1 <?xml version="1.0" encoding="utf-8"?> 2 <!-- 3 /* //device/apps/common/AndroidManifest.xml 4 ** 5 ** Copyright 2006, The Android Open Source Project 6 ** 7 ** Licensed under the Apache License, Version 2.0 (the "License"); 8 ** you may not use this file except in compliance with the License. 9 ** You may obtain a copy of the License at 10 ** 11 ** http://www.apache.org/licenses/LICENSE-2.0 12 ** 13 ** Unless required by applicable law or agreed to in writing, software 14 ** distributed under the License is distributed on an "AS IS" BASIS, 15 ** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 16 ** See the License for the specific language governing permissions and 17 ** limitations under the License. 18 */ 19 --> 20 <manifest xmlns:android="http://schemas.android.com/apk/res/android" 21 package="android" coreApp="true" android:sharedUserId="android.uid.system" 22 android:sharedUserLabel="@string/android_system_label"> 23 24 <!-- ================================================ --> 25 <!-- Special broadcasts that only the system can send --> 26 <!-- ================================================ --> 27 <eat-comment /> 28 29 <protected-broadcast android:name="android.intent.action.SCREEN_OFF" /> 30 <protected-broadcast android:name="android.intent.action.SCREEN_ON" /> 31 <protected-broadcast android:name="android.intent.action.USER_PRESENT" /> 32 <protected-broadcast android:name="android.intent.action.TIME_SET" /> 33 <protected-broadcast android:name="android.intent.action.TIME_TICK" /> 34 <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" /> 35 <protected-broadcast android:name="android.intent.action.DATE_CHANGED" /> 36 <protected-broadcast android:name="android.intent.action.PRE_BOOT_COMPLETED" /> 37 <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" /> 38 <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" /> 39 <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" /> 40 <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" /> 41 <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" /> 42 <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" /> 43 <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" /> 44 <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" /> 45 <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" /> 46 <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" /> 47 <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" /> 48 <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" /> 49 <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" /> 50 <protected-broadcast android:name="android.intent.action.PACKAGES_SUSPENDED" /> 51 <protected-broadcast android:name="android.intent.action.PACKAGES_UNSUSPENDED" /> 52 <protected-broadcast android:name="android.intent.action.ACTION_PREFERRED_ACTIVITY_CHANGED" /> 53 <protected-broadcast android:name="android.intent.action.UID_REMOVED" /> 54 <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" /> 55 <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" /> 56 <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" /> 57 <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" /> 58 <protected-broadcast android:name="android.intent.action.BATTERY_LOW" /> 59 <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" /> 60 <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" /> 61 <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" /> 62 <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" /> 63 <protected-broadcast android:name="android.intent.action.CHARGING" /> 64 <protected-broadcast android:name="android.intent.action.DISCHARGING" /> 65 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" /> 66 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" /> 67 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" /> 68 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" /> 69 <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" /> 70 <protected-broadcast android:name="android.intent.action.REBOOT" /> 71 <protected-broadcast android:name="android.intent.action.DOCK_EVENT" /> 72 <protected-broadcast android:name="android.intent.action.THERMAL_EVENT" /> 73 <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" /> 74 <protected-broadcast android:name="android.intent.action.USER_ADDED" /> 75 <protected-broadcast android:name="android.intent.action.USER_REMOVED" /> 76 <protected-broadcast android:name="android.intent.action.USER_STARTING" /> 77 <protected-broadcast android:name="android.intent.action.USER_STARTED" /> 78 <protected-broadcast android:name="android.intent.action.USER_STOPPING" /> 79 <protected-broadcast android:name="android.intent.action.USER_STOPPED" /> 80 <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" /> 81 <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" /> 82 <protected-broadcast android:name="android.intent.action.USER_SWITCHED" /> 83 <protected-broadcast android:name="android.intent.action.USER_INITIALIZE" /> 84 <protected-broadcast android:name="android.intent.action.INTENT_FILTER_NEEDS_VERIFICATION" /> 85 86 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED" /> 87 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGING" /> 88 <protected-broadcast android:name="android.os.action.DEVICE_IDLE_MODE_CHANGED" /> 89 <protected-broadcast android:name="android.os.action.POWER_SAVE_WHITELIST_CHANGED" /> 90 <protected-broadcast android:name="android.os.action.POWER_SAVE_TEMP_WHITELIST_CHANGED" /> 91 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED_INTERNAL" /> 92 93 <protected-broadcast android:name="android.os.action.SCREEN_BRIGHTNESS_BOOST_CHANGED" /> 94 95 <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" /> 96 <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" /> 97 <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" /> 98 <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" /> 99 <protected-broadcast android:name="android.app.action.NEXT_ALARM_CLOCK_CHANGED" /> 100 101 <protected-broadcast android:name="android.app.action.BUGREPORT_SHARING_DECLINED" /> 102 <protected-broadcast android:name="android.app.action.BUGREPORT_FAILED" /> 103 <protected-broadcast android:name="android.app.action.BUGREPORT_SHARE" /> 104 105 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" /> 106 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" /> 107 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" /> 108 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" /> 109 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_HOST_RESTORED" /> 110 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_RESTORED" /> 111 112 <protected-broadcast android:name="android.os.action.SETTING_RESTORED" /> 113 114 <protected-broadcast android:name="android.app.backup.intent.RUN" /> 115 <protected-broadcast android:name="android.app.backup.intent.CLEAR" /> 116 <protected-broadcast android:name="android.app.backup.intent.INIT" /> 117 118 <protected-broadcast android:name="android.bluetooth.intent.DISCOVERABLE_TIMEOUT" /> 119 <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" /> 120 <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" /> 121 <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" /> 122 <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" /> 123 <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" /> 124 <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" /> 125 <protected-broadcast android:name="android.bluetooth.device.action.UUID" /> 126 <protected-broadcast android:name="android.bluetooth.device.action.MAS_INSTANCE" /> 127 <protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" /> 128 <protected-broadcast android:name="android.bluetooth.device.action.FOUND" /> 129 <protected-broadcast android:name="android.bluetooth.device.action.DISAPPEARED" /> 130 <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" /> 131 <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" /> 132 <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" /> 133 <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" /> 134 <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" /> 135 <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" /> 136 <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" /> 137 <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" /> 138 <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" /> 139 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" /> 140 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" /> 141 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" /> 142 <protected-broadcast android:name="android.bluetooth.device.action.SDP_RECORD" /> 143 <protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" /> 144 <protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" /> 145 <protected-broadcast 146 android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" /> 147 <protected-broadcast 148 android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" /> 149 <protected-broadcast 150 android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" /> 151 <protected-broadcast 152 android:name="android.bluetooth.headsetclient.profile.action.CONNECTION_STATE_CHANGED" /> 153 <protected-broadcast 154 android:name="android.bluetooth.headsetclient.profile.action.AUDIO_STATE_CHANGED" /> 155 <protected-broadcast 156 android:name="android.bluetooth.headsetclient.profile.action.AG_EVENT" /> 157 <protected-broadcast 158 android:name="android.bluetooth.headsetclient.profile.action.AG_CALL_CHANGED" /> 159 <protected-broadcast 160 android:name="android.bluetooth.headsetclient.profile.action.RESULT" /> 161 <protected-broadcast 162 android:name="android.bluetooth.headsetclient.profile.action.LAST_VTAG" /> 163 <protected-broadcast 164 android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" /> 165 <protected-broadcast 166 android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" /> 167 <protected-broadcast 168 android:name="android.bluetooth.a2dp-sink.profile.action.CONNECTION_STATE_CHANGED" /> 169 <protected-broadcast 170 android:name="android.bluetooth.a2dp-sink.profile.action.PLAYING_STATE_CHANGED" /> 171 <protected-broadcast 172 android:name="android.bluetooth.a2dp-sink.profile.action.AUDIO_CONFIG_CHANGED" /> 173 <protected-broadcast 174 android:name="android.bluetooth.avrcp-controller.profile.action.CONNECTION_STATE_CHANGED" /> 175 <protected-broadcast 176 android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" /> 177 <protected-broadcast 178 android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" /> 179 <protected-broadcast 180 android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" /> 181 <protected-broadcast 182 android:name="android.bluetooth.map.profile.action.CONNECTION_STATE_CHANGED" /> 183 <protected-broadcast 184 android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" /> 185 <protected-broadcast android:name="android.bluetooth.pbap.intent.action.PBAP_STATE_CHANGED" /> 186 <protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" /> 187 <protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" /> 188 <protected-broadcast android:name="android.btopp.intent.action.LIST" /> 189 <protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" /> 190 <protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" /> 191 <protected-broadcast android:name="android.btopp.intent.action.CONFIRM" /> 192 <protected-broadcast android:name="android.btopp.intent.action.HIDE" /> 193 <protected-broadcast android:name="android.btopp.intent.action.RETRY" /> 194 <protected-broadcast android:name="android.btopp.intent.action.OPEN" /> 195 <protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" /> 196 <protected-broadcast android:name="android.btopp.intent.action.TRANSFER_COMPLETE" /> 197 <protected-broadcast android:name="com.android.bluetooth.gatt.REFRESH_BATCHED_SCAN" /> 198 <protected-broadcast android:name="com.android.bluetooth.pbap.authchall" /> 199 <protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" /> 200 <protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" /> 201 <protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" /> 202 203 <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" /> 204 205 <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" /> 206 <protected-broadcast android:name="android.hardware.usb.action.USB_PORT_CHANGED" /> 207 <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" /> 208 <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_DETACHED" /> 209 <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" /> 210 <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" /> 211 212 <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" /> 213 <protected-broadcast android:name="android.media.action.HDMI_AUDIO_PLUG" /> 214 215 <protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" /> 216 <protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" /> 217 <protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" /> 218 <protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" /> 219 <protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" /> 220 <protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" /> 221 <protected-broadcast android:name="android.media.MASTER_MONO_CHANGED_ACTION" /> 222 <protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" /> 223 <protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" /> 224 225 <protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" /> 226 <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" /> 227 <protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" /> 228 <protected-broadcast android:name="android.intent.action.MEDIA_NOFS" /> 229 <protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" /> 230 <protected-broadcast android:name="android.intent.action.MEDIA_SHARED" /> 231 <protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" /> 232 <protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" /> 233 <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" /> 234 <protected-broadcast android:name="android.intent.action.MEDIA_EJECT" /> 235 236 <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL" /> 237 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" /> 238 <!-- @deprecated. Only {@link android.net.ConnectivityManager.CONNECTIVITY_ACTION} is sent. --> 239 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" /> 240 <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" /> 241 <protected-broadcast android:name="android.net.conn.RESTRICT_BACKGROUND_CHANGED" /> 242 <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" /> 243 <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" /> 244 245 <protected-broadcast android:name="android.net.nsd.STATE_CHANGED" /> 246 247 <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" /> 248 <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" /> 249 <protected-broadcast android:name="com.android.nfc.action.LLCP_UP" /> 250 <protected-broadcast android:name="com.android.nfc.action.LLCP_DOWN" /> 251 <protected-broadcast android:name="com.android.nfc.cardemulation.action.CLOSE_TAP_DIALOG" /> 252 <protected-broadcast android:name="com.android.nfc.handover.action.ALLOW_CONNECT" /> 253 <protected-broadcast android:name="com.android.nfc.handover.action.DENY_CONNECT" /> 254 <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" /> 255 <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" /> 256 <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" /> 257 <!-- For NFC to BT handover --> 258 <protected-broadcast android:name="android.btopp.intent.action.WHITELIST_DEVICE" /> 259 <protected-broadcast android:name="android.btopp.intent.action.STOP_HANDOVER_TRANSFER" /> 260 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND" /> 261 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND_MULTIPLE" /> 262 263 <protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" /> 264 <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" /> 265 266 <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" /> 267 268 <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" /> 269 <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" /> 270 <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" /> 271 272 <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" /> 273 <protected-broadcast android:name="com.android.server.WifiManager.action.START_PNO" /> 274 <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" /> 275 <protected-broadcast android:name="com.android.server.WifiManager.action.DEVICE_IDLE" /> 276 <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_ACCEPTED" /> 277 <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_DECLINED" /> 278 <protected-broadcast android:name="com.android.server.usb.ACTION_OPEN_IN_APPS" /> 279 <protected-broadcast android:name="com.android.server.am.DELETE_DUMPHEAP" /> 280 <protected-broadcast android:name="com.android.server.net.action.SNOOZE_WARNING" /> 281 <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" /> 282 <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" /> 283 <protected-broadcast android:name="android.net.wifi.WIFI_CREDENTIAL_CHANGED" /> 284 <protected-broadcast android:name="android.net.wifi.WIFI_SCAN_AVAILABLE" /> 285 <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" /> 286 <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" /> 287 <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" /> 288 <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" /> 289 <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" /> 290 <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" /> 291 <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" /> 292 <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" /> 293 <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" /> 294 <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" /> 295 <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" /> 296 <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" /> 297 <protected-broadcast android:name="android.net.wifi.p2p.PERSISTENT_GROUPS_CHANGED" /> 298 <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" /> 299 <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" /> 300 <protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" /> 301 <protected-broadcast 302 android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" /> 303 <protected-broadcast android:name="android.net.scoring.SCORE_NETWORKS" /> 304 <protected-broadcast android:name="android.net.scoring.SCORER_CHANGED" /> 305 <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" /> 306 <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" /> 307 <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" /> 308 <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" /> 309 <protected-broadcast android:name="android.intent.action.APPLICATION_RESTRICTIONS_CHANGED" /> 310 311 <!-- Legacy --> 312 <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" /> 313 <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" /> 314 315 <protected-broadcast android:name="com.android.server.ACTION_TRIGGER_IDLE" /> 316 317 <protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" /> 318 319 <protected-broadcast android:name="android.intent.action.PHONE_STATE" /> 320 321 <protected-broadcast android:name="android.intent.action.SUB_DEFAULT_CHANGED" /> 322 323 <protected-broadcast android:name="android.location.GPS_ENABLED_CHANGE" /> 324 <protected-broadcast android:name="android.location.PROVIDERS_CHANGED" /> 325 <protected-broadcast android:name="android.location.MODE_CHANGED" /> 326 <protected-broadcast android:name="android.location.GPS_FIX_CHANGE" /> 327 <protected-broadcast android:name="android.net.proxy.PAC_REFRESH" /> 328 329 <protected-broadcast android:name="android.telecom.action.DEFAULT_DIALER_CHANGED" /> 330 <protected-broadcast android:name="android.provider.action.DEFAULT_SMS_PACKAGE_CHANGED" /> 331 <protected-broadcast android:name="android.intent.action.CONTENT_CHANGED" /> 332 <protected-broadcast android:name="android.provider.Telephony.MMS_DOWNLOADED" /> 333 334 <protected-broadcast 335 android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" /> 336 337 <!-- Defined in RestrictionsManager --> 338 <protected-broadcast 339 android:name="android.intent.action.PERMISSION_RESPONSE_RECEIVED" /> 340 <!-- Defined in RestrictionsManager --> 341 342 <protected-broadcast android:name="android.intent.action.REQUEST_PERMISSION" /> 343 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_STARTED" /> 344 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" /> 345 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_PROGRESS" /> 346 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" /> 347 348 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_SUBSCRIPTION_CHANGED" /> 349 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_SMS_SUBSCRIPTION_CHANGED" /> 350 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_DATA_SUBSCRIPTION_CHANGED" /> 351 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_VOICE_SUBSCRIPTION_CHANGED" /> 352 <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_CONTENT_CHANGE" /> 353 <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_RECORD_UPDATED" /> 354 355 <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_DONE" /> 356 <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_FAILED" /> 357 358 <protected-broadcast android:name="android.internal.policy.action.BURN_IN_PROTECTION" /> 359 <protected-broadcast android:name="android.app.action.SYSTEM_UPDATE_POLICY_CHANGED" /> 360 <protected-broadcast android:name="android.app.action.DEVICE_OWNER_CHANGED" /> 361 362 <!-- Added in N --> 363 <protected-broadcast android:name="android.intent.action.ANR" /> 364 <protected-broadcast android:name="android.intent.action.CALL" /> 365 <protected-broadcast android:name="android.intent.action.CALL_PRIVILEGED" /> 366 <protected-broadcast android:name="android.intent.action.DROPBOX_ENTRY_ADDED" /> 367 <protected-broadcast android:name="android.intent.action.INPUT_METHOD_CHANGED" /> 368 <protected-broadcast android:name="android.intent.action.internal_sim_state_changed" /> 369 <protected-broadcast android:name="android.intent.action.LOCKED_BOOT_COMPLETED" /> 370 <protected-broadcast android:name="android.intent.action.PRECISE_CALL_STATE" /> 371 <protected-broadcast android:name="android.intent.action.PRECISE_DATA_CONNECTION_STATE_CHANGED" /> 372 <protected-broadcast android:name="android.intent.action.SUBSCRIPTION_PHONE_STATE" /> 373 <protected-broadcast android:name="android.intent.action.USER_INFO_CHANGED" /> 374 <protected-broadcast android:name="android.intent.action.USER_UNLOCKED" /> 375 <protected-broadcast android:name="android.intent.action.WALLPAPER_CHANGED" /> 376 377 <protected-broadcast android:name="android.app.action.DEVICE_POLICY_MANAGER_STATE_CHANGED" /> 378 <protected-broadcast android:name="android.app.action.CHOOSE_PRIVATE_KEY_ALIAS" /> 379 <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLED" /> 380 <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLE_REQUESTED" /> 381 <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_ENABLED" /> 382 <protected-broadcast android:name="android.app.action.LOCK_TASK_ENTERING" /> 383 <protected-broadcast android:name="android.app.action.LOCK_TASK_EXITING" /> 384 <protected-broadcast android:name="android.app.action.NOTIFY_PENDING_SYSTEM_UPDATE" /> 385 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_CHANGED" /> 386 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_EXPIRING" /> 387 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_FAILED" /> 388 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_SUCCEEDED" /> 389 <protected-broadcast android:name="com.android.server.ACTION_EXPIRED_PASSWORD_NOTIFICATION" /> 390 391 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_ADDED" /> 392 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNLOCKED" /> 393 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_REMOVED" /> 394 395 <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_STATE_CHANGED" /> 396 <protected-broadcast android:name="com.android.bluetooth.map.USER_CONFIRM_TIMEOUT" /> 397 <protected-broadcast android:name="android.content.jobscheduler.JOB_DELAY_EXPIRED" /> 398 <protected-broadcast android:name="android.content.syncmanager.SYNC_ALARM" /> 399 <protected-broadcast android:name="android.media.INTERNAL_RINGER_MODE_CHANGED_ACTION" /> 400 <protected-broadcast android:name="android.media.STREAM_DEVICES_CHANGED_ACTION" /> 401 <protected-broadcast android:name="android.media.STREAM_MUTE_CHANGED_ACTION" /> 402 <protected-broadcast android:name="android.net.sip.SIP_SERVICE_UP" /> 403 <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" /> 404 <protected-broadcast android:name="android.os.action.CHARGING" /> 405 <protected-broadcast android:name="android.os.action.DISCHARGING" /> 406 <protected-broadcast android:name="android.search.action.SEARCHABLES_CHANGED" /> 407 <protected-broadcast android:name="android.security.STORAGE_CHANGED" /> 408 <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_REGISTERED" /> 409 <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_UNREGISTERED" /> 410 <protected-broadcast android:name="android.telecom.action.SHOW_MISSED_CALLS_NOTIFICATION" /> 411 <protected-broadcast android:name="android.telephony.action.CARRIER_CONFIG_CHANGED" /> 412 413 <protected-broadcast android:name="com.android.bluetooth.btservice.action.ALARM_WAKEUP" /> 414 <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_POLL" /> 415 <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_UPDATED" /> 416 <protected-broadcast android:name="com.android.server.NetworkTimeUpdateService.action.POLL" /> 417 <protected-broadcast android:name="com.android.server.telecom.intent.action.CALLS_ADD_ENTRY" /> 418 <protected-broadcast android:name="com.android.settings.location.MODE_CHANGING" /> 419 420 <protected-broadcast android:name="ScheduleConditionProvider.EVALUATE" /> 421 <protected-broadcast android:name="EventConditionProvider.EVALUATE" /> 422 <protected-broadcast android:name="wifi_scan_available" /> 423 424 <protected-broadcast android:name="action.cne.started" /> 425 <protected-broadcast android:name="android.content.jobscheduler.JOB_DEADLINE_EXPIRED" /> 426 <protected-broadcast android:name="android.intent.action.ACTION_UNSOL_RESPONSE_OEM_HOOK_RAW" /> 427 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_SUPL" /> 428 <protected-broadcast android:name="android.os.action.ACTION_EFFECTS_SUPPRESSOR_CHANGED" /> 429 <protected-broadcast android:name="android.os.action.LIGHT_DEVICE_IDLE_MODE_CHANGED" /> 430 <protected-broadcast android:name="android.os.storage.action.VOLUME_STATE_CHANGED" /> 431 <protected-broadcast android:name="android.os.storage.action.DISK_SCANNED" /> 432 <protected-broadcast android:name="com.android.server.action.UPDATE_TWILIGHT_STATE" /> 433 <protected-broadcast android:name="com.android.server.action.RESET_TWILIGHT_AUTO" /> 434 <protected-broadcast android:name="com.android.server.device_idle.STEP_IDLE_STATE" /> 435 <protected-broadcast android:name="com.android.server.device_idle.STEP_LIGHT_IDLE_STATE" /> 436 <protected-broadcast android:name="com.android.server.Wifi.action.TOGGLE_PNO" /> 437 <protected-broadcast android:name="intent.action.ACTION_RF_BAND_INFO" /> 438 <protected-broadcast android:name="android.intent.action.MEDIA_RESOURCE_GRANTED" /> 439 <protected-broadcast android:name="android.app.action.SECURITY_LOGS_AVAILABLE" /> 440 441 <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED" /> 442 <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED_INTERNAL" /> 443 <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_CHANGED" /> 444 <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_ACCESS_GRANTED_CHANGED" /> 445 <protected-broadcast android:name="android.os.action.ACTION_EFFECTS_SUPPRESSOR_CHANGED" /> 446 447 <protected-broadcast android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS" /> 448 <protected-broadcast android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS" /> 449 450 <protected-broadcast android:name="android.intent.action.DYNAMIC_SENSOR_CHANGED" /> 451 452 <protected-broadcast android:name="android.intent.action.ACTION_RADIO_OFF" /> 453 454 <protected-broadcast android:name="android.accounts.LOGIN_ACCOUNTS_CHANGED" /> 455 <protected-broadcast android:name="com.android.sync.SYNC_CONN_STATUS_CHANGED" /> 456 457 <protected-broadcast android:name="com.android.phone.SIP_INCOMING_CALL" /> 458 <protected-broadcast android:name="com.android.phone.SIP_ADD_PHONE" /> 459 <protected-broadcast android:name="com.android.phone.SIP_REMOVE_PHONE" /> 460 <protected-broadcast android:name="com.android.phone.SIP_CALL_OPTION_CHANGED" /> 461 462 <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_CONNECTED" /> 463 <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_DISCONNECTED" /> 464 465 <protected-broadcast android:name="android.bluetooth.input.profile.action.HANDSHAKE" /> 466 <protected-broadcast android:name="android.bluetooth.input.profile.action.REPORT" /> 467 468 <protected-broadcast android:name="android.intent.action.TWILIGHT_CHANGED" /> 469 470 <protected-broadcast android:name="com.android.server.fingerprint.ACTION_LOCKOUT_RESET" /> 471 <protected-broadcast android:name="android.net.wifi.PASSPOINT_ICON_RECEIVED" /> 472 <protected-broadcast android:name="com.android.server.notification.CountdownConditionProvider" /> 473 474 <protected-broadcast android:name="com.android.internal.location.ALARM_WAKEUP" /> 475 <protected-broadcast android:name="com.android.internal.location.ALARM_TIMEOUT" /> 476 <protected-broadcast android:name="android.intent.action.GLOBAL_BUTTON" /> 477 478 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_AVAILABLE" /> 479 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNAVAILABLE" /> 480 <protected-broadcast android:name="com.android.server.pm.DISABLE_QUIET_MODE_AFTER_UNLOCK" /> 481 482 <protected-broadcast android:name="com.android.server.retaildemo.ACTION_RESET_DEMO" /> 483 484 <!-- ====================================================================== --> 485 <!-- RUNTIME PERMISSIONS --> 486 <!-- ====================================================================== --> 487 <eat-comment /> 488 489 <!-- ====================================================================== --> 490 <!-- Permissions for accessing user's contacts including personal profile --> 491 <!-- ====================================================================== --> 492 <eat-comment /> 493 494 <!-- Used for runtime permissions related to contacts and profiles on this 495 device. --> 496 <permission-group android:name="android.permission-group.CONTACTS" 497 android:icon="@drawable/perm_group_contacts" 498 android:label="@string/permgrouplab_contacts" 499 android:description="@string/permgroupdesc_contacts" 500 android:priority="100" /> 501 502 <!-- Allows an application to read the user's contacts data. 503 <p>Protection level: dangerous 504 --> 505 <permission android:name="android.permission.READ_CONTACTS" 506 android:permissionGroup="android.permission-group.CONTACTS" 507 android:label="@string/permlab_readContacts" 508 android:description="@string/permdesc_readContacts" 509 android:protectionLevel="dangerous" /> 510 511 <!-- Allows an application to write the user's contacts data. 512 <p>Protection level: dangerous 513 --> 514 <permission android:name="android.permission.WRITE_CONTACTS" 515 android:permissionGroup="android.permission-group.CONTACTS" 516 android:label="@string/permlab_writeContacts" 517 android:description="@string/permdesc_writeContacts" 518 android:protectionLevel="dangerous" /> 519 520 <!-- ====================================================================== --> 521 <!-- Permissions for accessing user's calendar --> 522 <!-- ====================================================================== --> 523 <eat-comment /> 524 525 <!-- Used for runtime permissions related to user's calendar. --> 526 <permission-group android:name="android.permission-group.CALENDAR" 527 android:icon="@drawable/perm_group_calendar" 528 android:label="@string/permgrouplab_calendar" 529 android:description="@string/permgroupdesc_calendar" 530 android:priority="200" /> 531 532 <!-- Allows an application to read the user's calendar data. 533 <p>Protection level: dangerous 534 --> 535 <permission android:name="android.permission.READ_CALENDAR" 536 android:permissionGroup="android.permission-group.CALENDAR" 537 android:label="@string/permlab_readCalendar" 538 android:description="@string/permdesc_readCalendar" 539 android:protectionLevel="dangerous" /> 540 541 <!-- Allows an application to write the user's calendar data. 542 <p>Protection level: dangerous 543 --> 544 <permission android:name="android.permission.WRITE_CALENDAR" 545 android:permissionGroup="android.permission-group.CALENDAR" 546 android:label="@string/permlab_writeCalendar" 547 android:description="@string/permdesc_writeCalendar" 548 android:protectionLevel="dangerous" /> 549 550 <!-- ====================================================================== --> 551 <!-- Permissions for accessing and modifying user's SMS messages --> 552 <!-- ====================================================================== --> 553 <eat-comment /> 554 555 <!-- Used for runtime permissions related to user's SMS messages. --> 556 <permission-group android:name="android.permission-group.SMS" 557 android:icon="@drawable/perm_group_sms" 558 android:label="@string/permgrouplab_sms" 559 android:description="@string/permgroupdesc_sms" 560 android:priority="300" /> 561 562 <!-- Allows an application to send SMS messages. 563 <p>Protection level: dangerous 564 --> 565 <permission android:name="android.permission.SEND_SMS" 566 android:permissionGroup="android.permission-group.SMS" 567 android:label="@string/permlab_sendSms" 568 android:description="@string/permdesc_sendSms" 569 android:permissionFlags="costsMoney" 570 android:protectionLevel="dangerous" /> 571 572 <!-- Allows an application to receive SMS messages. 573 <p>Protection level: dangerous 574 --> 575 <permission android:name="android.permission.RECEIVE_SMS" 576 android:permissionGroup="android.permission-group.SMS" 577 android:label="@string/permlab_receiveSms" 578 android:description="@string/permdesc_receiveSms" 579 android:protectionLevel="dangerous"/> 580 581 <!-- Allows an application to read SMS messages. 582 <p>Protection level: dangerous 583 --> 584 <permission android:name="android.permission.READ_SMS" 585 android:permissionGroup="android.permission-group.SMS" 586 android:label="@string/permlab_readSms" 587 android:description="@string/permdesc_readSms" 588 android:protectionLevel="dangerous" /> 589 590 <!-- Allows an application to receive WAP push messages. 591 <p>Protection level: dangerous 592 --> 593 <permission android:name="android.permission.RECEIVE_WAP_PUSH" 594 android:permissionGroup="android.permission-group.SMS" 595 android:label="@string/permlab_receiveWapPush" 596 android:description="@string/permdesc_receiveWapPush" 597 android:protectionLevel="dangerous" /> 598 599 <!-- Allows an application to monitor incoming MMS messages. 600 <p>Protection level: dangerous 601 --> 602 <permission android:name="android.permission.RECEIVE_MMS" 603 android:permissionGroup="android.permission-group.SMS" 604 android:label="@string/permlab_receiveMms" 605 android:description="@string/permdesc_receiveMms" 606 android:protectionLevel="dangerous" /> 607 608 <!-- Allows an application to read previously received cell broadcast 609 messages and to register a content observer to get notifications when 610 a cell broadcast has been received and added to the database. For 611 emergency alerts, the database is updated immediately after the 612 alert dialog and notification sound/vibration/speech are presented. 613 The "read" column is then updated after the user dismisses the alert. 614 This enables supplementary emergency assistance apps to start loading 615 additional emergency information (if Internet access is available) 616 when the alert is first received, and to delay presenting the info 617 to the user until after the initial alert dialog is dismissed. 618 <p>Protection level: dangerous 619 @hide Pending API council approval --> 620 <permission android:name="android.permission.READ_CELL_BROADCASTS" 621 android:permissionGroup="android.permission-group.SMS" 622 android:label="@string/permlab_readCellBroadcasts" 623 android:description="@string/permdesc_readCellBroadcasts" 624 android:protectionLevel="dangerous" /> 625 626 <!-- ====================================================================== --> 627 <!-- Permissions for accessing external storage --> 628 <!-- ====================================================================== --> 629 <eat-comment /> 630 631 <!-- Used for runtime permissions related to the shared external storage. --> 632 <permission-group android:name="android.permission-group.STORAGE" 633 android:icon="@drawable/perm_group_storage" 634 android:label="@string/permgrouplab_storage" 635 android:description="@string/permgroupdesc_storage" 636 android:priority="900" /> 637 638 <!-- Allows an application to read from external storage. 639 <p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly 640 granted this permission.</p> 641 <p>This permission is enforced starting in API level 19. Before API level 19, this 642 permission is not enforced and all apps still have access to read from external storage. 643 You can test your app with the permission enforced by enabling <em>Protect USB 644 storage</em> under Developer options in the Settings app on a device running Android 4.1 or 645 higher.</p> 646 <p>Also starting in API level 19, this permission is <em>not</em> required to 647 read/write files in your application-specific directories returned by 648 {@link android.content.Context#getExternalFilesDir} and 649 {@link android.content.Context#getExternalCacheDir}. 650 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 651 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 652 minSdkVersion}</a> and <a 653 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 654 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 655 grants your app this permission. If you don't need this permission, be sure your <a 656 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 657 targetSdkVersion}</a> is 4 or higher. 658 <p>Protection level: dangerous 659 --> 660 <permission android:name="android.permission.READ_EXTERNAL_STORAGE" 661 android:permissionGroup="android.permission-group.STORAGE" 662 android:label="@string/permlab_sdcardRead" 663 android:description="@string/permdesc_sdcardRead" 664 android:protectionLevel="dangerous" /> 665 666 <!-- Allows an application to write to external storage. 667 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 668 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 669 minSdkVersion}</a> and <a 670 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 671 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 672 grants your app this permission. If you don't need this permission, be sure your <a 673 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 674 targetSdkVersion}</a> is 4 or higher. 675 <p>Starting in API level 19, this permission is <em>not</em> required to 676 read/write files in your application-specific directories returned by 677 {@link android.content.Context#getExternalFilesDir} and 678 {@link android.content.Context#getExternalCacheDir}. 679 <p>Protection level: dangerous 680 --> 681 <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE" 682 android:permissionGroup="android.permission-group.STORAGE" 683 android:label="@string/permlab_sdcardWrite" 684 android:description="@string/permdesc_sdcardWrite" 685 android:protectionLevel="dangerous" /> 686 687 <!-- ====================================================================== --> 688 <!-- Permissions for accessing the device location --> 689 <!-- ====================================================================== --> 690 <eat-comment /> 691 692 <!-- Used for permissions that allow accessing the device location. --> 693 <permission-group android:name="android.permission-group.LOCATION" 694 android:icon="@drawable/perm_group_location" 695 android:label="@string/permgrouplab_location" 696 android:description="@string/permgroupdesc_location" 697 android:priority="400" /> 698 699 <!-- Allows an app to access precise location. 700 <p>Protection level: dangerous 701 --> 702 <permission android:name="android.permission.ACCESS_FINE_LOCATION" 703 android:permissionGroup="android.permission-group.LOCATION" 704 android:label="@string/permlab_accessFineLocation" 705 android:description="@string/permdesc_accessFineLocation" 706 android:protectionLevel="dangerous" /> 707 708 <!-- Allows an app to access approximate location. 709 <p>Protection level: dangerous 710 --> 711 <permission android:name="android.permission.ACCESS_COARSE_LOCATION" 712 android:permissionGroup="android.permission-group.LOCATION" 713 android:label="@string/permlab_accessCoarseLocation" 714 android:description="@string/permdesc_accessCoarseLocation" 715 android:protectionLevel="dangerous" /> 716 717 <!-- ====================================================================== --> 718 <!-- Permissions for accessing the device telephony --> 719 <!-- ====================================================================== --> 720 <eat-comment /> 721 722 <!-- Used for permissions that are associated telephony features. --> 723 <permission-group android:name="android.permission-group.PHONE" 724 android:icon="@drawable/perm_group_phone_calls" 725 android:label="@string/permgrouplab_phone" 726 android:description="@string/permgroupdesc_phone" 727 android:priority="500" /> 728 729 <!-- Allows read only access to phone state, including the phone number of the device, 730 current cellular network information, the status of any ongoing calls, and a list of any 731 {@link android.telecom.PhoneAccount}s registered on the device. 732 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 733 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 734 minSdkVersion}</a> and <a 735 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 736 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 737 grants your app this permission. If you don't need this permission, be sure your <a 738 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 739 targetSdkVersion}</a> is 4 or higher. 740 <p>Protection level: dangerous 741 --> 742 <permission android:name="android.permission.READ_PHONE_STATE" 743 android:permissionGroup="android.permission-group.PHONE" 744 android:label="@string/permlab_readPhoneState" 745 android:description="@string/permdesc_readPhoneState" 746 android:protectionLevel="dangerous" /> 747 748 <!-- Allows an application to initiate a phone call without going through 749 the Dialer user interface for the user to confirm the call. 750 <p>Protection level: dangerous 751 --> 752 <permission android:name="android.permission.CALL_PHONE" 753 android:permissionGroup="android.permission-group.PHONE" 754 android:permissionFlags="costsMoney" 755 android:label="@string/permlab_callPhone" 756 android:description="@string/permdesc_callPhone" 757 android:protectionLevel="dangerous" /> 758 759 <!-- Allows an application to access the IMS call service: making and 760 modifying a call 761 <p>Protection level: signature|privileged 762 @hide 763 --> 764 <permission android:name="android.permission.ACCESS_IMS_CALL_SERVICE" 765 android:permissionGroup="android.permission-group.PHONE" 766 android:label="@string/permlab_accessImsCallService" 767 android:description="@string/permdesc_accessImsCallService" 768 android:protectionLevel="signature|privileged" /> 769 770 <!-- Allows an application to read the user's call log. 771 <p class="note"><strong>Note:</strong> If your app uses the 772 {@link #READ_CONTACTS} permission and <em>both</em> your <a 773 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 774 minSdkVersion}</a> and <a 775 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 776 targetSdkVersion}</a> values are set to 15 or lower, the system implicitly 777 grants your app this permission. If you don't need this permission, be sure your <a 778 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 779 targetSdkVersion}</a> is 16 or higher.</p> 780 <p>Protection level: dangerous 781 --> 782 <permission android:name="android.permission.READ_CALL_LOG" 783 android:permissionGroup="android.permission-group.PHONE" 784 android:label="@string/permlab_readCallLog" 785 android:description="@string/permdesc_readCallLog" 786 android:protectionLevel="dangerous" /> 787 788 <!-- Allows an application to write (but not read) the user's 789 call log data. 790 <p class="note"><strong>Note:</strong> If your app uses the 791 {@link #WRITE_CONTACTS} permission and <em>both</em> your <a 792 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 793 minSdkVersion}</a> and <a 794 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 795 targetSdkVersion}</a> values are set to 15 or lower, the system implicitly 796 grants your app this permission. If you don't need this permission, be sure your <a 797 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 798 targetSdkVersion}</a> is 16 or higher.</p> 799 <p>Protection level: dangerous 800 --> 801 <permission android:name="android.permission.WRITE_CALL_LOG" 802 android:permissionGroup="android.permission-group.PHONE" 803 android:label="@string/permlab_writeCallLog" 804 android:description="@string/permdesc_writeCallLog" 805 android:protectionLevel="dangerous" /> 806 807 <!-- Allows an application to add voicemails into the system. 808 <p>Protection level: dangerous 809 --> 810 <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL" 811 android:permissionGroup="android.permission-group.PHONE" 812 android:label="@string/permlab_addVoicemail" 813 android:description="@string/permdesc_addVoicemail" 814 android:protectionLevel="dangerous" /> 815 816 <!-- Allows an application to use SIP service. 817 <p>Protection level: dangerous 818 --> 819 <permission android:name="android.permission.USE_SIP" 820 android:permissionGroup="android.permission-group.PHONE" 821 android:description="@string/permdesc_use_sip" 822 android:label="@string/permlab_use_sip" 823 android:protectionLevel="dangerous"/> 824 825 <!-- Allows an application to see the number being dialed during an outgoing 826 call with the option to redirect the call to a different number or 827 abort the call altogether. 828 <p>Protection level: dangerous 829 --> 830 <permission android:name="android.permission.PROCESS_OUTGOING_CALLS" 831 android:permissionGroup="android.permission-group.PHONE" 832 android:label="@string/permlab_processOutgoingCalls" 833 android:description="@string/permdesc_processOutgoingCalls" 834 android:protectionLevel="dangerous" /> 835 836 <!-- ====================================================================== --> 837 <!-- Permissions for accessing the device microphone --> 838 <!-- ====================================================================== --> 839 <eat-comment /> 840 841 <!-- Used for permissions that are associated with accessing 842 microphone audio from the device. Note that phone calls also capture audio 843 but are in a separate (more visible) permission group. --> 844 <permission-group android:name="android.permission-group.MICROPHONE" 845 android:icon="@drawable/perm_group_microphone" 846 android:label="@string/permgrouplab_microphone" 847 android:description="@string/permgroupdesc_microphone" 848 android:priority="600" /> 849 850 <!-- Allows an application to record audio. 851 <p>Protection level: dangerous 852 --> 853 <permission android:name="android.permission.RECORD_AUDIO" 854 android:permissionGroup="android.permission-group.MICROPHONE" 855 android:label="@string/permlab_recordAudio" 856 android:description="@string/permdesc_recordAudio" 857 android:protectionLevel="dangerous"/> 858 859 <!-- ====================================================================== --> 860 <!-- Permissions for accessing the UCE Service --> 861 <!-- ====================================================================== --> 862 863 <!-- @hide Allows an application to Access UCE-Presence. 864 <p>Protection level: dangerous 865 --> 866 <permission android:name="android.permission.ACCESS_UCE_PRESENCE_SERVICE" 867 android:permissionGroup="android.permission-group.PHONE" 868 android:protectionLevel="signatureOrSystem"/> 869 870 <!-- @hide Allows an application to Access UCE-OPTIONS. 871 <p>Protection level: dangerous 872 --> 873 <permission android:name="android.permission.ACCESS_UCE_OPTIONS_SERVICE" 874 android:permissionGroup="android.permission-group.PHONE" 875 android:protectionLevel="signatureOrSystem"/> 876 877 878 879 <!-- ====================================================================== --> 880 <!-- Permissions for accessing the device camera --> 881 <!-- ====================================================================== --> 882 <eat-comment /> 883 884 <!-- Used for permissions that are associated with accessing 885 camera or capturing images/video from the device. --> 886 <permission-group android:name="android.permission-group.CAMERA" 887 android:icon="@drawable/perm_group_camera" 888 android:label="@string/permgrouplab_camera" 889 android:description="@string/permgroupdesc_camera" 890 android:priority="700" /> 891 892 <!-- Required to be able to access the camera device. 893 <p>This will automatically enforce the <a 894 href="{@docRoot}guide/topics/manifest/uses-feature-element.html"> 895 <uses-feature>}</a> manifest element for <em>all</em> camera features. 896 If you do not require all camera features or can properly operate if a camera 897 is not available, then you must modify your manifest as appropriate in order to 898 install on devices that don't support all camera features.</p> 899 <p>Protection level: dangerous 900 --> 901 <permission android:name="android.permission.CAMERA" 902 android:permissionGroup="android.permission-group.CAMERA" 903 android:label="@string/permlab_camera" 904 android:description="@string/permdesc_camera" 905 android:protectionLevel="dangerous" /> 906 907 908 <!-- ====================================================================== --> 909 <!-- Permissions for accessing the device sensors --> 910 <!-- ====================================================================== --> 911 <eat-comment /> 912 913 <!-- Used for permissions that are associated with accessing 914 camera or capturing images/video from the device. --> 915 <permission-group android:name="android.permission-group.SENSORS" 916 android:icon="@drawable/perm_group_sensors" 917 android:label="@string/permgrouplab_sensors" 918 android:description="@string/permgroupdesc_sensors" 919 android:priority="800" /> 920 921 <!-- Allows an application to access data from sensors that the user uses to 922 measure what is happening inside his/her body, such as heart rate. 923 <p>Protection level: dangerous --> 924 <permission android:name="android.permission.BODY_SENSORS" 925 android:permissionGroup="android.permission-group.SENSORS" 926 android:label="@string/permlab_bodySensors" 927 android:description="@string/permdesc_bodySensors" 928 android:protectionLevel="dangerous" /> 929 930 <!-- Allows an app to use fingerprint hardware. 931 <p>Protection level: normal 932 --> 933 <permission android:name="android.permission.USE_FINGERPRINT" 934 android:permissionGroup="android.permission-group.SENSORS" 935 android:label="@string/permlab_useFingerprint" 936 android:description="@string/permdesc_useFingerprint" 937 android:protectionLevel="normal" /> 938 939 <!-- ====================================================================== --> 940 <!-- REMOVED PERMISSIONS --> 941 <!-- ====================================================================== --> 942 943 <!-- @hide We need to keep this around for backwards compatibility --> 944 <permission android:name="android.permission.READ_PROFILE" 945 android:protectionLevel="normal" 946 android:permissionFlags="removed"/> 947 948 <!-- @hide We need to keep this around for backwards compatibility --> 949 <permission android:name="android.permission.WRITE_PROFILE" 950 android:protectionLevel="normal" 951 android:permissionFlags="removed"/> 952 953 <!-- @hide We need to keep this around for backwards compatibility --> 954 <permission android:name="android.permission.READ_SOCIAL_STREAM" 955 android:protectionLevel="normal" 956 android:permissionFlags="removed"/> 957 958 <!-- @hide We need to keep this around for backwards compatibility --> 959 <permission android:name="android.permission.WRITE_SOCIAL_STREAM" 960 android:protectionLevel="normal" 961 android:permissionFlags="removed"/> 962 963 <!-- @hide We need to keep this around for backwards compatibility --> 964 <permission android:name="android.permission.READ_USER_DICTIONARY" 965 android:protectionLevel="normal" 966 android:permissionFlags="removed"/> 967 968 <!-- @hide We need to keep this around for backwards compatibility --> 969 <permission android:name="android.permission.WRITE_USER_DICTIONARY" 970 android:protectionLevel="normal" 971 android:permissionFlags="removed"/> 972 973 <!-- @hide We need to keep this around for backwards compatibility --> 974 <permission android:name="android.permission.WRITE_SMS" 975 android:protectionLevel="normal" 976 android:permissionFlags="removed"/> 977 978 <!-- @hide We need to keep this around for backwards compatibility --> 979 <permission android:name="com.android.browser.permission.READ_HISTORY_BOOKMARKS" 980 android:protectionLevel="normal" 981 android:permissionFlags="removed"/> 982 983 <!-- @hide We need to keep this around for backwards compatibility --> 984 <permission android:name="com.android.browser.permission.WRITE_HISTORY_BOOKMARKS" 985 android:protectionLevel="normal" 986 android:permissionFlags="removed"/> 987 988 <!-- @hide We need to keep this around for backwards compatibility --> 989 <permission android:name="android.permission.AUTHENTICATE_ACCOUNTS" 990 android:protectionLevel="normal" 991 android:permissionFlags="removed"/> 992 993 <!-- @hide We need to keep this around for backwards compatibility --> 994 <permission android:name="android.permission.MANAGE_ACCOUNTS" 995 android:protectionLevel="normal" 996 android:permissionFlags="removed"/> 997 998 <!-- @hide We need to keep this around for backwards compatibility --> 999 <permission android:name="android.permission.USE_CREDENTIALS" 1000 android:protectionLevel="normal" 1001 android:permissionFlags="removed"/> 1002 1003 <!-- @hide We need to keep this around for backwards compatibility --> 1004 <permission android:name="android.permission.SUBSCRIBED_FEEDS_READ" 1005 android:protectionLevel="normal" 1006 android:permissionFlags="removed"/> 1007 1008 <!-- @hide We need to keep this around for backwards compatibility --> 1009 <permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE" 1010 android:protectionLevel="normal" 1011 android:permissionFlags="removed"/> 1012 1013 <!-- @hide We need to keep this around for backwards compatibility --> 1014 <permission android:name="android.permission.FLASHLIGHT" 1015 android:protectionLevel="normal" 1016 android:permissionFlags="removed"/> 1017 1018 <!-- ====================================================================== --> 1019 <!-- INSTALL PERMISSIONS --> 1020 <!-- ====================================================================== --> 1021 1022 <!-- ================================== --> 1023 <!-- Permissions for accessing messages --> 1024 <!-- ================================== --> 1025 <eat-comment /> 1026 1027 <!-- @SystemApi Allows an application (Phone) to send a request to other applications 1028 to handle the respond-via-message action during incoming calls. 1029 <p>Not for use by third-party applications. --> 1030 <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE" 1031 android:protectionLevel="signature|privileged" /> 1032 1033 <!-- @SystemApi Allows an application to send SMS to premium shortcodes without user permission. 1034 <p>Not for use by third-party applications. 1035 @hide --> 1036 <permission android:name="android.permission.SEND_SMS_NO_CONFIRMATION" 1037 android:protectionLevel="signature|privileged" /> 1038 1039 <!-- Allows an application to filter carrier specific sms. 1040 @hide --> 1041 <permission android:name="android.permission.CARRIER_FILTER_SMS" 1042 android:protectionLevel="signature|privileged" /> 1043 1044 <!-- @SystemApi Allows an application to receive emergency cell broadcast messages, 1045 to record or display them to the user. 1046 <p>Not for use by third-party applications. 1047 @hide --> 1048 <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST" 1049 android:protectionLevel="signature|privileged" /> 1050 1051 <!-- Allows an application to monitor incoming Bluetooth MAP messages, to record 1052 or perform processing on them. --> 1053 <!-- @hide --> 1054 <permission android:name="android.permission.RECEIVE_BLUETOOTH_MAP" 1055 android:protectionLevel="signature|privileged" /> 1056 1057 <!-- @SystemApi @hide Allows an application to execute contacts directory search. 1058 This should only be used by ContactsProvider. 1059 <p>Not for use by third-party applications. --> 1060 <permission android:name="android.permission.BIND_DIRECTORY_SEARCH" 1061 android:protectionLevel="signature|privileged" /> 1062 1063 <!-- @SystemApi @hide Allows an application to modify cell broadcasts through the content provider. 1064 <p>Not for use by third-party applications. --> 1065 <permission android:name="android.permission.MODIFY_CELL_BROADCASTS" 1066 android:protectionLevel="signature|privileged" /> 1067 1068 <!-- =============================================================== --> 1069 <!-- Permissions for setting the device alarm --> 1070 <!-- =============================================================== --> 1071 <eat-comment /> 1072 1073 <!-- Allows an application to broadcast an Intent to set an alarm for the user. 1074 <p>Protection level: normal 1075 --> 1076 <permission android:name="com.android.alarm.permission.SET_ALARM" 1077 android:label="@string/permlab_setAlarm" 1078 android:description="@string/permdesc_setAlarm" 1079 android:protectionLevel="normal" /> 1080 1081 <!-- =============================================================== --> 1082 <!-- Permissions for accessing the user voicemail --> 1083 <!-- =============================================================== --> 1084 <eat-comment /> 1085 1086 <!-- Allows an application to modify and remove existing voicemails in the system. 1087 <p>Protection level: signature|privileged 1088 --> 1089 <permission android:name="com.android.voicemail.permission.WRITE_VOICEMAIL" 1090 android:protectionLevel="signature|privileged" /> 1091 1092 <!-- Allows an application to read voicemails in the system. 1093 <p>Protection level: signature|privileged 1094 --> 1095 <permission android:name="com.android.voicemail.permission.READ_VOICEMAIL" 1096 android:protectionLevel="signature|privileged" /> 1097 1098 <!-- ======================================= --> 1099 <!-- Permissions for accessing location info --> 1100 <!-- ======================================= --> 1101 <eat-comment /> 1102 1103 <!-- Allows an application to access extra location provider commands. 1104 <p>Protection level: normal 1105 --> 1106 <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS" 1107 android:label="@string/permlab_accessLocationExtraCommands" 1108 android:description="@string/permdesc_accessLocationExtraCommands" 1109 android:protectionLevel="normal" /> 1110 1111 <!-- @SystemApi Allows an application to install a location provider into the Location Manager. 1112 <p>Not for use by third-party applications. --> 1113 <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER" 1114 android:protectionLevel="signature|privileged" /> 1115 1116 <!-- @SystemApi @hide Allows HDMI-CEC service to access device and configuration files. 1117 This should only be used by HDMI-CEC service. 1118 --> 1119 <permission android:name="android.permission.HDMI_CEC" 1120 android:protectionLevel="signature|privileged" /> 1121 1122 <!-- @SystemApi Allows an application to use location features in hardware, 1123 such as the geofencing api. 1124 <p>Not for use by third-party applications. --> 1125 <permission android:name="android.permission.LOCATION_HARDWARE" 1126 android:protectionLevel="signature|privileged" /> 1127 <uses-permission android:name="android.permission.LOCATION_HARDWARE"/> 1128 1129 <!-- @SystemApi Allows an application to create mock location providers for testing. 1130 <p>Protection level: signature 1131 @hide 1132 --> 1133 <permission android:name="android.permission.ACCESS_MOCK_LOCATION" 1134 android:protectionLevel="signature" /> 1135 1136 <!-- ======================================= --> 1137 <!-- Permissions for accessing networks --> 1138 <!-- ======================================= --> 1139 <eat-comment /> 1140 1141 <!-- Allows applications to open network sockets. 1142 <p>Protection level: normal 1143 --> 1144 <permission android:name="android.permission.INTERNET" 1145 android:description="@string/permdesc_createNetworkSockets" 1146 android:label="@string/permlab_createNetworkSockets" 1147 android:protectionLevel="normal" /> 1148 1149 <!-- Allows applications to access information about networks. 1150 <p>Protection level: normal 1151 --> 1152 <permission android:name="android.permission.ACCESS_NETWORK_STATE" 1153 android:description="@string/permdesc_accessNetworkState" 1154 android:label="@string/permlab_accessNetworkState" 1155 android:protectionLevel="normal" /> 1156 1157 <!-- Allows applications to access information about Wi-Fi networks. 1158 <p>Protection level: normal 1159 --> 1160 <permission android:name="android.permission.ACCESS_WIFI_STATE" 1161 android:description="@string/permdesc_accessWifiState" 1162 android:label="@string/permlab_accessWifiState" 1163 android:protectionLevel="normal" /> 1164 1165 <!-- Allows applications to change Wi-Fi connectivity state. 1166 <p>Protection level: normal 1167 --> 1168 <permission android:name="android.permission.CHANGE_WIFI_STATE" 1169 android:description="@string/permdesc_changeWifiState" 1170 android:label="@string/permlab_changeWifiState" 1171 android:protectionLevel="normal" /> 1172 1173 <!-- @SystemApi @hide Allows applications to read Wi-Fi credential. 1174 <p>Not for use by third-party applications. --> 1175 <permission android:name="android.permission.READ_WIFI_CREDENTIAL" 1176 android:protectionLevel="signature|privileged" /> 1177 1178 <!-- @SystemApi @hide Allows applications to change tether state and run 1179 tether carrier provisioning. 1180 <p>Not for use by third-party applications. --> 1181 <permission android:name="android.permission.TETHER_PRIVILEGED" 1182 android:protectionLevel="signature|privileged" /> 1183 1184 <!-- @SystemApi @hide Allow system apps to receive broadcast 1185 when a wifi network credential is changed. 1186 <p>Not for use by third-party applications. --> 1187 <permission android:name="android.permission.RECEIVE_WIFI_CREDENTIAL_CHANGE" 1188 android:protectionLevel="signature|privileged" /> 1189 1190 <!-- @SystemApi @hide Allows an application to modify any wifi configuration, even if created 1191 by another application. Once reconfigured the original creator cannot make any further 1192 modifications. 1193 <p>Not for use by third-party applications. --> 1194 <permission android:name="android.permission.OVERRIDE_WIFI_CONFIG" 1195 android:protectionLevel="signature|privileged" /> 1196 1197 <!-- @hide --> 1198 <permission android:name="android.permission.ACCESS_WIMAX_STATE" 1199 android:description="@string/permdesc_accessWimaxState" 1200 android:label="@string/permlab_accessWimaxState" 1201 android:protectionLevel="normal" /> 1202 1203 <!-- @hide --> 1204 <permission android:name="android.permission.CHANGE_WIMAX_STATE" 1205 android:description="@string/permdesc_changeWimaxState" 1206 android:label="@string/permlab_changeWimaxState" 1207 android:protectionLevel="normal" /> 1208 1209 <!-- Allows applications to act as network scorers. @hide @SystemApi--> 1210 <permission android:name="android.permission.SCORE_NETWORKS" 1211 android:protectionLevel="signature|privileged" /> 1212 1213 <!-- ======================================= --> 1214 <!-- Permissions for short range, peripheral networks --> 1215 <!-- ======================================= --> 1216 <eat-comment /> 1217 1218 <!-- Allows applications to connect to paired bluetooth devices. 1219 <p>Protection level: normal 1220 --> 1221 <permission android:name="android.permission.BLUETOOTH" 1222 android:description="@string/permdesc_bluetooth" 1223 android:label="@string/permlab_bluetooth" 1224 android:protectionLevel="normal" /> 1225 1226 <!-- Allows applications to discover and pair bluetooth devices. 1227 <p>Protection level: normal 1228 --> 1229 <permission android:name="android.permission.BLUETOOTH_ADMIN" 1230 android:description="@string/permdesc_bluetoothAdmin" 1231 android:label="@string/permlab_bluetoothAdmin" 1232 android:protectionLevel="normal" /> 1233 1234 <!-- @SystemApi Allows applications to pair bluetooth devices without user interaction, and to 1235 allow or disallow phonebook access or message access. 1236 This is not available to third party applications. --> 1237 <permission android:name="android.permission.BLUETOOTH_PRIVILEGED" 1238 android:protectionLevel="signature|privileged" /> 1239 1240 <!-- Control access to email providers exclusively for Bluetooth 1241 @hide 1242 --> 1243 <permission android:name="android.permission.BLUETOOTH_MAP" 1244 android:protectionLevel="signature" /> 1245 1246 <!-- Allows bluetooth stack to access files 1247 @hide This should only be used by Bluetooth apk. 1248 --> 1249 <permission android:name="android.permission.BLUETOOTH_STACK" 1250 android:protectionLevel="signature" /> 1251 1252 <!-- Allows applications to perform I/O operations over NFC. 1253 <p>Protection level: normal 1254 --> 1255 <permission android:name="android.permission.NFC" 1256 android:description="@string/permdesc_nfc" 1257 android:label="@string/permlab_nfc" 1258 android:protectionLevel="normal" /> 1259 1260 <!-- @SystemApi Allows an internal user to use privileged ConnectivityManager APIs. 1261 @hide --> 1262 <permission android:name="android.permission.CONNECTIVITY_INTERNAL" 1263 android:protectionLevel="signature|privileged" /> 1264 1265 <!-- Allows an internal user to use restricted Networks. 1266 @hide --> 1267 <permission android:name="android.permission.CONNECTIVITY_USE_RESTRICTED_NETWORKS" 1268 android:protectionLevel="signature|privileged" /> 1269 1270 <!-- Allows a system application to access hardware packet offload capabilities. 1271 @hide --> 1272 <permission android:name="android.permission.PACKET_KEEPALIVE_OFFLOAD" 1273 android:protectionLevel="signature|privileged" /> 1274 1275 <!-- @SystemApi 1276 @hide --> 1277 <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE" 1278 android:protectionLevel="signature|privileged" /> 1279 1280 <!-- @SystemApi Allows access to the loop radio (Android@Home mesh network) device. 1281 @hide --> 1282 <permission android:name="android.permission.LOOP_RADIO" 1283 android:protectionLevel="signature|privileged" /> 1284 1285 <!-- Allows sending and receiving handover transfer status from Wifi and Bluetooth 1286 @hide --> 1287 <permission android:name="android.permission.NFC_HANDOVER_STATUS" 1288 android:protectionLevel="signature|privileged" /> 1289 1290 <!-- ================================== --> 1291 <!-- Permissions for accessing accounts --> 1292 <!-- ================================== --> 1293 <eat-comment /> 1294 1295 <!-- Allows access to the list of accounts in the Accounts Service. 1296 1297 <p class="note"><strong>Note:</strong> Beginning with Android 6.0 (API level 1298 23), if an app shares the signature of the authenticator that manages an 1299 account, it does not need <code>"GET_ACCOUNTS"</code> permission to read 1300 information about that account. On Android 5.1 and lower, all apps need 1301 <code>"GET_ACCOUNTS"</code> permission to read information about any 1302 account.</p> 1303 1304 <p>Protection level: dangerous 1305 --> 1306 <permission android:name="android.permission.GET_ACCOUNTS" 1307 android:permissionGroup="android.permission-group.CONTACTS" 1308 android:protectionLevel="dangerous" 1309 android:description="@string/permdesc_getAccounts" 1310 android:label="@string/permlab_getAccounts" /> 1311 1312 <!-- @SystemApi Allows applications to call into AccountAuthenticators. 1313 <p>Not for use by third-party applications. --> 1314 <permission android:name="android.permission.ACCOUNT_MANAGER" 1315 android:protectionLevel="signature" /> 1316 1317 <!-- ================================== --> 1318 <!-- Permissions for accessing hardware that may effect battery life--> 1319 <!-- ================================== --> 1320 <eat-comment /> 1321 1322 <!-- Allows applications to enter Wi-Fi Multicast mode. 1323 <p>Protection level: normal 1324 --> 1325 <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE" 1326 android:description="@string/permdesc_changeWifiMulticastState" 1327 android:label="@string/permlab_changeWifiMulticastState" 1328 android:protectionLevel="normal" /> 1329 1330 <!-- Allows access to the vibrator. 1331 <p>Protection level: normal 1332 --> 1333 <permission android:name="android.permission.VIBRATE" 1334 android:label="@string/permlab_vibrate" 1335 android:description="@string/permdesc_vibrate" 1336 android:protectionLevel="normal" /> 1337 1338 <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen 1339 from dimming. 1340 <p>Protection level: normal 1341 --> 1342 <permission android:name="android.permission.WAKE_LOCK" 1343 android:label="@string/permlab_wakeLock" 1344 android:description="@string/permdesc_wakeLock" 1345 android:protectionLevel="normal" /> 1346 1347 <!-- Allows using the device's IR transmitter, if available. 1348 <p>Protection level: normal 1349 --> 1350 <permission android:name="android.permission.TRANSMIT_IR" 1351 android:label="@string/permlab_transmitIr" 1352 android:description="@string/permdesc_transmitIr" 1353 android:protectionLevel="normal" /> 1354 1355 <!-- ==================================================== --> 1356 <!-- Permissions related to changing audio settings --> 1357 <!-- ==================================================== --> 1358 <eat-comment /> 1359 1360 <!-- Allows an application to modify global audio settings. 1361 <p>Protection level: normal 1362 --> 1363 <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS" 1364 android:label="@string/permlab_modifyAudioSettings" 1365 android:description="@string/permdesc_modifyAudioSettings" 1366 android:protectionLevel="normal" /> 1367 1368 <!-- ================================== --> 1369 <!-- Permissions for accessing hardware --> 1370 <!-- ================================== --> 1371 <eat-comment /> 1372 1373 <!-- @SystemApi Allows an application to manage preferences and permissions for USB devices 1374 @hide --> 1375 <permission android:name="android.permission.MANAGE_USB" 1376 android:protectionLevel="signature|privileged" /> 1377 1378 <!-- @SystemApi Allows an application to access the MTP USB kernel driver. 1379 For use only by the device side MTP implementation. 1380 @hide --> 1381 <permission android:name="android.permission.ACCESS_MTP" 1382 android:protectionLevel="signature|privileged" /> 1383 1384 <!-- @SystemApi Allows access to hardware peripherals. Intended only for hardware testing. 1385 <p>Not for use by third-party applications. 1386 @hide 1387 --> 1388 <permission android:name="android.permission.HARDWARE_TEST" 1389 android:protectionLevel="signature" /> 1390 1391 <!-- @SystemApi Allows access to FM 1392 @hide This is not a third-party API (intended for system apps).--> 1393 <permission android:name="android.permission.ACCESS_FM_RADIO" 1394 android:protectionLevel="signature|privileged" /> 1395 1396 <!-- Allows access to configure network interfaces, configure/use IPSec, etc. 1397 @hide --> 1398 <permission android:name="android.permission.NET_ADMIN" 1399 android:protectionLevel="signature" /> 1400 1401 <!-- Allows registration for remote audio playback. @hide --> 1402 <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK" 1403 android:protectionLevel="signature" /> 1404 1405 <!-- @SystemApi Allows TvInputService to access underlying TV input hardware such as 1406 built-in tuners and HDMI-in's. 1407 @hide This should only be used by OEM's TvInputService's. 1408 --> 1409 <permission android:name="android.permission.TV_INPUT_HARDWARE" 1410 android:protectionLevel="signature|privileged" /> 1411 1412 <!-- @SystemApi Allows to capture a frame of TV input hardware such as 1413 built-in tuners and HDMI-in's. 1414 @hide <p>Not for use by third-party applications. 1415 --> 1416 <permission android:name="android.permission.CAPTURE_TV_INPUT" 1417 android:protectionLevel="signature|privileged" /> 1418 1419 <!-- @hide Allows TvInputService to access DVB device. 1420 <p>Not for use by third-party applications. --> 1421 <permission android:name="android.permission.DVB_DEVICE" 1422 android:protectionLevel="signature|privileged" /> 1423 1424 <!-- @SystemApi Allows reading the OEM unlock state 1425 @hide <p>Not for use by third-party applications. --> 1426 <permission android:name="android.permission.READ_OEM_UNLOCK_STATE" 1427 android:protectionLevel="signature|privileged" /> 1428 1429 <!-- @hide Allows enabling/disabling OEM unlock 1430 <p>Not for use by third-party applications. --> 1431 <permission android:name="android.permission.OEM_UNLOCK_STATE" 1432 android:protectionLevel="signature" /> 1433 1434 <!-- @hide Allows querying state of PersistentDataBlock 1435 <p>Not for use by third-party applications. --> 1436 <permission android:name="android.permission.ACCESS_PDB_STATE" 1437 android:protectionLevel="signature" /> 1438 1439 <!-- @hide Allows system update service to notify device owner about pending updates. 1440 <p>Not for use by third-party applications. --> 1441 <permission android:name="android.permission.NOTIFY_PENDING_SYSTEM_UPDATE" 1442 android:protectionLevel="signature|privileged" /> 1443 1444 <!-- =========================================== --> 1445 <!-- Permissions associated with camera and image capture --> 1446 <!-- =========================================== --> 1447 <eat-comment /> 1448 1449 <!-- @SystemApi Allows disabling the transmit-indicator LED that is normally on when 1450 a camera is in use by an application. 1451 @hide --> 1452 <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED" 1453 android:protectionLevel="signature|privileged" /> 1454 1455 <!-- Allows sending the camera service notifications about system-wide events. 1456 @hide --> 1457 <permission android:name="android.permission.CAMERA_SEND_SYSTEM_EVENTS" 1458 android:protectionLevel="signature|privileged" /> 1459 1460 <!-- =========================================== --> 1461 <!-- Permissions associated with telephony state --> 1462 <!-- =========================================== --> 1463 <eat-comment /> 1464 1465 <!-- @SystemApi Allows modification of the telephony state - power on, mmi, etc. 1466 Does not include placing calls. 1467 <p>Not for use by third-party applications. --> 1468 <permission android:name="android.permission.MODIFY_PHONE_STATE" 1469 android:protectionLevel="signature|privileged" /> 1470 1471 <!-- Allows read only access to precise phone state. 1472 @hide Pending API council approval --> 1473 <permission android:name="android.permission.READ_PRECISE_PHONE_STATE" 1474 android:protectionLevel="signature|privileged" /> 1475 1476 <!-- @SystemApi Allows read access to privileged phone state. 1477 @hide Used internally. --> 1478 <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE" 1479 android:protectionLevel="signature|privileged" /> 1480 1481 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1482 PhoneAccount#CAPABILITY_SIM_SUBSCRIPTION. This capability indicates that the PhoneAccount 1483 corresponds to a device SIM. 1484 @hide --> 1485 <permission android:name="android.permission.REGISTER_SIM_SUBSCRIPTION" 1486 android:protectionLevel="signature|privileged" /> 1487 1488 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1489 PhoneAccount#CAPABILITY_CALL_PROVIDER. 1490 @hide --> 1491 <permission android:name="android.permission.REGISTER_CALL_PROVIDER" 1492 android:protectionLevel="signature|privileged" /> 1493 1494 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1495 PhoneAccount#CAPABILITY_CONNECTION_MANAGER 1496 @hide --> 1497 <permission android:name="android.permission.REGISTER_CONNECTION_MANAGER" 1498 android:protectionLevel="signature|privileged" /> 1499 1500 <!-- Must be required by a {@link android.telecom.InCallService}, 1501 to ensure that only the system can bind to it. 1502 <p>Protection level: signature|privileged 1503 --> 1504 <permission android:name="android.permission.BIND_INCALL_SERVICE" 1505 android:protectionLevel="signature|privileged" /> 1506 1507 <!-- Must be required by a {@link android.telecom.CallScreeningService}, 1508 to ensure that only the system can bind to it. 1509 <p>Protection level: signature|privileged 1510 --> 1511 <permission android:name="android.permission.BIND_SCREENING_SERVICE" 1512 android:protectionLevel="signature|privileged" /> 1513 1514 <!-- Must be required by a {@link android.telecom.ConnectionService}, 1515 to ensure that only the system can bind to it. 1516 @deprecated {@link android.telecom.ConnectionService}s should require 1517 android.permission.BIND_TELECOM_CONNECTION_SERVICE instead. 1518 @SystemApi 1519 @hide --> 1520 <permission android:name="android.permission.BIND_CONNECTION_SERVICE" 1521 android:protectionLevel="signature|privileged" /> 1522 1523 <!-- Must be required by a {@link android.telecom.ConnectionService}, 1524 to ensure that only the system can bind to it. 1525 <p>Protection level: signature|privileged 1526 --> 1527 <permission android:name="android.permission.BIND_TELECOM_CONNECTION_SERVICE" 1528 android:protectionLevel="signature|privileged" /> 1529 1530 <!-- @SystemApi Allows an application to control the in-call experience. 1531 @hide --> 1532 <permission android:name="android.permission.CONTROL_INCALL_EXPERIENCE" 1533 android:protectionLevel="signature|privileged" /> 1534 1535 <!-- Allows an application to receive STK related commands. 1536 @hide --> 1537 <permission android:name="android.permission.RECEIVE_STK_COMMANDS" 1538 android:protectionLevel="signature|privileged" /> 1539 1540 <!-- ================================== --> 1541 <!-- Permissions for sdcard interaction --> 1542 <!-- ================================== --> 1543 <eat-comment /> 1544 1545 <!-- @SystemApi Allows an application to write to internal media storage 1546 @hide --> 1547 <permission android:name="android.permission.WRITE_MEDIA_STORAGE" 1548 android:protectionLevel="signature|privileged" /> 1549 1550 <!-- Allows an application to manage access to documents, usually as part 1551 of a document picker. 1552 <p>This permission should <em>only</em> be requested by the platform 1553 document management app. This permission cannot be granted to 1554 third-party apps. 1555 <p>Protection level: signature 1556 --> 1557 <permission android:name="android.permission.MANAGE_DOCUMENTS" 1558 android:protectionLevel="signature" /> 1559 1560 <!-- @hide Allows an application to cache content. 1561 <p>Not for use by third-party applications. 1562 <p>Protection level: signature 1563 --> 1564 <permission android:name="android.permission.CACHE_CONTENT" 1565 android:protectionLevel="signature" /> 1566 1567 <!-- ================================== --> 1568 <!-- Permissions for screenlock --> 1569 <!-- ================================== --> 1570 <eat-comment /> 1571 1572 <!-- Allows applications to disable the keyguard if it is not secure. 1573 <p>Protection level: normal 1574 --> 1575 <permission android:name="android.permission.DISABLE_KEYGUARD" 1576 android:description="@string/permdesc_disableKeyguard" 1577 android:label="@string/permlab_disableKeyguard" 1578 android:protectionLevel="normal" /> 1579 1580 <!-- ================================== --> 1581 <!-- Permissions to access other installed applications --> 1582 <!-- ================================== --> 1583 <eat-comment /> 1584 1585 <!-- @deprecated No longer enforced. --> 1586 <permission android:name="android.permission.GET_TASKS" 1587 android:label="@string/permlab_getTasks" 1588 android:description="@string/permdesc_getTasks" 1589 android:protectionLevel="normal" /> 1590 1591 <!-- New version of GET_TASKS that apps can request, since GET_TASKS doesn't really 1592 give access to task information. We need this new one because there are 1593 many existing apps that use add libraries and such that have validation 1594 code to ensure the app has requested the GET_TASKS permission by seeing 1595 if it has been granted the permission... if it hasn't, it kills the app 1596 with a message about being upset. So we need to have it continue to look 1597 like the app is getting that permission, even though it will never be 1598 checked, and new privileged apps can now request this one for real access. 1599 @hide 1600 @SystemApi --> 1601 <permission android:name="android.permission.REAL_GET_TASKS" 1602 android:protectionLevel="signature|privileged" /> 1603 1604 <!-- Allows an application to start a task from a ActivityManager#RecentTaskInfo. 1605 @hide --> 1606 <permission android:name="android.permission.START_TASKS_FROM_RECENTS" 1607 android:protectionLevel="signature|privileged" /> 1608 1609 <!-- @SystemApi @hide Allows an application to call APIs that allow it to do interactions 1610 across the users on the device, using singleton services and 1611 user-targeted broadcasts. This permission is not available to 1612 third party applications. --> 1613 <permission android:name="android.permission.INTERACT_ACROSS_USERS" 1614 android:protectionLevel="signature|privileged|development" /> 1615 1616 <!-- @SystemApi Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS} 1617 that removes restrictions on where broadcasts can be sent and allows other 1618 types of interactions 1619 @hide --> 1620 <permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL" 1621 android:protectionLevel="signature|installer" /> 1622 1623 <!-- @SystemApi @hide Allows an application to call APIs that allow it to query and manage 1624 users on the device. This permission is not available to 1625 third party applications. --> 1626 <permission android:name="android.permission.MANAGE_USERS" 1627 android:protectionLevel="signature|privileged" /> 1628 1629 <!-- @hide Allows an application to create, remove users and get the list of 1630 users on the device. Applications holding this permission can only create restricted, 1631 guest, managed, and ephemeral users. For creating other kind of users, 1632 {@link android.Manifest.permission#MANAGE_USERS} is needed. 1633 This permission is not available to third party applications. --> 1634 <permission android:name="android.permission.CREATE_USERS" 1635 android:protectionLevel="signature" /> 1636 1637 <!-- @hide Allows an application to set the profile owners and the device owner. 1638 This permission is not available to third party applications.--> 1639 <permission android:name="android.permission.MANAGE_PROFILE_AND_DEVICE_OWNERS" 1640 android:protectionLevel="signature" 1641 android:label="@string/permlab_manageProfileAndDeviceOwners" 1642 android:description="@string/permdesc_manageProfileAndDeviceOwners" /> 1643 1644 <!-- Allows an application to get full detailed information about 1645 recently running tasks, with full fidelity to the real state. 1646 @hide --> 1647 <permission android:name="android.permission.GET_DETAILED_TASKS" 1648 android:protectionLevel="signature" /> 1649 1650 <!-- Allows an application to change the Z-order of tasks. 1651 <p>Protection level: normal 1652 --> 1653 <permission android:name="android.permission.REORDER_TASKS" 1654 android:label="@string/permlab_reorderTasks" 1655 android:description="@string/permdesc_reorderTasks" 1656 android:protectionLevel="normal" /> 1657 1658 <!-- @hide Allows an application to change to remove/kill tasks --> 1659 <permission android:name="android.permission.REMOVE_TASKS" 1660 android:protectionLevel="signature" /> 1661 1662 <!-- @SystemApi @hide Allows an application to create/manage/remove stacks --> 1663 <permission android:name="android.permission.MANAGE_ACTIVITY_STACKS" 1664 android:protectionLevel="signature|privileged" /> 1665 1666 <!-- Allows an application to start any activity, regardless of permission 1667 protection or exported state. 1668 @hide --> 1669 <permission android:name="android.permission.START_ANY_ACTIVITY" 1670 android:protectionLevel="signature" /> 1671 1672 <!-- @deprecated The {@link android.app.ActivityManager#restartPackage} 1673 API is no longer supported. --> 1674 <permission android:name="android.permission.RESTART_PACKAGES" 1675 android:label="@string/permlab_killBackgroundProcesses" 1676 android:description="@string/permdesc_killBackgroundProcesses" 1677 android:protectionLevel="normal" /> 1678 1679 <!-- Allows an application to call 1680 {@link android.app.ActivityManager#killBackgroundProcesses}. 1681 <p>Protection level: normal 1682 --> 1683 <permission android:name="android.permission.KILL_BACKGROUND_PROCESSES" 1684 android:label="@string/permlab_killBackgroundProcesses" 1685 android:description="@string/permdesc_killBackgroundProcesses" 1686 android:protectionLevel="normal" /> 1687 1688 <!-- @SystemApi @hide Allows an application to query process states and current 1689 OOM adjustment scores. 1690 <p>Not for use by third-party applications. --> 1691 <permission android:name="android.permission.GET_PROCESS_STATE_AND_OOM_SCORE" 1692 android:protectionLevel="signature|privileged|development" /> 1693 1694 <!-- @SystemApi @hide Allows an application to retrieve a package's importance. 1695 This permission is not available to third party applications. --> 1696 <permission android:name="android.permission.GET_PACKAGE_IMPORTANCE" 1697 android:protectionLevel="signature|privileged" /> 1698 1699 <!-- Allows use of PendingIntent.getIntent(). 1700 @hide --> 1701 <permission android:name="android.permission.GET_INTENT_SENDER_INTENT" 1702 android:protectionLevel="signature" /> 1703 1704 <!-- ================================== --> 1705 <!-- Permissions affecting the display of other applications --> 1706 <!-- ================================== --> 1707 <eat-comment /> 1708 1709 <!-- Allows an app to create windows using the type 1710 {@link android.view.WindowManager.LayoutParams#TYPE_SYSTEM_ALERT}, 1711 shown on top of all other apps. Very few apps 1712 should use this permission; these windows are intended for 1713 system-level interaction with the user. 1714 1715 <p class="note"><strong>Note:</strong> If the app 1716 targets API level 23 or higher, the app user must explicitly grant 1717 this permission to the app through a permission management screen. The app requests 1718 the user's approval by sending an intent with action 1719 {@link android.provider.Settings#ACTION_MANAGE_OVERLAY_PERMISSION}. 1720 The app can check whether it has this authorization by calling 1721 {@link android.provider.Settings#canDrawOverlays 1722 Settings.canDrawOverlays()}. 1723 <p>Protection level: signature --> 1724 <permission android:name="android.permission.SYSTEM_ALERT_WINDOW" 1725 android:label="@string/permlab_systemAlertWindow" 1726 android:description="@string/permdesc_systemAlertWindow" 1727 android:protectionLevel="signature|preinstalled|appop|pre23|development" /> 1728 1729 <!-- ================================== --> 1730 <!-- Permissions affecting the system wallpaper --> 1731 <!-- ================================== --> 1732 <eat-comment /> 1733 1734 <!-- Allows applications to set the wallpaper. 1735 <p>Protection level: normal 1736 --> 1737 <permission android:name="android.permission.SET_WALLPAPER" 1738 android:label="@string/permlab_setWallpaper" 1739 android:description="@string/permdesc_setWallpaper" 1740 android:protectionLevel="normal" /> 1741 1742 <!-- Allows applications to set the wallpaper hints. 1743 <p>Protection level: normal 1744 --> 1745 <permission android:name="android.permission.SET_WALLPAPER_HINTS" 1746 android:label="@string/permlab_setWallpaperHints" 1747 android:description="@string/permdesc_setWallpaperHints" 1748 android:protectionLevel="normal" /> 1749 1750 <!-- ============================================ --> 1751 <!-- Permissions for changing the system clock --> 1752 <!-- ============================================ --> 1753 <eat-comment /> 1754 1755 <!-- @SystemApi Allows applications to set the system time. 1756 <p>Not for use by third-party applications. --> 1757 <permission android:name="android.permission.SET_TIME" 1758 android:protectionLevel="signature|privileged" /> 1759 1760 <!-- Allows applications to set the system time zone. 1761 <p>Protection level: normal 1762 --> 1763 <permission android:name="android.permission.SET_TIME_ZONE" 1764 android:label="@string/permlab_setTimeZone" 1765 android:description="@string/permdesc_setTimeZone" 1766 android:protectionLevel="normal" /> 1767 1768 <!-- ==================================================== --> 1769 <!-- Permissions related to changing status bar --> 1770 <!-- ==================================================== --> 1771 <eat-comment /> 1772 1773 <!-- Allows an application to expand or collapse the status bar. 1774 <p>Protection level: normal 1775 --> 1776 <permission android:name="android.permission.EXPAND_STATUS_BAR" 1777 android:label="@string/permlab_expandStatusBar" 1778 android:description="@string/permdesc_expandStatusBar" 1779 android:protectionLevel="normal" /> 1780 1781 <!-- ============================================================== --> 1782 <!-- Permissions related to adding/removing shortcuts from Launcher --> 1783 <!-- ============================================================== --> 1784 <eat-comment /> 1785 1786 <!-- Allows an application to install a shortcut in Launcher. 1787 <p>Protection level: normal 1788 --> 1789 <permission android:name="com.android.launcher.permission.INSTALL_SHORTCUT" 1790 android:label="@string/permlab_install_shortcut" 1791 android:description="@string/permdesc_install_shortcut" 1792 android:protectionLevel="normal"/> 1793 1794 <!-- Allows an application to uninstall a shortcut in Launcher. 1795 <p>Protection level: normal 1796 --> 1797 <permission android:name="com.android.launcher.permission.UNINSTALL_SHORTCUT" 1798 android:label="@string/permlab_uninstall_shortcut" 1799 android:description="@string/permdesc_uninstall_shortcut" 1800 android:protectionLevel="normal"/> 1801 1802 <!-- ==================================================== --> 1803 <!-- Permissions related to accessing sync settings --> 1804 <!-- ==================================================== --> 1805 <eat-comment /> 1806 1807 <!-- Allows applications to read the sync settings. 1808 <p>Protection level: normal 1809 --> 1810 <permission android:name="android.permission.READ_SYNC_SETTINGS" 1811 android:description="@string/permdesc_readSyncSettings" 1812 android:label="@string/permlab_readSyncSettings" 1813 android:protectionLevel="normal" /> 1814 1815 <!-- Allows applications to write the sync settings. 1816 <p>Protection level: normal 1817 --> 1818 <permission android:name="android.permission.WRITE_SYNC_SETTINGS" 1819 android:description="@string/permdesc_writeSyncSettings" 1820 android:label="@string/permlab_writeSyncSettings" 1821 android:protectionLevel="normal" /> 1822 1823 <!-- Allows applications to read the sync stats. 1824 <p>Protection level: normal 1825 --> 1826 <permission android:name="android.permission.READ_SYNC_STATS" 1827 android:description="@string/permdesc_readSyncStats" 1828 android:label="@string/permlab_readSyncStats" 1829 android:protectionLevel="normal" /> 1830 1831 <!-- ============================================ --> 1832 <!-- Permissions for low-level system interaction --> 1833 <!-- ============================================ --> 1834 <eat-comment /> 1835 1836 <!-- @SystemApi @hide Change the screen compatibility mode of applications --> 1837 <permission android:name="android.permission.SET_SCREEN_COMPATIBILITY" 1838 android:protectionLevel="signature" /> 1839 1840 <!-- @SystemApi Allows an application to modify the current configuration, such 1841 as locale. --> 1842 <permission android:name="android.permission.CHANGE_CONFIGURATION" 1843 android:protectionLevel="signature|privileged|development" /> 1844 1845 <!-- Allows an application to read or write the system settings. 1846 1847 <p class="note"><strong>Note:</strong> If the app targets API level 23 1848 or higher, the app user 1849 must explicitly grant this permission to the app through a permission management screen. 1850 The app requests the user's approval by sending an intent with action 1851 {@link android.provider.Settings#ACTION_MANAGE_WRITE_SETTINGS}. The app 1852 can check whether it has this authorization by calling {@link 1853 android.provider.Settings.System#canWrite Settings.System.canWrite()}. 1854 1855 <p>Protection level: signature 1856 --> 1857 <permission android:name="android.permission.WRITE_SETTINGS" 1858 android:label="@string/permlab_writeSettings" 1859 android:description="@string/permdesc_writeSettings" 1860 android:protectionLevel="signature|preinstalled|appop|pre23" /> 1861 1862 <!-- @SystemApi Allows an application to modify the Google service map. 1863 <p>Not for use by third-party applications. --> 1864 <permission android:name="android.permission.WRITE_GSERVICES" 1865 android:protectionLevel="signature|privileged" /> 1866 1867 <!-- @SystemApi Allows an application to call 1868 {@link android.app.ActivityManager#forceStopPackage}. 1869 @hide --> 1870 <permission android:name="android.permission.FORCE_STOP_PACKAGES" 1871 android:protectionLevel="signature|privileged" /> 1872 1873 <!-- @SystemApi @hide Allows an application to retrieve the content of the active window 1874 An active window is the window that has fired an accessibility event. --> 1875 <permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT" 1876 android:protectionLevel="signature|privileged" /> 1877 1878 <!-- @SystemApi Modify the global animation scaling factor. 1879 <p>Not for use by third-party applications. --> 1880 <permission android:name="android.permission.SET_ANIMATION_SCALE" 1881 android:protectionLevel="signature|privileged|development" /> 1882 1883 <!-- @deprecated This functionality will be removed in the future; please do 1884 not use. Allow an application to make its activities persistent. --> 1885 <permission android:name="android.permission.PERSISTENT_ACTIVITY" 1886 android:label="@string/permlab_persistentActivity" 1887 android:description="@string/permdesc_persistentActivity" 1888 android:protectionLevel="normal" /> 1889 1890 <!-- Allows an application to find out the space used by any package. 1891 <p>Protection level: normal 1892 --> 1893 <permission android:name="android.permission.GET_PACKAGE_SIZE" 1894 android:label="@string/permlab_getPackageSize" 1895 android:description="@string/permdesc_getPackageSize" 1896 android:protectionLevel="normal" /> 1897 1898 <!-- @deprecated No longer useful, see 1899 {@link android.content.pm.PackageManager#addPackageToPreferred} 1900 for details. --> 1901 <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS" 1902 android:protectionLevel="signature" /> 1903 1904 <!-- Allows an application to receive the 1905 {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is 1906 broadcast after the system finishes booting. If you don't 1907 request this permission, you will not receive the broadcast at 1908 that time. Though holding this permission does not have any 1909 security implications, it can have a negative impact on the 1910 user experience by increasing the amount of time it takes the 1911 system to start and allowing applications to have themselves 1912 running without the user being aware of them. As such, you must 1913 explicitly declare your use of this facility to make that visible 1914 to the user. 1915 <p>Protection level: normal 1916 --> 1917 <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED" 1918 android:label="@string/permlab_receiveBootCompleted" 1919 android:description="@string/permdesc_receiveBootCompleted" 1920 android:protectionLevel="normal" /> 1921 1922 <!-- Allows an application to broadcast sticky intents. These are 1923 broadcasts whose data is held by the system after being finished, 1924 so that clients can quickly retrieve that data without having 1925 to wait for the next broadcast. 1926 <p>Protection level: normal 1927 --> 1928 <permission android:name="android.permission.BROADCAST_STICKY" 1929 android:label="@string/permlab_broadcastSticky" 1930 android:description="@string/permdesc_broadcastSticky" 1931 android:protectionLevel="normal" /> 1932 1933 <!-- @SystemApi Allows mounting and unmounting file systems for removable storage. 1934 <p>Not for use by third-party applications.--> 1935 <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS" 1936 android:protectionLevel="signature|privileged" /> 1937 1938 <!-- @SystemApi Allows formatting file systems for removable storage. 1939 <p>Not for use by third-party applications. --> 1940 <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS" 1941 android:protectionLevel="signature|privileged" /> 1942 1943 <!-- @hide --> 1944 <permission android:name="android.permission.STORAGE_INTERNAL" 1945 android:protectionLevel="signature" /> 1946 1947 <!-- Allows access to ASEC non-destructive API calls 1948 @hide --> 1949 <permission android:name="android.permission.ASEC_ACCESS" 1950 android:protectionLevel="signature" /> 1951 1952 <!-- Allows creation of ASEC volumes 1953 @hide --> 1954 <permission android:name="android.permission.ASEC_CREATE" 1955 android:protectionLevel="signature" /> 1956 1957 <!-- Allows destruction of ASEC volumes 1958 @hide --> 1959 <permission android:name="android.permission.ASEC_DESTROY" 1960 android:protectionLevel="signature" /> 1961 1962 <!-- Allows mount / unmount of ASEC volumes 1963 @hide --> 1964 <permission android:name="android.permission.ASEC_MOUNT_UNMOUNT" 1965 android:protectionLevel="signature" /> 1966 1967 <!-- Allows rename of ASEC volumes 1968 @hide --> 1969 <permission android:name="android.permission.ASEC_RENAME" 1970 android:protectionLevel="signature" /> 1971 1972 <!-- @SystemApi Allows applications to write the apn settings. 1973 <p>Not for use by third-party applications. --> 1974 <permission android:name="android.permission.WRITE_APN_SETTINGS" 1975 android:protectionLevel="signature|privileged" /> 1976 1977 <!-- Allows applications to change network connectivity state. 1978 <p>Protection level: normal 1979 --> 1980 <permission android:name="android.permission.CHANGE_NETWORK_STATE" 1981 android:description="@string/permdesc_changeNetworkState" 1982 android:label="@string/permlab_changeNetworkState" 1983 android:protectionLevel="normal" /> 1984 1985 <!-- Allows an application to clear the caches of all installed 1986 applications on the device. 1987 <p>Protection level: system|signature 1988 --> 1989 <permission android:name="android.permission.CLEAR_APP_CACHE" 1990 android:protectionLevel="signature|privileged" /> 1991 1992 <!-- @SystemApi Allows an application to use any media decoder when decoding for playback 1993 @hide --> 1994 <permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK" 1995 android:protectionLevel="signature|privileged" /> 1996 1997 <!-- @SystemApi Allows an application to install and/or uninstall CA certificates on 1998 behalf of the user. 1999 @hide --> 2000 <permission android:name="android.permission.MANAGE_CA_CERTIFICATES" 2001 android:protectionLevel="signature|privileged" /> 2002 2003 <!-- @SystemApi Allows an application to do certain operations needed for 2004 interacting with the recovery (system update) system. 2005 @hide --> 2006 <permission android:name="android.permission.RECOVERY" 2007 android:protectionLevel="signature|privileged" /> 2008 2009 <!-- Allows the system to bind to an application's task services 2010 @hide --> 2011 <permission android:name="android.permission.BIND_JOB_SERVICE" 2012 android:protectionLevel="signature" /> 2013 <uses-permission android:name="android.permission.BIND_JOB_SERVICE"/> 2014 2015 <!-- Allows an application to initiate configuration updates 2016 <p>An application requesting this permission is responsible for 2017 verifying the source and integrity of any update before passing 2018 it off to the various individual installer components 2019 @hide --> 2020 <permission android:name="android.permission.UPDATE_CONFIG" 2021 android:protectionLevel="signature|privileged" /> 2022 2023 <!-- Allows the system to reset throttling in shortcut manager. 2024 @hide --> 2025 <permission android:name="android.permission.RESET_SHORTCUT_MANAGER_THROTTLING" 2026 android:protectionLevel="signature" /> 2027 2028 <!-- ========================================= --> 2029 <!-- Permissions for special development tools --> 2030 <!-- ========================================= --> 2031 <eat-comment /> 2032 2033 <!-- @SystemApi Allows an application to read or write the secure system settings. 2034 <p>Not for use by third-party applications. --> 2035 <permission android:name="android.permission.WRITE_SECURE_SETTINGS" 2036 android:protectionLevel="signature|privileged|development" /> 2037 2038 <!-- @SystemApi Allows an application to retrieve state dump information from system services. 2039 <p>Not for use by third-party applications. --> 2040 <permission android:name="android.permission.DUMP" 2041 android:protectionLevel="signature|privileged|development" /> 2042 2043 <!-- @SystemApi Allows an application to read the low-level system log files. 2044 <p>Not for use by third-party applications, because 2045 Log entries can contain the user's private information. --> 2046 <permission android:name="android.permission.READ_LOGS" 2047 android:protectionLevel="signature|privileged|development" /> 2048 2049 <!-- @SystemApi Configure an application for debugging. 2050 <p>Not for use by third-party applications. --> 2051 <permission android:name="android.permission.SET_DEBUG_APP" 2052 android:protectionLevel="signature|privileged|development" /> 2053 2054 <!-- @SystemApi Allows an application to set the maximum number of (not needed) 2055 application processes that can be running. 2056 <p>Not for use by third-party applications. --> 2057 <permission android:name="android.permission.SET_PROCESS_LIMIT" 2058 android:protectionLevel="signature|privileged|development" /> 2059 2060 <!-- @SystemApi Allows an application to control whether activities are immediately 2061 finished when put in the background. 2062 <p>Not for use by third-party applications. --> 2063 <permission android:name="android.permission.SET_ALWAYS_FINISH" 2064 android:protectionLevel="signature|privileged|development" /> 2065 2066 <!-- @SystemApi Allow an application to request that a signal be sent to all persistent processes. 2067 <p>Not for use by third-party applications. --> 2068 <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES" 2069 android:protectionLevel="signature|privileged|development" /> 2070 2071 <!-- ==================================== --> 2072 <!-- Private permissions --> 2073 <!-- ==================================== --> 2074 <eat-comment /> 2075 2076 <!-- @SystemApi Allows access to the list of accounts in the Accounts Service. --> 2077 <permission android:name="android.permission.GET_ACCOUNTS_PRIVILEGED" 2078 android:protectionLevel="signature|privileged" /> 2079 2080 <!-- Allows but does not guarantee access to user passwords at the conclusion of add account 2081 @hide --> 2082 <permission android:name="android.permission.GET_PASSWORD" 2083 android:protectionLevel="signature" /> 2084 2085 <!-- @SystemApi Allows applications to RW to diagnostic resources. 2086 <p>Not for use by third-party applications. --> 2087 <permission android:name="android.permission.DIAGNOSTIC" 2088 android:protectionLevel="signature" /> 2089 2090 <!-- @SystemApi Allows an application to open, close, or disable the status bar 2091 and its icons. 2092 <p>Not for use by third-party applications. --> 2093 <permission android:name="android.permission.STATUS_BAR" 2094 android:protectionLevel="signature|privileged" /> 2095 2096 <!-- Allows an application to be the status bar. Currently used only by SystemUI.apk 2097 @hide --> 2098 <permission android:name="android.permission.STATUS_BAR_SERVICE" 2099 android:protectionLevel="signature" /> 2100 2101 <!-- Allows an application to bind to third party quick settings tiles. 2102 <p>Should only be requested by the System, should be required by 2103 TileService declarations.--> 2104 <permission android:name="android.permission.BIND_QUICK_SETTINGS_TILE" 2105 android:protectionLevel="signature" /> 2106 2107 <!-- @SystemApi Allows an application to force a BACK operation on whatever is the 2108 top activity. 2109 <p>Not for use by third-party applications. 2110 @hide 2111 --> 2112 <permission android:name="android.permission.FORCE_BACK" 2113 android:protectionLevel="signature" /> 2114 2115 <!-- @SystemApi Allows an application to update device statistics. 2116 <p>Not for use by third-party applications. --> 2117 <permission android:name="android.permission.UPDATE_DEVICE_STATS" 2118 android:protectionLevel="signature|privileged" /> 2119 2120 <!-- @SystemApi @hide Allows an application to collect battery statistics --> 2121 <permission android:name="android.permission.GET_APP_OPS_STATS" 2122 android:protectionLevel="signature|privileged|development" /> 2123 2124 <!-- @SystemApi Allows an application to update application operation statistics. Not for 2125 use by third party apps. 2126 @hide --> 2127 <permission android:name="android.permission.UPDATE_APP_OPS_STATS" 2128 android:protectionLevel="signature|privileged|installer" /> 2129 2130 <!-- @SystemApi Allows an application to update the user app op restrictions. 2131 Not for use by third party apps. 2132 @hide --> 2133 <permission android:name="android.permission.MANAGE_APP_OPS_RESTRICTIONS" 2134 android:protectionLevel="signature|installer" /> 2135 2136 <!-- @SystemApi Allows an application to open windows that are for use by parts 2137 of the system user interface. 2138 <p>Not for use by third-party applications. 2139 @hide 2140 --> 2141 <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW" 2142 android:protectionLevel="signature" /> 2143 2144 <!-- @SystemApi Allows an application to manage (create, destroy, 2145 Z-order) application tokens in the window manager. 2146 <p>Not for use by third-party applications. 2147 @hide 2148 --> 2149 <permission android:name="android.permission.MANAGE_APP_TOKENS" 2150 android:protectionLevel="signature" /> 2151 2152 <!-- Allows System UI to register listeners for events from Window Manager. 2153 @hide --> 2154 <permission android:name="android.permission.REGISTER_WINDOW_MANAGER_LISTENERS" 2155 android:protectionLevel="signature" /> 2156 2157 <!-- @hide Allows the application to temporarily freeze the screen for a 2158 full-screen transition. --> 2159 <permission android:name="android.permission.FREEZE_SCREEN" 2160 android:protectionLevel="signature" /> 2161 2162 <!-- @SystemApi Allows an application to inject user events (keys, touch, trackball) 2163 into the event stream and deliver them to ANY window. Without this 2164 permission, you can only deliver events to windows in your own process. 2165 <p>Not for use by third-party applications. 2166 @hide 2167 --> 2168 <permission android:name="android.permission.INJECT_EVENTS" 2169 android:protectionLevel="signature" /> 2170 2171 <!-- @hide Allows an application to register an input filter which filters the stream 2172 of user events (keys, touch, trackball) before they are dispatched to any window. --> 2173 <permission android:name="android.permission.FILTER_EVENTS" 2174 android:protectionLevel="signature" /> 2175 2176 <!-- @hide Allows an application to retrieve the window token from the accessibility manager. --> 2177 <permission android:name="android.permission.RETRIEVE_WINDOW_TOKEN" 2178 android:protectionLevel="signature" /> 2179 2180 <!-- @hide Allows an application to collect frame statistics --> 2181 <permission android:name="android.permission.FRAME_STATS" 2182 android:protectionLevel="signature" /> 2183 2184 <!-- @hide Allows an application to temporary enable accessibility on the device. --> 2185 <permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY" 2186 android:protectionLevel="signature" /> 2187 2188 <!-- @SystemApi Allows an application to watch and control how activities are 2189 started globally in the system. Only for is in debugging 2190 (usually the monkey command). 2191 <p>Not for use by third-party applications. 2192 @hide 2193 --> 2194 <permission android:name="android.permission.SET_ACTIVITY_WATCHER" 2195 android:protectionLevel="signature" /> 2196 2197 <!-- @SystemApi Allows an application to call the activity manager shutdown() API 2198 to put the higher-level system there into a shutdown state. 2199 @hide --> 2200 <permission android:name="android.permission.SHUTDOWN" 2201 android:protectionLevel="signature|privileged" /> 2202 2203 <!-- @SystemApi Allows an application to tell the activity manager to temporarily 2204 stop application switches, putting it into a special mode that 2205 prevents applications from immediately switching away from some 2206 critical UI such as the home screen. 2207 @hide --> 2208 <permission android:name="android.permission.STOP_APP_SWITCHES" 2209 android:protectionLevel="signature|privileged" /> 2210 2211 <!-- @SystemApi Allows an application to retrieve private information about 2212 the current top activity, such as any assist context it can provide. 2213 <p>Not for use by third-party applications. 2214 @hide 2215 --> 2216 <permission android:name="android.permission.GET_TOP_ACTIVITY_INFO" 2217 android:protectionLevel="signature" /> 2218 2219 <!-- Allows an application to retrieve the current state of keys and 2220 switches. 2221 <p>Not for use by third-party applications. 2222 @deprecated The API that used this permission has been removed. --> 2223 <permission android:name="android.permission.READ_INPUT_STATE" 2224 android:protectionLevel="signature" /> 2225 2226 <!-- Must be required by an {@link android.inputmethodservice.InputMethodService}, 2227 to ensure that only the system can bind to it. 2228 <p>Protection level: signature 2229 --> 2230 <permission android:name="android.permission.BIND_INPUT_METHOD" 2231 android:protectionLevel="signature" /> 2232 2233 <!-- Must be required by an {@link android.media.midi.MidiDeviceService}, 2234 to ensure that only the system can bind to it. 2235 <p>Protection level: signature 2236 --> 2237 <permission android:name="android.permission.BIND_MIDI_DEVICE_SERVICE" 2238 android:protectionLevel="signature" /> 2239 2240 <!-- Must be required by an {@link android.accessibilityservice.AccessibilityService}, 2241 to ensure that only the system can bind to it. 2242 <p>Protection level: signature 2243 --> 2244 <permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE" 2245 android:protectionLevel="signature" /> 2246 2247 <!-- Must be required by a {@link android.printservice.PrintService}, 2248 to ensure that only the system can bind to it. 2249 <p>Protection level: signature 2250 --> 2251 <permission android:name="android.permission.BIND_PRINT_SERVICE" 2252 android:protectionLevel="signature" /> 2253 2254 <!-- Must be required by a {@link android.printservice.recommendation.RecommendationService}, 2255 to ensure that only the system can bind to it. 2256 @hide 2257 @SystemApi 2258 <p>Protection level: signature 2259 --> 2260 <permission android:name="android.permission.BIND_PRINT_RECOMMENDATION_SERVICE" 2261 android:protectionLevel="signature" /> 2262 2263 <!-- Must be required by a {@link android.nfc.cardemulation.HostApduService} 2264 or {@link android.nfc.cardemulation.OffHostApduService} to ensure that only 2265 the system can bind to it. 2266 <p>Protection level: signature 2267 --> 2268 <permission android:name="android.permission.BIND_NFC_SERVICE" 2269 android:protectionLevel="signature" /> 2270 2271 <!-- Must be required by the PrintSpooler to ensure that only the system can bind to it. 2272 @hide --> 2273 <permission android:name="android.permission.BIND_PRINT_SPOOLER_SERVICE" 2274 android:protectionLevel="signature" /> 2275 2276 <!-- @SystemApi Must be required by the RuntimePermissionPresenterService to ensure 2277 that only the system can bind to it. 2278 @hide --> 2279 <permission android:name="android.permission.BIND_RUNTIME_PERMISSION_PRESENTER_SERVICE" 2280 android:protectionLevel="signature" /> 2281 2282 <!-- Must be required by a TextService (e.g. SpellCheckerService) 2283 to ensure that only the system can bind to it. 2284 <p>Protection level: signature 2285 --> 2286 <permission android:name="android.permission.BIND_TEXT_SERVICE" 2287 android:protectionLevel="signature" /> 2288 2289 <!-- Must be required by a {@link android.net.VpnService}, 2290 to ensure that only the system can bind to it. 2291 <p>Protection level: signature 2292 --> 2293 <permission android:name="android.permission.BIND_VPN_SERVICE" 2294 android:protectionLevel="signature" /> 2295 2296 <!-- Must be required by a {@link android.service.wallpaper.WallpaperService}, 2297 to ensure that only the system can bind to it. 2298 <p>Protection level: system|signature 2299 --> 2300 <permission android:name="android.permission.BIND_WALLPAPER" 2301 android:protectionLevel="signature|privileged" /> 2302 2303 <!-- Must be required by a {@link android.service.voice.VoiceInteractionService}, 2304 to ensure that only the system can bind to it. 2305 <p>Protection level: signature 2306 --> 2307 <permission android:name="android.permission.BIND_VOICE_INTERACTION" 2308 android:protectionLevel="signature" /> 2309 2310 <!-- Must be required by hotword enrollment application, 2311 to ensure that only the system can interact with it. 2312 @hide <p>Not for use by third-party applications.</p> --> 2313 <permission android:name="android.permission.MANAGE_VOICE_KEYPHRASES" 2314 android:protectionLevel="signature|privileged" /> 2315 2316 <!-- Must be required by a {@link com.android.media.remotedisplay.RemoteDisplayProvider}, 2317 to ensure that only the system can bind to it. 2318 @hide --> 2319 <permission android:name="android.permission.BIND_REMOTE_DISPLAY" 2320 android:protectionLevel="signature" /> 2321 2322 <!-- Must be required by a {@link android.media.tv.TvInputService} 2323 to ensure that only the system can bind to it. 2324 <p>Protection level: signature 2325 --> 2326 <permission android:name="android.permission.BIND_TV_INPUT" 2327 android:protectionLevel="signature|privileged" /> 2328 2329 <!-- @SystemApi 2330 Must be required by a {@link com.android.media.tv.remoteprovider.TvRemoteProvider} 2331 to ensure that only the system can bind to it. 2332 <p>Protection level: signature|privileged 2333 <p>Not for use by third-party applications. </p> 2334 @hide --> 2335 <permission android:name="android.permission.BIND_TV_REMOTE_SERVICE" 2336 android:protectionLevel="signature|privileged" /> 2337 2338 <!-- @SystemApi 2339 Must be required for a virtual remote controller for TV. 2340 <p>Protection level: signature|privileged 2341 <p>Not for use by third-party applications. </p> 2342 @hide --> 2343 <permission android:name="android.permission.TV_VIRTUAL_REMOTE_CONTROLLER" 2344 android:protectionLevel="signature|privileged" /> 2345 2346 <!-- @SystemApi Allows an application to modify parental controls 2347 <p>Not for use by third-party applications. 2348 @hide --> 2349 <permission android:name="android.permission.MODIFY_PARENTAL_CONTROLS" 2350 android:protectionLevel="signature|privileged" /> 2351 2352 <!-- Must be required by a {@link android.media.routing.MediaRouteService} 2353 to ensure that only the system can interact with it. 2354 @hide --> 2355 <permission android:name="android.permission.BIND_ROUTE_PROVIDER" 2356 android:protectionLevel="signature" /> 2357 2358 <!-- Must be required by device administration receiver, to ensure that only the 2359 system can interact with it. 2360 <p>Protection level: signature 2361 --> 2362 <permission android:name="android.permission.BIND_DEVICE_ADMIN" 2363 android:protectionLevel="signature" /> 2364 2365 <!-- @SystemApi Required to add or remove another application as a device admin. 2366 <p>Not for use by third-party applications. 2367 @hide --> 2368 <permission android:name="android.permission.MANAGE_DEVICE_ADMINS" 2369 android:protectionLevel="signature|privileged" /> 2370 2371 <!-- @SystemApi Allows low-level access to setting the orientation (actually 2372 rotation) of the screen. 2373 <p>Not for use by third-party applications. 2374 @hide 2375 --> 2376 <permission android:name="android.permission.SET_ORIENTATION" 2377 android:protectionLevel="signature" /> 2378 2379 <!-- @SystemApi Allows low-level access to setting the pointer speed. 2380 <p>Not for use by third-party applications. 2381 @hide 2382 --> 2383 <permission android:name="android.permission.SET_POINTER_SPEED" 2384 android:protectionLevel="signature" /> 2385 2386 <!-- Allows low-level access to setting input device calibration. 2387 <p>Not for use by normal applications. 2388 @hide --> 2389 <permission android:name="android.permission.SET_INPUT_CALIBRATION" 2390 android:protectionLevel="signature" /> 2391 2392 <!-- Allows low-level access to setting the keyboard layout. 2393 <p>Not for use by third-party applications. 2394 @hide --> 2395 <permission android:name="android.permission.SET_KEYBOARD_LAYOUT" 2396 android:protectionLevel="signature" /> 2397 2398 <!-- Allows an application to query tablet mode state and monitor changes 2399 in it. 2400 <p>Not for use by third-party applications. 2401 @hide --> 2402 <permission android:name="android.permission.TABLET_MODE" 2403 android:protectionLevel="signature" /> 2404 2405 <!-- Allows an application to request installing packages. Apps 2406 targeting APIs greater than 22 must hold this permission in 2407 order to use {@link android.content.Intent#ACTION_INSTALL_PACKAGE}. 2408 <p>Protection level: normal 2409 --> 2410 <permission android:name="android.permission.REQUEST_INSTALL_PACKAGES" 2411 android:label="@string/permlab_requestInstallPackages" 2412 android:description="@string/permdesc_requestInstallPackages" 2413 android:protectionLevel="normal" /> 2414 2415 <!-- @SystemApi Allows an application to install packages. 2416 <p>Not for use by third-party applications. --> 2417 <permission android:name="android.permission.INSTALL_PACKAGES" 2418 android:protectionLevel="signature|privileged" /> 2419 2420 <!-- @SystemApi Allows an application to clear user data. 2421 <p>Not for use by third-party applications 2422 @hide 2423 --> 2424 <permission android:name="android.permission.CLEAR_APP_USER_DATA" 2425 android:protectionLevel="signature|installer" /> 2426 2427 <!-- @hide Allows an application to get the URI permissions 2428 granted to another application. 2429 <p>Not for use by third-party applications 2430 --> 2431 <permission android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS" 2432 android:protectionLevel="signature" /> 2433 2434 <!-- @hide Allows an application to clear the URI permissions 2435 granted to another application. 2436 <p>Not for use by third-party applications 2437 --> 2438 <permission 2439 android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS" 2440 android:protectionLevel="signature" /> 2441 2442 <!-- @SystemApi Allows an application to delete cache files. 2443 <p>Not for use by third-party applications. --> 2444 <permission android:name="android.permission.DELETE_CACHE_FILES" 2445 android:protectionLevel="signature|privileged" /> 2446 2447 <!-- @SystemApi Allows an application to delete packages. 2448 <p>Not for use by third-party applications. 2449 <p>Starting in {@link android.os.Build.VERSION_CODES#N}, user confirmation is requested 2450 when the application deleting the package is not the same application that installed the 2451 package. --> 2452 <permission android:name="android.permission.DELETE_PACKAGES" 2453 android:protectionLevel="signature|privileged" /> 2454 2455 <!-- @SystemApi Allows an application to move location of installed package. 2456 @hide --> 2457 <permission android:name="android.permission.MOVE_PACKAGE" 2458 android:protectionLevel="signature|privileged" /> 2459 2460 <!-- @SystemApi Allows an application to change whether an application component (other than its own) is 2461 enabled or not. 2462 <p>Not for use by third-party applications. --> 2463 <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE" 2464 android:protectionLevel="signature|privileged" /> 2465 2466 <!-- @SystemApi Allows an application to grant specific permissions. 2467 @hide --> 2468 <permission android:name="android.permission.GRANT_RUNTIME_PERMISSIONS" 2469 android:protectionLevel="signature|installer|verifier" /> 2470 2471 <!-- @SystemApi Allows an app that has this permission and the permissions to install packages 2472 to request certain runtime permissions to be granted at installation. 2473 @hide --> 2474 <permission android:name="android.permission.INSTALL_GRANT_RUNTIME_PERMISSIONS" 2475 android:protectionLevel="signature|installer|verifier" /> 2476 2477 <!-- @SystemApi Allows an application to revoke specific permissions. 2478 @hide --> 2479 <permission android:name="android.permission.REVOKE_RUNTIME_PERMISSIONS" 2480 android:protectionLevel="signature|installer|verifier" /> 2481 2482 <!-- @hide Allows an application to observe permission changes. --> 2483 <permission android:name="android.permission.OBSERVE_GRANT_REVOKE_PERMISSIONS" 2484 android:protectionLevel="signature|privileged" /> 2485 2486 <!-- @SystemApi Allows an application to use SurfaceFlinger's low level features. 2487 <p>Not for use by third-party applications. 2488 @hide 2489 --> 2490 <permission android:name="android.permission.ACCESS_SURFACE_FLINGER" 2491 android:protectionLevel="signature" /> 2492 2493 <!-- @SystemApi Allows an application to take screen shots and more generally 2494 get access to the frame buffer data. 2495 <p>Not for use by third-party applications. --> 2496 <permission android:name="android.permission.READ_FRAME_BUFFER" 2497 android:protectionLevel="signature|privileged" /> 2498 2499 <!-- Allows an application to use InputFlinger's low level features. 2500 @hide --> 2501 <permission android:name="android.permission.ACCESS_INPUT_FLINGER" 2502 android:protectionLevel="signature" /> 2503 2504 <!-- Allows an application to configure and connect to Wifi displays 2505 @hide --> 2506 <permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY" 2507 android:protectionLevel="signature" /> 2508 2509 <!-- Allows an application to control low-level features of Wifi displays 2510 such as opening an RTSP socket. This permission should only be used 2511 by the display manager. 2512 @hide --> 2513 <permission android:name="android.permission.CONTROL_WIFI_DISPLAY" 2514 android:protectionLevel="signature" /> 2515 2516 <!-- Allows an application to control the color modes set for displays system-wide. 2517 <p>Not for use by third-party applications.</p> 2518 @hide --> 2519 <permission android:name="android.permission.CONFIGURE_DISPLAY_COLOR_MODE" 2520 android:protectionLevel="signature" /> 2521 2522 <!-- @SystemApi Allows an application to control VPN. 2523 <p>Not for use by third-party applications.</p> 2524 @hide --> 2525 <permission android:name="android.permission.CONTROL_VPN" 2526 android:protectionLevel="signature|privileged" /> 2527 <uses-permission android:name="android.permission.CONTROL_VPN" /> 2528 2529 <!-- @SystemApi Allows an application to capture audio output. 2530 <p>Not for use by third-party applications.</p> --> 2531 <permission android:name="android.permission.CAPTURE_AUDIO_OUTPUT" 2532 android:protectionLevel="signature|privileged" /> 2533 2534 <!-- @SystemApi Allows an application to capture audio for hotword detection. 2535 <p>Not for use by third-party applications.</p> 2536 @hide --> 2537 <permission android:name="android.permission.CAPTURE_AUDIO_HOTWORD" 2538 android:protectionLevel="signature|privileged" /> 2539 2540 <!-- @SystemApi Allows an application to modify audio routing and override policy decisions. 2541 <p>Not for use by third-party applications.</p> 2542 @hide --> 2543 <permission android:name="android.permission.MODIFY_AUDIO_ROUTING" 2544 android:protectionLevel="signature|privileged" /> 2545 2546 <!-- @SystemApi Allows an application to capture video output. 2547 <p>Not for use by third-party applications.</p> --> 2548 <permission android:name="android.permission.CAPTURE_VIDEO_OUTPUT" 2549 android:protectionLevel="signature|privileged" /> 2550 2551 <!-- @SystemApi Allows an application to capture secure video output. 2552 <p>Not for use by third-party applications.</p> --> 2553 <permission android:name="android.permission.CAPTURE_SECURE_VIDEO_OUTPUT" 2554 android:protectionLevel="signature|privileged" /> 2555 2556 <!-- @SystemApi Allows an application to know what content is playing and control its playback. 2557 <p>Not for use by third-party applications due to privacy of media consumption</p> --> 2558 <permission android:name="android.permission.MEDIA_CONTENT_CONTROL" 2559 android:protectionLevel="signature|privileged" /> 2560 2561 <!-- @SystemApi Required to be able to disable the device (very dangerous!). 2562 <p>Not for use by third-party applications. 2563 @hide 2564 --> 2565 <permission android:name="android.permission.BRICK" 2566 android:protectionLevel="signature" /> 2567 2568 <!-- @SystemApi Required to be able to reboot the device. 2569 <p>Not for use by third-party applications. --> 2570 <permission android:name="android.permission.REBOOT" 2571 android:protectionLevel="signature|privileged" /> 2572 2573 <!-- @SystemApi Allows low-level access to power management. 2574 <p>Not for use by third-party applications. 2575 @hide 2576 --> 2577 <permission android:name="android.permission.DEVICE_POWER" 2578 android:protectionLevel="signature" /> 2579 2580 <!-- Allows access to the PowerManager.userActivity function. 2581 <p>Not for use by third-party applications. @hide @SystemApi --> 2582 <permission android:name="android.permission.USER_ACTIVITY" 2583 android:protectionLevel="signature|privileged" /> 2584 2585 <!-- @hide Allows low-level access to tun tap driver --> 2586 <permission android:name="android.permission.NET_TUNNELING" 2587 android:protectionLevel="signature" /> 2588 2589 <!-- Run as a manufacturer test application, running as the root user. 2590 Only available when the device is running in manufacturer test mode. 2591 <p>Not for use by third-party applications. 2592 --> 2593 <permission android:name="android.permission.FACTORY_TEST" 2594 android:protectionLevel="signature" /> 2595 2596 <!-- Allows an application to broadcast a notification that an application 2597 package has been removed. 2598 <p>Not for use by third-party applications. 2599 --> 2600 <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED" 2601 android:protectionLevel="signature" /> 2602 2603 <!-- Allows an application to broadcast an SMS receipt notification. 2604 <p>Not for use by third-party applications. 2605 --> 2606 <permission android:name="android.permission.BROADCAST_SMS" 2607 android:protectionLevel="signature" /> 2608 2609 <!-- Allows an application to broadcast a WAP PUSH receipt notification. 2610 <p>Not for use by third-party applications. 2611 --> 2612 <permission android:name="android.permission.BROADCAST_WAP_PUSH" 2613 android:protectionLevel="signature" /> 2614 2615 <!-- @SystemApi Allows an application to broadcast privileged networking requests. 2616 <p>Not for use by third-party applications. @hide --> 2617 <permission android:name="android.permission.BROADCAST_NETWORK_PRIVILEGED" 2618 android:protectionLevel="signature|privileged" /> 2619 2620 <!-- @SystemApi Not for use by third-party applications. --> 2621 <permission android:name="android.permission.MASTER_CLEAR" 2622 android:protectionLevel="signature|privileged" /> 2623 2624 <!-- @SystemApi Allows an application to call any phone number, including emergency 2625 numbers, without going through the Dialer user interface for the user 2626 to confirm the call being placed. 2627 <p>Not for use by third-party applications. --> 2628 <permission android:name="android.permission.CALL_PRIVILEGED" 2629 android:protectionLevel="signature|privileged" /> 2630 2631 <!-- @SystemApi Allows an application to perform CDMA OTA provisioning @hide --> 2632 <permission android:name="android.permission.PERFORM_CDMA_PROVISIONING" 2633 android:protectionLevel="signature|privileged" /> 2634 2635 <!-- @SystemApi Allows an application to perform SIM Activation @hide --> 2636 <permission android:name="android.permission.PERFORM_SIM_ACTIVATION" 2637 android:protectionLevel="signature|privileged" /> 2638 2639 <!-- @SystemApi Allows enabling/disabling location update notifications from 2640 the radio. 2641 <p>Not for use by third-party applications. --> 2642 <permission android:name="android.permission.CONTROL_LOCATION_UPDATES" 2643 android:protectionLevel="signature|privileged" /> 2644 2645 <!-- @SystemApi Allows read/write access to the "properties" table in the checkin 2646 database, to change values that get uploaded. 2647 <p>Not for use by third-party applications. --> 2648 <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES" 2649 android:protectionLevel="signature|privileged" /> 2650 2651 <!-- @SystemApi Allows an application to collect component usage 2652 statistics 2653 <p>Declaring the permission implies intention to use the API and the user of the 2654 device can grant permission through the Settings application. --> 2655 <permission android:name="android.permission.PACKAGE_USAGE_STATS" 2656 android:protectionLevel="signature|privileged|development|appop" /> 2657 <uses-permission android:name="android.permission.PACKAGE_USAGE_STATS" /> 2658 2659 <!-- @hide Allows an application to change the app idle state of an app. 2660 <p>Not for use by third-party applications. --> 2661 <permission android:name="android.permission.CHANGE_APP_IDLE_STATE" 2662 android:protectionLevel="signature" /> 2663 2664 <!-- @hide @SystemApi Allows an application to temporarily whitelist an inactive app to 2665 access the network and acquire wakelocks. 2666 <p>Not for use by third-party applications. --> 2667 <permission android:name="android.permission.CHANGE_DEVICE_IDLE_TEMP_WHITELIST" 2668 android:protectionLevel="signature|privileged" /> 2669 2670 <!-- Permission an application must hold in order to use 2671 {@link android.provider.Settings#ACTION_REQUEST_IGNORE_BATTERY_OPTIMIZATIONS}. 2672 This is a normal permission: an app requesting it will always be granted the 2673 permission, without the user needing to approve or see it. --> 2674 <permission android:name="android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS" 2675 android:protectionLevel="normal" /> 2676 2677 <!-- @SystemApi Allows an application to collect battery statistics --> 2678 <permission android:name="android.permission.BATTERY_STATS" 2679 android:protectionLevel="signature|privileged|development" /> 2680 2681 <!-- @SystemApi Allows an application to control the backup and restore process. 2682 <p>Not for use by third-party applications. 2683 @hide pending API council --> 2684 <permission android:name="android.permission.BACKUP" 2685 android:protectionLevel="signature|privileged" /> 2686 2687 <!-- Allows a package to launch the secure full-backup confirmation UI. 2688 ONLY the system process may hold this permission. 2689 @hide --> 2690 <permission android:name="android.permission.CONFIRM_FULL_BACKUP" 2691 android:protectionLevel="signature" /> 2692 2693 <!-- @SystemApi Must be required by a {@link android.widget.RemoteViewsService}, 2694 to ensure that only the system can bind to it. --> 2695 <permission android:name="android.permission.BIND_REMOTEVIEWS" 2696 android:protectionLevel="signature|privileged" /> 2697 2698 <!-- @SystemApi Allows an application to tell the AppWidget service which application 2699 can access AppWidget's data. The normal user flow is that a user 2700 picks an AppWidget to go into a particular host, thereby giving that 2701 host application access to the private data from the AppWidget app. 2702 An application that has this permission should honor that contract. 2703 <p>Not for use by third-party applications. --> 2704 <permission android:name="android.permission.BIND_APPWIDGET" 2705 android:protectionLevel="signature|privileged" /> 2706 2707 <!-- @SystemApi Private permission, to restrict who can bring up a dialog to add a new 2708 keyguard widget 2709 @hide --> 2710 <permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET" 2711 android:protectionLevel="signature|privileged" /> 2712 2713 <!-- @SystemApi Internal permission allowing an application to query/set which 2714 applications can bind AppWidgets. 2715 @hide --> 2716 <permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS" 2717 android:protectionLevel="signature|privileged" /> 2718 2719 <!-- Allows applications to change the background data setting. 2720 <p>Not for use by third-party applications. 2721 @hide pending API council --> 2722 <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING" 2723 android:protectionLevel="signature" /> 2724 2725 <!-- @SystemApi This permission can be used on content providers to allow the global 2726 search system to access their data. Typically it used when the 2727 provider has some permissions protecting it (which global search 2728 would not be expected to hold), and added as a read-only permission 2729 to the path in the provider where global search queries are 2730 performed. This permission can not be held by regular applications; 2731 it is used by applications to protect themselves from everyone else 2732 besides global search. --> 2733 <permission android:name="android.permission.GLOBAL_SEARCH" 2734 android:protectionLevel="signature|privileged" /> 2735 2736 <!-- Internal permission protecting access to the global search 2737 system: ensures that only the system can access the provider 2738 to perform queries (since this otherwise provides unrestricted 2739 access to a variety of content providers), and to write the 2740 search statistics (to keep applications from gaming the source 2741 ranking). 2742 @hide --> 2743 <permission android:name="android.permission.GLOBAL_SEARCH_CONTROL" 2744 android:protectionLevel="signature" /> 2745 2746 <!-- @SystemApi Internal permission to allows an application to read indexable data. 2747 @hide --> 2748 <permission android:name="android.permission.READ_SEARCH_INDEXABLES" 2749 android:protectionLevel="signature|privileged" /> 2750 2751 <!-- @SystemApi Allows applications to set a live wallpaper. 2752 @hide XXX Change to signature once the picker is moved to its 2753 own apk as Ghod Intended. --> 2754 <permission android:name="android.permission.SET_WALLPAPER_COMPONENT" 2755 android:protectionLevel="signature|privileged" /> 2756 2757 <!-- @SystemApi Allows applications to read dream settings and dream state. 2758 @hide --> 2759 <permission android:name="android.permission.READ_DREAM_STATE" 2760 android:protectionLevel="signature|privileged" /> 2761 2762 <!-- @SystemApi Allows applications to write dream settings, and start or stop dreaming. 2763 @hide --> 2764 <permission android:name="android.permission.WRITE_DREAM_STATE" 2765 android:protectionLevel="signature|privileged" /> 2766 2767 <!-- @SystemApi Allow an application to read and write the cache partition. 2768 @hide --> 2769 <permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM" 2770 android:protectionLevel="signature|privileged" /> 2771 2772 <!-- Must be required by default container service so that only 2773 the system can bind to it and use it to copy 2774 protected data to secure containers or files 2775 accessible to the system. 2776 @hide --> 2777 <permission android:name="android.permission.COPY_PROTECTED_DATA" 2778 android:protectionLevel="signature" /> 2779 2780 <!-- @SystemApi Internal permission protecting access to the encryption methods 2781 @hide 2782 --> 2783 <permission android:name="android.permission.CRYPT_KEEPER" 2784 android:protectionLevel="signature|privileged" /> 2785 2786 <!-- @SystemApi Allows an application to read historical network usage for 2787 specific networks and applications. @hide --> 2788 <permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY" 2789 android:protectionLevel="signature|privileged" /> 2790 2791 <!-- Allows an application to manage network policies (such as warning and disable 2792 limits) and to define application-specific rules. @hide --> 2793 <permission android:name="android.permission.MANAGE_NETWORK_POLICY" 2794 android:protectionLevel="signature" /> 2795 2796 <!-- @SystemApi Allows an application to account its network traffic against other UIDs. Used 2797 by system services like download manager and media server. Not for use by 2798 third party apps. @hide --> 2799 <permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING" 2800 android:protectionLevel="signature|privileged" /> 2801 2802 <!-- C2DM permission. 2803 @hide Used internally. 2804 --> 2805 <permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE" 2806 android:protectionLevel="signature" /> 2807 <uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/> 2808 2809 <!-- @SystemApi @hide Package verifier needs to have this permission before the PackageManager will 2810 trust it to verify packages. 2811 --> 2812 <permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT" 2813 android:protectionLevel="signature|privileged" /> 2814 2815 <!-- Must be required by package verifier receiver, to ensure that only the 2816 system can interact with it. 2817 @hide 2818 --> 2819 <permission android:name="android.permission.BIND_PACKAGE_VERIFIER" 2820 android:protectionLevel="signature" /> 2821 2822 <!-- @SystemApi @hide Intent filter verifier needs to have this permission before the 2823 PackageManager will trust it to verify intent filters. 2824 --> 2825 <permission android:name="android.permission.INTENT_FILTER_VERIFICATION_AGENT" 2826 android:protectionLevel="signature|privileged" /> 2827 2828 <!-- Must be required by intent filter verifier receiver, to ensure that only the 2829 system can interact with it. 2830 @hide 2831 --> 2832 <permission android:name="android.permission.BIND_INTENT_FILTER_VERIFIER" 2833 android:protectionLevel="signature" /> 2834 2835 <!-- @SystemApi Allows applications to access serial ports via the SerialManager. 2836 @hide --> 2837 <permission android:name="android.permission.SERIAL_PORT" 2838 android:protectionLevel="signature|privileged" /> 2839 2840 <!-- Allows the holder to access content providers from outside an ApplicationThread. 2841 This permission is enforced by the ActivityManagerService on the corresponding APIs, 2842 in particular ActivityManagerService#getContentProviderExternal(String) and 2843 ActivityManagerService#removeContentProviderExternal(String). 2844 @hide 2845 --> 2846 <permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY" 2847 android:protectionLevel="signature" /> 2848 2849 <!-- @SystemApi Allows an application to hold an UpdateLock, recommending that a headless 2850 OTA reboot *not* occur while the lock is held. 2851 @hide --> 2852 <permission android:name="android.permission.UPDATE_LOCK" 2853 android:protectionLevel="signature|privileged" /> 2854 2855 <!-- @SystemApi Allows an application to read the current set of notifications, including 2856 any metadata and intents attached. 2857 @hide --> 2858 <permission android:name="android.permission.ACCESS_NOTIFICATIONS" 2859 android:protectionLevel="signature|privileged" /> 2860 2861 <!-- Marker permission for applications that wish to access notification policy. 2862 <p>Protection level: normal 2863 --> 2864 <permission android:name="android.permission.ACCESS_NOTIFICATION_POLICY" 2865 android:description="@string/permdesc_access_notification_policy" 2866 android:label="@string/permlab_access_notification_policy" 2867 android:protectionLevel="normal" /> 2868 2869 <!-- Allows modification of do not disturb rules and policies. Only allowed for system 2870 processes. 2871 @hide --> 2872 <permission android:name="android.permission.MANAGE_NOTIFICATIONS" 2873 android:protectionLevel="signature" /> 2874 2875 <!-- Allows access to keyguard secure storage. Only allowed for system processes. 2876 @hide --> 2877 <permission android:name="android.permission.ACCESS_KEYGUARD_SECURE_STORAGE" 2878 android:protectionLevel="signature" /> 2879 2880 <!-- Allows managing (adding, removing) fingerprint templates. Reserved for the system. @hide --> 2881 <permission android:name="android.permission.MANAGE_FINGERPRINT" 2882 android:protectionLevel="signature|privileged" /> 2883 2884 <!-- Allows an app to reset fingerprint attempt counter. Reserved for the system. @hide --> 2885 <permission android:name="android.permission.RESET_FINGERPRINT_LOCKOUT" 2886 android:protectionLevel="signature" /> 2887 2888 <!-- Allows an application to control keyguard. Only allowed for system processes. 2889 @hide --> 2890 <permission android:name="android.permission.CONTROL_KEYGUARD" 2891 android:protectionLevel="signature" /> 2892 2893 <!-- Allows an application to listen to trust changes. Only allowed for system processes. 2894 @hide --> 2895 <permission android:name="android.permission.TRUST_LISTENER" 2896 android:protectionLevel="signature" /> 2897 2898 <!-- @SystemApi Allows an application to provide a trust agent. 2899 @hide For security reasons, this is a platform-only permission. --> 2900 <permission android:name="android.permission.PROVIDE_TRUST_AGENT" 2901 android:protectionLevel="signature|privileged" /> 2902 2903 <!-- Allows an application to launch the trust agent settings activity. 2904 @hide --> 2905 <permission android:name="android.permission.LAUNCH_TRUST_AGENT_SETTINGS" 2906 android:protectionLevel="signature|privileged" /> 2907 2908 <!-- @SystemApi Must be required by an {@link 2909 android.service.trust.TrustAgentService}, 2910 to ensure that only the system can bind to it. 2911 @hide --> 2912 <permission android:name="android.permission.BIND_TRUST_AGENT" 2913 android:protectionLevel="signature" /> 2914 2915 <!-- Must be required by an {@link 2916 android.service.notification.NotificationListenerService}, 2917 to ensure that only the system can bind to it. 2918 <p>Protection level: signature 2919 --> 2920 <permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE" 2921 android:protectionLevel="signature" /> 2922 2923 <!-- Must be required by an {@link 2924 android.service.notification.NotificationRankerService to ensure that only the system can bind to it. 2925 <p>Protection level: signature 2926 @hide This is not a third-party API (intended for system apps). --> 2927 --> 2928 <permission android:name="android.permission.BIND_NOTIFICATION_RANKER_SERVICE" 2929 android:protectionLevel="signature" /> 2930 2931 <!-- Must be required by a {@link 2932 android.service.chooser.ChooserTargetService}, to ensure that 2933 only the system can bind to it. 2934 <p>Protection level: signature 2935 --> 2936 <permission android:name="android.permission.BIND_CHOOSER_TARGET_SERVICE" 2937 android:protectionLevel="signature" /> 2938 2939 <!-- Must be required by a {@link 2940 android.service.notification.ConditionProviderService}, 2941 to ensure that only the system can bind to it. 2942 <p>Protection level: signature 2943 --> 2944 <permission android:name="android.permission.BIND_CONDITION_PROVIDER_SERVICE" 2945 android:protectionLevel="signature" /> 2946 2947 <!-- Must be required by an {@link android.service.dreams.DreamService}, 2948 to ensure that only the system can bind to it. 2949 <p>Protection level: signature 2950 --> 2951 <permission android:name="android.permission.BIND_DREAM_SERVICE" 2952 android:protectionLevel="signature" /> 2953 2954 <!-- @SystemApi Allows an application to call into a carrier setup flow. It is up to the 2955 carrier setup application to enforce that this permission is required 2956 @hide This is not a third-party API (intended for OEMs and system apps). --> 2957 <permission android:name="android.permission.INVOKE_CARRIER_SETUP" 2958 android:protectionLevel="signature|privileged" /> 2959 2960 <!-- @SystemApi Allows an application to listen for network condition observations. 2961 @hide This is not a third-party API (intended for system apps). --> 2962 <permission android:name="android.permission.ACCESS_NETWORK_CONDITIONS" 2963 android:protectionLevel="signature|privileged" /> 2964 2965 <!-- @SystemApi Allows an application to provision and access DRM certificates 2966 @hide This is not a third-party API (intended for system apps). --> 2967 <permission android:name="android.permission.ACCESS_DRM_CERTIFICATES" 2968 android:protectionLevel="signature|privileged" /> 2969 2970 <!-- Api Allows an application to manage media projection sessions. 2971 @hide This is not a third-party API (intended for system apps). --> 2972 <permission android:name="android.permission.MANAGE_MEDIA_PROJECTION" 2973 android:protectionLevel="signature" /> 2974 2975 <!-- @SystemApi Allows an application to read install sessions 2976 @hide This is not a third-party API (intended for system apps). --> 2977 <permission android:name="android.permission.READ_INSTALL_SESSIONS" 2978 android:label="@string/permlab_readInstallSessions" 2979 android:description="@string/permdesc_readInstallSessions" 2980 android:protectionLevel="normal"/> 2981 2982 <!-- @SystemApi Allows an application to remove DRM certificates 2983 @hide This is not a third-party API (intended for system apps). --> 2984 <permission android:name="android.permission.REMOVE_DRM_CERTIFICATES" 2985 android:protectionLevel="signature|privileged" /> 2986 2987 <!-- @deprecated Use {@link android.Manifest.permission#BIND_CARRIER_SERVICES} instead --> 2988 <permission android:name="android.permission.BIND_CARRIER_MESSAGING_SERVICE" 2989 android:protectionLevel="signature|privileged" /> 2990 2991 <!-- Allows an application to interact with the currently active 2992 {@link android.service.voice.VoiceInteractionService}. 2993 @hide --> 2994 <permission android:name="android.permission.ACCESS_VOICE_INTERACTION_SERVICE" 2995 android:protectionLevel="signature" /> 2996 2997 <!-- The system process that is allowed to bind to services in carrier apps will 2998 have this permission. Carrier apps should use this permission to protect 2999 their services that only the system is allowed to bind to. 3000 <p>Protection level: system|signature 3001 --> 3002 <permission android:name="android.permission.BIND_CARRIER_SERVICES" 3003 android:label="@string/permlab_bindCarrierServices" 3004 android:description="@string/permdesc_bindCarrierServices" 3005 android:protectionLevel="signature|privileged" /> 3006 3007 <!-- Allows an application to query whether DO_NOT_ASK_CREDENTIALS_ON_BOOT 3008 flag is set. 3009 @hide --> 3010 <permission android:name="android.permission.QUERY_DO_NOT_ASK_CREDENTIALS_ON_BOOT" 3011 android:protectionLevel="signature" /> 3012 3013 <!-- @SystemApi Allows applications to kill UIDs. 3014 <p>Not for use by third-party applications. 3015 @hide --> 3016 <permission android:name="android.permission.KILL_UID" 3017 android:protectionLevel="signature|installer" /> 3018 3019 <!-- @SystemApi Allows applications to read the local WiFi and Bluetooth MAC address. 3020 @hide --> 3021 <permission android:name="android.permission.LOCAL_MAC_ADDRESS" 3022 android:protectionLevel="signature|privileged" /> 3023 3024 <!-- @SystemApi Allows access to MAC addresses of WiFi and Bluetooth peer devices. 3025 @hide --> 3026 <permission android:name="android.permission.PEERS_MAC_ADDRESS" 3027 android:protectionLevel="signature" /> 3028 3029 <!-- Allows the Nfc stack to dispatch Nfc messages to applications. Applications 3030 can use this permission to ensure incoming Nfc messages are from the Nfc stack 3031 and not simulated by another application. 3032 @hide --> 3033 <permission android:name="android.permission.DISPATCH_NFC_MESSAGE" 3034 android:protectionLevel="signature|privileged" /> 3035 3036 <!-- @SystemApi Allows changing day / night mode when system is configured with 3037 config_lockDayNightMode set to true. If requesting app does not have permission, 3038 it will be ignored. 3039 @hide --> 3040 <permission android:name="android.permission.MODIFY_DAY_NIGHT_MODE" 3041 android:protectionLevel="signature|privileged" /> 3042 3043 <!-- The system process is explicitly the only one allowed to launch the 3044 confirmation UI for full backup/restore --> 3045 <uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/> 3046 3047 3048 <!-- Allows the holder to access the ephemeral applications on the device. 3049 @hide --> 3050 <permission android:name="android.permission.ACCESS_EPHEMERAL_APPS" 3051 android:protectionLevel="signature" /> 3052 3053 <!-- Allows receiving the usage of media resource e.g. video/audio codec and 3054 graphic memory. 3055 @hide --> 3056 <permission android:name="android.permission.RECEIVE_MEDIA_RESOURCE_USAGE" 3057 android:protectionLevel="signature|privileged" /> 3058 3059 <!-- Must be required by system/priv apps when accessing the sound trigger 3060 APIs given by {@link SoundTriggerManager}. 3061 @hide <p>Not for use by third-party applications.</p> --> 3062 <permission android:name="android.permission.MANAGE_SOUND_TRIGGER" 3063 android:protectionLevel="signature|privileged" /> 3064 3065 <!-- @SystemApi Allows trusted applications to dispatch managed provisioning message to Managed 3066 Provisioning app. If requesting app does not have permission, it will be ignored. 3067 @hide --> 3068 <permission android:name="android.permission.DISPATCH_PROVISIONING_MESSAGE" 3069 android:protectionLevel="signature|privileged" /> 3070 3071 <!-- Allows the holder to read blocked numbers. See 3072 {@link android.provider.BlockedNumberContract}. 3073 @hide --> 3074 <permission android:name="android.permission.READ_BLOCKED_NUMBERS" 3075 android:protectionLevel="signature" /> 3076 3077 <!-- Allows the holder to write blocked numbers. See 3078 {@link android.provider.BlockedNumberContract}. 3079 @hide --> 3080 <permission android:name="android.permission.WRITE_BLOCKED_NUMBERS" 3081 android:protectionLevel="signature" /> 3082 3083 <!-- Must be required by an {@link android.service.vr.VrListenerService}, to ensure that only 3084 the system can bind to it. 3085 <p>Protection level: signature --> 3086 <permission android:name="android.permission.BIND_VR_LISTENER_SERVICE" 3087 android:protectionLevel="signature" /> 3088 3089 <!-- Required to make calls to {@link android.service.vr.IVrManager}. 3090 @hide --> 3091 <permission android:name="android.permission.ACCESS_VR_MANAGER" 3092 android:protectionLevel="signature" /> 3093 3094 <!-- Allows an application to whitelist tasks during lock task mode 3095 @hide <p>Not for use by third-party applications.</p> --> 3096 <permission android:name="android.permission.UPDATE_LOCK_TASK_PACKAGES" 3097 android:protectionLevel="signature|setup" /> 3098 3099 <!-- @SystemApi Allows an application to replace the app name displayed alongside notifications 3100 in the N-release and later. 3101 @hide <p>Not for use by third-party applications.</p> --> 3102 <permission android:name="android.permission.SUBSTITUTE_NOTIFICATION_APP_NAME" 3103 android:protectionLevel="signature|privileged" /> 3104 3105 <application android:process="system" 3106 android:persistent="true" 3107 android:hasCode="false" 3108 android:label="@string/android_system_label" 3109 android:allowClearUserData="false" 3110 android:backupAgent="com.android.server.backup.SystemBackupAgent" 3111 android:killAfterRestore="false" 3112 android:icon="@drawable/ic_launcher_android" 3113 android:supportsRtl="true" 3114 android:theme="@style/Theme.Material.Light.DarkActionBar" 3115 android:defaultToDeviceProtectedStorage="true" 3116 android:directBootAware="true"> 3117 <activity android:name="com.android.internal.app.ChooserActivity" 3118 android:theme="@style/Theme.DeviceDefault.Resolver" 3119 android:finishOnCloseSystemDialogs="true" 3120 android:excludeFromRecents="true" 3121 android:documentLaunchMode="never" 3122 android:relinquishTaskIdentity="true" 3123 android:configChanges="screenSize|smallestScreenSize|screenLayout|orientation|keyboard|keyboardHidden" 3124 android:process=":ui"> 3125 <intent-filter> 3126 <action android:name="android.intent.action.CHOOSER" /> 3127 <category android:name="android.intent.category.DEFAULT" /> 3128 <category android:name="android.intent.category.VOICE" /> 3129 </intent-filter> 3130 </activity> 3131 <activity android:name="com.android.internal.app.IntentForwarderActivity" 3132 android:finishOnCloseSystemDialogs="true" 3133 android:theme="@style/Theme.NoDisplay" 3134 android:excludeFromRecents="true" 3135 android:label="@string/user_owner_label" 3136 android:exported="true" 3137 > 3138 </activity> 3139 <activity-alias android:name="com.android.internal.app.ForwardIntentToParent" 3140 android:targetActivity="com.android.internal.app.IntentForwarderActivity" 3141 android:exported="true" 3142 android:label="@string/user_owner_label"> 3143 </activity-alias> 3144 <activity-alias android:name="com.android.internal.app.ForwardIntentToManagedProfile" 3145 android:targetActivity="com.android.internal.app.IntentForwarderActivity" 3146 android:icon="@drawable/ic_corp_icon" 3147 android:exported="true" 3148 android:label="@string/managed_profile_label"> 3149 </activity-alias> 3150 <activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity" 3151 android:theme="@style/Theme.Material.Light.Dialog" 3152 android:label="@string/heavy_weight_switcher_title" 3153 android:finishOnCloseSystemDialogs="true" 3154 android:excludeFromRecents="true" 3155 android:process=":ui"> 3156 </activity> 3157 <activity android:name="com.android.internal.app.PlatLogoActivity" 3158 android:theme="@style/Theme.Wallpaper.NoTitleBar.Fullscreen" 3159 android:configChanges="orientation|keyboardHidden" 3160 android:process=":ui"> 3161 </activity> 3162 <activity android:name="com.android.internal.app.DisableCarModeActivity" 3163 android:theme="@style/Theme.NoDisplay" 3164 android:excludeFromRecents="true" 3165 android:process=":ui"> 3166 </activity> 3167 <activity android:name="com.android.internal.app.DumpHeapActivity" 3168 android:theme="@style/Theme.Translucent.NoTitleBar" 3169 android:label="@string/dump_heap_title" 3170 android:finishOnCloseSystemDialogs="true" 3171 android:noHistory="true" 3172 android:excludeFromRecents="true" 3173 android:process=":ui"> 3174 </activity> 3175 <provider android:name="com.android.server.am.DumpHeapProvider" 3176 android:authorities="com.android.server.heapdump" 3177 android:grantUriPermissions="true" 3178 android:multiprocess="false" 3179 android:singleUser="true" /> 3180 3181 <activity android:name="android.accounts.ChooseAccountActivity" 3182 android:excludeFromRecents="true" 3183 android:exported="true" 3184 android:theme="@style/Theme.Material.Light.Dialog" 3185 android:label="@string/choose_account_label" 3186 android:process=":ui"> 3187 </activity> 3188 3189 <activity android:name="android.accounts.ChooseTypeAndAccountActivity" 3190 android:excludeFromRecents="true" 3191 android:exported="true" 3192 android:theme="@style/Theme.Material.Light.Dialog" 3193 android:label="@string/choose_account_label" 3194 android:process=":ui"> 3195 </activity> 3196 3197 <activity android:name="android.accounts.ChooseAccountTypeActivity" 3198 android:excludeFromRecents="true" 3199 android:theme="@style/Theme.Material.Light.Dialog" 3200 android:label="@string/choose_account_label" 3201 android:process=":ui"> 3202 </activity> 3203 3204 <activity android:name="android.accounts.CantAddAccountActivity" 3205 android:excludeFromRecents="true" 3206 android:exported="true" 3207 android:theme="@style/Theme.Material.Light.Dialog.NoActionBar" 3208 android:process=":ui"> 3209 </activity> 3210 3211 <activity android:name="android.accounts.GrantCredentialsPermissionActivity" 3212 android:excludeFromRecents="true" 3213 android:exported="true" 3214 android:theme="@style/Theme.Material.Light.DialogWhenLarge" 3215 android:process=":ui"> 3216 </activity> 3217 3218 <activity android:name="android.content.SyncActivityTooManyDeletes" 3219 android:theme="@style/Theme.Material.Light.Dialog" 3220 android:label="@string/sync_too_many_deletes" 3221 android:process=":ui"> 3222 </activity> 3223 3224 <activity android:name="com.android.internal.app.ShutdownActivity" 3225 android:permission="android.permission.SHUTDOWN" 3226 android:theme="@style/Theme.NoDisplay" 3227 android:excludeFromRecents="true"> 3228 <intent-filter> 3229 <action android:name="android.intent.action.ACTION_REQUEST_SHUTDOWN" /> 3230 <category android:name="android.intent.category.DEFAULT" /> 3231 </intent-filter> 3232 <intent-filter> 3233 <action android:name="android.intent.action.REBOOT" /> 3234 <category android:name="android.intent.category.DEFAULT" /> 3235 </intent-filter> 3236 </activity> 3237 3238 <activity android:name="com.android.internal.app.NetInitiatedActivity" 3239 android:theme="@style/Theme.Material.Light.Dialog.Alert" 3240 android:excludeFromRecents="true" 3241 android:process=":ui"> 3242 </activity> 3243 3244 <activity android:name="com.android.internal.app.SystemUserHomeActivity" 3245 android:enabled="false" 3246 android:process=":ui" 3247 android:systemUserOnly="true" 3248 android:theme="@style/Theme.Translucent.NoTitleBar"> 3249 <intent-filter android:priority="-100"> 3250 <action android:name="android.intent.action.MAIN" /> 3251 <category android:name="android.intent.category.HOME" /> 3252 </intent-filter> 3253 </activity> 3254 3255 <!-- Activity to prompt user if it's ok to create a new user sandbox for a 3256 specified account. --> 3257 <activity android:name="com.android.internal.app.ConfirmUserCreationActivity" 3258 android:excludeFromRecents="true" 3259 android:process=":ui" 3260 android:theme="@style/Theme.Material.Light.Dialog.Alert"> 3261 <intent-filter android:priority="1000"> 3262 <action android:name="android.os.action.CREATE_USER" /> 3263 <category android:name="android.intent.category.DEFAULT" /> 3264 </intent-filter> 3265 </activity> 3266 3267 <activity android:name="com.android.internal.app.UnlaunchableAppActivity" 3268 android:theme="@style/Theme.Material.Light.Dialog.Alert" 3269 android:excludeFromRecents="true" 3270 android:process=":ui"> 3271 </activity> 3272 3273 <receiver android:name="com.android.server.BootReceiver" 3274 android:systemUserOnly="true"> 3275 <intent-filter android:priority="1000"> 3276 <action android:name="android.intent.action.BOOT_COMPLETED" /> 3277 </intent-filter> 3278 </receiver> 3279 3280 <receiver android:name="com.android.server.updates.CertPinInstallReceiver" 3281 android:permission="android.permission.UPDATE_CONFIG"> 3282 <intent-filter> 3283 <action android:name="android.intent.action.UPDATE_PINS" /> 3284 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3285 </intent-filter> 3286 </receiver> 3287 3288 <receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver" 3289 android:permission="android.permission.UPDATE_CONFIG"> 3290 <intent-filter> 3291 <action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" /> 3292 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3293 </intent-filter> 3294 </receiver> 3295 3296 <receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver" 3297 android:permission="android.permission.UPDATE_CONFIG"> 3298 <intent-filter> 3299 <action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" /> 3300 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3301 </intent-filter> 3302 </receiver> 3303 3304 <receiver android:name="com.android.server.updates.ApnDbInstallReceiver" 3305 android:permission="android.permission.UPDATE_CONFIG"> 3306 <intent-filter> 3307 <action android:name="android.intent.action.UPDATE_APN_DB" /> 3308 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3309 </intent-filter> 3310 </receiver> 3311 3312 <receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver" 3313 android:permission="android.permission.UPDATE_CONFIG"> 3314 <intent-filter> 3315 <action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" /> 3316 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3317 </intent-filter> 3318 </receiver> 3319 3320 <receiver android:name="com.android.server.updates.TzDataInstallReceiver" 3321 android:permission="android.permission.UPDATE_CONFIG"> 3322 <intent-filter> 3323 <action android:name="android.intent.action.UPDATE_TZDATA" /> 3324 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3325 </intent-filter> 3326 </receiver> 3327 3328 <receiver android:name="com.android.server.updates.SELinuxPolicyInstallReceiver" 3329 android:permission="android.permission.UPDATE_CONFIG"> 3330 <intent-filter> 3331 <action android:name="android.intent.action.UPDATE_SEPOLICY" /> 3332 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3333 </intent-filter> 3334 </receiver> 3335 3336 <receiver android:name="com.android.server.MasterClearReceiver" 3337 android:permission="android.permission.MASTER_CLEAR"> 3338 <intent-filter 3339 android:priority="100" > 3340 <!-- For Checkin, Settings, etc.: action=MASTER_CLEAR --> 3341 <action android:name="android.intent.action.MASTER_CLEAR" /> 3342 3343 <!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR --> 3344 <action android:name="com.google.android.c2dm.intent.RECEIVE" /> 3345 <category android:name="android.intent.category.MASTER_CLEAR" /> 3346 </intent-filter> 3347 </receiver> 3348 3349 <service android:name="android.hardware.location.GeofenceHardwareService" 3350 android:permission="android.permission.LOCATION_HARDWARE" 3351 android:exported="false" /> 3352 3353 <service android:name="com.android.internal.backup.LocalTransportService" 3354 android:permission="android.permission.CONFIRM_FULL_BACKUP" 3355 android:exported="false"> 3356 <intent-filter> 3357 <action android:name="android.backup.TRANSPORT_HOST" /> 3358 </intent-filter> 3359 </service> 3360 3361 <service android:name="com.android.server.MountServiceIdler" 3362 android:exported="true" 3363 android:permission="android.permission.BIND_JOB_SERVICE" > 3364 </service> 3365 3366 <service android:name="com.android.server.backup.FullBackupJob" 3367 android:exported="true" 3368 android:permission="android.permission.BIND_JOB_SERVICE" > 3369 </service> 3370 3371 <service android:name="com.android.server.backup.KeyValueBackupJob" 3372 android:permission="android.permission.BIND_JOB_SERVICE" > 3373 </service> 3374 3375 <service android:name="com.android.server.content.SyncJobService" 3376 android:permission="android.permission.BIND_JOB_SERVICE" > 3377 </service> 3378 3379 <service 3380 android:name="com.android.server.pm.BackgroundDexOptService" 3381 android:exported="true" 3382 android:permission="android.permission.BIND_JOB_SERVICE"> 3383 </service> 3384 3385 </application> 3386 3387 </manifest> 3388