Home | History | Annotate | Download | only in res
      1 <?xml version="1.0" encoding="utf-8"?>
      2 <!--
      3 /* //device/apps/common/AndroidManifest.xml
      4 **
      5 ** Copyright 2006, The Android Open Source Project
      6 **
      7 ** Licensed under the Apache License, Version 2.0 (the "License");
      8 ** you may not use this file except in compliance with the License.
      9 ** You may obtain a copy of the License at
     10 **
     11 **     http://www.apache.org/licenses/LICENSE-2.0
     12 **
     13 ** Unless required by applicable law or agreed to in writing, software
     14 ** distributed under the License is distributed on an "AS IS" BASIS,
     15 ** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
     16 ** See the License for the specific language governing permissions and
     17 ** limitations under the License.
     18 */
     19 -->
     20 <manifest xmlns:android="http://schemas.android.com/apk/res/android"
     21     package="android" coreApp="true" android:sharedUserId="android.uid.system"
     22     android:sharedUserLabel="@string/android_system_label">
     23 
     24     <!-- ================================================ -->
     25     <!-- Special broadcasts that only the system can send -->
     26     <!-- ================================================ -->
     27     <eat-comment />
     28 
     29     <protected-broadcast android:name="android.intent.action.SCREEN_OFF" />
     30     <protected-broadcast android:name="android.intent.action.SCREEN_ON" />
     31     <protected-broadcast android:name="android.intent.action.USER_PRESENT" />
     32     <protected-broadcast android:name="android.intent.action.TIME_SET" />
     33     <protected-broadcast android:name="android.intent.action.TIME_TICK" />
     34     <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" />
     35     <protected-broadcast android:name="android.intent.action.DATE_CHANGED" />
     36     <protected-broadcast android:name="android.intent.action.PRE_BOOT_COMPLETED" />
     37     <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" />
     38     <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" />
     39     <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" />
     40     <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" />
     41     <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" />
     42     <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" />
     43     <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" />
     44     <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" />
     45     <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" />
     46     <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" />
     47     <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" />
     48     <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" />
     49     <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" />
     50     <protected-broadcast android:name="android.intent.action.PACKAGES_SUSPENDED" />
     51     <protected-broadcast android:name="android.intent.action.PACKAGES_UNSUSPENDED" />
     52     <protected-broadcast android:name="android.intent.action.ACTION_PREFERRED_ACTIVITY_CHANGED" />
     53     <protected-broadcast android:name="android.intent.action.UID_REMOVED" />
     54     <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" />
     55     <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" />
     56     <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" />
     57     <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" />
     58     <protected-broadcast android:name="android.intent.action.BATTERY_LOW" />
     59     <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" />
     60     <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" />
     61     <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" />
     62     <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" />
     63     <protected-broadcast android:name="android.intent.action.CHARGING" />
     64     <protected-broadcast android:name="android.intent.action.DISCHARGING" />
     65     <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" />
     66     <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" />
     67     <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" />
     68     <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" />
     69     <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" />
     70     <protected-broadcast android:name="android.intent.action.REBOOT" />
     71     <protected-broadcast android:name="android.intent.action.DOCK_EVENT" />
     72     <protected-broadcast android:name="android.intent.action.THERMAL_EVENT" />
     73     <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" />
     74     <protected-broadcast android:name="android.intent.action.USER_ADDED" />
     75     <protected-broadcast android:name="android.intent.action.USER_REMOVED" />
     76     <protected-broadcast android:name="android.intent.action.USER_STARTING" />
     77     <protected-broadcast android:name="android.intent.action.USER_STARTED" />
     78     <protected-broadcast android:name="android.intent.action.USER_STOPPING" />
     79     <protected-broadcast android:name="android.intent.action.USER_STOPPED" />
     80     <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" />
     81     <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" />
     82     <protected-broadcast android:name="android.intent.action.USER_SWITCHED" />
     83     <protected-broadcast android:name="android.intent.action.USER_INITIALIZE" />
     84     <protected-broadcast android:name="android.intent.action.INTENT_FILTER_NEEDS_VERIFICATION" />
     85     <protected-broadcast android:name="android.intent.action.OVERLAY_ADDED" />
     86     <protected-broadcast android:name="android.intent.action.OVERLAY_CHANGED" />
     87     <protected-broadcast android:name="android.intent.action.OVERLAY_REMOVED" />
     88     <protected-broadcast android:name="android.intent.action.OVERLAY_PRIORITY_CHANGED" />
     89 
     90     <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED" />
     91     <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGING" />
     92     <protected-broadcast android:name="android.os.action.DEVICE_IDLE_MODE_CHANGED" />
     93     <protected-broadcast android:name="android.os.action.POWER_SAVE_WHITELIST_CHANGED" />
     94     <protected-broadcast android:name="android.os.action.POWER_SAVE_TEMP_WHITELIST_CHANGED" />
     95     <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED_INTERNAL" />
     96 
     97     <protected-broadcast android:name="android.os.action.SCREEN_BRIGHTNESS_BOOST_CHANGED" />
     98 
     99     <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" />
    100     <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" />
    101     <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" />
    102     <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" />
    103     <protected-broadcast android:name="android.app.action.NEXT_ALARM_CLOCK_CHANGED" />
    104 
    105     <protected-broadcast android:name="android.app.action.BUGREPORT_SHARING_DECLINED" />
    106     <protected-broadcast android:name="android.app.action.BUGREPORT_FAILED" />
    107     <protected-broadcast android:name="android.app.action.BUGREPORT_SHARE" />
    108     <protected-broadcast android:name="android.app.action.SHOW_DEVICE_MONITORING_DIALOG" />
    109 
    110     <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" />
    111     <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" />
    112     <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" />
    113     <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" />
    114     <protected-broadcast android:name="android.appwidget.action.APPWIDGET_HOST_RESTORED" />
    115     <protected-broadcast android:name="android.appwidget.action.APPWIDGET_RESTORED" />
    116 
    117     <protected-broadcast android:name="android.os.action.SETTING_RESTORED" />
    118 
    119     <protected-broadcast android:name="android.app.backup.intent.RUN" />
    120     <protected-broadcast android:name="android.app.backup.intent.CLEAR" />
    121     <protected-broadcast android:name="android.app.backup.intent.INIT" />
    122 
    123     <protected-broadcast android:name="android.bluetooth.intent.DISCOVERABLE_TIMEOUT" />
    124     <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" />
    125     <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" />
    126     <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" />
    127     <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" />
    128     <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" />
    129     <protected-broadcast android:name="android.bluetooth.adapter.action.BLUETOOTH_ADDRESS_CHANGED" />
    130     <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" />
    131     <protected-broadcast android:name="android.bluetooth.device.action.UUID" />
    132     <protected-broadcast android:name="android.bluetooth.device.action.MAS_INSTANCE" />
    133     <protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" />
    134     <protected-broadcast android:name="android.bluetooth.device.action.FOUND" />
    135     <protected-broadcast android:name="android.bluetooth.device.action.DISAPPEARED" />
    136     <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" />
    137     <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" />
    138     <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" />
    139     <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" />
    140     <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" />
    141     <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" />
    142     <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" />
    143     <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" />
    144     <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" />
    145     <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" />
    146     <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" />
    147     <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" />
    148     <protected-broadcast android:name="android.bluetooth.device.action.SDP_RECORD" />
    149     <protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" />
    150     <protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" />
    151     <protected-broadcast
    152         android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" />
    153     <protected-broadcast
    154         android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" />
    155     <protected-broadcast
    156         android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" />
    157     <protected-broadcast
    158         android:name="android.bluetooth.headset.action.HF_INDICATORS_VALUE_CHANGED" />
    159     <protected-broadcast
    160         android:name="android.bluetooth.headsetclient.profile.action.CONNECTION_STATE_CHANGED" />
    161     <protected-broadcast
    162         android:name="android.bluetooth.headsetclient.profile.action.AUDIO_STATE_CHANGED" />
    163     <protected-broadcast
    164         android:name="android.bluetooth.headsetclient.profile.action.AG_EVENT" />
    165     <protected-broadcast
    166         android:name="android.bluetooth.headsetclient.profile.action.AG_CALL_CHANGED" />
    167     <protected-broadcast
    168         android:name="android.bluetooth.headsetclient.profile.action.RESULT" />
    169     <protected-broadcast
    170         android:name="android.bluetooth.headsetclient.profile.action.LAST_VTAG" />
    171     <protected-broadcast
    172         android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" />
    173     <protected-broadcast
    174         android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" />
    175     <protected-broadcast
    176         android:name="android.bluetooth.a2dp.profile.action.CODEC_CONFIG_CHANGED" />
    177     <protected-broadcast
    178         android:name="android.bluetooth.a2dp-sink.profile.action.CONNECTION_STATE_CHANGED" />
    179     <protected-broadcast
    180         android:name="android.bluetooth.a2dp-sink.profile.action.PLAYING_STATE_CHANGED" />
    181     <protected-broadcast
    182         android:name="android.bluetooth.a2dp-sink.profile.action.AUDIO_CONFIG_CHANGED" />
    183     <protected-broadcast
    184         android:name="android.bluetooth.avrcp-controller.profile.action.CONNECTION_STATE_CHANGED" />
    185     <protected-broadcast
    186         android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" />
    187     <protected-broadcast
    188         android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" />
    189     <protected-broadcast
    190         android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" />
    191     <protected-broadcast
    192         android:name="android.bluetooth.inputhost.profile.action.CONNECTION_STATE_CHANGED" />
    193     <protected-broadcast
    194         android:name="android.bluetooth.map.profile.action.CONNECTION_STATE_CHANGED" />
    195     <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.CONNECTION_STATE_CHANGED" />
    196     <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_RECEIVED" />
    197     <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_SENT_SUCCESSFULLY" />
    198     <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_DELIVERED_SUCCESSFULLY" />
    199     <protected-broadcast
    200         android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_SENT" />
    201     <protected-broadcast
    202         android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_DELIVERY" />
    203     <protected-broadcast
    204         android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" />
    205     <protected-broadcast android:name="android.bluetooth.pbap.intent.action.PBAP_STATE_CHANGED" />
    206     <protected-broadcast android:name="android.bluetooth.pbap.profile.action.CONNECTION_STATE_CHANGED" />
    207     <protected-broadcast android:name="android.bluetooth.sap.profile.action.CONNECTION_STATE_CHANGED" />
    208     <protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" />
    209     <protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" />
    210     <protected-broadcast android:name="android.btopp.intent.action.LIST" />
    211     <protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" />
    212     <protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" />
    213     <protected-broadcast android:name="android.btopp.intent.action.CONFIRM" />
    214     <protected-broadcast android:name="android.btopp.intent.action.HIDE" />
    215     <protected-broadcast android:name="android.btopp.intent.action.RETRY" />
    216     <protected-broadcast android:name="android.btopp.intent.action.OPEN" />
    217     <protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" />
    218     <protected-broadcast android:name="android.btopp.intent.action.TRANSFER_COMPLETE" />
    219     <protected-broadcast android:name="android.btopp.intent.action.ACCEPT" />
    220     <protected-broadcast android:name="android.btopp.intent.action.DECLINE" />
    221     <protected-broadcast android:name="com.android.bluetooth.gatt.REFRESH_BATCHED_SCAN" />
    222     <protected-broadcast android:name="com.android.bluetooth.pbap.authchall" />
    223     <protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" />
    224     <protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" />
    225     <protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" />
    226     <protected-broadcast android:name="com.android.bluetooth.sap.USER_CONFIRM_TIMEOUT" />
    227     <protected-broadcast android:name="com.android.bluetooth.sap.action.DISCONNECT_ACTION" />
    228 
    229     <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" />
    230 
    231     <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" />
    232     <protected-broadcast android:name="android.hardware.usb.action.USB_PORT_CHANGED" />
    233     <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" />
    234     <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_DETACHED" />
    235     <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" />
    236     <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" />
    237 
    238     <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" />
    239     <protected-broadcast android:name="android.media.action.HDMI_AUDIO_PLUG" />
    240 
    241     <protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" />
    242     <protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" />
    243     <protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" />
    244     <protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" />
    245     <protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" />
    246     <protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" />
    247     <protected-broadcast android:name="android.media.MASTER_MONO_CHANGED_ACTION" />
    248     <protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" />
    249     <protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" />
    250 
    251     <protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" />
    252     <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" />
    253     <protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" />
    254     <protected-broadcast android:name="android.intent.action.MEDIA_NOFS" />
    255     <protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" />
    256     <protected-broadcast android:name="android.intent.action.MEDIA_SHARED" />
    257     <protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" />
    258     <protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" />
    259     <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" />
    260     <protected-broadcast android:name="android.intent.action.MEDIA_EJECT" />
    261 
    262     <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL" />
    263     <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" />
    264     <!-- @deprecated.  Only {@link android.net.ConnectivityManager.CONNECTIVITY_ACTION} is sent. -->
    265     <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" />
    266     <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" />
    267     <protected-broadcast android:name="android.net.conn.RESTRICT_BACKGROUND_CHANGED" />
    268     <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" />
    269     <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" />
    270 
    271     <protected-broadcast android:name="android.net.nsd.STATE_CHANGED" />
    272 
    273     <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" />
    274     <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" />
    275     <protected-broadcast android:name="com.android.nfc.action.LLCP_UP" />
    276     <protected-broadcast android:name="com.android.nfc.action.LLCP_DOWN" />
    277     <protected-broadcast android:name="com.android.nfc.cardemulation.action.CLOSE_TAP_DIALOG" />
    278     <protected-broadcast android:name="com.android.nfc.handover.action.ALLOW_CONNECT" />
    279     <protected-broadcast android:name="com.android.nfc.handover.action.DENY_CONNECT" />
    280     <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" />
    281     <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" />
    282     <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" />
    283     <!-- For NFC to BT handover -->
    284     <protected-broadcast android:name="android.btopp.intent.action.WHITELIST_DEVICE" />
    285     <protected-broadcast android:name="android.btopp.intent.action.STOP_HANDOVER_TRANSFER" />
    286     <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND" />
    287     <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND_MULTIPLE" />
    288 
    289     <protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" />
    290     <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" />
    291 
    292     <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" />
    293 
    294     <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" />
    295     <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" />
    296     <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" />
    297 
    298     <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" />
    299     <protected-broadcast android:name="com.android.server.WifiManager.action.START_PNO" />
    300     <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" />
    301     <protected-broadcast android:name="com.android.server.WifiManager.action.DEVICE_IDLE" />
    302     <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_ACCEPTED" />
    303     <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_DECLINED" />
    304     <protected-broadcast android:name="com.android.server.usb.ACTION_OPEN_IN_APPS" />
    305     <protected-broadcast android:name="com.android.server.am.DELETE_DUMPHEAP" />
    306     <protected-broadcast android:name="com.android.server.net.action.SNOOZE_WARNING" />
    307     <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" />
    308     <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" />
    309     <protected-broadcast android:name="android.net.wifi.WIFI_CREDENTIAL_CHANGED" />
    310     <protected-broadcast android:name="android.net.wifi.WIFI_SCAN_AVAILABLE" />
    311     <protected-broadcast android:name="android.net.wifi.aware.action.WIFI_AWARE_STATE_CHANGED" />
    312     <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" />
    313     <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" />
    314     <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" />
    315     <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" />
    316     <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" />
    317     <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_DEAUTH_IMMINENT" />
    318     <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_ICON" />
    319     <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_OSU_PROVIDERS_LIST" />
    320     <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_SUBSCRIPTION_REMEDIATION" />
    321     <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" />
    322     <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" />
    323     <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" />
    324     <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" />
    325     <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" />
    326     <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" />
    327     <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" />
    328     <protected-broadcast android:name="android.net.wifi.p2p.PERSISTENT_GROUPS_CHANGED" />
    329     <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" />
    330     <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" />
    331     <protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" />
    332     <protected-broadcast
    333             android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" />
    334     <protected-broadcast android:name="android.net.scoring.SCORE_NETWORKS" />
    335     <protected-broadcast android:name="android.net.scoring.SCORER_CHANGED" />
    336     <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" />
    337     <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" />
    338     <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" />
    339     <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" />
    340     <protected-broadcast android:name="android.intent.action.APPLICATION_RESTRICTIONS_CHANGED" />
    341 
    342     <!-- Legacy -->
    343     <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" />
    344     <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" />
    345 
    346     <protected-broadcast android:name="com.android.server.ACTION_TRIGGER_IDLE" />
    347 
    348     <protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" />
    349 
    350     <protected-broadcast android:name="android.intent.action.PHONE_STATE" />
    351 
    352     <protected-broadcast android:name="android.intent.action.SUB_DEFAULT_CHANGED" />
    353 
    354     <protected-broadcast android:name="android.location.GPS_ENABLED_CHANGE" />
    355     <protected-broadcast android:name="android.location.PROVIDERS_CHANGED" />
    356     <protected-broadcast android:name="android.location.MODE_CHANGED" />
    357     <protected-broadcast android:name="android.location.GPS_FIX_CHANGE" />
    358     <protected-broadcast android:name="android.net.proxy.PAC_REFRESH" />
    359 
    360     <protected-broadcast android:name="android.telecom.action.DEFAULT_DIALER_CHANGED" />
    361     <protected-broadcast android:name="android.provider.action.DEFAULT_SMS_PACKAGE_CHANGED" />
    362     <protected-broadcast android:name="android.intent.action.CONTENT_CHANGED" />
    363     <protected-broadcast android:name="android.provider.Telephony.MMS_DOWNLOADED" />
    364 
    365     <protected-broadcast
    366         android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" />
    367 
    368     <!-- Defined in RestrictionsManager -->
    369     <protected-broadcast
    370         android:name="android.intent.action.PERMISSION_RESPONSE_RECEIVED" />
    371     <!-- Defined in RestrictionsManager -->
    372 
    373     <protected-broadcast android:name="android.intent.action.REQUEST_PERMISSION" />
    374     <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_STARTED" />
    375     <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
    376     <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_PROGRESS" />
    377     <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
    378 
    379     <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_DATA_SUBSCRIPTION_CHANGED" />
    380     <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_VOICE_SUBSCRIPTION_CHANGED" />
    381     <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_CONTENT_CHANGE" />
    382     <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_RECORD_UPDATED" />
    383 
    384     <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_DONE" />
    385     <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_FAILED" />
    386 
    387     <protected-broadcast android:name="android.internal.policy.action.BURN_IN_PROTECTION" />
    388     <protected-broadcast android:name="android.app.action.SYSTEM_UPDATE_POLICY_CHANGED" />
    389     <protected-broadcast android:name="android.app.action.DEVICE_OWNER_CHANGED" />
    390 
    391     <!-- Added in N -->
    392     <protected-broadcast android:name="android.intent.action.ANR" />
    393     <protected-broadcast android:name="android.intent.action.CALL" />
    394     <protected-broadcast android:name="android.intent.action.CALL_PRIVILEGED" />
    395     <protected-broadcast android:name="android.intent.action.DROPBOX_ENTRY_ADDED" />
    396     <protected-broadcast android:name="android.intent.action.INPUT_METHOD_CHANGED" />
    397     <protected-broadcast android:name="android.intent.action.internal_sim_state_changed" />
    398     <protected-broadcast android:name="android.intent.action.LOCKED_BOOT_COMPLETED" />
    399     <protected-broadcast android:name="android.intent.action.PRECISE_CALL_STATE" />
    400     <protected-broadcast android:name="android.intent.action.PRECISE_DATA_CONNECTION_STATE_CHANGED" />
    401     <protected-broadcast android:name="android.intent.action.SUBSCRIPTION_PHONE_STATE" />
    402     <protected-broadcast android:name="android.intent.action.USER_INFO_CHANGED" />
    403     <protected-broadcast android:name="android.intent.action.USER_UNLOCKED" />
    404     <protected-broadcast android:name="android.intent.action.WALLPAPER_CHANGED" />
    405 
    406     <protected-broadcast android:name="android.app.action.DEVICE_POLICY_MANAGER_STATE_CHANGED" />
    407     <protected-broadcast android:name="android.app.action.CHOOSE_PRIVATE_KEY_ALIAS" />
    408     <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLED" />
    409     <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLE_REQUESTED" />
    410     <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_ENABLED" />
    411     <protected-broadcast android:name="android.app.action.LOCK_TASK_ENTERING" />
    412     <protected-broadcast android:name="android.app.action.LOCK_TASK_EXITING" />
    413     <protected-broadcast android:name="android.app.action.NOTIFY_PENDING_SYSTEM_UPDATE" />
    414     <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_CHANGED" />
    415     <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_EXPIRING" />
    416     <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_FAILED" />
    417     <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_SUCCEEDED" />
    418     <protected-broadcast android:name="com.android.server.ACTION_EXPIRED_PASSWORD_NOTIFICATION" />
    419 
    420     <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_ADDED" />
    421     <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNLOCKED" />
    422     <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_REMOVED" />
    423 
    424     <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_STATE_CHANGED" />
    425     <protected-broadcast android:name="com.android.bluetooth.map.USER_CONFIRM_TIMEOUT" />
    426     <protected-broadcast android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_SENT" />
    427     <protected-broadcast android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_DELIVERY" />
    428     <protected-broadcast android:name="android.content.jobscheduler.JOB_DELAY_EXPIRED" />
    429     <protected-broadcast android:name="android.content.syncmanager.SYNC_ALARM" />
    430     <protected-broadcast android:name="android.media.INTERNAL_RINGER_MODE_CHANGED_ACTION" />
    431     <protected-broadcast android:name="android.media.STREAM_DEVICES_CHANGED_ACTION" />
    432     <protected-broadcast android:name="android.media.STREAM_MUTE_CHANGED_ACTION" />
    433     <protected-broadcast android:name="android.net.sip.SIP_SERVICE_UP" />
    434     <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" />
    435     <protected-broadcast android:name="android.os.action.CHARGING" />
    436     <protected-broadcast android:name="android.os.action.DISCHARGING" />
    437     <protected-broadcast android:name="android.search.action.SEARCHABLES_CHANGED" />
    438     <protected-broadcast android:name="android.security.STORAGE_CHANGED" />
    439     <protected-broadcast android:name="android.security.action.TRUST_STORE_CHANGED" />
    440     <protected-broadcast android:name="android.security.action.KEYCHAIN_CHANGED" />
    441     <protected-broadcast android:name="android.security.action.KEY_ACCESS_CHANGED" />
    442     <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_REGISTERED" />
    443     <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_UNREGISTERED" />
    444     <protected-broadcast android:name="android.telecom.action.SHOW_MISSED_CALLS_NOTIFICATION" />
    445     <protected-broadcast android:name="android.telephony.action.CARRIER_CONFIG_CHANGED" />
    446     <protected-broadcast android:name="android.telephony.action.DEFAULT_SUBSCRIPTION_CHANGED" />
    447     <protected-broadcast android:name="android.telephony.action.DEFAULT_SMS_SUBSCRIPTION_CHANGED" />
    448     <protected-broadcast android:name="android.telephony.action.SHOW_VOICEMAIL_NOTIFICATION" />
    449 
    450     <protected-broadcast android:name="com.android.bluetooth.btservice.action.ALARM_WAKEUP" />
    451     <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_POLL" />
    452     <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_UPDATED" />
    453     <protected-broadcast android:name="com.android.server.NetworkTimeUpdateService.action.POLL" />
    454     <protected-broadcast android:name="com.android.server.telecom.intent.action.CALLS_ADD_ENTRY" />
    455     <protected-broadcast android:name="com.android.settings.location.MODE_CHANGING" />
    456     <protected-broadcast android:name="com.android.settings.bluetooth.ACTION_DISMISS_PAIRING" />
    457 
    458     <protected-broadcast android:name="NotificationManagerService.TIMEOUT" />
    459     <protected-broadcast android:name="ScheduleConditionProvider.EVALUATE" />
    460     <protected-broadcast android:name="EventConditionProvider.EVALUATE" />
    461     <protected-broadcast android:name="SnoozeHelper.EVALUATE" />
    462     <protected-broadcast android:name="wifi_scan_available" />
    463 
    464     <protected-broadcast android:name="action.cne.started" />
    465     <protected-broadcast android:name="android.content.jobscheduler.JOB_DEADLINE_EXPIRED" />
    466     <protected-broadcast android:name="android.intent.action.ACTION_UNSOL_RESPONSE_OEM_HOOK_RAW" />
    467     <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_SUPL" />
    468     <protected-broadcast android:name="android.os.action.ACTION_EFFECTS_SUPPRESSOR_CHANGED" />
    469     <protected-broadcast android:name="android.os.action.LIGHT_DEVICE_IDLE_MODE_CHANGED" />
    470     <protected-broadcast android:name="android.os.storage.action.VOLUME_STATE_CHANGED" />
    471     <protected-broadcast android:name="android.os.storage.action.DISK_SCANNED" />
    472     <protected-broadcast android:name="com.android.server.action.UPDATE_TWILIGHT_STATE" />
    473     <protected-broadcast android:name="com.android.server.action.RESET_TWILIGHT_AUTO" />
    474     <protected-broadcast android:name="com.android.server.device_idle.STEP_IDLE_STATE" />
    475     <protected-broadcast android:name="com.android.server.device_idle.STEP_LIGHT_IDLE_STATE" />
    476     <protected-broadcast android:name="com.android.server.Wifi.action.TOGGLE_PNO" />
    477     <protected-broadcast android:name="intent.action.ACTION_RF_BAND_INFO" />
    478     <protected-broadcast android:name="android.intent.action.MEDIA_RESOURCE_GRANTED" />
    479     <protected-broadcast android:name="android.app.action.NETWORK_LOGS_AVAILABLE" />
    480     <protected-broadcast android:name="android.app.action.SECURITY_LOGS_AVAILABLE" />
    481 
    482     <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED" />
    483     <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED_INTERNAL" />
    484     <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_CHANGED" />
    485     <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_ACCESS_GRANTED_CHANGED" />
    486     <protected-broadcast android:name="android.os.action.ACTION_EFFECTS_SUPPRESSOR_CHANGED" />
    487 
    488     <protected-broadcast android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS" />
    489     <protected-broadcast android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS" />
    490 
    491     <protected-broadcast android:name="android.intent.action.DYNAMIC_SENSOR_CHANGED" />
    492 
    493     <protected-broadcast android:name="android.intent.action.ACTION_RADIO_OFF" />
    494 
    495     <protected-broadcast android:name="android.accounts.LOGIN_ACCOUNTS_CHANGED" />
    496     <protected-broadcast android:name="android.accounts.action.ACCOUNT_REMOVED" />
    497     <protected-broadcast android:name="android.accounts.action.VISIBLE_ACCOUNTS_CHANGED" />
    498 
    499     <protected-broadcast android:name="com.android.sync.SYNC_CONN_STATUS_CHANGED" />
    500 
    501     <protected-broadcast android:name="com.android.phone.SIP_INCOMING_CALL" />
    502     <protected-broadcast android:name="com.android.phone.SIP_ADD_PHONE" />
    503     <protected-broadcast android:name="com.android.phone.SIP_REMOVE_PHONE" />
    504     <protected-broadcast android:name="com.android.phone.SIP_CALL_OPTION_CHANGED" />
    505 
    506     <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_CONNECTED" />
    507     <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_DISCONNECTED" />
    508 
    509     <protected-broadcast android:name="android.bluetooth.input.profile.action.HANDSHAKE" />
    510     <protected-broadcast android:name="android.bluetooth.input.profile.action.REPORT" />
    511 
    512     <protected-broadcast android:name="android.intent.action.TWILIGHT_CHANGED" />
    513 
    514     <protected-broadcast android:name="com.android.server.fingerprint.ACTION_LOCKOUT_RESET" />
    515     <protected-broadcast android:name="android.net.wifi.PASSPOINT_ICON_RECEIVED" />
    516     <protected-broadcast android:name="com.android.server.notification.CountdownConditionProvider" />
    517 
    518     <protected-broadcast android:name="com.android.internal.location.ALARM_WAKEUP" />
    519     <protected-broadcast android:name="com.android.internal.location.ALARM_TIMEOUT" />
    520     <protected-broadcast android:name="android.intent.action.GLOBAL_BUTTON" />
    521 
    522     <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_AVAILABLE" />
    523     <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNAVAILABLE" />
    524     <protected-broadcast android:name="com.android.server.pm.DISABLE_QUIET_MODE_AFTER_UNLOCK" />
    525 
    526     <protected-broadcast android:name="com.android.server.retaildemo.ACTION_RESET_DEMO" />
    527 
    528     <protected-broadcast android:name="android.intent.action.DEVICE_LOCKED_CHANGED" />
    529 
    530     <!-- Added in O -->
    531     <!-- TODO: temporary broadcast used by AutoFillManagerServiceImpl; will be removed -->
    532     <protected-broadcast android:name="com.android.internal.autofill.action.REQUEST_AUTOFILL" />
    533     <protected-broadcast android:name="android.app.action.APPLICATION_DELEGATION_SCOPES_CHANGED" />
    534     <protected-broadcast android:name="com.android.server.wm.ACTION_REVOKE_SYSTEM_ALERT_WINDOW_PERMISSION" />
    535     <protected-broadcast android:name="android.media.tv.action.PARENTAL_CONTROLS_ENABLED_CHANGED" />
    536 
    537     <protected-broadcast android:name="android.content.pm.action.SESSION_COMMITTED" />
    538     <protected-broadcast android:name="android.os.action.USER_RESTRICTIONS_CHANGED" />
    539     <protected-broadcast android:name="android.media.tv.action.PREVIEW_PROGRAM_ADDED_TO_WATCH_NEXT" />
    540     <protected-broadcast android:name="android.media.tv.action.PREVIEW_PROGRAM_BROWSABLE_DISABLED" />
    541     <protected-broadcast android:name="android.media.tv.action.WATCH_NEXT_PROGRAM_BROWSABLE_DISABLED" />
    542     <protected-broadcast android:name="android.media.tv.action.CHANNEL_BROWSABLE_REQUESTED" />
    543 
    544     <!-- ====================================================================== -->
    545     <!--                          RUNTIME PERMISSIONS                           -->
    546     <!-- ====================================================================== -->
    547     <eat-comment />
    548 
    549     <!-- ====================================================================== -->
    550     <!-- Permissions for accessing user's contacts including personal profile   -->
    551     <!-- ====================================================================== -->
    552     <eat-comment />
    553 
    554     <!-- Used for runtime permissions related to contacts and profiles on this
    555         device. -->
    556     <permission-group android:name="android.permission-group.CONTACTS"
    557         android:icon="@drawable/perm_group_contacts"
    558         android:label="@string/permgrouplab_contacts"
    559         android:description="@string/permgroupdesc_contacts"
    560         android:priority="100" />
    561 
    562     <!-- Allows an application to read the user's contacts data.
    563         <p>Protection level: dangerous
    564     -->
    565     <permission android:name="android.permission.READ_CONTACTS"
    566         android:permissionGroup="android.permission-group.CONTACTS"
    567         android:label="@string/permlab_readContacts"
    568         android:description="@string/permdesc_readContacts"
    569         android:protectionLevel="dangerous" />
    570 
    571     <!-- Allows an application to write the user's contacts data.
    572          <p>Protection level: dangerous
    573     -->
    574     <permission android:name="android.permission.WRITE_CONTACTS"
    575         android:permissionGroup="android.permission-group.CONTACTS"
    576         android:label="@string/permlab_writeContacts"
    577         android:description="@string/permdesc_writeContacts"
    578         android:protectionLevel="dangerous" />
    579 
    580     <!-- ====================================================================== -->
    581     <!-- Permissions for accessing user's calendar                              -->
    582     <!-- ====================================================================== -->
    583     <eat-comment />
    584 
    585     <!-- Used for runtime permissions related to user's calendar. -->
    586     <permission-group android:name="android.permission-group.CALENDAR"
    587         android:icon="@drawable/perm_group_calendar"
    588         android:label="@string/permgrouplab_calendar"
    589         android:description="@string/permgroupdesc_calendar"
    590         android:priority="200" />
    591 
    592     <!-- Allows an application to read the user's calendar data.
    593          <p>Protection level: dangerous
    594     -->
    595     <permission android:name="android.permission.READ_CALENDAR"
    596         android:permissionGroup="android.permission-group.CALENDAR"
    597         android:label="@string/permlab_readCalendar"
    598         android:description="@string/permdesc_readCalendar"
    599         android:protectionLevel="dangerous" />
    600 
    601     <!-- Allows an application to write the user's calendar data.
    602          <p>Protection level: dangerous
    603     -->
    604     <permission android:name="android.permission.WRITE_CALENDAR"
    605         android:permissionGroup="android.permission-group.CALENDAR"
    606         android:label="@string/permlab_writeCalendar"
    607         android:description="@string/permdesc_writeCalendar"
    608         android:protectionLevel="dangerous" />
    609 
    610     <!-- ====================================================================== -->
    611     <!-- Permissions for accessing and modifying user's SMS messages            -->
    612     <!-- ====================================================================== -->
    613     <eat-comment />
    614 
    615     <!-- Used for runtime permissions related to user's SMS messages. -->
    616     <permission-group android:name="android.permission-group.SMS"
    617         android:icon="@drawable/perm_group_sms"
    618         android:label="@string/permgrouplab_sms"
    619         android:description="@string/permgroupdesc_sms"
    620         android:priority="300" />
    621 
    622     <!-- Allows an application to send SMS messages.
    623          <p>Protection level: dangerous
    624     -->
    625     <permission android:name="android.permission.SEND_SMS"
    626         android:permissionGroup="android.permission-group.SMS"
    627         android:label="@string/permlab_sendSms"
    628         android:description="@string/permdesc_sendSms"
    629         android:permissionFlags="costsMoney"
    630         android:protectionLevel="dangerous" />
    631 
    632     <!-- Allows an application to receive SMS messages.
    633          <p>Protection level: dangerous
    634     -->
    635     <permission android:name="android.permission.RECEIVE_SMS"
    636         android:permissionGroup="android.permission-group.SMS"
    637         android:label="@string/permlab_receiveSms"
    638         android:description="@string/permdesc_receiveSms"
    639         android:protectionLevel="dangerous"/>
    640 
    641     <!-- Allows an application to read SMS messages.
    642          <p>Protection level: dangerous
    643     -->
    644     <permission android:name="android.permission.READ_SMS"
    645         android:permissionGroup="android.permission-group.SMS"
    646         android:label="@string/permlab_readSms"
    647         android:description="@string/permdesc_readSms"
    648         android:protectionLevel="dangerous" />
    649 
    650     <!-- Allows an application to receive WAP push messages.
    651          <p>Protection level: dangerous
    652     -->
    653     <permission android:name="android.permission.RECEIVE_WAP_PUSH"
    654         android:permissionGroup="android.permission-group.SMS"
    655         android:label="@string/permlab_receiveWapPush"
    656         android:description="@string/permdesc_receiveWapPush"
    657         android:protectionLevel="dangerous" />
    658 
    659     <!-- Allows an application to monitor incoming MMS messages.
    660         <p>Protection level: dangerous
    661     -->
    662     <permission android:name="android.permission.RECEIVE_MMS"
    663         android:permissionGroup="android.permission-group.SMS"
    664         android:label="@string/permlab_receiveMms"
    665         android:description="@string/permdesc_receiveMms"
    666         android:protectionLevel="dangerous" />
    667 
    668     <!-- Allows an application to read previously received cell broadcast
    669          messages and to register a content observer to get notifications when
    670          a cell broadcast has been received and added to the database. For
    671          emergency alerts, the database is updated immediately after the
    672          alert dialog and notification sound/vibration/speech are presented.
    673          The "read" column is then updated after the user dismisses the alert.
    674          This enables supplementary emergency assistance apps to start loading
    675          additional emergency information (if Internet access is available)
    676          when the alert is first received, and to delay presenting the info
    677          to the user until after the initial alert dialog is dismissed.
    678          <p>Protection level: dangerous
    679          @hide Pending API council approval -->
    680     <permission android:name="android.permission.READ_CELL_BROADCASTS"
    681         android:permissionGroup="android.permission-group.SMS"
    682         android:label="@string/permlab_readCellBroadcasts"
    683         android:description="@string/permdesc_readCellBroadcasts"
    684         android:protectionLevel="dangerous" />
    685 
    686     <!-- ====================================================================== -->
    687     <!-- Permissions for accessing external storage                             -->
    688     <!-- ====================================================================== -->
    689     <eat-comment />
    690 
    691     <!-- Used for runtime permissions related to the shared external storage. -->
    692     <permission-group android:name="android.permission-group.STORAGE"
    693         android:icon="@drawable/perm_group_storage"
    694         android:label="@string/permgrouplab_storage"
    695         android:description="@string/permgroupdesc_storage"
    696         android:priority="900" />
    697 
    698     <!-- Allows an application to read from external storage.
    699      <p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly
    700      granted this permission.</p>
    701      <p>This permission is enforced starting in API level 19.  Before API level 19, this
    702      permission is not enforced and all apps still have access to read from external storage.
    703      You can test your app with the permission enforced by enabling <em>Protect USB
    704      storage</em> under Developer options in the Settings app on a device running Android 4.1 or
    705      higher.</p>
    706      <p>Also starting in API level 19, this permission is <em>not</em> required to
    707      read/write files in your application-specific directories returned by
    708      {@link android.content.Context#getExternalFilesDir} and
    709      {@link android.content.Context#getExternalCacheDir}.
    710      <p class="note"><strong>Note:</strong> If <em>both</em> your <a
    711      href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
    712      minSdkVersion}</a> and <a
    713      href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
    714      targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
    715      grants your app this permission. If you don't need this permission, be sure your <a
    716      href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
    717      targetSdkVersion}</a> is 4 or higher.
    718      <p>Protection level: dangerous
    719      -->
    720     <permission android:name="android.permission.READ_EXTERNAL_STORAGE"
    721         android:permissionGroup="android.permission-group.STORAGE"
    722         android:label="@string/permlab_sdcardRead"
    723         android:description="@string/permdesc_sdcardRead"
    724         android:protectionLevel="dangerous" />
    725 
    726     <!-- Allows an application to write to external storage.
    727          <p class="note"><strong>Note:</strong> If <em>both</em> your <a
    728          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
    729          minSdkVersion}</a> and <a
    730          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
    731          targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
    732          grants your app this permission. If you don't need this permission, be sure your <a
    733          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
    734          targetSdkVersion}</a> is 4 or higher.
    735          <p>Starting in API level 19, this permission is <em>not</em> required to
    736          read/write files in your application-specific directories returned by
    737          {@link android.content.Context#getExternalFilesDir} and
    738          {@link android.content.Context#getExternalCacheDir}.
    739          <p>Protection level: dangerous
    740     -->
    741     <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE"
    742         android:permissionGroup="android.permission-group.STORAGE"
    743         android:label="@string/permlab_sdcardWrite"
    744         android:description="@string/permdesc_sdcardWrite"
    745         android:protectionLevel="dangerous" />
    746 
    747     <!-- ====================================================================== -->
    748     <!-- Permissions for accessing the device location                          -->
    749     <!-- ====================================================================== -->
    750     <eat-comment />
    751 
    752     <!-- Used for permissions that allow accessing the device location. -->
    753     <permission-group android:name="android.permission-group.LOCATION"
    754         android:icon="@drawable/perm_group_location"
    755         android:label="@string/permgrouplab_location"
    756         android:description="@string/permgroupdesc_location"
    757         android:priority="400" />
    758 
    759     <!-- Allows an app to access precise location.
    760          Alternatively, you might want {@link #ACCESS_COARSE_LOCATION}.
    761          <p>Protection level: dangerous
    762     -->
    763     <permission android:name="android.permission.ACCESS_FINE_LOCATION"
    764         android:permissionGroup="android.permission-group.LOCATION"
    765         android:label="@string/permlab_accessFineLocation"
    766         android:description="@string/permdesc_accessFineLocation"
    767         android:protectionLevel="dangerous|ephemeral" />
    768 
    769     <!-- Allows an app to access approximate location.
    770          Alternatively, you might want {@link #ACCESS_FINE_LOCATION}.
    771          <p>Protection level: dangerous
    772     -->
    773     <permission android:name="android.permission.ACCESS_COARSE_LOCATION"
    774         android:permissionGroup="android.permission-group.LOCATION"
    775         android:label="@string/permlab_accessCoarseLocation"
    776         android:description="@string/permdesc_accessCoarseLocation"
    777         android:protectionLevel="dangerous|ephemeral" />
    778 
    779     <!-- ====================================================================== -->
    780     <!-- Permissions for accessing the device telephony                         -->
    781     <!-- ====================================================================== -->
    782     <eat-comment />
    783 
    784     <!-- Used for permissions that are associated telephony features. -->
    785     <permission-group android:name="android.permission-group.PHONE"
    786         android:icon="@drawable/perm_group_phone_calls"
    787         android:label="@string/permgrouplab_phone"
    788         android:description="@string/permgroupdesc_phone"
    789         android:priority="500" />
    790 
    791     <!-- Allows read only access to phone state, including the phone number of the device,
    792          current cellular network information, the status of any ongoing calls, and a list of any
    793          {@link android.telecom.PhoneAccount}s registered on the device.
    794          <p class="note"><strong>Note:</strong> If <em>both</em> your <a
    795          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
    796          minSdkVersion}</a> and <a
    797          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
    798          targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
    799          grants your app this permission. If you don't need this permission, be sure your <a
    800          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
    801          targetSdkVersion}</a> is 4 or higher.
    802          <p>Protection level: dangerous
    803     -->
    804     <permission android:name="android.permission.READ_PHONE_STATE"
    805         android:permissionGroup="android.permission-group.PHONE"
    806         android:label="@string/permlab_readPhoneState"
    807         android:description="@string/permdesc_readPhoneState"
    808         android:protectionLevel="dangerous" />
    809 
    810     <!-- Allows read access to the device's phone number(s). This is a subset of the capabilities
    811          granted by {@link #READ_PHONE_STATE} but is exposed to ephemeral applications.
    812          <p>Protection level: dangerous-->
    813     <permission android:name="android.permission.READ_PHONE_NUMBERS"
    814         android:permissionGroup="android.permission-group.PHONE"
    815         android:label="@string/permlab_readPhoneNumbers"
    816         android:description="@string/permdesc_readPhoneNumbers"
    817         android:protectionLevel="dangerous|ephemeral" />
    818 
    819     <!-- Allows an application to initiate a phone call without going through
    820         the Dialer user interface for the user to confirm the call.
    821         <p>Protection level: dangerous
    822     -->
    823     <permission android:name="android.permission.CALL_PHONE"
    824         android:permissionGroup="android.permission-group.PHONE"
    825         android:permissionFlags="costsMoney"
    826         android:label="@string/permlab_callPhone"
    827         android:description="@string/permdesc_callPhone"
    828         android:protectionLevel="dangerous" />
    829 
    830     <!-- Allows an application to access the IMS call service: making and
    831          modifying a call
    832         <p>Protection level: signature|privileged
    833         @hide
    834     -->
    835     <permission android:name="android.permission.ACCESS_IMS_CALL_SERVICE"
    836         android:permissionGroup="android.permission-group.PHONE"
    837         android:label="@string/permlab_accessImsCallService"
    838         android:description="@string/permdesc_accessImsCallService"
    839         android:protectionLevel="signature|privileged" />
    840 
    841     <!-- Allows an application to read the user's call log.
    842          <p class="note"><strong>Note:</strong> If your app uses the
    843          {@link #READ_CONTACTS} permission and <em>both</em> your <a
    844          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
    845          minSdkVersion}</a> and <a
    846          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
    847          targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
    848          grants your app this permission. If you don't need this permission, be sure your <a
    849          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
    850          targetSdkVersion}</a> is 16 or higher.</p>
    851          <p>Protection level: dangerous
    852     -->
    853     <permission android:name="android.permission.READ_CALL_LOG"
    854         android:permissionGroup="android.permission-group.PHONE"
    855         android:label="@string/permlab_readCallLog"
    856         android:description="@string/permdesc_readCallLog"
    857         android:protectionLevel="dangerous" />
    858 
    859     <!-- Allows an application to write (but not read) the user's
    860          call log data.
    861          <p class="note"><strong>Note:</strong> If your app uses the
    862          {@link #WRITE_CONTACTS} permission and <em>both</em> your <a
    863          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
    864          minSdkVersion}</a> and <a
    865          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
    866          targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
    867          grants your app this permission. If you don't need this permission, be sure your <a
    868          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
    869          targetSdkVersion}</a> is 16 or higher.</p>
    870          <p>Protection level: dangerous
    871     -->
    872     <permission android:name="android.permission.WRITE_CALL_LOG"
    873         android:permissionGroup="android.permission-group.PHONE"
    874         android:label="@string/permlab_writeCallLog"
    875         android:description="@string/permdesc_writeCallLog"
    876         android:protectionLevel="dangerous" />
    877 
    878     <!-- Allows an application to add voicemails into the system.
    879          <p>Protection level: dangerous
    880     -->
    881     <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL"
    882         android:permissionGroup="android.permission-group.PHONE"
    883         android:label="@string/permlab_addVoicemail"
    884         android:description="@string/permdesc_addVoicemail"
    885         android:protectionLevel="dangerous" />
    886 
    887     <!-- Allows an application to use SIP service.
    888          <p>Protection level: dangerous
    889     -->
    890     <permission android:name="android.permission.USE_SIP"
    891         android:permissionGroup="android.permission-group.PHONE"
    892         android:description="@string/permdesc_use_sip"
    893         android:label="@string/permlab_use_sip"
    894         android:protectionLevel="dangerous"/>
    895 
    896     <!-- Allows an application to see the number being dialed during an outgoing
    897          call with the option to redirect the call to a different number or
    898          abort the call altogether.
    899          <p>Protection level: dangerous
    900     -->
    901     <permission android:name="android.permission.PROCESS_OUTGOING_CALLS"
    902         android:permissionGroup="android.permission-group.PHONE"
    903         android:label="@string/permlab_processOutgoingCalls"
    904         android:description="@string/permdesc_processOutgoingCalls"
    905         android:protectionLevel="dangerous" />
    906 
    907 
    908     <!-- Allows the app to answer an incoming phone call.
    909          <p>Protection level: dangerous
    910     -->
    911     <permission android:name="android.permission.ANSWER_PHONE_CALLS"
    912         android:permissionGroup="android.permission-group.PHONE"
    913         android:label="@string/permlab_answerPhoneCalls"
    914         android:description="@string/permdesc_answerPhoneCalls"
    915         android:protectionLevel="dangerous|runtime" />
    916 
    917     <!-- Allows a calling application which manages it own calls through the self-managed
    918          {@link android.telecom.ConnectionService} APIs.  See
    919          {@link android.telecom.PhoneAccount#CAPABILITY_SELF_MANAGED for more information on the
    920          self-managed ConnectionService APIs.
    921          <p>Protection level: normal
    922     -->
    923     <permission android:name="android.permission.MANAGE_OWN_CALLS"
    924                 android:label="@string/permlab_manageOwnCalls"
    925                 android:description="@string/permdesc_manageOwnCalls"
    926                 android:protectionLevel="normal" />
    927 
    928     <!-- ====================================================================== -->
    929     <!-- Permissions for accessing the device microphone                        -->
    930     <!-- ====================================================================== -->
    931     <eat-comment />
    932 
    933     <!-- Used for permissions that are associated with accessing
    934          microphone audio from the device. Note that phone calls also capture audio
    935          but are in a separate (more visible) permission group. -->
    936     <permission-group android:name="android.permission-group.MICROPHONE"
    937         android:icon="@drawable/perm_group_microphone"
    938         android:label="@string/permgrouplab_microphone"
    939         android:description="@string/permgroupdesc_microphone"
    940         android:priority="600" />
    941 
    942     <!-- Allows an application to record audio.
    943          <p>Protection level: dangerous
    944     -->
    945     <permission android:name="android.permission.RECORD_AUDIO"
    946         android:permissionGroup="android.permission-group.MICROPHONE"
    947         android:label="@string/permlab_recordAudio"
    948         android:description="@string/permdesc_recordAudio"
    949         android:protectionLevel="dangerous"/>
    950 
    951     <!-- ====================================================================== -->
    952     <!-- Permissions for accessing the UCE Service                              -->
    953     <!-- ====================================================================== -->
    954 
    955     <!-- @hide Allows an application to Access UCE-Presence.
    956          <p>Protection level: dangerous
    957     -->
    958     <permission android:name="android.permission.ACCESS_UCE_PRESENCE_SERVICE"
    959         android:permissionGroup="android.permission-group.PHONE"
    960         android:protectionLevel="signatureOrSystem"/>
    961 
    962     <!-- @hide Allows an application to Access UCE-OPTIONS.
    963          <p>Protection level: dangerous
    964     -->
    965     <permission android:name="android.permission.ACCESS_UCE_OPTIONS_SERVICE"
    966         android:permissionGroup="android.permission-group.PHONE"
    967         android:protectionLevel="signatureOrSystem"/>
    968 
    969 
    970 
    971     <!-- ====================================================================== -->
    972     <!-- Permissions for accessing the device camera                            -->
    973     <!-- ====================================================================== -->
    974     <eat-comment />
    975 
    976     <!-- Used for permissions that are associated with accessing
    977      camera or capturing images/video from the device. -->
    978     <permission-group android:name="android.permission-group.CAMERA"
    979         android:icon="@drawable/perm_group_camera"
    980         android:label="@string/permgrouplab_camera"
    981         android:description="@string/permgroupdesc_camera"
    982         android:priority="700" />
    983 
    984     <!-- Required to be able to access the camera device.
    985          <p>This will automatically enforce the <a
    986          href="{@docRoot}guide/topics/manifest/uses-feature-element.html">
    987          <uses-feature>}</a> manifest element for <em>all</em> camera features.
    988          If you do not require all camera features or can properly operate if a camera
    989          is not available, then you must modify your manifest as appropriate in order to
    990          install on devices that don't support all camera features.</p>
    991          <p>Protection level: dangerous
    992     -->
    993     <permission android:name="android.permission.CAMERA"
    994         android:permissionGroup="android.permission-group.CAMERA"
    995         android:label="@string/permlab_camera"
    996         android:description="@string/permdesc_camera"
    997         android:protectionLevel="dangerous|ephemeral" />
    998 
    999 
   1000     <!-- ====================================================================== -->
   1001     <!-- Permissions for accessing the device sensors                           -->
   1002     <!-- ====================================================================== -->
   1003     <eat-comment />
   1004 
   1005     <!-- Used for permissions that are associated with accessing
   1006          camera or capturing images/video from the device. -->
   1007     <permission-group android:name="android.permission-group.SENSORS"
   1008         android:icon="@drawable/perm_group_sensors"
   1009         android:label="@string/permgrouplab_sensors"
   1010         android:description="@string/permgroupdesc_sensors"
   1011         android:priority="800" />
   1012 
   1013     <!-- Allows an application to access data from sensors that the user uses to
   1014          measure what is happening inside his/her body, such as heart rate.
   1015          <p>Protection level: dangerous -->
   1016     <permission android:name="android.permission.BODY_SENSORS"
   1017         android:permissionGroup="android.permission-group.SENSORS"
   1018         android:label="@string/permlab_bodySensors"
   1019         android:description="@string/permdesc_bodySensors"
   1020         android:protectionLevel="dangerous" />
   1021 
   1022     <!-- Allows an app to use fingerprint hardware.
   1023          <p>Protection level: normal
   1024     -->
   1025     <permission android:name="android.permission.USE_FINGERPRINT"
   1026         android:permissionGroup="android.permission-group.SENSORS"
   1027         android:label="@string/permlab_useFingerprint"
   1028         android:description="@string/permdesc_useFingerprint"
   1029         android:protectionLevel="normal" />
   1030 
   1031     <!-- ====================================================================== -->
   1032     <!-- REMOVED PERMISSIONS                                                    -->
   1033     <!-- ====================================================================== -->
   1034 
   1035     <!-- @hide We need to keep this around for backwards compatibility -->
   1036     <permission android:name="android.permission.READ_PROFILE"
   1037         android:protectionLevel="normal"
   1038         android:permissionFlags="removed"/>
   1039 
   1040     <!-- @hide We need to keep this around for backwards compatibility -->
   1041     <permission android:name="android.permission.WRITE_PROFILE"
   1042         android:protectionLevel="normal"
   1043         android:permissionFlags="removed"/>
   1044 
   1045     <!-- @hide We need to keep this around for backwards compatibility -->
   1046     <permission android:name="android.permission.READ_SOCIAL_STREAM"
   1047         android:protectionLevel="normal"
   1048         android:permissionFlags="removed"/>
   1049 
   1050     <!-- @hide We need to keep this around for backwards compatibility -->
   1051     <permission android:name="android.permission.WRITE_SOCIAL_STREAM"
   1052         android:protectionLevel="normal"
   1053         android:permissionFlags="removed"/>
   1054 
   1055     <!-- @hide We need to keep this around for backwards compatibility -->
   1056     <permission android:name="android.permission.READ_USER_DICTIONARY"
   1057         android:protectionLevel="normal"
   1058         android:permissionFlags="removed"/>
   1059 
   1060     <!-- @hide We need to keep this around for backwards compatibility -->
   1061     <permission android:name="android.permission.WRITE_USER_DICTIONARY"
   1062         android:protectionLevel="normal"
   1063         android:permissionFlags="removed"/>
   1064 
   1065     <!-- @hide We need to keep this around for backwards compatibility -->
   1066     <permission android:name="android.permission.WRITE_SMS"
   1067         android:protectionLevel="normal"
   1068         android:permissionFlags="removed"/>
   1069 
   1070     <!-- @hide We need to keep this around for backwards compatibility -->
   1071     <permission android:name="com.android.browser.permission.READ_HISTORY_BOOKMARKS"
   1072         android:protectionLevel="normal"
   1073         android:permissionFlags="removed"/>
   1074 
   1075     <!-- @hide We need to keep this around for backwards compatibility -->
   1076     <permission android:name="com.android.browser.permission.WRITE_HISTORY_BOOKMARKS"
   1077         android:protectionLevel="normal"
   1078         android:permissionFlags="removed"/>
   1079 
   1080     <!-- @hide We need to keep this around for backwards compatibility -->
   1081     <permission android:name="android.permission.AUTHENTICATE_ACCOUNTS"
   1082         android:protectionLevel="normal"
   1083         android:permissionFlags="removed"/>
   1084 
   1085     <!-- @hide We need to keep this around for backwards compatibility -->
   1086     <permission android:name="android.permission.MANAGE_ACCOUNTS"
   1087         android:protectionLevel="normal"
   1088         android:permissionFlags="removed"/>
   1089 
   1090     <!-- @hide We need to keep this around for backwards compatibility -->
   1091     <permission android:name="android.permission.USE_CREDENTIALS"
   1092         android:protectionLevel="normal"
   1093         android:permissionFlags="removed"/>
   1094 
   1095     <!-- @hide We need to keep this around for backwards compatibility -->
   1096     <permission android:name="android.permission.SUBSCRIBED_FEEDS_READ"
   1097         android:protectionLevel="normal"
   1098         android:permissionFlags="removed"/>
   1099 
   1100     <!-- @hide We need to keep this around for backwards compatibility -->
   1101     <permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE"
   1102         android:protectionLevel="normal"
   1103         android:permissionFlags="removed"/>
   1104 
   1105     <!-- @hide We need to keep this around for backwards compatibility -->
   1106     <permission android:name="android.permission.FLASHLIGHT"
   1107         android:protectionLevel="normal"
   1108         android:permissionFlags="removed"/>
   1109 
   1110     <!-- ====================================================================== -->
   1111     <!-- INSTALL PERMISSIONS                                                    -->
   1112     <!-- ====================================================================== -->
   1113 
   1114     <!-- ================================== -->
   1115     <!-- Permissions for accessing messages -->
   1116     <!-- ================================== -->
   1117     <eat-comment />
   1118 
   1119     <!-- @SystemApi Allows an application (Phone) to send a request to other applications
   1120          to handle the respond-via-message action during incoming calls.
   1121          <p>Not for use by third-party applications. -->
   1122     <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE"
   1123         android:protectionLevel="signature|privileged" />
   1124 
   1125     <!-- @SystemApi Allows an application to send SMS to premium shortcodes without user permission.
   1126          <p>Not for use by third-party applications.
   1127          @hide -->
   1128     <permission android:name="android.permission.SEND_SMS_NO_CONFIRMATION"
   1129         android:protectionLevel="signature|privileged" />
   1130 
   1131     <!-- Allows an application to filter carrier specific sms.
   1132          @hide -->
   1133     <permission android:name="android.permission.CARRIER_FILTER_SMS"
   1134         android:protectionLevel="signature|privileged" />
   1135 
   1136     <!-- @SystemApi Allows an application to receive emergency cell broadcast messages,
   1137          to record or display them to the user.
   1138          <p>Not for use by third-party applications.
   1139          @hide -->
   1140     <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST"
   1141         android:protectionLevel="signature|privileged" />
   1142 
   1143     <!-- Allows an application to monitor incoming Bluetooth MAP messages, to record
   1144          or perform processing on them. -->
   1145     <!-- @hide -->
   1146     <permission android:name="android.permission.RECEIVE_BLUETOOTH_MAP"
   1147         android:protectionLevel="signature|privileged" />
   1148 
   1149     <!-- @SystemApi @hide Allows an application to execute contacts directory search.
   1150          This should only be used by ContactsProvider.
   1151          <p>Not for use by third-party applications. -->
   1152     <permission android:name="android.permission.BIND_DIRECTORY_SEARCH"
   1153         android:protectionLevel="signature|privileged" />
   1154 
   1155     <!-- @SystemApi @hide Allows an application to modify cell broadcasts through the content provider.
   1156          <p>Not for use by third-party applications. -->
   1157     <permission android:name="android.permission.MODIFY_CELL_BROADCASTS"
   1158                 android:protectionLevel="signature|privileged" />
   1159 
   1160     <!-- =============================================================== -->
   1161     <!-- Permissions for setting the device alarm                        -->
   1162     <!-- =============================================================== -->
   1163     <eat-comment />
   1164 
   1165     <!-- Allows an application to broadcast an Intent to set an alarm for the user.
   1166          <p>Protection level: normal
   1167     -->
   1168     <permission android:name="com.android.alarm.permission.SET_ALARM"
   1169         android:label="@string/permlab_setAlarm"
   1170         android:description="@string/permdesc_setAlarm"
   1171         android:protectionLevel="normal" />
   1172 
   1173     <!-- =============================================================== -->
   1174     <!-- Permissions for accessing the user voicemail                    -->
   1175     <!-- =============================================================== -->
   1176     <eat-comment />
   1177 
   1178     <!-- Allows an application to modify and remove existing voicemails in the system.
   1179         <p>Protection level: signature|privileged
   1180     -->
   1181     <permission android:name="com.android.voicemail.permission.WRITE_VOICEMAIL"
   1182         android:protectionLevel="signature|privileged" />
   1183 
   1184     <!-- Allows an application to read voicemails in the system.
   1185          <p>Protection level: signature|privileged
   1186     -->
   1187     <permission android:name="com.android.voicemail.permission.READ_VOICEMAIL"
   1188         android:protectionLevel="signature|privileged" />
   1189 
   1190     <!-- ======================================= -->
   1191     <!-- Permissions for accessing location info -->
   1192     <!-- ======================================= -->
   1193     <eat-comment />
   1194 
   1195     <!-- Allows an application to access extra location provider commands.
   1196          <p>Protection level: normal
   1197     -->
   1198     <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS"
   1199         android:label="@string/permlab_accessLocationExtraCommands"
   1200         android:description="@string/permdesc_accessLocationExtraCommands"
   1201         android:protectionLevel="normal" />
   1202 
   1203     <!-- @SystemApi Allows an application to install a location provider into the Location Manager.
   1204     <p>Not for use by third-party applications. -->
   1205     <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER"
   1206         android:protectionLevel="signature|privileged" />
   1207 
   1208     <!-- @SystemApi @hide Allows HDMI-CEC service to access device and configuration files.
   1209          This should only be used by HDMI-CEC service.
   1210     -->
   1211     <permission android:name="android.permission.HDMI_CEC"
   1212         android:protectionLevel="signature|privileged" />
   1213 
   1214     <!-- @SystemApi Allows an application to use location features in hardware,
   1215          such as the geofencing api.
   1216          <p>Not for use by third-party applications. -->
   1217     <permission android:name="android.permission.LOCATION_HARDWARE"
   1218         android:protectionLevel="signature|privileged" />
   1219     <uses-permission android:name="android.permission.LOCATION_HARDWARE"/>
   1220 
   1221     <!-- @SystemApi Allows an application to create mock location providers for testing.
   1222          <p>Protection level: signature
   1223          @hide
   1224     -->
   1225     <permission android:name="android.permission.ACCESS_MOCK_LOCATION"
   1226         android:protectionLevel="signature" />
   1227 
   1228     <!-- ======================================= -->
   1229     <!-- Permissions for accessing networks -->
   1230     <!-- ======================================= -->
   1231     <eat-comment />
   1232 
   1233     <!-- Allows applications to open network sockets.
   1234          <p>Protection level: normal
   1235     -->
   1236     <permission android:name="android.permission.INTERNET"
   1237         android:description="@string/permdesc_createNetworkSockets"
   1238         android:label="@string/permlab_createNetworkSockets"
   1239         android:protectionLevel="normal|ephemeral" />
   1240 
   1241     <!-- Allows applications to access information about networks.
   1242          <p>Protection level: normal
   1243     -->
   1244     <permission android:name="android.permission.ACCESS_NETWORK_STATE"
   1245         android:description="@string/permdesc_accessNetworkState"
   1246         android:label="@string/permlab_accessNetworkState"
   1247         android:protectionLevel="normal|ephemeral" />
   1248 
   1249     <!-- Allows applications to access information about Wi-Fi networks.
   1250          <p>Protection level: normal
   1251     -->
   1252     <permission android:name="android.permission.ACCESS_WIFI_STATE"
   1253         android:description="@string/permdesc_accessWifiState"
   1254         android:label="@string/permlab_accessWifiState"
   1255         android:protectionLevel="normal" />
   1256 
   1257     <!-- Allows applications to change Wi-Fi connectivity state.
   1258          <p>Protection level: normal
   1259     -->
   1260     <permission android:name="android.permission.CHANGE_WIFI_STATE"
   1261         android:description="@string/permdesc_changeWifiState"
   1262         android:label="@string/permlab_changeWifiState"
   1263         android:protectionLevel="normal" />
   1264 
   1265     <!-- @SystemApi @hide Allows applications to read Wi-Fi credential.
   1266          <p>Not for use by third-party applications. -->
   1267     <permission android:name="android.permission.READ_WIFI_CREDENTIAL"
   1268         android:protectionLevel="signature|privileged" />
   1269 
   1270     <!-- @SystemApi @hide Allows applications to change tether state and run
   1271          tether carrier provisioning.
   1272          <p>Not for use by third-party applications. -->
   1273     <permission android:name="android.permission.TETHER_PRIVILEGED"
   1274         android:protectionLevel="signature|privileged" />
   1275 
   1276     <!-- @SystemApi @hide Allow system apps to receive broadcast
   1277          when a wifi network credential is changed.
   1278          <p>Not for use by third-party applications. -->
   1279     <permission android:name="android.permission.RECEIVE_WIFI_CREDENTIAL_CHANGE"
   1280         android:protectionLevel="signature|privileged" />
   1281 
   1282     <!-- @SystemApi @hide Allows an application to modify any wifi configuration, even if created
   1283      by another application. Once reconfigured the original creator cannot make any further
   1284      modifications.
   1285      <p>Not for use by third-party applications. -->
   1286     <permission android:name="android.permission.OVERRIDE_WIFI_CONFIG"
   1287         android:protectionLevel="signature|privileged" />
   1288 
   1289     <!-- @hide -->
   1290     <permission android:name="android.permission.ACCESS_WIMAX_STATE"
   1291         android:description="@string/permdesc_accessWimaxState"
   1292         android:label="@string/permlab_accessWimaxState"
   1293         android:protectionLevel="normal" />
   1294 
   1295     <!-- @hide -->
   1296     <permission android:name="android.permission.CHANGE_WIMAX_STATE"
   1297         android:description="@string/permdesc_changeWimaxState"
   1298         android:label="@string/permlab_changeWimaxState"
   1299         android:protectionLevel="normal" />
   1300 
   1301     <!-- Allows applications to act as network scorers. @hide @SystemApi-->
   1302     <permission android:name="android.permission.SCORE_NETWORKS"
   1303         android:protectionLevel="signature|privileged" />
   1304 
   1305     <!-- Allows applications to request network
   1306          recommendations and scores from the NetworkScoreService.
   1307          <p>Not for use by third-party applications. @hide -->
   1308     <permission android:name="android.permission.REQUEST_NETWORK_SCORES"
   1309         android:protectionLevel="signature|setup" />
   1310 
   1311     <!-- Allows network stack services (Connectivity and Wifi) to coordinate
   1312          <p>Not for use by third-party or privileged applications.
   1313          @hide This should only be used by Connectivity and Wifi Services.
   1314     -->
   1315     <permission android:name="android.permission.NETWORK_STACK"
   1316         android:protectionLevel="signature" />
   1317 
   1318     <!-- Allows Settings and SystemUI to call methods in Networking services
   1319          <p>Not for use by third-party or privileged applications.
   1320          @hide This should only be used by Settings and SystemUI.
   1321     -->
   1322     <permission android:name="android.permission.NETWORK_SETTINGS"
   1323         android:protectionLevel="signature" />
   1324 
   1325     <!-- ======================================= -->
   1326     <!-- Permissions for short range, peripheral networks -->
   1327     <!-- ======================================= -->
   1328     <eat-comment />
   1329 
   1330     <!-- Allows applications to connect to paired bluetooth devices.
   1331          <p>Protection level: normal
   1332     -->
   1333     <permission android:name="android.permission.BLUETOOTH"
   1334         android:description="@string/permdesc_bluetooth"
   1335         android:label="@string/permlab_bluetooth"
   1336         android:protectionLevel="normal" />
   1337 
   1338     <!-- Allows applications to discover and pair bluetooth devices.
   1339          <p>Protection level: normal
   1340     -->
   1341     <permission android:name="android.permission.BLUETOOTH_ADMIN"
   1342         android:description="@string/permdesc_bluetoothAdmin"
   1343         android:label="@string/permlab_bluetoothAdmin"
   1344         android:protectionLevel="normal" />
   1345 
   1346     <!-- @SystemApi Allows applications to pair bluetooth devices without user interaction, and to
   1347          allow or disallow phonebook access or message access.
   1348          This is not available to third party applications. -->
   1349     <permission android:name="android.permission.BLUETOOTH_PRIVILEGED"
   1350         android:protectionLevel="signature|privileged" />
   1351 
   1352     <!-- Control access to email providers exclusively for Bluetooth
   1353          @hide
   1354     -->
   1355     <permission android:name="android.permission.BLUETOOTH_MAP"
   1356         android:protectionLevel="signature" />
   1357 
   1358     <!-- Allows bluetooth stack to access files
   1359          @hide This should only be used by Bluetooth apk.
   1360     -->
   1361     <permission android:name="android.permission.BLUETOOTH_STACK"
   1362         android:protectionLevel="signature" />
   1363 
   1364     <!-- Allows applications to perform I/O operations over NFC.
   1365          <p>Protection level: normal
   1366     -->
   1367     <permission android:name="android.permission.NFC"
   1368         android:description="@string/permdesc_nfc"
   1369         android:label="@string/permlab_nfc"
   1370         android:protectionLevel="normal" />
   1371 
   1372     <!-- @SystemApi Allows an internal user to use privileged ConnectivityManager APIs.
   1373          @hide -->
   1374     <permission android:name="android.permission.CONNECTIVITY_INTERNAL"
   1375         android:protectionLevel="signature|privileged" />
   1376 
   1377     <!-- @SystemApi Allows an internal user to use restricted Networks.
   1378          @hide -->
   1379     <permission android:name="android.permission.CONNECTIVITY_USE_RESTRICTED_NETWORKS"
   1380         android:protectionLevel="signature|privileged" />
   1381 
   1382     <!-- Allows a system application to access hardware packet offload capabilities.
   1383          @hide -->
   1384     <permission android:name="android.permission.PACKET_KEEPALIVE_OFFLOAD"
   1385         android:protectionLevel="signature|privileged" />
   1386 
   1387     <!-- @SystemApi
   1388          @hide -->
   1389     <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE"
   1390         android:protectionLevel="signature|privileged" />
   1391 
   1392     <!-- @SystemApi Allows access to the loop radio (Android@Home mesh network) device.
   1393          @hide -->
   1394     <permission android:name="android.permission.LOOP_RADIO"
   1395         android:protectionLevel="signature|privileged" />
   1396 
   1397     <!-- Allows sending and receiving handover transfer status from Wifi and Bluetooth
   1398          @hide -->
   1399     <permission android:name="android.permission.NFC_HANDOVER_STATUS"
   1400         android:protectionLevel="signature|privileged" />
   1401 
   1402     <!-- ================================== -->
   1403     <!-- Permissions for accessing accounts -->
   1404     <!-- ================================== -->
   1405     <eat-comment />
   1406 
   1407     <!-- Allows access to the list of accounts in the Accounts Service.
   1408 
   1409     <p class="note"><strong>Note:</strong> Beginning with Android 6.0 (API level
   1410     23), if an app shares the signature of the authenticator that manages an
   1411     account, it does not need <code>"GET_ACCOUNTS"</code> permission to read
   1412     information about that account. On Android 5.1 and lower, all apps need
   1413     <code>"GET_ACCOUNTS"</code> permission to read information about any
   1414     account.</p>
   1415 
   1416     <p>Protection level: dangerous
   1417     -->
   1418     <permission android:name="android.permission.GET_ACCOUNTS"
   1419         android:permissionGroup="android.permission-group.CONTACTS"
   1420         android:protectionLevel="dangerous"
   1421         android:description="@string/permdesc_getAccounts"
   1422         android:label="@string/permlab_getAccounts" />
   1423     <uses-permission android:name="android.permission.GET_ACCOUNTS"/>
   1424 
   1425     <!-- @SystemApi Allows applications to call into AccountAuthenticators.
   1426     <p>Not for use by third-party applications. -->
   1427     <permission android:name="android.permission.ACCOUNT_MANAGER"
   1428         android:protectionLevel="signature" />
   1429 
   1430     <!-- ================================== -->
   1431     <!-- Permissions for accessing hardware that may effect battery life-->
   1432     <!-- ================================== -->
   1433     <eat-comment />
   1434 
   1435     <!-- Allows applications to enter Wi-Fi Multicast mode.
   1436          <p>Protection level: normal
   1437     -->
   1438     <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE"
   1439         android:description="@string/permdesc_changeWifiMulticastState"
   1440         android:label="@string/permlab_changeWifiMulticastState"
   1441         android:protectionLevel="normal" />
   1442 
   1443     <!-- Allows access to the vibrator.
   1444          <p>Protection level: normal
   1445     -->
   1446     <permission android:name="android.permission.VIBRATE"
   1447         android:label="@string/permlab_vibrate"
   1448         android:description="@string/permdesc_vibrate"
   1449         android:protectionLevel="normal|ephemeral" />
   1450 
   1451     <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen
   1452          from dimming.
   1453          <p>Protection level: normal
   1454     -->
   1455     <permission android:name="android.permission.WAKE_LOCK"
   1456         android:label="@string/permlab_wakeLock"
   1457         android:description="@string/permdesc_wakeLock"
   1458         android:protectionLevel="normal|ephemeral" />
   1459 
   1460     <!-- Allows using the device's IR transmitter, if available.
   1461          <p>Protection level: normal
   1462     -->
   1463     <permission android:name="android.permission.TRANSMIT_IR"
   1464         android:label="@string/permlab_transmitIr"
   1465         android:description="@string/permdesc_transmitIr"
   1466         android:protectionLevel="normal" />
   1467 
   1468     <!-- ==================================================== -->
   1469     <!-- Permissions related to changing audio settings   -->
   1470     <!-- ==================================================== -->
   1471     <eat-comment />
   1472 
   1473     <!-- Allows an application to modify global audio settings.
   1474          <p>Protection level: normal
   1475     -->
   1476     <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS"
   1477         android:label="@string/permlab_modifyAudioSettings"
   1478         android:description="@string/permdesc_modifyAudioSettings"
   1479         android:protectionLevel="normal" />
   1480 
   1481     <!-- ================================== -->
   1482     <!-- Permissions for accessing hardware -->
   1483     <!-- ================================== -->
   1484     <eat-comment />
   1485 
   1486     <!-- @SystemApi Allows an application to manage preferences and permissions for USB devices
   1487          @hide -->
   1488     <permission android:name="android.permission.MANAGE_USB"
   1489         android:protectionLevel="signature|privileged" />
   1490 
   1491     <!-- @SystemApi Allows an application to access the MTP USB kernel driver.
   1492          For use only by the device side MTP implementation.
   1493          @hide -->
   1494     <permission android:name="android.permission.ACCESS_MTP"
   1495         android:protectionLevel="signature|privileged" />
   1496 
   1497     <!-- @SystemApi Allows access to hardware peripherals.  Intended only for hardware testing.
   1498          <p>Not for use by third-party applications.
   1499          @hide
   1500     -->
   1501     <permission android:name="android.permission.HARDWARE_TEST"
   1502         android:protectionLevel="signature" />
   1503 
   1504     <!-- @SystemApi Allows access to FM
   1505          @hide This is not a third-party API (intended for system apps).-->
   1506     <permission android:name="android.permission.ACCESS_FM_RADIO"
   1507         android:protectionLevel="signature|privileged" />
   1508 
   1509     <!-- Allows access to configure network interfaces, configure/use IPSec, etc.
   1510          @hide -->
   1511     <permission android:name="android.permission.NET_ADMIN"
   1512         android:protectionLevel="signature" />
   1513 
   1514     <!-- Allows registration for remote audio playback. @hide -->
   1515     <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK"
   1516         android:protectionLevel="signature" />
   1517 
   1518     <!-- @SystemApi Allows TvInputService to access underlying TV input hardware such as
   1519          built-in tuners and HDMI-in's.
   1520          @hide This should only be used by OEM's TvInputService's.
   1521     -->
   1522     <permission android:name="android.permission.TV_INPUT_HARDWARE"
   1523         android:protectionLevel="signature|privileged" />
   1524 
   1525     <!-- @SystemApi Allows to capture a frame of TV input hardware such as
   1526          built-in tuners and HDMI-in's.
   1527          @hide <p>Not for use by third-party applications.
   1528     -->
   1529     <permission android:name="android.permission.CAPTURE_TV_INPUT"
   1530         android:protectionLevel="signature|privileged" />
   1531 
   1532     <!-- @hide Allows TvInputService to access DVB device.
   1533    <p>Not for use by third-party applications. -->
   1534     <permission android:name="android.permission.DVB_DEVICE"
   1535         android:protectionLevel="signature|privileged" />
   1536 
   1537     <!-- @SystemApi Allows reading and enabling/disabling the OEM unlock allowed by carrier state
   1538          @hide <p>Not for use by third-party applications. -->
   1539     <permission android:name="android.permission.MANAGE_CARRIER_OEM_UNLOCK_STATE"
   1540         android:protectionLevel="signature|privileged" />
   1541 
   1542     <!-- @SystemApi Allows reading and enabling/disabling the OEM unlock allowed by user state
   1543          @hide <p>Not for use by third-party applications. -->
   1544     <permission android:name="android.permission.MANAGE_USER_OEM_UNLOCK_STATE"
   1545         android:protectionLevel="signature|privileged" />
   1546 
   1547     <!-- @SystemApi Allows reading the OEM unlock state
   1548          @hide <p>Not for use by third-party applications. -->
   1549     <permission android:name="android.permission.READ_OEM_UNLOCK_STATE"
   1550         android:protectionLevel="signature|privileged" />
   1551 
   1552     <!-- @hide Allows enabling/disabling OEM unlock
   1553    <p>Not for use by third-party applications. -->
   1554     <permission android:name="android.permission.OEM_UNLOCK_STATE"
   1555         android:protectionLevel="signature" />
   1556 
   1557     <!-- @hide Allows querying state of PersistentDataBlock
   1558    <p>Not for use by third-party applications. -->
   1559     <permission android:name="android.permission.ACCESS_PDB_STATE"
   1560         android:protectionLevel="signature" />
   1561 
   1562     <!-- @hide Allows system update service to notify device owner about pending updates.
   1563    <p>Not for use by third-party applications. -->
   1564     <permission android:name="android.permission.NOTIFY_PENDING_SYSTEM_UPDATE"
   1565         android:protectionLevel="signature|privileged" />
   1566 
   1567     <!-- =========================================== -->
   1568     <!-- Permissions associated with camera and image capture -->
   1569     <!-- =========================================== -->
   1570     <eat-comment />
   1571 
   1572     <!-- @SystemApi Allows disabling the transmit-indicator LED that is normally on when
   1573          a camera is in use by an application.
   1574          @hide -->
   1575     <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED"
   1576         android:protectionLevel="signature|privileged" />
   1577 
   1578     <!-- Allows sending the camera service notifications about system-wide events.
   1579         @hide -->
   1580     <permission android:name="android.permission.CAMERA_SEND_SYSTEM_EVENTS"
   1581         android:protectionLevel="signature|privileged" />
   1582 
   1583     <!-- =========================================== -->
   1584     <!-- Permissions associated with telephony state -->
   1585     <!-- =========================================== -->
   1586     <eat-comment />
   1587 
   1588     <!-- @SystemApi Allows modification of the telephony state - power on, mmi, etc.
   1589          Does not include placing calls.
   1590          <p>Not for use by third-party applications. -->
   1591     <permission android:name="android.permission.MODIFY_PHONE_STATE"
   1592         android:protectionLevel="signature|privileged" />
   1593 
   1594     <!-- Allows read only access to precise phone state.
   1595          @hide Pending API council approval -->
   1596     <permission android:name="android.permission.READ_PRECISE_PHONE_STATE"
   1597         android:protectionLevel="signature|privileged" />
   1598 
   1599     <!-- @SystemApi Allows read access to privileged phone state.
   1600          @hide Used internally. -->
   1601     <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE"
   1602         android:protectionLevel="signature|privileged" />
   1603 
   1604     <!-- @SystemApi Protects the ability to register any PhoneAccount with
   1605          PhoneAccount#CAPABILITY_SIM_SUBSCRIPTION. This capability indicates that the PhoneAccount
   1606          corresponds to a device SIM.
   1607          @hide -->
   1608     <permission android:name="android.permission.REGISTER_SIM_SUBSCRIPTION"
   1609         android:protectionLevel="signature|privileged" />
   1610 
   1611     <!-- @SystemApi Protects the ability to register any PhoneAccount with
   1612          PhoneAccount#CAPABILITY_CALL_PROVIDER.
   1613          @hide -->
   1614     <permission android:name="android.permission.REGISTER_CALL_PROVIDER"
   1615         android:protectionLevel="signature|privileged" />
   1616 
   1617     <!-- @SystemApi Protects the ability to register any PhoneAccount with
   1618          PhoneAccount#CAPABILITY_CONNECTION_MANAGER
   1619          @hide -->
   1620     <permission android:name="android.permission.REGISTER_CONNECTION_MANAGER"
   1621         android:protectionLevel="signature|privileged" />
   1622 
   1623     <!-- Must be required by a {@link android.telecom.InCallService},
   1624          to ensure that only the system can bind to it.
   1625          <p>Protection level: signature|privileged
   1626     -->
   1627     <permission android:name="android.permission.BIND_INCALL_SERVICE"
   1628         android:protectionLevel="signature|privileged" />
   1629 
   1630     <!-- Must be required by a link {@link android.telephony.VisualVoicemailService} to ensure that
   1631          only the system can bind to it.
   1632          <p>Protection level: signature|privileged
   1633     -->
   1634     <permission
   1635       android:name="android.permission.BIND_VISUAL_VOICEMAIL_SERVICE"
   1636       android:protectionLevel="signature|privileged"/>
   1637 
   1638     <!-- Must be required by a {@link android.telecom.CallScreeningService},
   1639          to ensure that only the system can bind to it.
   1640          <p>Protection level: signature|privileged
   1641     -->
   1642     <permission android:name="android.permission.BIND_SCREENING_SERVICE"
   1643         android:protectionLevel="signature|privileged" />
   1644 
   1645     <!-- Must be required by a {@link android.telecom.ConnectionService},
   1646          to ensure that only the system can bind to it.
   1647          @deprecated {@link android.telecom.ConnectionService}s should require
   1648                  android.permission.BIND_TELECOM_CONNECTION_SERVICE instead.
   1649          @SystemApi
   1650          @hide -->
   1651     <permission android:name="android.permission.BIND_CONNECTION_SERVICE"
   1652         android:protectionLevel="signature|privileged" />
   1653 
   1654     <!-- Must be required by a {@link android.telecom.ConnectionService},
   1655          to ensure that only the system can bind to it.
   1656          <p>Protection level: signature|privileged
   1657     -->
   1658     <permission android:name="android.permission.BIND_TELECOM_CONNECTION_SERVICE"
   1659         android:protectionLevel="signature|privileged" />
   1660 
   1661     <!-- @SystemApi Allows an application to control the in-call experience.
   1662          @hide -->
   1663     <permission android:name="android.permission.CONTROL_INCALL_EXPERIENCE"
   1664         android:protectionLevel="signature|privileged" />
   1665 
   1666     <!-- Allows an application to receive STK related commands.
   1667          @hide -->
   1668     <permission android:name="android.permission.RECEIVE_STK_COMMANDS"
   1669         android:protectionLevel="signature|privileged" />
   1670 
   1671     <!-- Must be required by an ImsService to ensure that only the
   1672          system can bind to it.
   1673          <p>Protection level: signature|privileged
   1674          @SystemApi
   1675          @hide
   1676     -->
   1677     <permission android:name="android.permission.BIND_IMS_SERVICE"
   1678         android:protectionLevel="signature|privileged" />
   1679 
   1680 
   1681     <!-- ================================== -->
   1682     <!-- Permissions for sdcard interaction -->
   1683     <!-- ================================== -->
   1684     <eat-comment />
   1685 
   1686     <!-- @SystemApi Allows an application to write to internal media storage
   1687          @hide  -->
   1688     <permission android:name="android.permission.WRITE_MEDIA_STORAGE"
   1689         android:protectionLevel="signature|privileged" />
   1690 
   1691     <!-- Allows an application to manage access to documents, usually as part
   1692          of a document picker.
   1693          <p>This permission should <em>only</em> be requested by the platform
   1694          document management app.  This permission cannot be granted to
   1695          third-party apps.
   1696          <p>Protection level: signature
   1697     -->
   1698     <permission android:name="android.permission.MANAGE_DOCUMENTS"
   1699         android:protectionLevel="signature" />
   1700 
   1701     <!-- @hide Allows an application to cache content.
   1702          <p>Not for use by third-party applications.
   1703          <p>Protection level: signature
   1704     -->
   1705     <permission android:name="android.permission.CACHE_CONTENT"
   1706         android:protectionLevel="signature" />
   1707 
   1708     <!-- @SystemApi @hide
   1709          Allows an application to aggressively allocate disk space.
   1710          <p>Not for use by third-party applications.
   1711     -->
   1712     <permission android:name="android.permission.ALLOCATE_AGGRESSIVE"
   1713         android:protectionLevel="signature|privileged" />
   1714 
   1715     <!-- ================================== -->
   1716     <!-- Permissions for screenlock         -->
   1717     <!-- ================================== -->
   1718     <eat-comment />
   1719 
   1720     <!-- Allows applications to disable the keyguard if it is not secure.
   1721          <p>Protection level: normal
   1722     -->
   1723     <permission android:name="android.permission.DISABLE_KEYGUARD"
   1724         android:description="@string/permdesc_disableKeyguard"
   1725         android:label="@string/permlab_disableKeyguard"
   1726         android:protectionLevel="normal" />
   1727 
   1728     <!-- ================================== -->
   1729     <!-- Permissions to access other installed applications  -->
   1730     <!-- ================================== -->
   1731     <eat-comment />
   1732 
   1733     <!-- @deprecated No longer enforced. -->
   1734     <permission android:name="android.permission.GET_TASKS"
   1735         android:label="@string/permlab_getTasks"
   1736         android:description="@string/permdesc_getTasks"
   1737         android:protectionLevel="normal" />
   1738 
   1739     <!-- New version of GET_TASKS that apps can request, since GET_TASKS doesn't really
   1740          give access to task information.  We need this new one because there are
   1741          many existing apps that use add libraries and such that have validation
   1742          code to ensure the app has requested the GET_TASKS permission by seeing
   1743          if it has been granted the permission...  if it hasn't, it kills the app
   1744          with a message about being upset.  So we need to have it continue to look
   1745          like the app is getting that permission, even though it will never be
   1746          checked, and new privileged apps can now request this one for real access.
   1747          @hide
   1748          @SystemApi -->
   1749     <permission android:name="android.permission.REAL_GET_TASKS"
   1750         android:protectionLevel="signature|privileged" />
   1751 
   1752     <!-- Allows an application to start a task from a ActivityManager#RecentTaskInfo.
   1753          @hide -->
   1754     <permission android:name="android.permission.START_TASKS_FROM_RECENTS"
   1755         android:protectionLevel="signature|privileged" />
   1756 
   1757     <!-- @SystemApi @hide Allows an application to call APIs that allow it to do interactions
   1758          across the users on the device, using singleton services and
   1759          user-targeted broadcasts.  This permission is not available to
   1760          third party applications. -->
   1761     <permission android:name="android.permission.INTERACT_ACROSS_USERS"
   1762         android:protectionLevel="signature|privileged|development" />
   1763 
   1764     <!-- @SystemApi Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS}
   1765          that removes restrictions on where broadcasts can be sent and allows other
   1766          types of interactions
   1767          @hide -->
   1768     <permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL"
   1769         android:protectionLevel="signature|installer" />
   1770 
   1771     <!-- @SystemApi @hide Allows an application to call APIs that allow it to query and manage
   1772          users on the device. This permission is not available to
   1773          third party applications. -->
   1774     <permission android:name="android.permission.MANAGE_USERS"
   1775         android:protectionLevel="signature|privileged" />
   1776 
   1777     <!-- @hide Allows an application to create, remove users and get the list of
   1778          users on the device. Applications holding this permission can only create restricted,
   1779          guest, managed, demo, and ephemeral users. For creating other kind of users,
   1780          {@link android.Manifest.permission#MANAGE_USERS} is needed.
   1781          This permission is not available to third party applications. -->
   1782     <permission android:name="android.permission.CREATE_USERS"
   1783         android:protectionLevel="signature" />
   1784 
   1785     <!-- @hide Allows an application to set the profile owners and the device owner.
   1786          This permission is not available to third party applications.-->
   1787     <permission android:name="android.permission.MANAGE_PROFILE_AND_DEVICE_OWNERS"
   1788         android:protectionLevel="signature"
   1789         android:label="@string/permlab_manageProfileAndDeviceOwners"
   1790         android:description="@string/permdesc_manageProfileAndDeviceOwners" />
   1791 
   1792     <!-- Allows an application to get full detailed information about
   1793          recently running tasks, with full fidelity to the real state.
   1794          @hide -->
   1795     <permission android:name="android.permission.GET_DETAILED_TASKS"
   1796         android:protectionLevel="signature" />
   1797 
   1798     <!-- Allows an application to change the Z-order of tasks.
   1799          <p>Protection level: normal
   1800     -->
   1801     <permission android:name="android.permission.REORDER_TASKS"
   1802         android:label="@string/permlab_reorderTasks"
   1803         android:description="@string/permdesc_reorderTasks"
   1804         android:protectionLevel="normal" />
   1805 
   1806     <!-- @hide Allows an application to change to remove/kill tasks -->
   1807     <permission android:name="android.permission.REMOVE_TASKS"
   1808         android:protectionLevel="signature" />
   1809 
   1810     <!-- @SystemApi @hide Allows an application to create/manage/remove stacks -->
   1811     <permission android:name="android.permission.MANAGE_ACTIVITY_STACKS"
   1812         android:protectionLevel="signature|privileged" />
   1813 
   1814     <!-- Allows an application to start any activity, regardless of permission
   1815          protection or exported state.
   1816          @hide -->
   1817     <permission android:name="android.permission.START_ANY_ACTIVITY"
   1818         android:protectionLevel="signature" />
   1819 
   1820     <!-- @deprecated The {@link android.app.ActivityManager#restartPackage}
   1821         API is no longer supported. -->
   1822     <permission android:name="android.permission.RESTART_PACKAGES"
   1823         android:label="@string/permlab_killBackgroundProcesses"
   1824         android:description="@string/permdesc_killBackgroundProcesses"
   1825         android:protectionLevel="normal" />
   1826 
   1827     <!-- Allows an application to call
   1828         {@link android.app.ActivityManager#killBackgroundProcesses}.
   1829          <p>Protection level: normal
   1830     -->
   1831     <permission android:name="android.permission.KILL_BACKGROUND_PROCESSES"
   1832         android:label="@string/permlab_killBackgroundProcesses"
   1833         android:description="@string/permdesc_killBackgroundProcesses"
   1834         android:protectionLevel="normal" />
   1835 
   1836     <!-- @SystemApi @hide Allows an application to query process states and current
   1837          OOM adjustment scores.
   1838          <p>Not for use by third-party applications. -->
   1839     <permission android:name="android.permission.GET_PROCESS_STATE_AND_OOM_SCORE"
   1840         android:protectionLevel="signature|privileged|development" />
   1841 
   1842     <!-- Allows use of PendingIntent.getIntent().
   1843          @hide -->
   1844     <permission android:name="android.permission.GET_INTENT_SENDER_INTENT"
   1845         android:protectionLevel="signature" />
   1846 
   1847     <!-- ================================== -->
   1848     <!-- Permissions affecting the display of other applications  -->
   1849     <!-- ================================== -->
   1850     <eat-comment />
   1851 
   1852     <!-- Allows an app to create windows using the type
   1853          {@link android.view.WindowManager.LayoutParams#TYPE_APPLICATION_OVERLAY},
   1854          shown on top of all other apps.  Very few apps
   1855          should use this permission; these windows are intended for
   1856          system-level interaction with the user.
   1857 
   1858          <p class="note"><strong>Note:</strong> If the app
   1859          targets API level 23 or higher, the app user must explicitly grant
   1860          this permission to the app through a permission management screen. The app requests
   1861          the user's approval by sending an intent with action
   1862          {@link android.provider.Settings#ACTION_MANAGE_OVERLAY_PERMISSION}.
   1863          The app can check whether it has this authorization by calling
   1864          {@link android.provider.Settings#canDrawOverlays
   1865          Settings.canDrawOverlays()}.
   1866          <p>Protection level: signature -->
   1867     <permission android:name="android.permission.SYSTEM_ALERT_WINDOW"
   1868         android:label="@string/permlab_systemAlertWindow"
   1869         android:description="@string/permdesc_systemAlertWindow"
   1870         android:protectionLevel="signature|preinstalled|appop|pre23|development" />
   1871 
   1872     <!-- @deprecated Use {@link android.Manifest.permission#REQUEST_COMPANION_RUN_IN_BACKGROUND}
   1873          @hide
   1874     -->
   1875     <permission android:name="android.permission.RUN_IN_BACKGROUND"
   1876         android:label="@string/permlab_runInBackground"
   1877         android:description="@string/permdesc_runInBackground"
   1878         android:protectionLevel="signature" />
   1879 
   1880     <!-- @deprecated Use
   1881         {@link android.Manifest.permission#REQUEST_COMPANION_USE_DATA_IN_BACKGROUND}
   1882          @hide
   1883     -->
   1884     <permission android:name="android.permission.USE_DATA_IN_BACKGROUND"
   1885         android:label="@string/permlab_useDataInBackground"
   1886         android:description="@string/permdesc_useDataInBackground"
   1887         android:protectionLevel="signature" />
   1888 
   1889     <!-- Allows a companion app to run in the background.
   1890          <p>Protection level: normal
   1891     -->
   1892     <permission android:name="android.permission.REQUEST_COMPANION_RUN_IN_BACKGROUND"
   1893                 android:label="@string/permlab_runInBackground"
   1894                 android:description="@string/permdesc_runInBackground"
   1895                 android:protectionLevel="normal" />
   1896 
   1897     <!-- Allows a companion app to use data in the background.
   1898          <p>Protection level: normal
   1899     -->
   1900     <permission android:name="android.permission.REQUEST_COMPANION_USE_DATA_IN_BACKGROUND"
   1901                 android:label="@string/permlab_useDataInBackground"
   1902                 android:description="@string/permdesc_useDataInBackground"
   1903                 android:protectionLevel="normal" />
   1904 
   1905     <!-- @hide Allows an application to set display offsets for the screen.
   1906          This permission is not available to third party applications. -->
   1907     <permission android:name="android.permission.SET_DISPLAY_OFFSET"
   1908         android:protectionLevel="signature|privileged" />
   1909 
   1910     <!-- ================================== -->
   1911     <!-- Permissions affecting the system wallpaper -->
   1912     <!-- ================================== -->
   1913     <eat-comment />
   1914 
   1915     <!-- Allows applications to set the wallpaper.
   1916          <p>Protection level: normal
   1917      -->
   1918     <permission android:name="android.permission.SET_WALLPAPER"
   1919         android:label="@string/permlab_setWallpaper"
   1920         android:description="@string/permdesc_setWallpaper"
   1921         android:protectionLevel="normal" />
   1922 
   1923     <!-- Allows applications to set the wallpaper hints.
   1924          <p>Protection level: normal
   1925     -->
   1926     <permission android:name="android.permission.SET_WALLPAPER_HINTS"
   1927         android:label="@string/permlab_setWallpaperHints"
   1928         android:description="@string/permdesc_setWallpaperHints"
   1929         android:protectionLevel="normal" />
   1930 
   1931     <!-- ============================================ -->
   1932     <!-- Permissions for changing the system clock -->
   1933     <!-- ============================================ -->
   1934     <eat-comment />
   1935 
   1936     <!-- @SystemApi Allows applications to set the system time.
   1937     <p>Not for use by third-party applications. -->
   1938     <permission android:name="android.permission.SET_TIME"
   1939         android:protectionLevel="signature|privileged" />
   1940 
   1941     <!-- Allows applications to set the system time zone.
   1942          <p>Not for use by third-party applications.
   1943     -->
   1944     <permission android:name="android.permission.SET_TIME_ZONE"
   1945         android:label="@string/permlab_setTimeZone"
   1946         android:description="@string/permdesc_setTimeZone"
   1947         android:protectionLevel="signature|privileged" />
   1948 
   1949     <!-- ==================================================== -->
   1950     <!-- Permissions related to changing status bar   -->
   1951     <!-- ==================================================== -->
   1952     <eat-comment />
   1953 
   1954     <!-- Allows an application to expand or collapse the status bar.
   1955          <p>Protection level: normal
   1956     -->
   1957     <permission android:name="android.permission.EXPAND_STATUS_BAR"
   1958         android:label="@string/permlab_expandStatusBar"
   1959         android:description="@string/permdesc_expandStatusBar"
   1960         android:protectionLevel="normal" />
   1961 
   1962     <!-- ============================================================== -->
   1963     <!-- Permissions related to adding/removing shortcuts from Launcher -->
   1964     <!-- ============================================================== -->
   1965     <eat-comment />
   1966 
   1967     <!-- Allows an application to install a shortcut in Launcher.
   1968          <p>Protection level: normal
   1969     -->
   1970     <permission android:name="com.android.launcher.permission.INSTALL_SHORTCUT"
   1971         android:label="@string/permlab_install_shortcut"
   1972         android:description="@string/permdesc_install_shortcut"
   1973         android:protectionLevel="normal"/>
   1974 
   1975     <!--This permission is no longer supported.
   1976     -->
   1977     <permission android:name="com.android.launcher.permission.UNINSTALL_SHORTCUT"
   1978         android:label="@string/permlab_uninstall_shortcut"
   1979         android:description="@string/permdesc_uninstall_shortcut"
   1980         android:protectionLevel="normal"/>
   1981 
   1982     <!-- ==================================================== -->
   1983     <!-- Permissions related to accessing sync settings   -->
   1984     <!-- ==================================================== -->
   1985     <eat-comment />
   1986 
   1987     <!-- Allows applications to read the sync settings.
   1988          <p>Protection level: normal
   1989     -->
   1990     <permission android:name="android.permission.READ_SYNC_SETTINGS"
   1991         android:description="@string/permdesc_readSyncSettings"
   1992         android:label="@string/permlab_readSyncSettings"
   1993         android:protectionLevel="normal" />
   1994 
   1995     <!-- Allows applications to write the sync settings.
   1996          <p>Protection level: normal
   1997     -->
   1998     <permission android:name="android.permission.WRITE_SYNC_SETTINGS"
   1999         android:description="@string/permdesc_writeSyncSettings"
   2000         android:label="@string/permlab_writeSyncSettings"
   2001         android:protectionLevel="normal" />
   2002 
   2003     <!-- Allows applications to read the sync stats.
   2004          <p>Protection level: normal
   2005     -->
   2006     <permission android:name="android.permission.READ_SYNC_STATS"
   2007         android:description="@string/permdesc_readSyncStats"
   2008         android:label="@string/permlab_readSyncStats"
   2009         android:protectionLevel="normal" />
   2010 
   2011     <!-- ============================================ -->
   2012     <!-- Permissions for low-level system interaction -->
   2013     <!-- ============================================ -->
   2014     <eat-comment />
   2015 
   2016     <!-- @SystemApi @hide Change the screen compatibility mode of applications -->
   2017     <permission android:name="android.permission.SET_SCREEN_COMPATIBILITY"
   2018         android:protectionLevel="signature" />
   2019 
   2020     <!-- @SystemApi Allows an application to modify the current configuration, such
   2021          as locale. -->
   2022     <permission android:name="android.permission.CHANGE_CONFIGURATION"
   2023         android:protectionLevel="signature|privileged|development" />
   2024 
   2025     <!-- Allows an application to read or write the system settings.
   2026 
   2027         <p class="note"><strong>Note:</strong> If the app targets API level 23
   2028         or higher, the app user
   2029         must explicitly grant this permission to the app through a permission management screen.
   2030         The app requests the user's approval by sending an intent with action
   2031         {@link android.provider.Settings#ACTION_MANAGE_WRITE_SETTINGS}. The app
   2032         can check whether it has this authorization by calling {@link
   2033         android.provider.Settings.System#canWrite Settings.System.canWrite()}.
   2034 
   2035         <p>Protection level: signature
   2036     -->
   2037     <permission android:name="android.permission.WRITE_SETTINGS"
   2038         android:label="@string/permlab_writeSettings"
   2039         android:description="@string/permdesc_writeSettings"
   2040         android:protectionLevel="signature|preinstalled|appop|pre23" />
   2041 
   2042     <!-- @SystemApi Allows an application to modify the Google service map.
   2043     <p>Not for use by third-party applications. -->
   2044     <permission android:name="android.permission.WRITE_GSERVICES"
   2045         android:protectionLevel="signature|privileged" />
   2046 
   2047     <!-- @SystemApi Allows an application to call
   2048         {@link android.app.ActivityManager#forceStopPackage}.
   2049         @hide -->
   2050     <permission android:name="android.permission.FORCE_STOP_PACKAGES"
   2051         android:protectionLevel="signature|privileged" />
   2052 
   2053     <!-- @SystemApi @hide Allows an application to retrieve the content of the active window
   2054          An active window is the window that has fired an accessibility event. -->
   2055     <permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT"
   2056         android:protectionLevel="signature|privileged" />
   2057 
   2058     <!-- @SystemApi Modify the global animation scaling factor.
   2059     <p>Not for use by third-party applications. -->
   2060     <permission android:name="android.permission.SET_ANIMATION_SCALE"
   2061         android:protectionLevel="signature|privileged|development" />
   2062 
   2063     <!-- @deprecated This functionality will be removed in the future; please do
   2064          not use. Allow an application to make its activities persistent. -->
   2065     <permission android:name="android.permission.PERSISTENT_ACTIVITY"
   2066         android:label="@string/permlab_persistentActivity"
   2067         android:description="@string/permdesc_persistentActivity"
   2068         android:protectionLevel="normal" />
   2069 
   2070     <!-- Allows an application to find out the space used by any package.
   2071          <p>Protection level: normal
   2072     -->
   2073     <permission android:name="android.permission.GET_PACKAGE_SIZE"
   2074         android:label="@string/permlab_getPackageSize"
   2075         android:description="@string/permdesc_getPackageSize"
   2076         android:protectionLevel="normal" />
   2077 
   2078     <!-- @deprecated No longer useful, see
   2079          {@link android.content.pm.PackageManager#addPackageToPreferred}
   2080          for details. -->
   2081     <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS"
   2082         android:protectionLevel="signature|verifier" />
   2083 
   2084     <!-- Allows an application to receive the
   2085          {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is
   2086          broadcast after the system finishes booting.  If you don't
   2087          request this permission, you will not receive the broadcast at
   2088          that time.  Though holding this permission does not have any
   2089          security implications, it can have a negative impact on the
   2090          user experience by increasing the amount of time it takes the
   2091          system to start and allowing applications to have themselves
   2092          running without the user being aware of them.  As such, you must
   2093          explicitly declare your use of this facility to make that visible
   2094          to the user.
   2095          <p>Protection level: normal
   2096     -->
   2097     <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED"
   2098         android:label="@string/permlab_receiveBootCompleted"
   2099         android:description="@string/permdesc_receiveBootCompleted"
   2100         android:protectionLevel="normal" />
   2101 
   2102     <!-- Allows an application to broadcast sticky intents.  These are
   2103          broadcasts whose data is held by the system after being finished,
   2104          so that clients can quickly retrieve that data without having
   2105          to wait for the next broadcast.
   2106          <p>Protection level: normal
   2107     -->
   2108     <permission android:name="android.permission.BROADCAST_STICKY"
   2109         android:label="@string/permlab_broadcastSticky"
   2110         android:description="@string/permdesc_broadcastSticky"
   2111         android:protectionLevel="normal" />
   2112 
   2113     <!-- @SystemApi Allows mounting and unmounting file systems for removable storage.
   2114     <p>Not for use by third-party applications.-->
   2115     <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS"
   2116         android:protectionLevel="signature|privileged" />
   2117 
   2118     <!-- @SystemApi Allows formatting file systems for removable storage.
   2119     <p>Not for use by third-party applications. -->
   2120     <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS"
   2121         android:protectionLevel="signature|privileged" />
   2122 
   2123     <!-- @hide -->
   2124     <permission android:name="android.permission.STORAGE_INTERNAL"
   2125         android:protectionLevel="signature" />
   2126 
   2127     <!-- Allows access to ASEC non-destructive API calls
   2128          @hide  -->
   2129     <permission android:name="android.permission.ASEC_ACCESS"
   2130         android:protectionLevel="signature" />
   2131 
   2132     <!-- Allows creation of ASEC volumes
   2133          @hide  -->
   2134     <permission android:name="android.permission.ASEC_CREATE"
   2135         android:protectionLevel="signature" />
   2136 
   2137     <!-- Allows destruction of ASEC volumes
   2138          @hide  -->
   2139     <permission android:name="android.permission.ASEC_DESTROY"
   2140         android:protectionLevel="signature" />
   2141 
   2142     <!-- Allows mount / unmount of ASEC volumes
   2143          @hide  -->
   2144     <permission android:name="android.permission.ASEC_MOUNT_UNMOUNT"
   2145         android:protectionLevel="signature" />
   2146 
   2147     <!-- Allows rename of ASEC volumes
   2148          @hide  -->
   2149     <permission android:name="android.permission.ASEC_RENAME"
   2150         android:protectionLevel="signature" />
   2151 
   2152     <!-- @SystemApi Allows applications to write the apn settings.
   2153     <p>Not for use by third-party applications. -->
   2154     <permission android:name="android.permission.WRITE_APN_SETTINGS"
   2155         android:protectionLevel="signature|privileged" />
   2156 
   2157     <!-- Allows applications to change network connectivity state.
   2158          <p>Protection level: normal
   2159     -->
   2160     <permission android:name="android.permission.CHANGE_NETWORK_STATE"
   2161         android:description="@string/permdesc_changeNetworkState"
   2162         android:label="@string/permlab_changeNetworkState"
   2163         android:protectionLevel="normal" />
   2164 
   2165     <!-- Allows an application to clear the caches of all installed
   2166          applications on the device.
   2167          <p>Protection level: system|signature
   2168     -->
   2169     <permission android:name="android.permission.CLEAR_APP_CACHE"
   2170         android:protectionLevel="signature|privileged" />
   2171 
   2172     <!-- @SystemApi Allows an application to use any media decoder when decoding for playback
   2173          @hide -->
   2174     <permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK"
   2175         android:protectionLevel="signature|privileged" />
   2176 
   2177     <!-- @SystemApi Allows an application to install and/or uninstall CA certificates on
   2178          behalf of the user.
   2179          @hide -->
   2180     <permission android:name="android.permission.MANAGE_CA_CERTIFICATES"
   2181         android:protectionLevel="signature|privileged" />
   2182 
   2183     <!-- @SystemApi Allows an application to do certain operations needed for
   2184          interacting with the recovery (system update) system.
   2185          @hide -->
   2186     <permission android:name="android.permission.RECOVERY"
   2187         android:protectionLevel="signature|privileged" />
   2188 
   2189     <!-- Allows the system to bind to an application's task services
   2190          @hide -->
   2191     <permission android:name="android.permission.BIND_JOB_SERVICE"
   2192         android:protectionLevel="signature" />
   2193     <uses-permission android:name="android.permission.BIND_JOB_SERVICE"/>
   2194 
   2195     <!-- Allows an application to initiate configuration updates
   2196          <p>An application requesting this permission is responsible for
   2197          verifying the source and integrity of any update before passing
   2198          it off to the various individual installer components
   2199          @hide -->
   2200     <permission android:name="android.permission.UPDATE_CONFIG"
   2201         android:protectionLevel="signature|privileged" />
   2202 
   2203     <!-- Allows the system to reset throttling in shortcut manager.
   2204          @hide -->
   2205     <permission android:name="android.permission.RESET_SHORTCUT_MANAGER_THROTTLING"
   2206         android:protectionLevel="signature" />
   2207 
   2208     <!-- Allows the system to bind to the discovered Network Recommendation Service.
   2209          @SystemApi @hide -->
   2210     <permission android:name="android.permission.BIND_NETWORK_RECOMMENDATION_SERVICE"
   2211         android:protectionLevel="signature" />
   2212     <uses-permission android:name="android.permission.BIND_NETWORK_RECOMMENDATION_SERVICE"/>
   2213 
   2214     <!-- Allows an application to enable, disable and change priority of
   2215          runtime resource overlays.
   2216          @hide -->
   2217     <permission android:name="android.permission.CHANGE_OVERLAY_PACKAGES"
   2218         android:protectionLevel="signature|privileged" />
   2219 
   2220     <!-- ========================================= -->
   2221     <!-- Permissions for special development tools -->
   2222     <!-- ========================================= -->
   2223     <eat-comment />
   2224 
   2225     <!-- @SystemApi Allows an application to read or write the secure system settings.
   2226     <p>Not for use by third-party applications. -->
   2227     <permission android:name="android.permission.WRITE_SECURE_SETTINGS"
   2228         android:protectionLevel="signature|privileged|development" />
   2229 
   2230     <!-- @SystemApi Allows an application to retrieve state dump information from system services.
   2231     <p>Not for use by third-party applications. -->
   2232     <permission android:name="android.permission.DUMP"
   2233         android:protectionLevel="signature|privileged|development" />
   2234 
   2235     <!-- @SystemApi Allows an application to read the low-level system log files.
   2236     <p>Not for use by third-party applications, because
   2237     Log entries can contain the user's private information. -->
   2238     <permission android:name="android.permission.READ_LOGS"
   2239         android:protectionLevel="signature|privileged|development" />
   2240 
   2241     <!-- @SystemApi Configure an application for debugging.
   2242     <p>Not for use by third-party applications. -->
   2243     <permission android:name="android.permission.SET_DEBUG_APP"
   2244         android:protectionLevel="signature|privileged|development" />
   2245 
   2246     <!-- @SystemApi Allows an application to set the maximum number of (not needed)
   2247          application processes that can be running.
   2248          <p>Not for use by third-party applications. -->
   2249     <permission android:name="android.permission.SET_PROCESS_LIMIT"
   2250         android:protectionLevel="signature|privileged|development" />
   2251 
   2252     <!-- @SystemApi Allows an application to control whether activities are immediately
   2253          finished when put in the background.
   2254          <p>Not for use by third-party applications. -->
   2255     <permission android:name="android.permission.SET_ALWAYS_FINISH"
   2256         android:protectionLevel="signature|privileged|development" />
   2257 
   2258     <!-- @SystemApi Allow an application to request that a signal be sent to all persistent processes.
   2259     <p>Not for use by third-party applications. -->
   2260     <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES"
   2261         android:protectionLevel="signature|privileged|development" />
   2262 
   2263     <!-- ==================================== -->
   2264     <!-- Private permissions                  -->
   2265     <!-- ==================================== -->
   2266     <eat-comment />
   2267 
   2268     <!-- @SystemApi Allows access to the list of accounts in the Accounts Service. -->
   2269     <permission android:name="android.permission.GET_ACCOUNTS_PRIVILEGED"
   2270         android:protectionLevel="signature|privileged" />
   2271 
   2272     <!-- Allows but does not guarantee access to user passwords at the conclusion of add account
   2273     @hide -->
   2274     <permission android:name="android.permission.GET_PASSWORD"
   2275         android:protectionLevel="signature" />
   2276 
   2277     <!-- @SystemApi Allows applications to RW to diagnostic resources.
   2278     <p>Not for use by third-party applications. -->
   2279     <permission android:name="android.permission.DIAGNOSTIC"
   2280         android:protectionLevel="signature" />
   2281 
   2282     <!-- @SystemApi Allows an application to open, close, or disable the status bar
   2283          and its icons.
   2284          <p>Not for use by third-party applications. -->
   2285     <permission android:name="android.permission.STATUS_BAR"
   2286         android:protectionLevel="signature|privileged" />
   2287 
   2288     <!-- Allows an application to be the status bar.  Currently used only by SystemUI.apk
   2289     @hide -->
   2290     <permission android:name="android.permission.STATUS_BAR_SERVICE"
   2291         android:protectionLevel="signature" />
   2292 
   2293     <!-- Allows an application to bind to third party quick settings tiles.
   2294          <p>Should only be requested by the System, should be required by
   2295          TileService declarations.-->
   2296     <permission android:name="android.permission.BIND_QUICK_SETTINGS_TILE"
   2297         android:protectionLevel="signature" />
   2298 
   2299     <!-- @SystemApi Allows an application to force a BACK operation on whatever is the
   2300          top activity.
   2301          <p>Not for use by third-party applications.
   2302          @hide
   2303     -->
   2304     <permission android:name="android.permission.FORCE_BACK"
   2305         android:protectionLevel="signature" />
   2306 
   2307     <!-- @SystemApi Allows an application to update device statistics.
   2308     <p>Not for use by third-party applications. -->
   2309     <permission android:name="android.permission.UPDATE_DEVICE_STATS"
   2310         android:protectionLevel="signature|privileged" />
   2311 
   2312     <!-- @SystemApi @hide Allows an application to collect battery statistics -->
   2313     <permission android:name="android.permission.GET_APP_OPS_STATS"
   2314         android:protectionLevel="signature|privileged|development" />
   2315 
   2316     <!-- @SystemApi Allows an application to update application operation statistics. Not for
   2317          use by third party apps.
   2318          @hide -->
   2319     <permission android:name="android.permission.UPDATE_APP_OPS_STATS"
   2320         android:protectionLevel="signature|privileged|installer" />
   2321 
   2322     <!-- @SystemApi Allows an application to update the user app op restrictions.
   2323          Not for use by third party apps.
   2324          @hide -->
   2325     <permission android:name="android.permission.MANAGE_APP_OPS_RESTRICTIONS"
   2326         android:protectionLevel="signature|installer" />
   2327 
   2328     <!-- @SystemApi Allows an application to open windows that are for use by parts
   2329          of the system user interface.
   2330          <p>Not for use by third-party applications.
   2331          @hide
   2332     -->
   2333     <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW"
   2334         android:protectionLevel="signature" />
   2335 
   2336     <!-- @SystemApi Allows an application to manage (create, destroy,
   2337          Z-order) application tokens in the window manager.
   2338          <p>Not for use by third-party applications.
   2339          @hide
   2340     -->
   2341     <permission android:name="android.permission.MANAGE_APP_TOKENS"
   2342         android:protectionLevel="signature" />
   2343 
   2344     <!-- Allows System UI to register listeners for events from Window Manager.
   2345          @hide -->
   2346     <permission android:name="android.permission.REGISTER_WINDOW_MANAGER_LISTENERS"
   2347         android:protectionLevel="signature" />
   2348 
   2349     <!-- @hide Allows the application to temporarily freeze the screen for a
   2350          full-screen transition. -->
   2351     <permission android:name="android.permission.FREEZE_SCREEN"
   2352         android:protectionLevel="signature" />
   2353 
   2354     <!-- @SystemApi Allows an application to inject user events (keys, touch, trackball)
   2355          into the event stream and deliver them to ANY window.  Without this
   2356          permission, you can only deliver events to windows in your own process.
   2357          <p>Not for use by third-party applications.
   2358          @hide
   2359     -->
   2360     <permission android:name="android.permission.INJECT_EVENTS"
   2361         android:protectionLevel="signature" />
   2362 
   2363     <!-- @hide Allows an application to register an input filter which filters the stream
   2364          of user events (keys, touch, trackball) before they are dispatched to any window. -->
   2365     <permission android:name="android.permission.FILTER_EVENTS"
   2366         android:protectionLevel="signature" />
   2367 
   2368     <!-- @hide Allows an application to retrieve the window token from the accessibility manager. -->
   2369     <permission android:name="android.permission.RETRIEVE_WINDOW_TOKEN"
   2370         android:protectionLevel="signature" />
   2371 
   2372     <!-- @hide Allows an application to modify accessibility information from another app. -->
   2373     <permission android:name="android.permission.MODIFY_ACCESSIBILITY_DATA"
   2374                 android:protectionLevel="signature" />
   2375 
   2376     <!-- @hide Allows an application to change the accessibility volume. -->
   2377     <permission android:name="android.permission.CHANGE_ACCESSIBILITY_VOLUME"
   2378                 android:protectionLevel="signature" />
   2379 
   2380     <!-- @hide Allows an application to collect frame statistics -->
   2381     <permission android:name="android.permission.FRAME_STATS"
   2382          android:protectionLevel="signature" />
   2383 
   2384     <!-- @hide Allows an application to temporary enable accessibility on the device. -->
   2385     <permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY"
   2386         android:protectionLevel="signature" />
   2387 
   2388     <!-- @SystemApi Allows an application to watch and control how activities are
   2389          started globally in the system.  Only for is in debugging
   2390          (usually the monkey command).
   2391          <p>Not for use by third-party applications.
   2392          @hide
   2393     -->
   2394     <permission android:name="android.permission.SET_ACTIVITY_WATCHER"
   2395         android:protectionLevel="signature" />
   2396 
   2397     <!-- @SystemApi Allows an application to call the activity manager shutdown() API
   2398          to put the higher-level system there into a shutdown state.
   2399          @hide -->
   2400     <permission android:name="android.permission.SHUTDOWN"
   2401         android:protectionLevel="signature|privileged" />
   2402 
   2403     <!-- @SystemApi Allows an application to tell the activity manager to temporarily
   2404          stop application switches, putting it into a special mode that
   2405          prevents applications from immediately switching away from some
   2406          critical UI such as the home screen.
   2407          @hide -->
   2408     <permission android:name="android.permission.STOP_APP_SWITCHES"
   2409         android:protectionLevel="signature|privileged" />
   2410 
   2411     <!-- @SystemApi Allows an application to retrieve private information about
   2412          the current top activity, such as any assist context it can provide.
   2413          <p>Not for use by third-party applications.
   2414          @hide
   2415     -->
   2416     <permission android:name="android.permission.GET_TOP_ACTIVITY_INFO"
   2417         android:protectionLevel="signature" />
   2418 
   2419     <!-- Allows an application to retrieve the current state of keys and
   2420          switches.
   2421          <p>Not for use by third-party applications.
   2422          @deprecated The API that used this permission has been removed. -->
   2423     <permission android:name="android.permission.READ_INPUT_STATE"
   2424         android:protectionLevel="signature" />
   2425 
   2426     <!-- Must be required by an {@link android.inputmethodservice.InputMethodService},
   2427          to ensure that only the system can bind to it.
   2428          <p>Protection level: signature
   2429     -->
   2430     <permission android:name="android.permission.BIND_INPUT_METHOD"
   2431         android:protectionLevel="signature" />
   2432 
   2433     <!-- Must be required by an {@link android.media.midi.MidiDeviceService},
   2434          to ensure that only the system can bind to it.
   2435          <p>Protection level: signature
   2436     -->
   2437     <permission android:name="android.permission.BIND_MIDI_DEVICE_SERVICE"
   2438         android:protectionLevel="signature" />
   2439 
   2440     <!-- Must be required by an {@link android.accessibilityservice.AccessibilityService},
   2441          to ensure that only the system can bind to it.
   2442          <p>Protection level: signature
   2443     -->
   2444     <permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE"
   2445         android:protectionLevel="signature" />
   2446 
   2447     <!-- Must be required by a {@link android.printservice.PrintService},
   2448          to ensure that only the system can bind to it.
   2449          <p>Protection level: signature
   2450     -->
   2451     <permission android:name="android.permission.BIND_PRINT_SERVICE"
   2452         android:protectionLevel="signature" />
   2453 
   2454     <!-- Must be required by a {@link android.printservice.recommendation.RecommendationService},
   2455      to ensure that only the system can bind to it.
   2456      @hide
   2457      @SystemApi
   2458      <p>Protection level: signature
   2459     -->
   2460     <permission android:name="android.permission.BIND_PRINT_RECOMMENDATION_SERVICE"
   2461             android:protectionLevel="signature" />
   2462 
   2463     <!-- Must be required by a {@link android.nfc.cardemulation.HostApduService}
   2464          or {@link android.nfc.cardemulation.OffHostApduService} to ensure that only
   2465          the system can bind to it.
   2466          <p>Protection level: signature
   2467     -->
   2468     <permission android:name="android.permission.BIND_NFC_SERVICE"
   2469         android:protectionLevel="signature" />
   2470 
   2471     <!-- Must be required by the PrintSpooler to ensure that only the system can bind to it.
   2472          @hide -->
   2473     <permission android:name="android.permission.BIND_PRINT_SPOOLER_SERVICE"
   2474         android:protectionLevel="signature" />
   2475 
   2476     <!-- Must be required by the CompanionDeviceManager to ensure that only the system can bind to it.
   2477          @hide -->
   2478     <permission android:name="android.permission.BIND_COMPANION_DEVICE_MANAGER_SERVICE"
   2479         android:protectionLevel="signature" />
   2480 
   2481     <!-- @SystemApi Must be required by the RuntimePermissionPresenterService to ensure
   2482          that only the system can bind to it.
   2483          @hide -->
   2484     <permission android:name="android.permission.BIND_RUNTIME_PERMISSION_PRESENTER_SERVICE"
   2485         android:protectionLevel="signature" />
   2486 
   2487     <!-- Must be required by a TextService (e.g. SpellCheckerService)
   2488          to ensure that only the system can bind to it.
   2489          <p>Protection level: signature
   2490     -->
   2491     <permission android:name="android.permission.BIND_TEXT_SERVICE"
   2492         android:protectionLevel="signature" />
   2493 
   2494     <!-- Must be required by a {@link android.net.VpnService},
   2495          to ensure that only the system can bind to it.
   2496          <p>Protection level: signature
   2497     -->
   2498     <permission android:name="android.permission.BIND_VPN_SERVICE"
   2499         android:protectionLevel="signature" />
   2500 
   2501     <!-- Must be required by a {@link android.service.wallpaper.WallpaperService},
   2502          to ensure that only the system can bind to it.
   2503          <p>Protection level: system|signature
   2504     -->
   2505     <permission android:name="android.permission.BIND_WALLPAPER"
   2506         android:protectionLevel="signature|privileged" />
   2507 
   2508     <!-- Must be required by a {@link android.service.voice.VoiceInteractionService},
   2509          to ensure that only the system can bind to it.
   2510          <p>Protection level: signature
   2511     -->
   2512     <permission android:name="android.permission.BIND_VOICE_INTERACTION"
   2513         android:protectionLevel="signature" />
   2514 
   2515     <!-- Must be required by a {@link android.service.autofill.AutofillService},
   2516          to ensure that only the system can bind to it.
   2517          <p>Protection level: signature
   2518     -->
   2519     <permission android:name="android.permission.BIND_AUTOFILL_SERVICE"
   2520         android:protectionLevel="signature" />
   2521 
   2522     <!-- @hide TODO(b/37563972): remove once clients use BIND_AUTOFILL_SERVICE -->
   2523     <permission android:name="android.permission.BIND_AUTOFILL"
   2524         android:protectionLevel="signature" />
   2525 
   2526     <!-- Must be required by hotword enrollment application,
   2527          to ensure that only the system can interact with it.
   2528          @hide <p>Not for use by third-party applications.</p> -->
   2529     <permission android:name="android.permission.MANAGE_VOICE_KEYPHRASES"
   2530         android:protectionLevel="signature|privileged" />
   2531 
   2532     <!-- Must be required by a {@link com.android.media.remotedisplay.RemoteDisplayProvider},
   2533          to ensure that only the system can bind to it.
   2534          @hide -->
   2535     <permission android:name="android.permission.BIND_REMOTE_DISPLAY"
   2536         android:protectionLevel="signature" />
   2537 
   2538     <!-- Must be required by a {@link android.media.tv.TvInputService}
   2539          to ensure that only the system can bind to it.
   2540          <p>Protection level: signature
   2541     -->
   2542     <permission android:name="android.permission.BIND_TV_INPUT"
   2543         android:protectionLevel="signature|privileged" />
   2544 
   2545     <!-- @SystemApi
   2546          Must be required by a {@link com.android.media.tv.remoteprovider.TvRemoteProvider}
   2547          to ensure that only the system can bind to it.
   2548          <p>Protection level: signature|privileged
   2549          <p>Not for use by third-party applications. </p>
   2550          @hide  -->
   2551     <permission android:name="android.permission.BIND_TV_REMOTE_SERVICE"
   2552         android:protectionLevel="signature|privileged" />
   2553 
   2554     <!-- @SystemApi
   2555          Must be required for a virtual remote controller for TV.
   2556          <p>Protection level: signature|privileged
   2557          <p>Not for use by third-party applications. </p>
   2558          @hide  -->
   2559     <permission android:name="android.permission.TV_VIRTUAL_REMOTE_CONTROLLER"
   2560         android:protectionLevel="signature|privileged" />
   2561 
   2562     <!-- @SystemApi Allows an application to modify parental controls
   2563          <p>Not for use by third-party applications.
   2564          @hide -->
   2565     <permission android:name="android.permission.MODIFY_PARENTAL_CONTROLS"
   2566         android:protectionLevel="signature|privileged" />
   2567 
   2568     <!-- @SystemApi Allows an application to notify TV inputs by sending broadcasts.
   2569          <p>Protection level: signature|privileged
   2570          <p>Not for use by third-party applications.
   2571          @hide -->
   2572     <permission android:name="android.permission.NOTIFY_TV_INPUTS"
   2573          android:protectionLevel="signature|privileged" />
   2574 
   2575     <!-- Must be required by a {@link android.media.routing.MediaRouteService}
   2576          to ensure that only the system can interact with it.
   2577          @hide -->
   2578     <permission android:name="android.permission.BIND_ROUTE_PROVIDER"
   2579         android:protectionLevel="signature" />
   2580 
   2581     <!-- Must be required by device administration receiver, to ensure that only the
   2582          system can interact with it.
   2583          <p>Protection level: signature
   2584     -->
   2585     <permission android:name="android.permission.BIND_DEVICE_ADMIN"
   2586         android:protectionLevel="signature" />
   2587 
   2588     <!-- @SystemApi Required to add or remove another application as a device admin.
   2589          <p>Not for use by third-party applications.
   2590          @hide -->
   2591     <permission android:name="android.permission.MANAGE_DEVICE_ADMINS"
   2592         android:protectionLevel="signature|privileged" />
   2593 
   2594     <!-- @SystemApi Allows low-level access to setting the orientation (actually
   2595          rotation) of the screen.
   2596          <p>Not for use by third-party applications.
   2597          @hide
   2598     -->
   2599     <permission android:name="android.permission.SET_ORIENTATION"
   2600         android:protectionLevel="signature" />
   2601 
   2602     <!-- @SystemApi Allows low-level access to setting the pointer speed.
   2603          <p>Not for use by third-party applications.
   2604          @hide
   2605     -->
   2606     <permission android:name="android.permission.SET_POINTER_SPEED"
   2607         android:protectionLevel="signature" />
   2608 
   2609     <!-- Allows low-level access to setting input device calibration.
   2610          <p>Not for use by normal applications.
   2611          @hide -->
   2612     <permission android:name="android.permission.SET_INPUT_CALIBRATION"
   2613         android:protectionLevel="signature" />
   2614 
   2615     <!-- Allows low-level access to setting the keyboard layout.
   2616          <p>Not for use by third-party applications.
   2617          @hide -->
   2618     <permission android:name="android.permission.SET_KEYBOARD_LAYOUT"
   2619         android:protectionLevel="signature" />
   2620 
   2621     <!-- Allows an application to query tablet mode state and monitor changes
   2622          in it.
   2623          <p>Not for use by third-party applications.
   2624          @hide -->
   2625     <permission android:name="android.permission.TABLET_MODE"
   2626         android:protectionLevel="signature" />
   2627 
   2628     <!-- Allows an application to request installing packages. Apps
   2629          targeting APIs greater than 25 must hold this permission in
   2630          order to use {@link android.content.Intent#ACTION_INSTALL_PACKAGE}.
   2631          <p>Protection level: signature
   2632     -->
   2633     <permission android:name="android.permission.REQUEST_INSTALL_PACKAGES"
   2634         android:label="@string/permlab_requestInstallPackages"
   2635         android:description="@string/permdesc_requestInstallPackages"
   2636         android:protectionLevel="signature|appop" />
   2637 
   2638     <!-- Allows an application to request deleting packages. Apps
   2639          targeting APIs greater than 25 must hold this permission in
   2640          order to use {@link android.content.Intent#ACTION_UNINSTALL_PACKAGE}.
   2641          <p>Protection level: normal
   2642     -->
   2643     <permission android:name="android.permission.REQUEST_DELETE_PACKAGES"
   2644         android:label="@string/permlab_requestDeletePackages"
   2645         android:description="@string/permdesc_requestDeletePackages"
   2646         android:protectionLevel="normal" />
   2647 
   2648     <!-- @SystemApi Allows an application to install packages.
   2649     <p>Not for use by third-party applications. -->
   2650     <permission android:name="android.permission.INSTALL_PACKAGES"
   2651         android:protectionLevel="signature|privileged" />
   2652 
   2653     <!-- @SystemApi Allows an application to clear user data.
   2654          <p>Not for use by third-party applications
   2655          @hide
   2656     -->
   2657     <permission android:name="android.permission.CLEAR_APP_USER_DATA"
   2658         android:protectionLevel="signature|installer" />
   2659 
   2660     <!-- @hide Allows an application to get the URI permissions
   2661          granted to another application.
   2662          <p>Not for use by third-party applications
   2663     -->
   2664     <permission android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS"
   2665         android:protectionLevel="signature" />
   2666 
   2667     <!-- @hide Allows an application to clear the URI permissions
   2668          granted to another application.
   2669          <p>Not for use by third-party applications
   2670     -->
   2671     <permission
   2672         android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS"
   2673         android:protectionLevel="signature" />
   2674 
   2675     <!-- @SystemApi Allows an application to delete cache files.
   2676     <p>Not for use by third-party applications. -->
   2677     <permission android:name="android.permission.DELETE_CACHE_FILES"
   2678         android:protectionLevel="signature|privileged" />
   2679 
   2680     <!-- @SystemApi Allows an application to delete packages.
   2681          <p>Not for use by third-party applications.
   2682          <p>Starting in {@link android.os.Build.VERSION_CODES#N}, user confirmation is requested
   2683          when the application deleting the package is not the same application that installed the
   2684          package. -->
   2685     <permission android:name="android.permission.DELETE_PACKAGES"
   2686         android:protectionLevel="signature|privileged" />
   2687 
   2688     <!-- @SystemApi Allows an application to move location of installed package.
   2689          @hide -->
   2690     <permission android:name="android.permission.MOVE_PACKAGE"
   2691         android:protectionLevel="signature|privileged" />
   2692 
   2693     <!-- @SystemApi Allows an application to change whether an application component (other than its own) is
   2694          enabled or not.
   2695          <p>Not for use by third-party applications. -->
   2696     <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE"
   2697         android:protectionLevel="signature|privileged" />
   2698 
   2699     <!-- @SystemApi Allows an application to grant specific permissions.
   2700          @hide -->
   2701     <permission android:name="android.permission.GRANT_RUNTIME_PERMISSIONS"
   2702         android:protectionLevel="signature|installer|verifier" />
   2703 
   2704     <!-- @SystemApi Allows an app that has this permission and the permissions to install packages
   2705          to request certain runtime permissions to be granted at installation.
   2706          @hide -->
   2707     <permission android:name="android.permission.INSTALL_GRANT_RUNTIME_PERMISSIONS"
   2708         android:protectionLevel="signature|installer|verifier" />
   2709 
   2710     <!-- @SystemApi Allows an application to revoke specific permissions.
   2711         @hide -->
   2712     <permission android:name="android.permission.REVOKE_RUNTIME_PERMISSIONS"
   2713          android:protectionLevel="signature|installer|verifier" />
   2714 
   2715     <!-- @hide Allows an application to observe permission changes. -->
   2716     <permission android:name="android.permission.OBSERVE_GRANT_REVOKE_PERMISSIONS"
   2717         android:protectionLevel="signature|privileged" />
   2718 
   2719     <!-- @SystemApi Allows an application to use SurfaceFlinger's low level features.
   2720          <p>Not for use by third-party applications.
   2721          @hide
   2722     -->
   2723     <permission android:name="android.permission.ACCESS_SURFACE_FLINGER"
   2724         android:protectionLevel="signature" />
   2725 
   2726     <!-- @SystemApi Allows an application to take screen shots and more generally
   2727          get access to the frame buffer data.
   2728          <p>Not for use by third-party applications. -->
   2729     <permission android:name="android.permission.READ_FRAME_BUFFER"
   2730         android:protectionLevel="signature|privileged" />
   2731 
   2732     <!-- Allows an application to use InputFlinger's low level features.
   2733          @hide -->
   2734     <permission android:name="android.permission.ACCESS_INPUT_FLINGER"
   2735         android:protectionLevel="signature" />
   2736 
   2737     <!-- Allows an application to configure and connect to Wifi displays
   2738          @hide -->
   2739     <permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY"
   2740         android:protectionLevel="signature" />
   2741 
   2742     <!-- Allows an application to control low-level features of Wifi displays
   2743          such as opening an RTSP socket.  This permission should only be used
   2744          by the display manager.
   2745          @hide -->
   2746     <permission android:name="android.permission.CONTROL_WIFI_DISPLAY"
   2747         android:protectionLevel="signature" />
   2748 
   2749     <!-- Allows an application to control the color modes set for displays system-wide.
   2750          <p>Not for use by third-party applications.</p>
   2751          @hide -->
   2752     <permission android:name="android.permission.CONFIGURE_DISPLAY_COLOR_MODE"
   2753         android:protectionLevel="signature" />
   2754 
   2755     <!-- @SystemApi Allows an application to control VPN.
   2756          <p>Not for use by third-party applications.</p>
   2757          @hide -->
   2758     <permission android:name="android.permission.CONTROL_VPN"
   2759         android:protectionLevel="signature|privileged" />
   2760     <uses-permission android:name="android.permission.CONTROL_VPN" />
   2761 
   2762     <!-- @SystemApi Allows an application to capture audio output.
   2763          <p>Not for use by third-party applications.</p> -->
   2764     <permission android:name="android.permission.CAPTURE_AUDIO_OUTPUT"
   2765         android:protectionLevel="signature|privileged" />
   2766 
   2767     <!-- @SystemApi Allows an application to capture audio for hotword detection.
   2768          <p>Not for use by third-party applications.</p>
   2769          @hide -->
   2770     <permission android:name="android.permission.CAPTURE_AUDIO_HOTWORD"
   2771         android:protectionLevel="signature|privileged" />
   2772 
   2773     <!-- @SystemApi Allows an application to modify audio routing and override policy decisions.
   2774          <p>Not for use by third-party applications.</p>
   2775          @hide -->
   2776     <permission android:name="android.permission.MODIFY_AUDIO_ROUTING"
   2777         android:protectionLevel="signature|privileged" />
   2778 
   2779     <!-- @SystemApi Allows an application to capture video output.
   2780          <p>Not for use by third-party applications.</p> -->
   2781     <permission android:name="android.permission.CAPTURE_VIDEO_OUTPUT"
   2782         android:protectionLevel="signature|privileged" />
   2783 
   2784     <!-- @SystemApi Allows an application to capture secure video output.
   2785          <p>Not for use by third-party applications.</p> -->
   2786     <permission android:name="android.permission.CAPTURE_SECURE_VIDEO_OUTPUT"
   2787         android:protectionLevel="signature|privileged" />
   2788 
   2789     <!-- @SystemApi Allows an application to know what content is playing and control its playback.
   2790          <p>Not for use by third-party applications due to privacy of media consumption</p>  -->
   2791     <permission android:name="android.permission.MEDIA_CONTENT_CONTROL"
   2792         android:protectionLevel="signature|privileged" />
   2793 
   2794     <!-- @SystemApi @hide Allows an application to set the volume key long-press listener.
   2795          <p>When it's set, the application will receive the volume key long-press event
   2796          instead of changing volume.</p>
   2797          <p>Not for use by third-party applications</p> -->
   2798     <permission android:name="android.permission.SET_VOLUME_KEY_LONG_PRESS_LISTENER"
   2799         android:protectionLevel="signature|privileged|development" />
   2800 
   2801     <!-- @SystemApi @hide Allows an application to set media key event listener.
   2802          <p>When it's set, the application will receive the media key event before
   2803          any other media sessions. If the event is handled by the listener, other sessions
   2804          cannot get the event.</p>
   2805          <p>Not for use by third-party applications</p> -->
   2806     <permission android:name="android.permission.SET_MEDIA_KEY_LISTENER"
   2807         android:protectionLevel="signature|privileged|development" />
   2808 
   2809     <!-- @SystemApi Required to be able to disable the device (very dangerous!).
   2810          <p>Not for use by third-party applications.
   2811          @hide
   2812     -->
   2813     <permission android:name="android.permission.BRICK"
   2814         android:protectionLevel="signature" />
   2815 
   2816     <!-- @SystemApi Required to be able to reboot the device.
   2817     <p>Not for use by third-party applications. -->
   2818     <permission android:name="android.permission.REBOOT"
   2819         android:protectionLevel="signature|privileged" />
   2820 
   2821    <!-- @SystemApi Allows low-level access to power management.
   2822         <p>Not for use by third-party applications.
   2823         @hide
   2824     -->
   2825    <permission android:name="android.permission.DEVICE_POWER"
   2826         android:protectionLevel="signature" />
   2827 
   2828    <!-- Allows access to the PowerManager.userActivity function.
   2829    <p>Not for use by third-party applications. @hide @SystemApi -->
   2830     <permission android:name="android.permission.USER_ACTIVITY"
   2831         android:protectionLevel="signature|privileged" />
   2832 
   2833    <!-- @hide Allows low-level access to tun tap driver -->
   2834     <permission android:name="android.permission.NET_TUNNELING"
   2835         android:protectionLevel="signature" />
   2836 
   2837     <!-- Run as a manufacturer test application, running as the root user.
   2838          Only available when the device is running in manufacturer test mode.
   2839          <p>Not for use by third-party applications.
   2840     -->
   2841     <permission android:name="android.permission.FACTORY_TEST"
   2842         android:protectionLevel="signature" />
   2843 
   2844     <!-- Allows an application to broadcast a notification that an application
   2845          package has been removed.
   2846          <p>Not for use by third-party applications.
   2847     -->
   2848     <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED"
   2849         android:protectionLevel="signature" />
   2850 
   2851     <!-- Allows an application to broadcast an SMS receipt notification.
   2852          <p>Not for use by third-party applications.
   2853     -->
   2854     <permission android:name="android.permission.BROADCAST_SMS"
   2855         android:protectionLevel="signature" />
   2856 
   2857     <!-- Allows an application to broadcast a WAP PUSH receipt notification.
   2858          <p>Not for use by third-party applications.
   2859     -->
   2860     <permission android:name="android.permission.BROADCAST_WAP_PUSH"
   2861         android:protectionLevel="signature" />
   2862 
   2863     <!-- @SystemApi Allows an application to broadcast privileged networking requests.
   2864          <p>Not for use by third-party applications.
   2865          @hide
   2866          @deprecated Use {@link android.Manifest.permission#REQUEST_NETWORK_SCORES} instead
   2867     -->
   2868     <permission android:name="android.permission.BROADCAST_NETWORK_PRIVILEGED"
   2869         android:protectionLevel="signature|privileged" />
   2870 
   2871     <!-- @SystemApi Not for use by third-party applications. -->
   2872     <permission android:name="android.permission.MASTER_CLEAR"
   2873         android:protectionLevel="signature|privileged" />
   2874 
   2875     <!-- @SystemApi Allows an application to call any phone number, including emergency
   2876          numbers, without going through the Dialer user interface for the user
   2877          to confirm the call being placed.
   2878          <p>Not for use by third-party applications. -->
   2879     <permission android:name="android.permission.CALL_PRIVILEGED"
   2880         android:protectionLevel="signature|privileged" />
   2881 
   2882     <!-- @SystemApi Allows an application to perform CDMA OTA provisioning @hide -->
   2883     <permission android:name="android.permission.PERFORM_CDMA_PROVISIONING"
   2884         android:protectionLevel="signature|privileged" />
   2885 
   2886     <!-- @SystemApi Allows an application to perform SIM Activation @hide -->
   2887     <permission android:name="android.permission.PERFORM_SIM_ACTIVATION"
   2888         android:protectionLevel="signature|privileged" />
   2889 
   2890     <!-- @SystemApi Allows enabling/disabling location update notifications from
   2891          the radio.
   2892          <p>Not for use by third-party applications. -->
   2893     <permission android:name="android.permission.CONTROL_LOCATION_UPDATES"
   2894         android:protectionLevel="signature|privileged" />
   2895 
   2896     <!-- @SystemApi Allows read/write access to the "properties" table in the checkin
   2897          database, to change values that get uploaded.
   2898          <p>Not for use by third-party applications. -->
   2899     <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES"
   2900         android:protectionLevel="signature|privileged" />
   2901 
   2902     <!-- @SystemApi Allows an application to collect component usage
   2903          statistics
   2904          <p>Declaring the permission implies intention to use the API and the user of the
   2905          device can grant permission through the Settings application. -->
   2906     <permission android:name="android.permission.PACKAGE_USAGE_STATS"
   2907         android:protectionLevel="signature|privileged|development|appop" />
   2908     <uses-permission android:name="android.permission.PACKAGE_USAGE_STATS" />
   2909 
   2910     <!-- @hide Allows an application to change the app idle state of an app.
   2911          <p>Not for use by third-party applications. -->
   2912     <permission android:name="android.permission.CHANGE_APP_IDLE_STATE"
   2913         android:protectionLevel="signature" />
   2914 
   2915     <!-- @hide @SystemApi Allows an application to temporarily whitelist an inactive app to
   2916          access the network and acquire wakelocks.
   2917          <p>Not for use by third-party applications. -->
   2918     <permission android:name="android.permission.CHANGE_DEVICE_IDLE_TEMP_WHITELIST"
   2919         android:protectionLevel="signature|privileged" />
   2920 
   2921     <!-- Permission an application must hold in order to use
   2922          {@link android.provider.Settings#ACTION_REQUEST_IGNORE_BATTERY_OPTIMIZATIONS}.
   2923          This is a normal permission: an app requesting it will always be granted the
   2924          permission, without the user needing to approve or see it. -->
   2925     <permission android:name="android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS"
   2926         android:label="@string/permlab_requestIgnoreBatteryOptimizations"
   2927         android:description="@string/permdesc_requestIgnoreBatteryOptimizations"
   2928         android:protectionLevel="normal" />
   2929 
   2930     <!-- @SystemApi Allows an application to collect battery statistics -->
   2931     <permission android:name="android.permission.BATTERY_STATS"
   2932         android:protectionLevel="signature|privileged|development" />
   2933 
   2934     <!-- @SystemApi Allows an application to control the backup and restore process.
   2935     <p>Not for use by third-party applications.
   2936          @hide pending API council -->
   2937     <permission android:name="android.permission.BACKUP"
   2938         android:protectionLevel="signature|privileged" />
   2939 
   2940     <!-- Allows a package to launch the secure full-backup confirmation UI.
   2941          ONLY the system process may hold this permission.
   2942          @hide -->
   2943     <permission android:name="android.permission.CONFIRM_FULL_BACKUP"
   2944         android:protectionLevel="signature" />
   2945 
   2946     <!-- @SystemApi Must be required by a {@link android.widget.RemoteViewsService},
   2947          to ensure that only the system can bind to it. -->
   2948     <permission android:name="android.permission.BIND_REMOTEVIEWS"
   2949         android:protectionLevel="signature|privileged" />
   2950 
   2951     <!-- @SystemApi Allows an application to tell the AppWidget service which application
   2952          can access AppWidget's data.  The normal user flow is that a user
   2953          picks an AppWidget to go into a particular host, thereby giving that
   2954          host application access to the private data from the AppWidget app.
   2955          An application that has this permission should honor that contract.
   2956          <p>Not for use by third-party applications. -->
   2957     <permission android:name="android.permission.BIND_APPWIDGET"
   2958         android:protectionLevel="signature|privileged" />
   2959 
   2960     <!-- @SystemApi Private permission, to restrict who can bring up a dialog to add a new
   2961          keyguard widget
   2962          @hide -->
   2963     <permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET"
   2964         android:protectionLevel="signature|privileged" />
   2965 
   2966     <!-- @SystemApi Internal permission allowing an application to query/set which
   2967          applications can bind AppWidgets.
   2968          @hide -->
   2969     <permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS"
   2970         android:protectionLevel="signature|privileged" />
   2971 
   2972     <!-- Allows applications to change the background data setting.
   2973     <p>Not for use by third-party applications.
   2974          @hide pending API council -->
   2975     <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING"
   2976         android:protectionLevel="signature" />
   2977 
   2978     <!-- @SystemApi This permission can be used on content providers to allow the global
   2979          search system to access their data.  Typically it used when the
   2980          provider has some permissions protecting it (which global search
   2981          would not be expected to hold), and added as a read-only permission
   2982          to the path in the provider where global search queries are
   2983          performed.  This permission can not be held by regular applications;
   2984          it is used by applications to protect themselves from everyone else
   2985          besides global search. -->
   2986     <permission android:name="android.permission.GLOBAL_SEARCH"
   2987         android:protectionLevel="signature|privileged" />
   2988 
   2989     <!-- Internal permission protecting access to the global search
   2990          system: ensures that only the system can access the provider
   2991          to perform queries (since this otherwise provides unrestricted
   2992          access to a variety of content providers), and to write the
   2993          search statistics (to keep applications from gaming the source
   2994          ranking).
   2995          @hide -->
   2996     <permission android:name="android.permission.GLOBAL_SEARCH_CONTROL"
   2997         android:protectionLevel="signature" />
   2998 
   2999     <!-- @SystemApi Internal permission to allows an application to read indexable data.
   3000         @hide -->
   3001     <permission android:name="android.permission.READ_SEARCH_INDEXABLES"
   3002         android:protectionLevel="signature|privileged" />
   3003 
   3004     <!-- @SystemApi Allows applications to set a live wallpaper.
   3005          @hide XXX Change to signature once the picker is moved to its
   3006          own apk as Ghod Intended. -->
   3007     <permission android:name="android.permission.SET_WALLPAPER_COMPONENT"
   3008         android:protectionLevel="signature|privileged" />
   3009 
   3010     <!-- @SystemApi Allows applications to read dream settings and dream state.
   3011          @hide -->
   3012     <permission android:name="android.permission.READ_DREAM_STATE"
   3013         android:protectionLevel="signature|privileged" />
   3014 
   3015     <!-- @SystemApi Allows applications to write dream settings, and start or stop dreaming.
   3016          @hide -->
   3017     <permission android:name="android.permission.WRITE_DREAM_STATE"
   3018         android:protectionLevel="signature|privileged" />
   3019 
   3020     <!-- @SystemApi Allow an application to read and write the cache partition.
   3021          @hide -->
   3022     <permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM"
   3023         android:protectionLevel="signature|privileged" />
   3024 
   3025     <!-- Must be required by default container service so that only
   3026          the system can bind to it and use it to copy
   3027          protected data to secure containers or files
   3028          accessible to the system.
   3029          @hide -->
   3030     <permission android:name="android.permission.COPY_PROTECTED_DATA"
   3031         android:protectionLevel="signature" />
   3032 
   3033     <!-- @SystemApi Internal permission protecting access to the encryption methods
   3034         @hide
   3035     -->
   3036     <permission android:name="android.permission.CRYPT_KEEPER"
   3037         android:protectionLevel="signature|privileged" />
   3038 
   3039     <!-- @SystemApi Allows an application to read historical network usage for
   3040          specific networks and applications. @hide -->
   3041     <permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY"
   3042         android:protectionLevel="signature|privileged" />
   3043 
   3044     <!-- Allows an application to manage network policies (such as warning and disable
   3045          limits) and to define application-specific rules. @hide -->
   3046     <permission android:name="android.permission.MANAGE_NETWORK_POLICY"
   3047         android:protectionLevel="signature" />
   3048 
   3049     <!-- @SystemApi Allows an application to account its network traffic against other UIDs. Used
   3050          by system services like download manager and media server. Not for use by
   3051          third party apps. @hide -->
   3052     <permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING"
   3053         android:protectionLevel="signature|privileged" />
   3054 
   3055     <!-- C2DM permission.
   3056          @hide Used internally.
   3057      -->
   3058     <permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"
   3059           android:protectionLevel="signature" />
   3060     <uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/>
   3061 
   3062     <!-- @SystemApi @hide Package verifier needs to have this permission before the PackageManager will
   3063          trust it to verify packages.
   3064     -->
   3065     <permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT"
   3066         android:protectionLevel="signature|privileged" />
   3067 
   3068     <!-- Must be required by package verifier receiver, to ensure that only the
   3069          system can interact with it.
   3070          @hide
   3071     -->
   3072     <permission android:name="android.permission.BIND_PACKAGE_VERIFIER"
   3073         android:protectionLevel="signature" />
   3074 
   3075     <!-- @SystemApi @hide Intent filter verifier needs to have this permission before the
   3076          PackageManager will trust it to verify intent filters.
   3077     -->
   3078     <permission android:name="android.permission.INTENT_FILTER_VERIFICATION_AGENT"
   3079         android:protectionLevel="signature|privileged" />
   3080 
   3081     <!-- Must be required by intent filter verifier receiver, to ensure that only the
   3082          system can interact with it.
   3083          @hide
   3084     -->
   3085     <permission android:name="android.permission.BIND_INTENT_FILTER_VERIFIER"
   3086         android:protectionLevel="signature" />
   3087 
   3088     <!-- @SystemApi Allows applications to access serial ports via the SerialManager.
   3089          @hide -->
   3090     <permission android:name="android.permission.SERIAL_PORT"
   3091         android:protectionLevel="signature|privileged" />
   3092 
   3093     <!-- Allows the holder to access content providers from outside an ApplicationThread.
   3094          This permission is enforced by the ActivityManagerService on the corresponding APIs,
   3095          in particular ActivityManagerService#getContentProviderExternal(String) and
   3096          ActivityManagerService#removeContentProviderExternal(String).
   3097          @hide
   3098     -->
   3099     <permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY"
   3100         android:protectionLevel="signature" />
   3101 
   3102     <!-- @SystemApi Allows an application to hold an UpdateLock, recommending that a headless
   3103          OTA reboot *not* occur while the lock is held.
   3104          @hide -->
   3105     <permission android:name="android.permission.UPDATE_LOCK"
   3106         android:protectionLevel="signature|privileged" />
   3107 
   3108     <!-- @SystemApi Allows an application to read the current set of notifications, including
   3109          any metadata and intents attached.
   3110          @hide -->
   3111     <permission android:name="android.permission.ACCESS_NOTIFICATIONS"
   3112         android:protectionLevel="signature|privileged|appop" />
   3113 
   3114     <!-- Marker permission for applications that wish to access notification policy.
   3115          <p>Protection level: normal
   3116     -->
   3117     <permission android:name="android.permission.ACCESS_NOTIFICATION_POLICY"
   3118         android:description="@string/permdesc_access_notification_policy"
   3119         android:label="@string/permlab_access_notification_policy"
   3120         android:protectionLevel="normal" />
   3121 
   3122     <!-- Allows modification of do not disturb rules and policies. Only allowed for system
   3123         processes.
   3124         @hide -->
   3125     <permission android:name="android.permission.MANAGE_NOTIFICATIONS"
   3126                 android:protectionLevel="signature" />
   3127 
   3128     <!-- Allows access to keyguard secure storage.  Only allowed for system processes.
   3129         @hide -->
   3130     <permission android:name="android.permission.ACCESS_KEYGUARD_SECURE_STORAGE"
   3131         android:protectionLevel="signature" />
   3132 
   3133     <!-- Allows managing (adding, removing) fingerprint templates. Reserved for the system. @hide -->
   3134     <permission android:name="android.permission.MANAGE_FINGERPRINT"
   3135         android:protectionLevel="signature|privileged" />
   3136 
   3137     <!-- Allows an app to reset fingerprint attempt counter. Reserved for the system. @hide -->
   3138     <permission android:name="android.permission.RESET_FINGERPRINT_LOCKOUT"
   3139         android:protectionLevel="signature" />
   3140 
   3141     <!-- Allows an application to control keyguard.  Only allowed for system processes.
   3142         @hide -->
   3143     <permission android:name="android.permission.CONTROL_KEYGUARD"
   3144         android:protectionLevel="signature" />
   3145 
   3146     <!-- Allows an application to listen to trust changes.  Only allowed for system processes.
   3147         @hide -->
   3148     <permission android:name="android.permission.TRUST_LISTENER"
   3149         android:protectionLevel="signature" />
   3150 
   3151     <!-- @SystemApi Allows an application to provide a trust agent.
   3152          @hide For security reasons, this is a platform-only permission. -->
   3153     <permission android:name="android.permission.PROVIDE_TRUST_AGENT"
   3154         android:protectionLevel="signature|privileged" />
   3155 
   3156     <!-- Allows an application to launch the trust agent settings activity.
   3157         @hide -->
   3158     <permission android:name="android.permission.LAUNCH_TRUST_AGENT_SETTINGS"
   3159         android:protectionLevel="signature|privileged" />
   3160 
   3161     <!-- @SystemApi Must be required by an {@link
   3162         android.service.trust.TrustAgentService},
   3163         to ensure that only the system can bind to it.
   3164         @hide -->
   3165     <permission android:name="android.permission.BIND_TRUST_AGENT"
   3166         android:protectionLevel="signature" />
   3167 
   3168     <!-- Must be required by an {@link
   3169          android.service.notification.NotificationListenerService},
   3170          to ensure that only the system can bind to it.
   3171          <p>Protection level: signature
   3172     -->
   3173     <permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE"
   3174         android:protectionLevel="signature" />
   3175 
   3176     <!-- @SystemApi Must be required by an {@link
   3177          android.service.notification.NotificationAssistantService} to ensure that only the system
   3178          can bind to it.
   3179          <p>Protection level: signature
   3180          @hide
   3181     -->
   3182     <permission android:name="android.permission.BIND_NOTIFICATION_ASSISTANT_SERVICE"
   3183         android:protectionLevel="signature" />
   3184 
   3185     <!-- Must be required by a {@link
   3186          android.service.chooser.ChooserTargetService}, to ensure that
   3187          only the system can bind to it.
   3188          <p>Protection level: signature
   3189     -->
   3190     <permission android:name="android.permission.BIND_CHOOSER_TARGET_SERVICE"
   3191         android:protectionLevel="signature" />
   3192 
   3193     <!-- @SystemApi Must be held by services that extend
   3194          {@link android.service.resolver.ResolverRankerService}.
   3195          <p>Protection level: signature|privileged
   3196          @hide
   3197     -->
   3198     <permission android:name="android.permission.PROVIDE_RESOLVER_RANKER_SERVICE"
   3199                 android:protectionLevel="signature|privileged" />
   3200 
   3201     <!-- @SystemApi Must be required by services that extend
   3202          {@link android.service.resolver.ResolverRankerService}, to ensure that only the system can
   3203          bind to them.
   3204          <p>Protection level: signature
   3205          @hide
   3206     -->
   3207     <permission android:name="android.permission.BIND_RESOLVER_RANKER_SERVICE"
   3208         android:protectionLevel="signature" />
   3209 
   3210     <!-- Must be required by a {@link
   3211          android.service.notification.ConditionProviderService},
   3212          to ensure that only the system can bind to it.
   3213          <p>Protection level: signature
   3214          -->
   3215     <permission android:name="android.permission.BIND_CONDITION_PROVIDER_SERVICE"
   3216         android:protectionLevel="signature" />
   3217 
   3218     <!-- Must be required by an {@link android.service.dreams.DreamService},
   3219          to ensure that only the system can bind to it.
   3220          <p>Protection level: signature
   3221     -->
   3222     <permission android:name="android.permission.BIND_DREAM_SERVICE"
   3223         android:protectionLevel="signature" />
   3224 
   3225     <!-- Must be required by an {@link android.app.usage.CacheQuotaService} to ensure that only the
   3226          system can bind to it.
   3227          @hide This is not a third-party API (intended for OEMs and system apps).
   3228     -->
   3229     <permission android:name="android.permission.BIND_CACHE_QUOTA_SERVICE"
   3230                 android:protectionLevel="signature" />
   3231 
   3232     <!-- @SystemApi Allows an application to call into a carrier setup flow. It is up to the
   3233          carrier setup application to enforce that this permission is required
   3234          @hide This is not a third-party API (intended for OEMs and system apps). -->
   3235     <permission android:name="android.permission.INVOKE_CARRIER_SETUP"
   3236         android:protectionLevel="signature|privileged" />
   3237 
   3238     <!-- @SystemApi Allows an application to listen for network condition observations.
   3239          @hide This is not a third-party API (intended for system apps). -->
   3240     <permission android:name="android.permission.ACCESS_NETWORK_CONDITIONS"
   3241         android:protectionLevel="signature|privileged" />
   3242 
   3243     <!-- @SystemApi Allows an application to provision and access DRM certificates
   3244          @hide This is not a third-party API (intended for system apps). -->
   3245     <permission android:name="android.permission.ACCESS_DRM_CERTIFICATES"
   3246         android:protectionLevel="signature|privileged" />
   3247 
   3248     <!-- Api Allows an application to manage media projection sessions.
   3249          @hide This is not a third-party API (intended for system apps). -->
   3250     <permission android:name="android.permission.MANAGE_MEDIA_PROJECTION"
   3251         android:protectionLevel="signature" />
   3252 
   3253     <!-- @SystemApi Allows an application to read install sessions
   3254          @hide This is not a third-party API (intended for system apps). -->
   3255     <permission android:name="android.permission.READ_INSTALL_SESSIONS"
   3256         android:label="@string/permlab_readInstallSessions"
   3257         android:description="@string/permdesc_readInstallSessions"
   3258         android:protectionLevel="normal"/>
   3259 
   3260     <!-- @SystemApi Allows an application to remove DRM certificates
   3261          @hide This is not a third-party API (intended for system apps). -->
   3262     <permission android:name="android.permission.REMOVE_DRM_CERTIFICATES"
   3263         android:protectionLevel="signature|privileged" />
   3264 
   3265     <!-- @deprecated Use {@link android.Manifest.permission#BIND_CARRIER_SERVICES} instead -->
   3266     <permission android:name="android.permission.BIND_CARRIER_MESSAGING_SERVICE"
   3267         android:protectionLevel="signature|privileged" />
   3268 
   3269     <!-- Allows an application to interact with the currently active
   3270          {@link android.service.voice.VoiceInteractionService}.
   3271          @hide -->
   3272     <permission android:name="android.permission.ACCESS_VOICE_INTERACTION_SERVICE"
   3273         android:protectionLevel="signature" />
   3274 
   3275     <!-- The system process that is allowed to bind to services in carrier apps will
   3276          have this permission. Carrier apps should use this permission to protect
   3277          their services that only the system is allowed to bind to.
   3278          <p>Protection level: system|signature
   3279     -->
   3280     <permission android:name="android.permission.BIND_CARRIER_SERVICES"
   3281         android:label="@string/permlab_bindCarrierServices"
   3282         android:description="@string/permdesc_bindCarrierServices"
   3283         android:protectionLevel="signature|privileged" />
   3284 
   3285     <!-- Allows an application to query whether DO_NOT_ASK_CREDENTIALS_ON_BOOT
   3286          flag is set.
   3287          @hide -->
   3288     <permission android:name="android.permission.QUERY_DO_NOT_ASK_CREDENTIALS_ON_BOOT"
   3289                 android:protectionLevel="signature" />
   3290 
   3291     <!-- @SystemApi Allows applications to kill UIDs.
   3292         <p>Not for use by third-party applications.
   3293          @hide -->
   3294     <permission android:name="android.permission.KILL_UID"
   3295                 android:protectionLevel="signature|installer" />
   3296 
   3297     <!-- @SystemApi Allows applications to read the local WiFi and Bluetooth MAC address.
   3298         @hide -->
   3299     <permission android:name="android.permission.LOCAL_MAC_ADDRESS"
   3300                 android:protectionLevel="signature|privileged" />
   3301 
   3302     <!-- @SystemApi Allows access to MAC addresses of WiFi and Bluetooth peer devices.
   3303         @hide -->
   3304     <permission android:name="android.permission.PEERS_MAC_ADDRESS"
   3305                 android:protectionLevel="signature|setup" />
   3306 
   3307     <!-- Allows the Nfc stack to dispatch Nfc messages to applications. Applications
   3308         can use this permission to ensure incoming Nfc messages are from the Nfc stack
   3309         and not simulated by another application.
   3310         @hide -->
   3311     <permission android:name="android.permission.DISPATCH_NFC_MESSAGE"
   3312                 android:protectionLevel="signature|privileged" />
   3313 
   3314     <!-- @SystemApi Allows changing day / night mode when system is configured with
   3315          config_lockDayNightMode set to true. If requesting app does not have permission,
   3316          it will be ignored.
   3317         @hide -->
   3318     <permission android:name="android.permission.MODIFY_DAY_NIGHT_MODE"
   3319                 android:protectionLevel="signature|privileged" />
   3320 
   3321     <!-- The system process is explicitly the only one allowed to launch the
   3322          confirmation UI for full backup/restore -->
   3323     <uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/>
   3324 
   3325     <!-- Allows the holder to access and manage instant applications on the device.
   3326     @hide -->
   3327     <permission android:name="android.permission.ACCESS_INSTANT_APPS"
   3328             android:protectionLevel="signature|installer|verifier" />
   3329 
   3330     <!-- Allows the holder to view the instant applications on the device.
   3331     @hide -->
   3332     <permission android:name="android.permission.VIEW_INSTANT_APPS"
   3333             android:protectionLevel="signature|preinstalled" />
   3334 
   3335     <!-- Allows receiving the usage of media resource e.g. video/audio codec and
   3336          graphic memory.
   3337          @hide -->
   3338     <permission android:name="android.permission.RECEIVE_MEDIA_RESOURCE_USAGE"
   3339                 android:protectionLevel="signature|privileged" />
   3340 
   3341     <!-- Must be required by system/priv apps when accessing the sound trigger
   3342          APIs given by {@link SoundTriggerManager}.
   3343          @hide <p>Not for use by third-party applications.</p> -->
   3344     <permission android:name="android.permission.MANAGE_SOUND_TRIGGER"
   3345         android:protectionLevel="signature|privileged" />
   3346 
   3347     <!-- @SystemApi Allows trusted applications to dispatch managed provisioning message to Managed
   3348          Provisioning app. If requesting app does not have permission, it will be ignored.
   3349          @hide -->
   3350     <permission android:name="android.permission.DISPATCH_PROVISIONING_MESSAGE"
   3351                 android:protectionLevel="signature|privileged" />
   3352 
   3353     <!-- Allows the holder to read blocked numbers. See
   3354          {@link android.provider.BlockedNumberContract}.
   3355          @hide -->
   3356     <permission android:name="android.permission.READ_BLOCKED_NUMBERS"
   3357                 android:protectionLevel="signature" />
   3358 
   3359     <!-- Allows the holder to write blocked numbers. See
   3360          {@link android.provider.BlockedNumberContract}.
   3361          @hide -->
   3362     <permission android:name="android.permission.WRITE_BLOCKED_NUMBERS"
   3363                 android:protectionLevel="signature" />
   3364 
   3365     <!-- Must be required by an {@link android.service.vr.VrListenerService}, to ensure that only
   3366          the system can bind to it.
   3367          <p>Protection level: signature -->
   3368     <permission android:name="android.permission.BIND_VR_LISTENER_SERVICE"
   3369         android:protectionLevel="signature" />
   3370 
   3371     <!-- Must be required by system apps when accessing restricted VR APIs.
   3372          @hide
   3373          @SystemApi
   3374          <p>Protection level: signature -->
   3375     <permission android:name="android.permission.RESTRICTED_VR_ACCESS"
   3376         android:protectionLevel="signature|preinstalled" />
   3377 
   3378     <!-- Required to make calls to {@link android.service.vr.IVrManager}.
   3379          @hide -->
   3380     <permission android:name="android.permission.ACCESS_VR_MANAGER"
   3381             android:protectionLevel="signature" />
   3382 
   3383     <!-- Allows an application to whitelist tasks during lock task mode
   3384          @hide <p>Not for use by third-party applications.</p> -->
   3385     <permission android:name="android.permission.UPDATE_LOCK_TASK_PACKAGES"
   3386         android:protectionLevel="signature|setup" />
   3387 
   3388     <!-- @SystemApi Allows an application to replace the app name displayed alongside notifications
   3389          in the N-release and later.
   3390          @hide  <p>Not for use by third-party applications.</p> -->
   3391     <permission android:name="android.permission.SUBSTITUTE_NOTIFICATION_APP_NAME"
   3392                 android:protectionLevel="signature|privileged" />
   3393 
   3394     <!-- @SystemApi Allows an application to show notifications before the device is provisioned.
   3395          @hide  <p>Not for use by third-party applications.</p> -->
   3396     <permission android:name="android.permission.NOTIFICATION_DURING_SETUP"
   3397                 android:protectionLevel="signature|privileged" />
   3398 
   3399     <!-- @SystemApi Allows an application to manage auto-fill sessions.
   3400          @hide  <p>Not for use by third-party applications.</p> -->
   3401     <permission android:name="android.permission.MANAGE_AUTO_FILL"
   3402         android:protectionLevel="signature" />
   3403 
   3404     <!-- Allows an app to set the theme overlay in /vendor/overlay
   3405          being used.
   3406          @hide  <p>Not for use by third-party applications.</p> -->
   3407     <permission android:name="android.permission.MODIFY_THEME_OVERLAY"
   3408                 android:protectionLevel="signature" />
   3409 
   3410     <!-- Allows an instant app to create foreground services. -->
   3411     <permission android:name="android.permission.INSTANT_APP_FOREGROUND_SERVICE"
   3412         android:protectionLevel="signature|development|ephemeral|appop" />
   3413 
   3414     <application android:process="system"
   3415                  android:persistent="true"
   3416                  android:hasCode="false"
   3417                  android:label="@string/android_system_label"
   3418                  android:allowClearUserData="false"
   3419                  android:backupAgent="com.android.server.backup.SystemBackupAgent"
   3420                  android:killAfterRestore="false"
   3421                  android:icon="@drawable/ic_launcher_android"
   3422                  android:supportsRtl="true"
   3423                  android:theme="@style/Theme.DeviceDefault.Light.DarkActionBar"
   3424                  android:defaultToDeviceProtectedStorage="true"
   3425                  android:directBootAware="true">
   3426         <activity android:name="com.android.internal.app.ChooserActivity"
   3427                 android:theme="@style/Theme.DeviceDefault.Resolver"
   3428                 android:finishOnCloseSystemDialogs="true"
   3429                 android:excludeFromRecents="true"
   3430                 android:documentLaunchMode="never"
   3431                 android:relinquishTaskIdentity="true"
   3432                 android:configChanges="screenSize|smallestScreenSize|screenLayout|orientation|keyboard|keyboardHidden"
   3433                 android:process=":ui"
   3434                 android:visibleToInstantApps="true">
   3435             <intent-filter>
   3436                 <action android:name="android.intent.action.CHOOSER" />
   3437                 <category android:name="android.intent.category.DEFAULT" />
   3438                 <category android:name="android.intent.category.VOICE" />
   3439             </intent-filter>
   3440         </activity>
   3441         <activity android:name="com.android.internal.app.AccessibilityButtonChooserActivity"
   3442                   android:exported="false"
   3443                   android:theme="@style/Theme.DeviceDefault.Resolver"
   3444                   android:finishOnCloseSystemDialogs="true"
   3445                   android:excludeFromRecents="true"
   3446                   android:documentLaunchMode="never"
   3447                   android:relinquishTaskIdentity="true"
   3448                   android:configChanges="screenSize|smallestScreenSize|screenLayout|orientation|keyboard|keyboardHidden"
   3449                   android:process=":ui"
   3450                   android:visibleToInstantApps="true">
   3451             <intent-filter>
   3452                 <action android:name="com.android.internal.intent.action.CHOOSE_ACCESSIBILITY_BUTTON" />
   3453                 <category android:name="android.intent.category.DEFAULT" />
   3454             </intent-filter>
   3455         </activity>
   3456         <activity android:name="com.android.internal.app.IntentForwarderActivity"
   3457                 android:finishOnCloseSystemDialogs="true"
   3458                 android:theme="@style/Theme.NoDisplay"
   3459                 android:excludeFromRecents="true"
   3460                 android:label="@string/user_owner_label"
   3461                 android:exported="true"
   3462                 >
   3463         </activity>
   3464         <activity-alias android:name="com.android.internal.app.ForwardIntentToParent"
   3465                 android:targetActivity="com.android.internal.app.IntentForwarderActivity"
   3466                 android:exported="true"
   3467                 android:label="@string/user_owner_label">
   3468         </activity-alias>
   3469         <activity-alias android:name="com.android.internal.app.ForwardIntentToManagedProfile"
   3470                 android:targetActivity="com.android.internal.app.IntentForwarderActivity"
   3471                 android:icon="@drawable/ic_corp_icon"
   3472                 android:exported="true"
   3473                 android:label="@string/managed_profile_label">
   3474         </activity-alias>
   3475         <activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity"
   3476                 android:theme="@style/Theme.DeviceDefault.Light.Dialog"
   3477                 android:label="@string/heavy_weight_switcher_title"
   3478                 android:finishOnCloseSystemDialogs="true"
   3479                 android:excludeFromRecents="true"
   3480                 android:process=":ui">
   3481         </activity>
   3482         <activity android:name="com.android.internal.app.PlatLogoActivity"
   3483                 android:theme="@style/Theme.Wallpaper.NoTitleBar.Fullscreen"
   3484                 android:configChanges="orientation|keyboardHidden"
   3485                 android:process=":ui">
   3486         </activity>
   3487         <activity android:name="com.android.internal.app.DisableCarModeActivity"
   3488                 android:theme="@style/Theme.NoDisplay"
   3489                 android:excludeFromRecents="true"
   3490                 android:process=":ui">
   3491         </activity>
   3492         <activity android:name="com.android.internal.app.DumpHeapActivity"
   3493                 android:theme="@style/Theme.Translucent.NoTitleBar"
   3494                 android:label="@string/dump_heap_title"
   3495                 android:finishOnCloseSystemDialogs="true"
   3496                 android:noHistory="true"
   3497                 android:excludeFromRecents="true"
   3498                 android:process=":ui">
   3499         </activity>
   3500         <provider android:name="com.android.server.am.DumpHeapProvider"
   3501                 android:authorities="com.android.server.heapdump"
   3502                 android:grantUriPermissions="true"
   3503                 android:multiprocess="false"
   3504                 android:singleUser="true" />
   3505 
   3506         <activity android:name="android.accounts.ChooseAccountActivity"
   3507                 android:excludeFromRecents="true"
   3508                 android:exported="true"
   3509                 android:theme="@style/Theme.DeviceDefault.Light.Dialog"
   3510                 android:label="@string/choose_account_label"
   3511                 android:process=":ui"
   3512                 android:visibleToInstantApps="true">
   3513         </activity>
   3514 
   3515         <activity android:name="android.accounts.ChooseTypeAndAccountActivity"
   3516                 android:excludeFromRecents="true"
   3517                 android:exported="true"
   3518                 android:theme="@style/Theme.DeviceDefault.Light.Dialog"
   3519                 android:label="@string/choose_account_label"
   3520                 android:process=":ui"
   3521                 android:visibleToInstantApps="true">
   3522         </activity>
   3523 
   3524         <activity android:name="android.accounts.ChooseAccountTypeActivity"
   3525                 android:excludeFromRecents="true"
   3526                 android:theme="@style/Theme.DeviceDefault.Light.Dialog"
   3527                 android:label="@string/choose_account_label"
   3528                 android:process=":ui"
   3529                 android:visibleToInstantApps="true">
   3530         </activity>
   3531 
   3532         <activity android:name="android.accounts.CantAddAccountActivity"
   3533                 android:excludeFromRecents="true"
   3534                 android:exported="true"
   3535                 android:theme="@style/Theme.DeviceDefault.Light.Dialog.NoActionBar"
   3536                 android:process=":ui">
   3537         </activity>
   3538 
   3539         <activity android:name="android.accounts.GrantCredentialsPermissionActivity"
   3540                 android:excludeFromRecents="true"
   3541                 android:exported="true"
   3542                 android:theme="@style/Theme.DeviceDefault.Light.DialogWhenLarge"
   3543                 android:process=":ui"
   3544                 android:visibleToInstantApps="true">
   3545         </activity>
   3546 
   3547         <activity android:name="android.content.SyncActivityTooManyDeletes"
   3548                android:theme="@style/Theme.DeviceDefault.Light.Dialog"
   3549                android:label="@string/sync_too_many_deletes"
   3550                android:process=":ui">
   3551         </activity>
   3552 
   3553         <activity android:name="com.android.internal.app.ShutdownActivity"
   3554             android:permission="android.permission.SHUTDOWN"
   3555             android:theme="@style/Theme.NoDisplay"
   3556             android:excludeFromRecents="true">
   3557             <intent-filter>
   3558                 <action android:name="com.android.internal.intent.action.REQUEST_SHUTDOWN" />
   3559                 <category android:name="android.intent.category.DEFAULT" />
   3560             </intent-filter>
   3561             <intent-filter>
   3562                 <action android:name="android.intent.action.REBOOT" />
   3563                 <category android:name="android.intent.category.DEFAULT" />
   3564             </intent-filter>
   3565         </activity>
   3566 
   3567         <activity android:name="com.android.internal.app.NetInitiatedActivity"
   3568                 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert"
   3569                 android:excludeFromRecents="true"
   3570                 android:process=":ui">
   3571         </activity>
   3572 
   3573         <activity android:name="com.android.internal.app.SystemUserHomeActivity"
   3574                   android:enabled="false"
   3575                   android:process=":ui"
   3576                   android:systemUserOnly="true"
   3577                   android:theme="@style/Theme.Translucent.NoTitleBar">
   3578             <intent-filter android:priority="-100">
   3579                 <action android:name="android.intent.action.MAIN" />
   3580                 <category android:name="android.intent.category.HOME" />
   3581             </intent-filter>
   3582         </activity>
   3583 
   3584         <!-- Activity to prompt user if it's ok to create a new user sandbox for a
   3585              specified account. -->
   3586         <activity android:name="com.android.internal.app.ConfirmUserCreationActivity"
   3587                 android:excludeFromRecents="true"
   3588                 android:process=":ui"
   3589                 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert">
   3590             <intent-filter android:priority="1000">
   3591                 <action android:name="android.os.action.CREATE_USER" />
   3592                 <category android:name="android.intent.category.DEFAULT" />
   3593             </intent-filter>
   3594         </activity>
   3595 
   3596         <activity android:name="com.android.internal.app.UnlaunchableAppActivity"
   3597                 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert"
   3598                 android:excludeFromRecents="true"
   3599                 android:process=":ui">
   3600         </activity>
   3601 
   3602         <activity android:name="com.android.settings.notification.NotificationAccessConfirmationActivity"
   3603                   android:theme="@android:style/Theme.DeviceDefault.Light.Dialog.Alert"
   3604                   android:excludeFromRecents="true">
   3605         </activity>
   3606 
   3607         <receiver android:name="com.android.server.BootReceiver"
   3608                 android:systemUserOnly="true">
   3609             <intent-filter android:priority="1000">
   3610                 <action android:name="android.intent.action.BOOT_COMPLETED" />
   3611             </intent-filter>
   3612         </receiver>
   3613 
   3614         <receiver android:name="com.android.server.updates.CertPinInstallReceiver"
   3615                 android:permission="android.permission.UPDATE_CONFIG">
   3616             <intent-filter>
   3617                 <action android:name="android.intent.action.UPDATE_PINS" />
   3618                 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
   3619             </intent-filter>
   3620         </receiver>
   3621 
   3622         <receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver"
   3623                 android:permission="android.permission.UPDATE_CONFIG">
   3624             <intent-filter>
   3625                 <action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" />
   3626                 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
   3627             </intent-filter>
   3628         </receiver>
   3629 
   3630         <receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver"
   3631                 android:permission="android.permission.UPDATE_CONFIG">
   3632             <intent-filter>
   3633                 <action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" />
   3634                 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
   3635             </intent-filter>
   3636         </receiver>
   3637 
   3638         <receiver android:name="com.android.server.updates.ApnDbInstallReceiver"
   3639                 android:permission="android.permission.UPDATE_CONFIG">
   3640             <intent-filter>
   3641                 <action android:name="com.android.internal.intent.action.UPDATE_APN_DB" />
   3642                 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
   3643             </intent-filter>
   3644         </receiver>
   3645 
   3646         <receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver"
   3647                 android:permission="android.permission.UPDATE_CONFIG">
   3648             <intent-filter>
   3649                 <action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" />
   3650                 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
   3651             </intent-filter>
   3652         </receiver>
   3653 
   3654         <receiver android:name="com.android.server.updates.TzDataInstallReceiver"
   3655                 android:permission="android.permission.UPDATE_CONFIG">
   3656             <intent-filter>
   3657                 <action android:name="android.intent.action.UPDATE_TZDATA" />
   3658                 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
   3659             </intent-filter>
   3660         </receiver>
   3661 
   3662         <receiver android:name="com.android.server.updates.CertificateTransparencyLogInstallReceiver"
   3663                 android:permission="android.permission.UPDATE_CONFIG">
   3664             <intent-filter>
   3665                 <action android:name="android.intent.action.UPDATE_CT_LOGS" />
   3666                 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
   3667             </intent-filter>
   3668         </receiver>
   3669 
   3670         <receiver android:name="com.android.server.updates.LangIdInstallReceiver"
   3671                 android:permission="android.permission.UPDATE_CONFIG">
   3672             <intent-filter>
   3673                 <action android:name="android.intent.action.UPDATE_LANG_ID" />
   3674                 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
   3675             </intent-filter>
   3676         </receiver>
   3677 
   3678         <receiver android:name="com.android.server.updates.SmartSelectionInstallReceiver"
   3679                 android:permission="android.permission.UPDATE_CONFIG">
   3680             <intent-filter>
   3681                 <action android:name="android.intent.action.UPDATE_SMART_SELECTION" />
   3682                 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
   3683             </intent-filter>
   3684         </receiver>
   3685 
   3686         <receiver android:name="com.android.server.MasterClearReceiver"
   3687             android:permission="android.permission.MASTER_CLEAR">
   3688             <intent-filter
   3689                     android:priority="100" >
   3690                 <!-- For Checkin, Settings, etc.: action=FACTORY_RESET -->
   3691                 <action android:name="android.intent.action.FACTORY_RESET" />
   3692                 <!-- As above until all the references to the deprecated MASTER_CLEAR get updated to
   3693                      FACTORY_RESET. -->
   3694                 <action android:name="android.intent.action.MASTER_CLEAR" />
   3695 
   3696                 <!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR -->
   3697                 <action android:name="com.google.android.c2dm.intent.RECEIVE" />
   3698                 <category android:name="android.intent.category.MASTER_CLEAR" />
   3699             </intent-filter>
   3700         </receiver>
   3701 
   3702         <service android:name="android.hardware.location.GeofenceHardwareService"
   3703             android:permission="android.permission.LOCATION_HARDWARE"
   3704             android:exported="false" />
   3705 
   3706         <service android:name="com.android.internal.backup.LocalTransportService"
   3707                 android:permission="android.permission.CONFIRM_FULL_BACKUP"
   3708                 android:exported="false">
   3709             <intent-filter>
   3710                 <action android:name="android.backup.TRANSPORT_HOST" />
   3711             </intent-filter>
   3712         </service>
   3713 
   3714         <service android:name="com.android.server.MountServiceIdler"
   3715                  android:exported="true"
   3716                  android:permission="android.permission.BIND_JOB_SERVICE" >
   3717         </service>
   3718 
   3719         <service android:name="com.android.server.backup.FullBackupJob"
   3720                  android:exported="true"
   3721                  android:permission="android.permission.BIND_JOB_SERVICE" >
   3722         </service>
   3723 
   3724         <service android:name="com.android.server.backup.KeyValueBackupJob"
   3725                  android:permission="android.permission.BIND_JOB_SERVICE" >
   3726         </service>
   3727 
   3728         <service android:name="com.android.server.content.SyncJobService"
   3729                  android:permission="android.permission.BIND_JOB_SERVICE" >
   3730         </service>
   3731 
   3732         <service android:name="com.android.server.pm.BackgroundDexOptService"
   3733                  android:exported="true"
   3734                  android:permission="android.permission.BIND_JOB_SERVICE">
   3735         </service>
   3736 
   3737         <service android:name="com.android.server.PruneInstantAppsJobService"
   3738                  android:permission="android.permission.BIND_JOB_SERVICE" >
   3739         </service>
   3740 
   3741         <service android:name="com.android.server.storage.DiskStatsLoggingService"
   3742                  android:permission="android.permission.BIND_JOB_SERVICE" >
   3743         </service>
   3744 
   3745         <service android:name="com.android.server.PreloadsFileCacheExpirationJobService"
   3746                  android:permission="android.permission.BIND_JOB_SERVICE" >
   3747         </service>
   3748     </application>
   3749 
   3750 </manifest>
   3751