 <!-- @SystemApi Allows an application to read install sessions 3051 @hide This is not a third-party API (intended for system apps). --> 3052 <permission android:name="android.permission.READ_INSTALL_SESSIONS" 3053 android:label="@string/permlab_readInstallSessions" 3054 android:description="@string/permdesc_readInstallSessions" 3055 android:protectionLevel="normal"/> 3056 3057 <!-- @SystemApi Allows an application to remove DRM certificates 3058 @hide This is not a third-party API (intended for system apps). --> 3059 <permission android:name="android.permission.REMOVE_DRM_CERTIFICATES" 3060 android:protectionLevel="signature|privileged" /> 3061 3062 <!-- @deprecated Use {@link android.Manifest.permission#BIND_CARRIER_SERVICES} instead --> 3063 <permission android:name="android.permission.BIND_CARRIER_MESSAGING_SERVICE" 3064 android:protectionLevel="signature|privileged" /> 3065 3066 <!-- Allows an application to interact with the currently active 3067 {@link android.service.voice.VoiceInteractionService}. 3068 @hide --> 3069 <permission android:name="android.permission.ACCESS_VOICE_INTERACTION_SERVICE" 3070 android:protectionLevel="signature" /> 3071 3072 <!-- The system process that is allowed to bind to services in carrier apps will 3073 have this permission. Carrier apps should use this permission to protect 3074 their services that only the system is allowed to bind to. 3075 <p>Protection level: system|signature 3076 --> 3077 <permission android:name="android.permission.BIND_CARRIER_SERVICES" 3078 android:label="@string/permlab_bindCarrierServices" 3079 android:description="@string/permdesc_bindCarrierServices" 3080 android:protectionLevel="signature|privileged" /> 3081 3082 <!-- Allows an application to query whether DO_NOT_ASK_CREDENTIALS_ON_BOOT 3083 flag is set. 3084 @hide --> 3085 <permission android:name="android.permission.QUERY_DO_NOT_ASK_CREDENTIALS_ON_BOOT" 3086 android:protectionLevel="signature" /> 3087 3088 <!-- @SystemApi Allows applications to kill UIDs. 3089 <p>Not for use by third-party applications. 3090 @hide --> 3091 <permission android:name="android.permission.KILL_UID" 3092 android:protectionLevel="signature|installer" /> 3093 3094 <!-- @SystemApi Allows applications to read the local WiFi and Bluetooth MAC address. 3095 @hide --> 3096 <permission android:name="android.permission.LOCAL_MAC_ADDRESS" 3097 android:protectionLevel="signature|privileged" /> 3098 3099 <!-- @SystemApi Allows access to MAC addresses of WiFi and Bluetooth peer devices. 3100 @hide --> 3101 <permission android:name="android.permission.PEERS_MAC_ADDRESS" 3102 android:protectionLevel="signature|setup" /> 3103 3104 <!-- Allows the Nfc stack to dispatch Nfc messages to applications. Applications 3105 can use this permission to ensure incoming Nfc messages are from the Nfc stack 3106 and not simulated by another application. 3107 @hide --> 3108 <permission android:name="android.permission.DISPATCH_NFC_MESSAGE" 3109 android:protectionLevel="signature|privileged" /> 3110 3111 <!-- @SystemApi Allows changing day / night mode when system is configured with 3112 config_lockDayNightMode set to true. If requesting app does not have permission, 3113 it will be ignored. 3114 @hide --> 3115 <permission android:name="android.permission.MODIFY_DAY_NIGHT_MODE" 3116 android:protectionLevel="signature|privileged" /> 3117 3118 <!-- The system process is explicitly the only one allowed to launch the 3119 confirmation UI for full backup/restore --> 3120 <uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/> 3121 3122 3123 <!-- Allows the holder to access the ephemeral applications on the device. 3124 @hide --> 3125 <permission android:name="android.permission.ACCESS_EPHEMERAL_APPS" 3126 android:protectionLevel="signature" /> 3127 3128 <!-- Allows receiving the usage of media resource e.g. video/audio codec and 3129 graphic memory. 3130 @hide --> 3131 <permission android:name="android.permission.RECEIVE_MEDIA_RESOURCE_USAGE" 3132 android:protectionLevel="signature|privileged" /> 3133 3134 <!-- Must be required by system/priv apps when accessing the sound trigger 3135 APIs given by {@link SoundTriggerManager}. 3136 @hide <p>Not for use by third-party applications.</p> --> 3137 <permission android:name="android.permission.MANAGE_SOUND_TRIGGER" 3138 android:protectionLevel="signature|privileged" /> 3139 3140 <!-- @SystemApi Allows trusted applications to dispatch managed provisioning message to Managed 3141 Provisioning app. If requesting app does not have permission, it will be ignored. 3142 @hide --> 3143 <permission android:name="android.permission.DISPATCH_PROVISIONING_MESSAGE" 3144 android:protectionLevel="signature|privileged" /> 3145 3146 <!-- Allows the holder to read blocked numbers. See 3147 {@link android.provider.BlockedNumberContract}. 3148 @hide --> 3149 <permission android:name="android.permission.READ_BLOCKED_NUMBERS" 3150 android:protectionLevel="signature" /> 3151 3152 <!-- Allows the holder to write blocked numbers. See 3153 {@link android.provider.BlockedNumberContract}. 3154 @hide --> 3155 <permission android:name="android.permission.WRITE_BLOCKED_NUMBERS" 3156 android:protectionLevel="signature" /> 3157 3158 <!-- Must be required by an {@link android.service.vr.VrListenerService}, to ensure that only 3159 the system can bind to it. 3160 <p>Protection level: signature --> 3161 <permission android:name="android.permission.BIND_VR_LISTENER_SERVICE" 3162 android:protectionLevel="signature" /> 3163 3164 <!-- Required to make calls to {@link android.service.vr.IVrManager}. 3165 @hide --> 3166 <permission android:name="android.permission.ACCESS_VR_MANAGER" 3167 android:protectionLevel="signature" /> 3168 3169 <!-- Allows an application to whitelist tasks during lock task mode 3170 @hide <p>Not for use by third-party applications.</p> --> 3171 <permission android:name="android.permission.UPDATE_LOCK_TASK_PACKAGES" 3172 android:protectionLevel="signature|setup" /> 3173 3174 <!-- @SystemApi Allows an application to replace the app name displayed alongside notifications 3175 in the N-release and later. 3176 @hide <p>Not for use by third-party applications.</p> --> 3177 <permission android:name="android.permission.SUBSTITUTE_NOTIFICATION_APP_NAME" 3178 android:protectionLevel="signature|privileged" /> 3179 3180 <!-- @SystemApi Allows an application to manage auto-fill sessions. 3181 @hide <p>Not for use by third-party applications.</p> --> 3182 <permission android:name="android.permission.MANAGE_AUTO_FILL" 3183 android:protectionLevel="signature" /> 3184 3185 <!-- Allows an app to set the theme overlay in /vendor/overlay 3186 being used. 3187 @hide <p>Not for use by third-party applications.</p> --> 3188 <permission android:name="android.permission.MODIFY_THEME_OVERLAY" 3189 android:protectionLevel="signature" /> 3190 3191 <application android:process="system" 3192 android:persistent="true" 3193 android:hasCode="false" 3194 android:label="@string/android_system_label" 3195 android:allowClearUserData="false" 3196 android:backupAgent="com.android.server.backup.SystemBackupAgent" 3197 android:killAfterRestore="false" 3198 android:icon="@drawable/ic_launcher_android" 3199 android:supportsRtl="true" 3200 android:theme="@style/Theme.DeviceDefault.Light.DarkActionBar" 3201 android:defaultToDeviceProtectedStorage="true" 3202 android:directBootAware="true"> 3203 <activity android:name="com.android.internal.app.ChooserActivity" 3204 android:theme="@style/Theme.DeviceDefault.Resolver" 3205 android:finishOnCloseSystemDialogs="true" 3206 android:excludeFromRecents="true" 3207 android:documentLaunchMode="never" 3208 android:relinquishTaskIdentity="true" 3209 android:configChanges="screenSize|smallestScreenSize|screenLayout|orientation|keyboard|keyboardHidden" 3210 android:process=":ui"> 3211 <intent-filter> 3212 <action android:name="android.intent.action.CHOOSER" /> 3213 <category android:name="android.intent.category.DEFAULT" /> 3214 <category android:name="android.intent.category.VOICE" /> 3215 </intent-filter> 3216 </activity> 3217 <activity android:name="com.android.internal.app.IntentForwarderActivity" 3218 android:finishOnCloseSystemDialogs="true" 3219 android:theme="@style/Theme.NoDisplay" 3220 android:excludeFromRecents="true" 3221 android:label="@string/user_owner_label" 3222 android:exported="true" 3223 > 3224 </activity> 3225 <activity-alias android:name="com.android.internal.app.ForwardIntentToParent" 3226 android:targetActivity="com.android.internal.app.IntentForwarderActivity" 3227 android:exported="true" 3228 android:label="@string/user_owner_label"> 3229 </activity-alias> 3230 <activity-alias android:name="com.android.internal.app.ForwardIntentToManagedProfile" 3231 android:targetActivity="com.android.internal.app.IntentForwarderActivity" 3232 android:icon="@drawable/ic_corp_icon" 3233 android:exported="true" 3234 android:label="@string/managed_profile_label"> 3235 </activity-alias> 3236 <activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity" 3237 android:theme="@style/Theme.DeviceDefault.Light.Dialog" 3238 android:label="@string/heavy_weight_switcher_title" 3239 android:finishOnCloseSystemDialogs="true" 3240 android:excludeFromRecents="true" 3241 android:process=":ui"> 3242 </activity> 3243 <activity android:name="com.android.internal.app.PlatLogoActivity" 3244 android:theme="@style/Theme.Wallpaper.NoTitleBar.Fullscreen" 3245 android:configChanges="orientation|keyboardHidden" 3246 android:process=":ui"> 3247 </activity> 3248 <activity android:name="com.android.internal.app.DisableCarModeActivity" 3249 android:theme="@style/Theme.NoDisplay" 3250 android:excludeFromRecents="true" 3251 android:process=":ui"> 3252 </activity> 3253 <activity android:name="com.android.internal.app.DumpHeapActivity" 3254 android:theme="@style/Theme.Translucent.NoTitleBar" 3255 android:label="@string/dump_heap_title" 3256 android:finishOnCloseSystemDialogs="true" 3257 android:noHistory="true" 3258 android:excludeFromRecents="true" 3259 android:process=":ui"> 3260 </activity> 3261 <provider android:name="com.android.server.am.DumpHeapProvider" 3262 android:authorities="com.android.server.heapdump" 3263 android:grantUriPermissions="true" 3264 android:multiprocess="false" 3265 android:singleUser="true" /> 3266 3267 <activity android:name="android.accounts.ChooseAccountActivity" 3268 android:excludeFromRecents="true" 3269 android:exported="true" 3270 android:theme="@style/Theme.DeviceDefault.Light.Dialog" 3271 android:label="@string/choose_account_label" 3272 android:process=":ui"> 3273 </activity> 3274 3275 <activity android:name="android.accounts.ChooseTypeAndAccountActivity" 3276 android:excludeFromRecents="true" 3277 android:exported="true" 3278 android:theme="@style/Theme.DeviceDefault.Light.Dialog" 3279 android:label="@string/choose_account_label" 3280 android:process=":ui"> 3281 </activity> 3282 3283 <activity android:name="android.accounts.ChooseAccountTypeActivity" 3284 android:excludeFromRecents="true" 3285 android:theme="@style/Theme.DeviceDefault.Light.Dialog" 3286 android:label="@string/choose_account_label" 3287 android:process=":ui"> 3288 </activity> 3289 3290 <activity android:name="android.accounts.CantAddAccountActivity" 3291 android:excludeFromRecents="true" 3292 android:exported="true" 3293 android:theme="@style/Theme.DeviceDefault.Light.Dialog.NoActionBar" 3294 android:process=":ui"> 3295 </activity> 3296 3297 <activity android:name="android.accounts.GrantCredentialsPermissionActivity" 3298 android:excludeFromRecents="true" 3299 android:exported="true" 3300 android:theme="@style/Theme.DeviceDefault.Light.DialogWhenLarge" 3301 android:process=":ui"> 3302 </activity> 3303 3304 <activity android:name="android.content.SyncActivityTooManyDeletes" 3305 android:theme="@style/Theme.DeviceDefault.Light.Dialog" 3306 android:label="@string/sync_too_many_deletes" 3307 android:process=":ui"> 3308 </activity> 3309 3310 <activity android:name="com.android.internal.app.ShutdownActivity" 3311 android:permission="android.permission.SHUTDOWN" 3312 android:theme="@style/Theme.NoDisplay" 3313 android:excludeFromRecents="true"> 3314 <intent-filter> 3315 <action android:name="android.intent.action.ACTION_REQUEST_SHUTDOWN" /> 3316 <category android:name="android.intent.category.DEFAULT" /> 3317 </intent-filter> 3318 <intent-filter> 3319 <action android:name="android.intent.action.REBOOT" /> 3320 <category android:name="android.intent.category.DEFAULT" /> 3321 </intent-filter> 3322 </activity> 3323 3324 <activity android:name="com.android.internal.app.NetInitiatedActivity" 3325 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert" 3326 android:excludeFromRecents="true" 3327 android:process=":ui"> 3328 </activity> 3329 3330 <activity android:name="com.android.internal.app.SystemUserHomeActivity" 3331 android:enabled="false" 3332 android:process=":ui" 3333 android:systemUserOnly="true" 3334 android:theme="@style/Theme.Translucent.NoTitleBar"> 3335 <intent-filter android:priority="-100"> 3336 <action android:name="android.intent.action.MAIN" /> 3337 <category android:name="android.intent.category.HOME" /> 3338 </intent-filter> 3339 </activity> 3340 3341 <!-- Activity to prompt user if it's ok to create a new user sandbox for a 3342 specified account. --> 3343 <activity android:name="com.android.internal.app.ConfirmUserCreationActivity" 3344 android:excludeFromRecents="true" 3345 android:process=":ui" 3346 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert"> 3347 <intent-filter android:priority="1000"> 3348 <action android:name="android.os.action.CREATE_USER" /> 3349 <category android:name="android.intent.category.DEFAULT" /> 3350 </intent-filter> 3351 </activity> 3352 3353 <activity android:name="com.android.internal.app.UnlaunchableAppActivity" 3354 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert" 3355 android:excludeFromRecents="true" 3356 android:process=":ui"> 3357 </activity> 3358 3359 <receiver android:name="com.android.server.BootReceiver" 3360 android:systemUserOnly="true"> 3361 <intent-filter android:priority="1000"> 3362 <action android:name="android.intent.action.BOOT_COMPLETED" /> 3363 </intent-filter> 3364 </receiver> 3365 3366 <receiver android:name="com.android.server.updates.CertPinInstallReceiver" 3367 android:permission="android.permission.UPDATE_CONFIG"> 3368 <intent-filter> 3369 <action android:name="android.intent.action.UPDATE_PINS" /> 3370 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3371 </intent-filter> 3372 </receiver> 3373 3374 <receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver" 3375 android:permission="android.permission.UPDATE_CONFIG"> 3376 <intent-filter> 3377 <action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" /> 3378 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3379 </intent-filter> 3380 </receiver> 3381 3382 <receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver" 3383 android:permission="android.permission.UPDATE_CONFIG"> 3384 <intent-filter> 3385 <action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" /> 3386 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3387 </intent-filter> 3388 </receiver> 3389 3390 <receiver android:name="com.android.server.updates.ApnDbInstallReceiver" 3391 android:permission="android.permission.UPDATE_CONFIG"> 3392 <intent-filter> 3393 <action android:name="android.intent.action.UPDATE_APN_DB" /> 3394 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3395 </intent-filter> 3396 </receiver> 3397 3398 <receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver" 3399 android:permission="android.permission.UPDATE_CONFIG"> 3400 <intent-filter> 3401 <action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" /> 3402 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3403 </intent-filter> 3404 </receiver> 3405 3406 <receiver android:name="com.android.server.updates.TzDataInstallReceiver" 3407 android:permission="android.permission.UPDATE_CONFIG"> 3408 <intent-filter> 3409 <action android:name="android.intent.action.UPDATE_TZDATA" /> 3410 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3411 </intent-filter> 3412 </receiver> 3413 3414 <receiver android:name="com.android.server.updates.CertificateTransparencyLogInstallReceiver" 3415 android:permission="android.permission.UPDATE_CONFIG"> 3416 <intent-filter> 3417 <action android:name="android.intent.action.UPDATE_CT_LOGS" /> 3418 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3419 </intent-filter> 3420 </receiver> 3421 3422 <receiver android:name="com.android.server.MasterClearReceiver" 3423 android:permission="android.permission.MASTER_CLEAR"> 3424 <intent-filter 3425 android:priority="100" > 3426 <!-- For Checkin, Settings, etc.: action=FACTORY_RESET --> 3427 <action android:name="android.intent.action.FACTORY_RESET" /> 3428 <!-- As above until all the references to the deprecated MASTER_CLEAR get updated to 3429 FACTORY_RESET. --> 3430 <action android:name="android.intent.action.MASTER_CLEAR" /> 3431 3432 <!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR --> 3433 <action android:name="com.google.android.c2dm.intent.RECEIVE" /> 3434 <category android:name="android.intent.category.MASTER_CLEAR" /> 3435 </intent-filter> 3436 </receiver> 3437 3438 <service android:name="android.hardware.location.GeofenceHardwareService" 3439 android:permission="android.permission.LOCATION_HARDWARE" 3440 android:exported="false" /> 3441 3442 <service android:name="com.android.internal.backup.LocalTransportService" 3443 android:permission="android.permission.CONFIRM_FULL_BACKUP" 3444 android:exported="false"> 3445 <intent-filter> 3446 <action android:name="android.backup.TRANSPORT_HOST" /> 3447 </intent-filter> 3448 </service> 3449 3450 <service android:name="com.android.server.MountServiceIdler" 3451 android:exported="true" 3452 android:permission="android.permission.BIND_JOB_SERVICE" > 3453 </service> 3454 3455 <service android:name="com.android.server.backup.FullBackupJob" 3456 android:exported="true" 3457 android:permission="android.permission.BIND_JOB_SERVICE" > 3458 </service> 3459 3460 <service android:name="com.android.server.backup.KeyValueBackupJob" 3461 android:permission="android.permission.BIND_JOB_SERVICE" > 3462 </service> 3463 3464 <service android:name="com.android.server.content.SyncJobService" 3465 android:permission="android.permission.BIND_JOB_SERVICE" > 3466 </service> 3467 3468 <service android:name="com.android.server.pm.BackgroundDexOptService" 3469 android:exported="true" 3470 android:permission="android.permission.BIND_JOB_SERVICE"> 3471 </service> 3472 3473 <service android:name="com.android.server.storage.DiskStatsLoggingService" 3474 android:permission="android.permission.BIND_JOB_SERVICE" > 3475 </service> 3476 3477 </application> 3478 3479</manifest> 3480