1 <?xml version="1.0" encoding="utf-8"?> 2 <!-- 3 /* //device/apps/common/AndroidManifest.xml 4 ** 5 ** Copyright 2006, The Android Open Source Project 6 ** 7 ** Licensed under the Apache License, Version 2.0 (the "License"); 8 ** you may not use this file except in compliance with the License. 9 ** You may obtain a copy of the License at 10 ** 11 ** http://www.apache.org/licenses/LICENSE-2.0 12 ** 13 ** Unless required by applicable law or agreed to in writing, software 14 ** distributed under the License is distributed on an "AS IS" BASIS, 15 ** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 16 ** See the License for the specific language governing permissions and 17 ** limitations under the License. 18 */ 19 --> 20 <manifest xmlns:android="http://schemas.android.com/apk/res/android" 21 package="android" coreApp="true" android:sharedUserId="android.uid.system" 22 android:sharedUserLabel="@string/android_system_label"> 23 24 <!-- ================================================ --> 25 <!-- Special broadcasts that only the system can send --> 26 <!-- ================================================ --> 27 <eat-comment /> 28 29 <protected-broadcast android:name="android.intent.action.SCREEN_OFF" /> 30 <protected-broadcast android:name="android.intent.action.SCREEN_ON" /> 31 <protected-broadcast android:name="android.intent.action.USER_PRESENT" /> 32 <protected-broadcast android:name="android.intent.action.TIME_SET" /> 33 <protected-broadcast android:name="android.intent.action.TIME_TICK" /> 34 <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" /> 35 <protected-broadcast android:name="android.intent.action.DATE_CHANGED" /> 36 <protected-broadcast android:name="android.intent.action.PRE_BOOT_COMPLETED" /> 37 <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" /> 38 <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" /> 39 <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" /> 40 <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" /> 41 <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" /> 42 <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" /> 43 <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" /> 44 <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" /> 45 <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" /> 46 <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" /> 47 <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" /> 48 <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" /> 49 <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" /> 50 <protected-broadcast android:name="android.intent.action.PACKAGES_SUSPENDED" /> 51 <protected-broadcast android:name="android.intent.action.PACKAGES_UNSUSPENDED" /> 52 <protected-broadcast android:name="android.intent.action.ACTION_PREFERRED_ACTIVITY_CHANGED" /> 53 <protected-broadcast android:name="android.intent.action.UID_REMOVED" /> 54 <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" /> 55 <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" /> 56 <protected-broadcast android:name="android.intent.action.SPLIT_CONFIGURATION_CHANGED" /> 57 <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" /> 58 <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" /> 59 <protected-broadcast android:name="android.intent.action.BATTERY_LEVEL_CHANGED" /> 60 <protected-broadcast android:name="android.intent.action.BATTERY_LOW" /> 61 <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" /> 62 <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" /> 63 <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" /> 64 <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" /> 65 <protected-broadcast android:name="android.intent.action.CHARGING" /> 66 <protected-broadcast android:name="android.intent.action.DISCHARGING" /> 67 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" /> 68 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" /> 69 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" /> 70 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" /> 71 <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" /> 72 <protected-broadcast android:name="android.intent.action.REBOOT" /> 73 <protected-broadcast android:name="android.intent.action.DOCK_EVENT" /> 74 <protected-broadcast android:name="android.intent.action.THERMAL_EVENT" /> 75 <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" /> 76 <protected-broadcast android:name="android.intent.action.USER_ADDED" /> 77 <protected-broadcast android:name="android.intent.action.USER_REMOVED" /> 78 <protected-broadcast android:name="android.intent.action.USER_STARTING" /> 79 <protected-broadcast android:name="android.intent.action.USER_STARTED" /> 80 <protected-broadcast android:name="android.intent.action.USER_STOPPING" /> 81 <protected-broadcast android:name="android.intent.action.USER_STOPPED" /> 82 <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" /> 83 <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" /> 84 <protected-broadcast android:name="android.intent.action.USER_SWITCHED" /> 85 <protected-broadcast android:name="android.intent.action.USER_INITIALIZE" /> 86 <protected-broadcast android:name="android.intent.action.INTENT_FILTER_NEEDS_VERIFICATION" /> 87 <protected-broadcast android:name="android.intent.action.OVERLAY_ADDED" /> 88 <protected-broadcast android:name="android.intent.action.OVERLAY_CHANGED" /> 89 <protected-broadcast android:name="android.intent.action.OVERLAY_REMOVED" /> 90 <protected-broadcast android:name="android.intent.action.OVERLAY_PRIORITY_CHANGED" /> 91 <protected-broadcast android:name="android.intent.action.USER_ACTIVITY_NOTIFICATION" /> 92 <protected-broadcast android:name="android.intent.action.MY_PACKAGE_SUSPENDED" /> 93 <protected-broadcast android:name="android.intent.action.MY_PACKAGE_UNSUSPENDED" /> 94 95 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED" /> 96 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGING" /> 97 <protected-broadcast android:name="android.os.action.DEVICE_IDLE_MODE_CHANGED" /> 98 <protected-broadcast android:name="android.os.action.POWER_SAVE_WHITELIST_CHANGED" /> 99 <protected-broadcast android:name="android.os.action.POWER_SAVE_TEMP_WHITELIST_CHANGED" /> 100 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED_INTERNAL" /> 101 102 <!-- @deprecated This is rarely used and will be phased out soon. --> 103 <protected-broadcast android:name="android.os.action.SCREEN_BRIGHTNESS_BOOST_CHANGED" /> 104 105 <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" /> 106 <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" /> 107 <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" /> 108 <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" /> 109 <protected-broadcast android:name="android.app.action.NEXT_ALARM_CLOCK_CHANGED" /> 110 111 <protected-broadcast android:name="android.app.action.BUGREPORT_SHARING_DECLINED" /> 112 <protected-broadcast android:name="android.app.action.BUGREPORT_FAILED" /> 113 <protected-broadcast android:name="android.app.action.BUGREPORT_SHARE" /> 114 <protected-broadcast android:name="android.app.action.SHOW_DEVICE_MONITORING_DIALOG" /> 115 116 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" /> 117 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" /> 118 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" /> 119 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" /> 120 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_HOST_RESTORED" /> 121 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_RESTORED" /> 122 123 <protected-broadcast android:name="android.os.action.SETTING_RESTORED" /> 124 125 <protected-broadcast android:name="android.app.backup.intent.RUN" /> 126 <protected-broadcast android:name="android.app.backup.intent.CLEAR" /> 127 <protected-broadcast android:name="android.app.backup.intent.INIT" /> 128 129 <protected-broadcast android:name="android.bluetooth.intent.DISCOVERABLE_TIMEOUT" /> 130 <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" /> 131 <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" /> 132 <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" /> 133 <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" /> 134 <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" /> 135 <protected-broadcast android:name="android.bluetooth.adapter.action.BLUETOOTH_ADDRESS_CHANGED" /> 136 <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" /> 137 <protected-broadcast android:name="android.bluetooth.device.action.UUID" /> 138 <protected-broadcast android:name="android.bluetooth.device.action.MAS_INSTANCE" /> 139 <protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" /> 140 <protected-broadcast android:name="android.bluetooth.device.action.FOUND" /> 141 <protected-broadcast android:name="android.bluetooth.device.action.DISAPPEARED" /> 142 <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" /> 143 <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" /> 144 <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" /> 145 <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" /> 146 <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" /> 147 <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" /> 148 <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" /> 149 <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" /> 150 <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" /> 151 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" /> 152 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" /> 153 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" /> 154 <protected-broadcast android:name="android.bluetooth.device.action.SDP_RECORD" /> 155 <protected-broadcast android:name="android.bluetooth.device.action.BATTERY_LEVEL_CHANGED" /> 156 <protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" /> 157 <protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" /> 158 <protected-broadcast 159 android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" /> 160 <protected-broadcast 161 android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" /> 162 <protected-broadcast 163 android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" /> 164 <protected-broadcast 165 android:name="android.bluetooth.headset.action.HF_INDICATORS_VALUE_CHANGED" /> 166 <protected-broadcast 167 android:name="android.bluetooth.headset.profile.action.ACTIVE_DEVICE_CHANGED" /> 168 <protected-broadcast 169 android:name="android.bluetooth.headsetclient.profile.action.CONNECTION_STATE_CHANGED" /> 170 <protected-broadcast 171 android:name="android.bluetooth.headsetclient.profile.action.AUDIO_STATE_CHANGED" /> 172 <protected-broadcast 173 android:name="android.bluetooth.headsetclient.profile.action.AG_EVENT" /> 174 <protected-broadcast 175 android:name="android.bluetooth.headsetclient.profile.action.AG_CALL_CHANGED" /> 176 <protected-broadcast 177 android:name="android.bluetooth.headsetclient.profile.action.RESULT" /> 178 <protected-broadcast 179 android:name="android.bluetooth.headsetclient.profile.action.LAST_VTAG" /> 180 <protected-broadcast 181 android:name="android.bluetooth.hearingaid.profile.action.CONNECTION_STATE_CHANGED" /> 182 <protected-broadcast 183 android:name="android.bluetooth.hearingaid.profile.action.PLAYING_STATE_CHANGED" /> 184 <protected-broadcast 185 android:name="android.bluetooth.hearingaid.profile.action.ACTIVE_DEVICE_CHANGED" /> 186 <protected-broadcast 187 android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" /> 188 <protected-broadcast 189 android:name="android.bluetooth.a2dp.profile.action.ACTIVE_DEVICE_CHANGED" /> 190 <protected-broadcast 191 android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" /> 192 <protected-broadcast 193 android:name="android.bluetooth.a2dp.profile.action.CODEC_CONFIG_CHANGED" /> 194 <protected-broadcast 195 android:name="android.bluetooth.a2dp-sink.profile.action.CONNECTION_STATE_CHANGED" /> 196 <protected-broadcast 197 android:name="android.bluetooth.a2dp-sink.profile.action.PLAYING_STATE_CHANGED" /> 198 <protected-broadcast 199 android:name="android.bluetooth.a2dp-sink.profile.action.AUDIO_CONFIG_CHANGED" /> 200 <protected-broadcast 201 android:name="android.bluetooth.avrcp-controller.profile.action.BROWSE_CONNECTION_STATE_CHANGED" /> 202 <protected-broadcast 203 android:name="android.bluetooth.avrcp-controller.profile.action.CONNECTION_STATE_CHANGED" /> 204 <protected-broadcast 205 android:name="android.bluetooth.avrcp-controller.profile.action.FOLDER_LIST" /> 206 <protected-broadcast 207 android:name="android.bluetooth.avrcp-controller.profile.action.TRACK_EVENT" /> 208 <protected-broadcast 209 android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" /> 210 <protected-broadcast 211 android:name="android.bluetooth.input.profile.action.IDLE_TIME_CHANGED" /> 212 <protected-broadcast 213 android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" /> 214 <protected-broadcast 215 android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" /> 216 <protected-broadcast 217 android:name="android.bluetooth.hiddevice.profile.action.CONNECTION_STATE_CHANGED" /> 218 <protected-broadcast 219 android:name="android.bluetooth.map.profile.action.CONNECTION_STATE_CHANGED" /> 220 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.CONNECTION_STATE_CHANGED" /> 221 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_RECEIVED" /> 222 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_SENT_SUCCESSFULLY" /> 223 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_DELIVERED_SUCCESSFULLY" /> 224 <protected-broadcast 225 android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_SENT" /> 226 <protected-broadcast 227 android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_DELIVERY" /> 228 <protected-broadcast 229 android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" /> 230 <protected-broadcast android:name="android.bluetooth.pbap.profile.action.CONNECTION_STATE_CHANGED" /> 231 <protected-broadcast android:name="android.bluetooth.pbapclient.profile.action.CONNECTION_STATE_CHANGED" /> 232 <protected-broadcast android:name="android.bluetooth.sap.profile.action.CONNECTION_STATE_CHANGED" /> 233 <protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" /> 234 <protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" /> 235 <protected-broadcast android:name="android.btopp.intent.action.LIST" /> 236 <protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" /> 237 <protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" /> 238 <protected-broadcast android:name="android.btopp.intent.action.CONFIRM" /> 239 <protected-broadcast android:name="android.btopp.intent.action.HIDE" /> 240 <protected-broadcast android:name="android.btopp.intent.action.RETRY" /> 241 <protected-broadcast android:name="android.btopp.intent.action.OPEN" /> 242 <protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" /> 243 <protected-broadcast android:name="android.btopp.intent.action.TRANSFER_COMPLETE" /> 244 <protected-broadcast android:name="android.btopp.intent.action.ACCEPT" /> 245 <protected-broadcast android:name="android.btopp.intent.action.DECLINE" /> 246 <protected-broadcast android:name="com.android.bluetooth.gatt.REFRESH_BATCHED_SCAN" /> 247 <protected-broadcast android:name="com.android.bluetooth.pbap.authchall" /> 248 <protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" /> 249 <protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" /> 250 <protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" /> 251 <protected-broadcast android:name="com.android.bluetooth.sap.USER_CONFIRM_TIMEOUT" /> 252 <protected-broadcast android:name="com.android.bluetooth.sap.action.DISCONNECT_ACTION" /> 253 254 <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" /> 255 256 <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" /> 257 <protected-broadcast android:name="android.hardware.usb.action.USB_PORT_CHANGED" /> 258 <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" /> 259 <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_DETACHED" /> 260 <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" /> 261 <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" /> 262 263 <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" /> 264 <protected-broadcast android:name="android.media.action.HDMI_AUDIO_PLUG" /> 265 266 <protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" /> 267 <protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" /> 268 <protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" /> 269 <protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" /> 270 <protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" /> 271 <protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" /> 272 <protected-broadcast android:name="android.media.MASTER_MONO_CHANGED_ACTION" /> 273 <protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" /> 274 <protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" /> 275 276 <protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" /> 277 <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" /> 278 <protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" /> 279 <protected-broadcast android:name="android.intent.action.MEDIA_NOFS" /> 280 <protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" /> 281 <protected-broadcast android:name="android.intent.action.MEDIA_SHARED" /> 282 <protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" /> 283 <protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" /> 284 <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" /> 285 <protected-broadcast android:name="android.intent.action.MEDIA_EJECT" /> 286 287 <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL" /> 288 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" /> 289 <!-- @deprecated. Only {@link android.net.ConnectivityManager.CONNECTIVITY_ACTION} is sent. --> 290 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" /> 291 <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" /> 292 <protected-broadcast android:name="android.net.conn.RESTRICT_BACKGROUND_CHANGED" /> 293 <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" /> 294 <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" /> 295 296 <protected-broadcast android:name="android.net.nsd.STATE_CHANGED" /> 297 298 <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" /> 299 <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" /> 300 <protected-broadcast android:name="com.android.nfc.action.LLCP_UP" /> 301 <protected-broadcast android:name="com.android.nfc.action.LLCP_DOWN" /> 302 <protected-broadcast android:name="com.android.nfc.cardemulation.action.CLOSE_TAP_DIALOG" /> 303 <protected-broadcast android:name="com.android.nfc.handover.action.ALLOW_CONNECT" /> 304 <protected-broadcast android:name="com.android.nfc.handover.action.DENY_CONNECT" /> 305 <protected-broadcast android:name="com.android.nfc.handover.action.TIMEOUT_CONNECT" /> 306 <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" /> 307 <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" /> 308 <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" /> 309 <!-- For NFC to BT handover --> 310 <protected-broadcast android:name="android.btopp.intent.action.WHITELIST_DEVICE" /> 311 <protected-broadcast android:name="android.btopp.intent.action.STOP_HANDOVER_TRANSFER" /> 312 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND" /> 313 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND_MULTIPLE" /> 314 <protected-broadcast android:name="com.android.nfc.handover.action.CANCEL_HANDOVER_TRANSFER" /> 315 316 <protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" /> 317 <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" /> 318 319 <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" /> 320 321 <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" /> 322 <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" /> 323 <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" /> 324 325 <protected-broadcast android:name="com.android.server.stats.action.TRIGGER_COLLECTION" /> 326 327 <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" /> 328 <protected-broadcast android:name="com.android.server.WifiManager.action.START_PNO" /> 329 <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" /> 330 <protected-broadcast android:name="com.android.server.WifiManager.action.DEVICE_IDLE" /> 331 <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_ACCEPTED" /> 332 <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_DECLINED" /> 333 <protected-broadcast android:name="com.android.internal.action.EUICC_FACTORY_RESET" /> 334 <protected-broadcast android:name="com.android.server.usb.ACTION_OPEN_IN_APPS" /> 335 <protected-broadcast android:name="com.android.server.am.DELETE_DUMPHEAP" /> 336 <protected-broadcast android:name="com.android.server.net.action.SNOOZE_WARNING" /> 337 <protected-broadcast android:name="com.android.server.net.action.SNOOZE_RAPID" /> 338 <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.USER_DISMISSED_NOTIFICATION" /> 339 <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.CONNECT_TO_NETWORK" /> 340 <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.PICK_WIFI_NETWORK" /> 341 <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.PICK_NETWORK_AFTER_FAILURE" /> 342 <protected-broadcast android:name="com.android.server.wifi.wakeup.DISMISS_NOTIFICATION" /> 343 <protected-broadcast android:name="com.android.server.wifi.wakeup.OPEN_WIFI_PREFERENCES" /> 344 <protected-broadcast android:name="com.android.server.wifi.wakeup.OPEN_WIFI_SETTINGS" /> 345 <protected-broadcast android:name="com.android.server.wifi.wakeup.TURN_OFF_WIFI_WAKE" /> 346 <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" /> 347 <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" /> 348 <protected-broadcast android:name="android.net.wifi.WIFI_CREDENTIAL_CHANGED" /> 349 <protected-broadcast android:name="android.net.wifi.WIFI_SCAN_AVAILABLE" /> 350 <protected-broadcast android:name="android.net.wifi.aware.action.WIFI_AWARE_STATE_CHANGED" /> 351 <protected-broadcast android:name="android.net.wifi.rtt.action.WIFI_RTT_STATE_CHANGED" /> 352 <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" /> 353 <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" /> 354 <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" /> 355 <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" /> 356 <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" /> 357 <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_DEAUTH_IMMINENT" /> 358 <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_ICON" /> 359 <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_OSU_PROVIDERS_LIST" /> 360 <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_SUBSCRIPTION_REMEDIATION" /> 361 <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" /> 362 <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" /> 363 <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" /> 364 <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" /> 365 <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" /> 366 <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" /> 367 <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" /> 368 <protected-broadcast android:name="android.net.wifi.p2p.PERSISTENT_GROUPS_CHANGED" /> 369 <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" /> 370 <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" /> 371 <protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" /> 372 <protected-broadcast 373 android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" /> 374 <protected-broadcast android:name="android.net.scoring.SCORE_NETWORKS" /> 375 <protected-broadcast android:name="android.net.scoring.SCORER_CHANGED" /> 376 <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" /> 377 <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" /> 378 <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" /> 379 <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" /> 380 <protected-broadcast android:name="android.intent.action.APPLICATION_RESTRICTIONS_CHANGED" /> 381 382 <!-- Legacy --> 383 <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" /> 384 <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" /> 385 386 <protected-broadcast android:name="com.android.server.ACTION_TRIGGER_IDLE" /> 387 388 <protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" /> 389 390 <protected-broadcast android:name="android.intent.action.PHONE_STATE" /> 391 392 <protected-broadcast android:name="android.intent.action.SUB_DEFAULT_CHANGED" /> 393 394 <protected-broadcast android:name="android.location.GPS_ENABLED_CHANGE" /> 395 <protected-broadcast android:name="android.location.PROVIDERS_CHANGED" /> 396 <protected-broadcast android:name="android.location.MODE_CHANGED" /> 397 <protected-broadcast android:name="android.location.GPS_FIX_CHANGE" /> 398 <protected-broadcast android:name="android.net.proxy.PAC_REFRESH" /> 399 400 <protected-broadcast android:name="android.telecom.action.DEFAULT_DIALER_CHANGED" /> 401 <protected-broadcast android:name="android.provider.action.DEFAULT_SMS_PACKAGE_CHANGED" /> 402 <protected-broadcast android:name="android.intent.action.CONTENT_CHANGED" /> 403 <protected-broadcast android:name="android.provider.Telephony.MMS_DOWNLOADED" /> 404 405 <protected-broadcast 406 android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" /> 407 408 <!-- Defined in RestrictionsManager --> 409 <protected-broadcast 410 android:name="android.intent.action.PERMISSION_RESPONSE_RECEIVED" /> 411 <!-- Defined in RestrictionsManager --> 412 413 <protected-broadcast android:name="android.intent.action.REQUEST_PERMISSION" /> 414 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_STARTED" /> 415 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" /> 416 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_PROGRESS" /> 417 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" /> 418 419 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_DATA_SUBSCRIPTION_CHANGED" /> 420 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_VOICE_SUBSCRIPTION_CHANGED" /> 421 <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_CONTENT_CHANGE" /> 422 <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_RECORD_UPDATED" /> 423 424 <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_DONE" /> 425 <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_FAILED" /> 426 427 <protected-broadcast android:name="android.internal.policy.action.BURN_IN_PROTECTION" /> 428 <protected-broadcast android:name="android.app.action.SYSTEM_UPDATE_POLICY_CHANGED" /> 429 <protected-broadcast android:name="android.app.action.DEVICE_OWNER_CHANGED" /> 430 <protected-broadcast android:name="android.app.action.MANAGED_USER_CREATED" /> 431 432 <!-- Added in N --> 433 <protected-broadcast android:name="android.intent.action.ANR" /> 434 <protected-broadcast android:name="android.intent.action.CALL" /> 435 <protected-broadcast android:name="android.intent.action.CALL_PRIVILEGED" /> 436 <protected-broadcast android:name="android.intent.action.DROPBOX_ENTRY_ADDED" /> 437 <protected-broadcast android:name="android.intent.action.INPUT_METHOD_CHANGED" /> 438 <protected-broadcast android:name="android.intent.action.internal_sim_state_changed" /> 439 <protected-broadcast android:name="android.intent.action.LOCKED_BOOT_COMPLETED" /> 440 <protected-broadcast android:name="android.intent.action.PRECISE_CALL_STATE" /> 441 <protected-broadcast android:name="android.intent.action.PRECISE_DATA_CONNECTION_STATE_CHANGED" /> 442 <protected-broadcast android:name="android.intent.action.SUBSCRIPTION_PHONE_STATE" /> 443 <protected-broadcast android:name="android.intent.action.USER_INFO_CHANGED" /> 444 <protected-broadcast android:name="android.intent.action.USER_UNLOCKED" /> 445 <protected-broadcast android:name="android.intent.action.WALLPAPER_CHANGED" /> 446 447 <protected-broadcast android:name="android.app.action.DEVICE_POLICY_MANAGER_STATE_CHANGED" /> 448 <protected-broadcast android:name="android.app.action.CHOOSE_PRIVATE_KEY_ALIAS" /> 449 <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLED" /> 450 <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLE_REQUESTED" /> 451 <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_ENABLED" /> 452 <protected-broadcast android:name="android.app.action.LOCK_TASK_ENTERING" /> 453 <protected-broadcast android:name="android.app.action.LOCK_TASK_EXITING" /> 454 <protected-broadcast android:name="android.app.action.NOTIFY_PENDING_SYSTEM_UPDATE" /> 455 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_CHANGED" /> 456 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_EXPIRING" /> 457 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_FAILED" /> 458 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_SUCCEEDED" /> 459 <protected-broadcast android:name="com.android.server.ACTION_EXPIRED_PASSWORD_NOTIFICATION" /> 460 461 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_ADDED" /> 462 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNLOCKED" /> 463 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_REMOVED" /> 464 465 <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_STATE_CHANGED" /> 466 <protected-broadcast android:name="com.android.bluetooth.map.USER_CONFIRM_TIMEOUT" /> 467 <protected-broadcast android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_SENT" /> 468 <protected-broadcast android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_DELIVERY" /> 469 <protected-broadcast android:name="android.content.jobscheduler.JOB_DELAY_EXPIRED" /> 470 <protected-broadcast android:name="android.content.syncmanager.SYNC_ALARM" /> 471 <protected-broadcast android:name="android.media.INTERNAL_RINGER_MODE_CHANGED_ACTION" /> 472 <protected-broadcast android:name="android.media.STREAM_DEVICES_CHANGED_ACTION" /> 473 <protected-broadcast android:name="android.media.STREAM_MUTE_CHANGED_ACTION" /> 474 <protected-broadcast android:name="android.net.sip.SIP_SERVICE_UP" /> 475 <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" /> 476 <protected-broadcast android:name="android.os.action.CHARGING" /> 477 <protected-broadcast android:name="android.os.action.DISCHARGING" /> 478 <protected-broadcast android:name="android.search.action.SEARCHABLES_CHANGED" /> 479 <protected-broadcast android:name="android.security.STORAGE_CHANGED" /> 480 <protected-broadcast android:name="android.security.action.TRUST_STORE_CHANGED" /> 481 <protected-broadcast android:name="android.security.action.KEYCHAIN_CHANGED" /> 482 <protected-broadcast android:name="android.security.action.KEY_ACCESS_CHANGED" /> 483 <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_REGISTERED" /> 484 <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_UNREGISTERED" /> 485 <protected-broadcast android:name="android.telecom.action.SHOW_MISSED_CALLS_NOTIFICATION" /> 486 <protected-broadcast android:name="android.telephony.action.CARRIER_CONFIG_CHANGED" /> 487 <protected-broadcast android:name="android.telephony.action.DEFAULT_SUBSCRIPTION_CHANGED" /> 488 <protected-broadcast android:name="android.telephony.action.DEFAULT_SMS_SUBSCRIPTION_CHANGED" /> 489 <protected-broadcast android:name="android.telephony.action.SHOW_VOICEMAIL_NOTIFICATION" /> 490 491 <protected-broadcast android:name="com.android.bluetooth.btservice.action.ALARM_WAKEUP" /> 492 <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_POLL" /> 493 <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_UPDATED" /> 494 <protected-broadcast android:name="com.android.server.NetworkTimeUpdateService.action.POLL" /> 495 <protected-broadcast android:name="com.android.server.telecom.intent.action.CALLS_ADD_ENTRY" /> 496 <protected-broadcast android:name="com.android.settings.location.MODE_CHANGING" /> 497 <protected-broadcast android:name="com.android.settings.bluetooth.ACTION_DISMISS_PAIRING" /> 498 499 <protected-broadcast android:name="NotificationManagerService.TIMEOUT" /> 500 <protected-broadcast android:name="ScheduleConditionProvider.EVALUATE" /> 501 <protected-broadcast android:name="EventConditionProvider.EVALUATE" /> 502 <protected-broadcast android:name="SnoozeHelper.EVALUATE" /> 503 <protected-broadcast android:name="wifi_scan_available" /> 504 505 <protected-broadcast android:name="action.cne.started" /> 506 <protected-broadcast android:name="android.content.jobscheduler.JOB_DEADLINE_EXPIRED" /> 507 <protected-broadcast android:name="android.intent.action.ACTION_UNSOL_RESPONSE_OEM_HOOK_RAW" /> 508 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_SUPL" /> 509 <protected-broadcast android:name="android.os.action.LIGHT_DEVICE_IDLE_MODE_CHANGED" /> 510 <protected-broadcast android:name="android.os.storage.action.VOLUME_STATE_CHANGED" /> 511 <protected-broadcast android:name="android.os.storage.action.DISK_SCANNED" /> 512 <protected-broadcast android:name="com.android.server.action.UPDATE_TWILIGHT_STATE" /> 513 <protected-broadcast android:name="com.android.server.action.RESET_TWILIGHT_AUTO" /> 514 <protected-broadcast android:name="com.android.server.device_idle.STEP_IDLE_STATE" /> 515 <protected-broadcast android:name="com.android.server.device_idle.STEP_LIGHT_IDLE_STATE" /> 516 <protected-broadcast android:name="com.android.server.Wifi.action.TOGGLE_PNO" /> 517 <protected-broadcast android:name="intent.action.ACTION_RF_BAND_INFO" /> 518 <protected-broadcast android:name="android.intent.action.MEDIA_RESOURCE_GRANTED" /> 519 <protected-broadcast android:name="android.app.action.NETWORK_LOGS_AVAILABLE" /> 520 <protected-broadcast android:name="android.app.action.SECURITY_LOGS_AVAILABLE" /> 521 522 <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED" /> 523 <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED_INTERNAL" /> 524 <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_CHANGED" /> 525 <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_ACCESS_GRANTED_CHANGED" /> 526 <protected-broadcast android:name="android.os.action.ACTION_EFFECTS_SUPPRESSOR_CHANGED" /> 527 <protected-broadcast android:name="android.app.action.NOTIFICATION_CHANNEL_BLOCK_STATE_CHANGED" /> 528 <protected-broadcast android:name="android.app.action.NOTIFICATION_CHANNEL_GROUP_BLOCK_STATE_CHANGED" /> 529 <protected-broadcast android:name="android.app.action.APP_BLOCK_STATE_CHANGED" /> 530 531 <protected-broadcast android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS" /> 532 <protected-broadcast android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS" /> 533 534 <protected-broadcast android:name="android.intent.action.DYNAMIC_SENSOR_CHANGED" /> 535 536 <protected-broadcast android:name="android.intent.action.ACTION_RADIO_OFF" /> 537 538 <protected-broadcast android:name="android.accounts.LOGIN_ACCOUNTS_CHANGED" /> 539 <protected-broadcast android:name="android.accounts.action.ACCOUNT_REMOVED" /> 540 <protected-broadcast android:name="android.accounts.action.VISIBLE_ACCOUNTS_CHANGED" /> 541 542 <protected-broadcast android:name="com.android.sync.SYNC_CONN_STATUS_CHANGED" /> 543 544 <protected-broadcast android:name="com.android.phone.SIP_INCOMING_CALL" /> 545 <protected-broadcast android:name="com.android.phone.SIP_ADD_PHONE" /> 546 <protected-broadcast android:name="com.android.phone.SIP_REMOVE_PHONE" /> 547 <protected-broadcast android:name="com.android.phone.SIP_CALL_OPTION_CHANGED" /> 548 549 <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_CONNECTED" /> 550 <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_DISCONNECTED" /> 551 552 <protected-broadcast android:name="android.bluetooth.input.profile.action.HANDSHAKE" /> 553 <protected-broadcast android:name="android.bluetooth.input.profile.action.REPORT" /> 554 555 <protected-broadcast android:name="android.intent.action.TWILIGHT_CHANGED" /> 556 557 <protected-broadcast android:name="com.android.server.fingerprint.ACTION_LOCKOUT_RESET" /> 558 <protected-broadcast android:name="android.net.wifi.PASSPOINT_ICON_RECEIVED" /> 559 <protected-broadcast android:name="com.android.server.notification.CountdownConditionProvider" /> 560 561 <protected-broadcast android:name="com.android.internal.location.ALARM_WAKEUP" /> 562 <protected-broadcast android:name="com.android.internal.location.ALARM_TIMEOUT" /> 563 <protected-broadcast android:name="android.intent.action.GLOBAL_BUTTON" /> 564 565 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_AVAILABLE" /> 566 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNAVAILABLE" /> 567 <protected-broadcast android:name="com.android.server.pm.DISABLE_QUIET_MODE_AFTER_UNLOCK" /> 568 569 <protected-broadcast android:name="com.android.server.retaildemo.ACTION_RESET_DEMO" /> 570 571 <protected-broadcast android:name="android.intent.action.DEVICE_LOCKED_CHANGED" /> 572 573 <!-- Added in O --> 574 <protected-broadcast android:name="android.app.action.APPLICATION_DELEGATION_SCOPES_CHANGED" /> 575 <protected-broadcast android:name="com.android.server.wm.ACTION_REVOKE_SYSTEM_ALERT_WINDOW_PERMISSION" /> 576 <protected-broadcast android:name="android.media.tv.action.PARENTAL_CONTROLS_ENABLED_CHANGED" /> 577 578 <protected-broadcast android:name="android.content.pm.action.SESSION_COMMITTED" /> 579 <protected-broadcast android:name="android.os.action.USER_RESTRICTIONS_CHANGED" /> 580 <protected-broadcast android:name="android.media.tv.action.PREVIEW_PROGRAM_ADDED_TO_WATCH_NEXT" /> 581 <protected-broadcast android:name="android.media.tv.action.PREVIEW_PROGRAM_BROWSABLE_DISABLED" /> 582 <protected-broadcast android:name="android.media.tv.action.WATCH_NEXT_PROGRAM_BROWSABLE_DISABLED" /> 583 <protected-broadcast android:name="android.media.tv.action.CHANNEL_BROWSABLE_REQUESTED" /> 584 <protected-broadcast android:name="com.android.server.InputMethodManagerService.SHOW_INPUT_METHOD_PICKER" /> 585 586 <!-- Time zone rules update intents fired by the system server --> 587 <protected-broadcast android:name="com.android.intent.action.timezone.RULES_UPDATE_OPERATION" /> 588 <protected-broadcast android:name="com.android.intent.action.timezone.TRIGGER_RULES_UPDATE_CHECK" /> 589 590 <!-- Made protected in P (was introduced in JB-MR2) --> 591 <protected-broadcast android:name="android.intent.action.GET_RESTRICTION_ENTRIES" /> 592 <protected-broadcast android:name="android.telephony.euicc.action.OTA_STATUS_CHANGED" /> 593 594 <!-- Added in P --> 595 <protected-broadcast android:name="android.app.action.PROFILE_OWNER_CHANGED" /> 596 <protected-broadcast android:name="android.app.action.TRANSFER_OWNERSHIP_COMPLETE" /> 597 <protected-broadcast android:name="android.app.action.AFFILIATED_PROFILE_TRANSFER_OWNERSHIP_COMPLETE" /> 598 <protected-broadcast android:name="android.app.action.DATA_SHARING_RESTRICTION_CHANGED" /> 599 <protected-broadcast android:name="android.app.action.STATSD_STARTED" /> 600 601 <!-- ====================================================================== --> 602 <!-- RUNTIME PERMISSIONS --> 603 <!-- ====================================================================== --> 604 <eat-comment /> 605 606 <!-- ====================================================================== --> 607 <!-- Permissions for accessing user's contacts including personal profile --> 608 <!-- ====================================================================== --> 609 <eat-comment /> 610 611 <!-- Used for runtime permissions related to contacts and profiles on this 612 device. --> 613 <permission-group android:name="android.permission-group.CONTACTS" 614 android:icon="@drawable/perm_group_contacts" 615 android:label="@string/permgrouplab_contacts" 616 android:description="@string/permgroupdesc_contacts" 617 android:request="@string/permgrouprequest_contacts" 618 android:priority="100" /> 619 620 <!-- Allows an application to read the user's contacts data. 621 <p>Protection level: dangerous 622 --> 623 <permission android:name="android.permission.READ_CONTACTS" 624 android:permissionGroup="android.permission-group.CONTACTS" 625 android:label="@string/permlab_readContacts" 626 android:description="@string/permdesc_readContacts" 627 android:protectionLevel="dangerous" /> 628 629 <!-- Allows an application to write the user's contacts data. 630 <p>Protection level: dangerous 631 --> 632 <permission android:name="android.permission.WRITE_CONTACTS" 633 android:permissionGroup="android.permission-group.CONTACTS" 634 android:label="@string/permlab_writeContacts" 635 android:description="@string/permdesc_writeContacts" 636 android:protectionLevel="dangerous" /> 637 638 <!-- ====================================================================== --> 639 <!-- Permissions for accessing user's calendar --> 640 <!-- ====================================================================== --> 641 <eat-comment /> 642 643 <!-- Used for runtime permissions related to user's calendar. --> 644 <permission-group android:name="android.permission-group.CALENDAR" 645 android:icon="@drawable/perm_group_calendar" 646 android:label="@string/permgrouplab_calendar" 647 android:description="@string/permgroupdesc_calendar" 648 android:request="@string/permgrouprequest_calendar" 649 android:priority="200" /> 650 651 <!-- Allows an application to read the user's calendar data. 652 <p>Protection level: dangerous 653 --> 654 <permission android:name="android.permission.READ_CALENDAR" 655 android:permissionGroup="android.permission-group.CALENDAR" 656 android:label="@string/permlab_readCalendar" 657 android:description="@string/permdesc_readCalendar" 658 android:protectionLevel="dangerous" /> 659 660 <!-- Allows an application to write the user's calendar data. 661 <p>Protection level: dangerous 662 --> 663 <permission android:name="android.permission.WRITE_CALENDAR" 664 android:permissionGroup="android.permission-group.CALENDAR" 665 android:label="@string/permlab_writeCalendar" 666 android:description="@string/permdesc_writeCalendar" 667 android:protectionLevel="dangerous" /> 668 669 <!-- ====================================================================== --> 670 <!-- Permissions for accessing and modifying user's SMS messages --> 671 <!-- ====================================================================== --> 672 <eat-comment /> 673 674 <!-- Used for runtime permissions related to user's SMS messages. --> 675 <permission-group android:name="android.permission-group.SMS" 676 android:icon="@drawable/perm_group_sms" 677 android:label="@string/permgrouplab_sms" 678 android:description="@string/permgroupdesc_sms" 679 android:request="@string/permgrouprequest_sms" 680 android:priority="300" /> 681 682 <!-- Allows an application to send SMS messages. 683 <p>Protection level: dangerous 684 --> 685 <permission android:name="android.permission.SEND_SMS" 686 android:permissionGroup="android.permission-group.SMS" 687 android:label="@string/permlab_sendSms" 688 android:description="@string/permdesc_sendSms" 689 android:permissionFlags="costsMoney" 690 android:protectionLevel="dangerous" /> 691 692 <!-- Allows an application to receive SMS messages. 693 <p>Protection level: dangerous 694 --> 695 <permission android:name="android.permission.RECEIVE_SMS" 696 android:permissionGroup="android.permission-group.SMS" 697 android:label="@string/permlab_receiveSms" 698 android:description="@string/permdesc_receiveSms" 699 android:protectionLevel="dangerous"/> 700 701 <!-- Allows an application to read SMS messages. 702 <p>Protection level: dangerous 703 --> 704 <permission android:name="android.permission.READ_SMS" 705 android:permissionGroup="android.permission-group.SMS" 706 android:label="@string/permlab_readSms" 707 android:description="@string/permdesc_readSms" 708 android:protectionLevel="dangerous" /> 709 710 <!-- Allows an application to receive WAP push messages. 711 <p>Protection level: dangerous 712 --> 713 <permission android:name="android.permission.RECEIVE_WAP_PUSH" 714 android:permissionGroup="android.permission-group.SMS" 715 android:label="@string/permlab_receiveWapPush" 716 android:description="@string/permdesc_receiveWapPush" 717 android:protectionLevel="dangerous" /> 718 719 <!-- Allows an application to monitor incoming MMS messages. 720 <p>Protection level: dangerous 721 --> 722 <permission android:name="android.permission.RECEIVE_MMS" 723 android:permissionGroup="android.permission-group.SMS" 724 android:label="@string/permlab_receiveMms" 725 android:description="@string/permdesc_receiveMms" 726 android:protectionLevel="dangerous" /> 727 728 <!-- Allows an application to read previously received cell broadcast 729 messages and to register a content observer to get notifications when 730 a cell broadcast has been received and added to the database. For 731 emergency alerts, the database is updated immediately after the 732 alert dialog and notification sound/vibration/speech are presented. 733 The "read" column is then updated after the user dismisses the alert. 734 This enables supplementary emergency assistance apps to start loading 735 additional emergency information (if Internet access is available) 736 when the alert is first received, and to delay presenting the info 737 to the user until after the initial alert dialog is dismissed. 738 <p>Protection level: dangerous 739 @hide Pending API council approval --> 740 <permission android:name="android.permission.READ_CELL_BROADCASTS" 741 android:permissionGroup="android.permission-group.SMS" 742 android:label="@string/permlab_readCellBroadcasts" 743 android:description="@string/permdesc_readCellBroadcasts" 744 android:protectionLevel="dangerous" /> 745 746 <!-- ====================================================================== --> 747 <!-- Permissions for accessing external storage --> 748 <!-- ====================================================================== --> 749 <eat-comment /> 750 751 <!-- Used for runtime permissions related to the shared external storage. --> 752 <permission-group android:name="android.permission-group.STORAGE" 753 android:icon="@drawable/perm_group_storage" 754 android:label="@string/permgrouplab_storage" 755 android:description="@string/permgroupdesc_storage" 756 android:request="@string/permgrouprequest_storage" 757 android:priority="900" /> 758 759 <!-- Allows an application to read from external storage. 760 <p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly 761 granted this permission.</p> 762 <p>This permission is enforced starting in API level 19. Before API level 19, this 763 permission is not enforced and all apps still have access to read from external storage. 764 You can test your app with the permission enforced by enabling <em>Protect USB 765 storage</em> under Developer options in the Settings app on a device running Android 4.1 or 766 higher.</p> 767 <p>Also starting in API level 19, this permission is <em>not</em> required to 768 read/write files in your application-specific directories returned by 769 {@link android.content.Context#getExternalFilesDir} and 770 {@link android.content.Context#getExternalCacheDir}. 771 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 772 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 773 minSdkVersion}</a> and <a 774 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 775 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 776 grants your app this permission. If you don't need this permission, be sure your <a 777 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 778 targetSdkVersion}</a> is 4 or higher. 779 <p>Protection level: dangerous 780 --> 781 <permission android:name="android.permission.READ_EXTERNAL_STORAGE" 782 android:permissionGroup="android.permission-group.STORAGE" 783 android:label="@string/permlab_sdcardRead" 784 android:description="@string/permdesc_sdcardRead" 785 android:protectionLevel="dangerous" /> 786 787 <!-- Allows an application to write to external storage. 788 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 789 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 790 minSdkVersion}</a> and <a 791 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 792 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 793 grants your app this permission. If you don't need this permission, be sure your <a 794 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 795 targetSdkVersion}</a> is 4 or higher. 796 <p>Starting in API level 19, this permission is <em>not</em> required to 797 read/write files in your application-specific directories returned by 798 {@link android.content.Context#getExternalFilesDir} and 799 {@link android.content.Context#getExternalCacheDir}. 800 <p>Protection level: dangerous 801 --> 802 <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE" 803 android:permissionGroup="android.permission-group.STORAGE" 804 android:label="@string/permlab_sdcardWrite" 805 android:description="@string/permdesc_sdcardWrite" 806 android:protectionLevel="dangerous" /> 807 808 <!-- ====================================================================== --> 809 <!-- Permissions for accessing the device location --> 810 <!-- ====================================================================== --> 811 <eat-comment /> 812 813 <!-- Used for permissions that allow accessing the device location. --> 814 <permission-group android:name="android.permission-group.LOCATION" 815 android:icon="@drawable/perm_group_location" 816 android:label="@string/permgrouplab_location" 817 android:description="@string/permgroupdesc_location" 818 android:request="@string/permgrouprequest_location" 819 android:priority="400" /> 820 821 <!-- Allows an app to access precise location. 822 Alternatively, you might want {@link #ACCESS_COARSE_LOCATION}. 823 <p>Protection level: dangerous 824 --> 825 <permission android:name="android.permission.ACCESS_FINE_LOCATION" 826 android:permissionGroup="android.permission-group.LOCATION" 827 android:label="@string/permlab_accessFineLocation" 828 android:description="@string/permdesc_accessFineLocation" 829 android:protectionLevel="dangerous|instant" /> 830 831 <!-- Allows an app to access approximate location. 832 Alternatively, you might want {@link #ACCESS_FINE_LOCATION}. 833 <p>Protection level: dangerous 834 --> 835 <permission android:name="android.permission.ACCESS_COARSE_LOCATION" 836 android:permissionGroup="android.permission-group.LOCATION" 837 android:label="@string/permlab_accessCoarseLocation" 838 android:description="@string/permdesc_accessCoarseLocation" 839 android:protectionLevel="dangerous|instant" /> 840 841 <!-- ====================================================================== --> 842 <!-- Permissions for accessing the call log --> 843 <!-- ====================================================================== --> 844 <eat-comment /> 845 846 <!-- Used for permissions that are associated telephony features. --> 847 <permission-group android:name="android.permission-group.CALL_LOG" 848 android:icon="@drawable/perm_group_phone_calls" 849 android:label="@string/permgrouplab_calllog" 850 android:description="@string/permgroupdesc_calllog" 851 android:request="@string/permgrouprequest_calllog" 852 android:priority="450" /> 853 854 855 <!-- Used for permissions that are associated telephony features. --> 856 <permission-group android:name="android.permission-group.CALL_LOG" 857 android:icon="@drawable/perm_group_phone_calls" 858 android:label="@string/permgrouplab_calllog" 859 android:description="@string/permgroupdesc_calllog" 860 android:request="@string/permgrouprequest_calllog" 861 android:priority="450" /> 862 863 <!-- Allows an application to access the IMS call service: making and 864 modifying a call 865 <p>Protection level: signature|privileged 866 @hide 867 --> 868 <permission android:name="android.permission.ACCESS_IMS_CALL_SERVICE" 869 android:label="@string/permlab_accessImsCallService" 870 android:description="@string/permdesc_accessImsCallService" 871 android:protectionLevel="signature|privileged" /> 872 873 <!-- Allows an application to read the user's call log. 874 <p class="note"><strong>Note:</strong> If your app uses the 875 {@link #READ_CONTACTS} permission and <em>both</em> your <a 876 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 877 minSdkVersion}</a> and <a 878 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 879 targetSdkVersion}</a> values are set to 15 or lower, the system implicitly 880 grants your app this permission. If you don't need this permission, be sure your <a 881 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 882 targetSdkVersion}</a> is 16 or higher.</p> 883 <p>Protection level: dangerous 884 --> 885 <permission android:name="android.permission.READ_CALL_LOG" 886 android:permissionGroup="android.permission-group.CALL_LOG" 887 android:label="@string/permlab_readCallLog" 888 android:description="@string/permdesc_readCallLog" 889 android:protectionLevel="dangerous" /> 890 891 <!-- Allows an application to write (but not read) the user's 892 call log data. 893 <p class="note"><strong>Note:</strong> If your app uses the 894 {@link #WRITE_CONTACTS} permission and <em>both</em> your <a 895 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 896 minSdkVersion}</a> and <a 897 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 898 targetSdkVersion}</a> values are set to 15 or lower, the system implicitly 899 grants your app this permission. If you don't need this permission, be sure your <a 900 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 901 targetSdkVersion}</a> is 16 or higher.</p> 902 <p>Protection level: dangerous 903 --> 904 <permission android:name="android.permission.WRITE_CALL_LOG" 905 android:permissionGroup="android.permission-group.CALL_LOG" 906 android:label="@string/permlab_writeCallLog" 907 android:description="@string/permdesc_writeCallLog" 908 android:protectionLevel="dangerous" /> 909 910 <!-- Allows an application to see the number being dialed during an outgoing 911 call with the option to redirect the call to a different number or 912 abort the call altogether. 913 <p>Protection level: dangerous 914 --> 915 <permission android:name="android.permission.PROCESS_OUTGOING_CALLS" 916 android:permissionGroup="android.permission-group.CALL_LOG" 917 android:label="@string/permlab_processOutgoingCalls" 918 android:description="@string/permdesc_processOutgoingCalls" 919 android:protectionLevel="dangerous" /> 920 921 <!-- ====================================================================== --> 922 <!-- Permissions for accessing the device telephony --> 923 <!-- ====================================================================== --> 924 <eat-comment /> 925 926 <!-- Used for permissions that are associated telephony features. --> 927 <permission-group android:name="android.permission-group.PHONE" 928 android:icon="@drawable/perm_group_phone_calls" 929 android:label="@string/permgrouplab_phone" 930 android:description="@string/permgroupdesc_phone" 931 android:request="@string/permgrouprequest_phone" 932 android:priority="500" /> 933 934 <!-- Allows read only access to phone state, including the phone number of the device, 935 current cellular network information, the status of any ongoing calls, and a list of any 936 {@link android.telecom.PhoneAccount}s registered on the device. 937 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 938 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 939 minSdkVersion}</a> and <a 940 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 941 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 942 grants your app this permission. If you don't need this permission, be sure your <a 943 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 944 targetSdkVersion}</a> is 4 or higher. 945 <p>Protection level: dangerous 946 --> 947 <permission android:name="android.permission.READ_PHONE_STATE" 948 android:permissionGroup="android.permission-group.PHONE" 949 android:label="@string/permlab_readPhoneState" 950 android:description="@string/permdesc_readPhoneState" 951 android:protectionLevel="dangerous" /> 952 953 <!-- Allows read access to the device's phone number(s). This is a subset of the capabilities 954 granted by {@link #READ_PHONE_STATE} but is exposed to instant applications. 955 <p>Protection level: dangerous--> 956 <permission android:name="android.permission.READ_PHONE_NUMBERS" 957 android:permissionGroup="android.permission-group.PHONE" 958 android:label="@string/permlab_readPhoneNumbers" 959 android:description="@string/permdesc_readPhoneNumbers" 960 android:protectionLevel="dangerous|instant" /> 961 962 <!-- Allows an application to initiate a phone call without going through 963 the Dialer user interface for the user to confirm the call. 964 <p>Protection level: dangerous 965 --> 966 <permission android:name="android.permission.CALL_PHONE" 967 android:permissionGroup="android.permission-group.PHONE" 968 android:permissionFlags="costsMoney" 969 android:label="@string/permlab_callPhone" 970 android:description="@string/permdesc_callPhone" 971 android:protectionLevel="dangerous" /> 972 973 <!-- Allows an application to add voicemails into the system. 974 <p>Protection level: dangerous 975 --> 976 <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL" 977 android:permissionGroup="android.permission-group.PHONE" 978 android:label="@string/permlab_addVoicemail" 979 android:description="@string/permdesc_addVoicemail" 980 android:protectionLevel="dangerous" /> 981 982 <!-- Allows an application to use SIP service. 983 <p>Protection level: dangerous 984 --> 985 <permission android:name="android.permission.USE_SIP" 986 android:permissionGroup="android.permission-group.PHONE" 987 android:description="@string/permdesc_use_sip" 988 android:label="@string/permlab_use_sip" 989 android:protectionLevel="dangerous"/> 990 991 <!-- Allows the app to answer an incoming phone call. 992 <p>Protection level: dangerous 993 --> 994 <permission android:name="android.permission.ANSWER_PHONE_CALLS" 995 android:permissionGroup="android.permission-group.PHONE" 996 android:label="@string/permlab_answerPhoneCalls" 997 android:description="@string/permdesc_answerPhoneCalls" 998 android:protectionLevel="dangerous|runtime" /> 999 1000 <!-- Allows a calling application which manages it own calls through the self-managed 1001 {@link android.telecom.ConnectionService} APIs. See 1002 {@link android.telecom.PhoneAccount#CAPABILITY_SELF_MANAGED for more information on the 1003 self-managed ConnectionService APIs. 1004 <p>Protection level: normal 1005 --> 1006 <permission android:name="android.permission.MANAGE_OWN_CALLS" 1007 android:label="@string/permlab_manageOwnCalls" 1008 android:description="@string/permdesc_manageOwnCalls" 1009 android:protectionLevel="normal" /> 1010 1011 <!-- Allows a calling app to continue a call which was started in another app. An example is a 1012 video calling app that wants to continue a voice call on the user's mobile network.<p> 1013 When the handover of a call from one app to another takes place, there are two devices 1014 which are involved in the handover; the initiating and receiving devices. The initiating 1015 device is where the request to handover the call was started, and the receiving device is 1016 where the handover request is confirmed by the other party.<p> 1017 This permission protects access to the 1018 {@link android.telecom.TelecomManager#acceptHandover(Uri, int, PhoneAccountHandle)} which 1019 the receiving side of the handover uses to accept a handover. 1020 <p>Protection level: dangerous 1021 --> 1022 <permission android:name="android.permission.ACCEPT_HANDOVER" 1023 android:permissionGroup="android.permission-group.PHONE" 1024 android.label="@string/permlab_acceptHandover" 1025 android:description="@string/permdesc_acceptHandovers" 1026 android:protectionLevel="dangerous" /> 1027 1028 <!-- ====================================================================== --> 1029 <!-- Permissions for accessing the device microphone --> 1030 <!-- ====================================================================== --> 1031 <eat-comment /> 1032 1033 <!-- Used for permissions that are associated with accessing 1034 microphone audio from the device. Note that phone calls also capture audio 1035 but are in a separate (more visible) permission group. --> 1036 <permission-group android:name="android.permission-group.MICROPHONE" 1037 android:icon="@drawable/perm_group_microphone" 1038 android:label="@string/permgrouplab_microphone" 1039 android:description="@string/permgroupdesc_microphone" 1040 android:request="@string/permgrouprequest_microphone" 1041 android:priority="600" /> 1042 1043 <!-- Allows an application to record audio. 1044 <p>Protection level: dangerous 1045 --> 1046 <permission android:name="android.permission.RECORD_AUDIO" 1047 android:permissionGroup="android.permission-group.MICROPHONE" 1048 android:label="@string/permlab_recordAudio" 1049 android:description="@string/permdesc_recordAudio" 1050 android:protectionLevel="dangerous|instant"/> 1051 1052 <!-- ====================================================================== --> 1053 <!-- Permissions for accessing the UCE Service --> 1054 <!-- ====================================================================== --> 1055 1056 <!-- @hide Allows an application to Access UCE-Presence. 1057 <p>Protection level: signature|privileged 1058 --> 1059 <permission android:name="android.permission.ACCESS_UCE_PRESENCE_SERVICE" 1060 android:permissionGroup="android.permission-group.PHONE" 1061 android:protectionLevel="signature|privileged"/> 1062 1063 <!-- @hide Allows an application to Access UCE-OPTIONS. 1064 <p>Protection level: signature|privileged 1065 --> 1066 <permission android:name="android.permission.ACCESS_UCE_OPTIONS_SERVICE" 1067 android:permissionGroup="android.permission-group.PHONE" 1068 android:protectionLevel="signature|privileged"/> 1069 1070 1071 1072 <!-- ====================================================================== --> 1073 <!-- Permissions for accessing the device camera --> 1074 <!-- ====================================================================== --> 1075 <eat-comment /> 1076 1077 <!-- Used for permissions that are associated with accessing 1078 camera or capturing images/video from the device. --> 1079 <permission-group android:name="android.permission-group.CAMERA" 1080 android:icon="@drawable/perm_group_camera" 1081 android:label="@string/permgrouplab_camera" 1082 android:description="@string/permgroupdesc_camera" 1083 android:request="@string/permgrouprequest_camera" 1084 android:priority="700" /> 1085 1086 <!-- Required to be able to access the camera device. 1087 <p>This will automatically enforce the <a 1088 href="{@docRoot}guide/topics/manifest/uses-feature-element.html"> 1089 <uses-feature>}</a> manifest element for <em>all</em> camera features. 1090 If you do not require all camera features or can properly operate if a camera 1091 is not available, then you must modify your manifest as appropriate in order to 1092 install on devices that don't support all camera features.</p> 1093 <p>Protection level: dangerous 1094 --> 1095 <permission android:name="android.permission.CAMERA" 1096 android:permissionGroup="android.permission-group.CAMERA" 1097 android:label="@string/permlab_camera" 1098 android:description="@string/permdesc_camera" 1099 android:protectionLevel="dangerous|instant" /> 1100 1101 1102 <!-- ====================================================================== --> 1103 <!-- Permissions for accessing the device sensors --> 1104 <!-- ====================================================================== --> 1105 <eat-comment /> 1106 1107 <!-- Used for permissions that are associated with accessing 1108 body or environmental sensors. --> 1109 <permission-group android:name="android.permission-group.SENSORS" 1110 android:icon="@drawable/perm_group_sensors" 1111 android:label="@string/permgrouplab_sensors" 1112 android:description="@string/permgroupdesc_sensors" 1113 android:request="@string/permgrouprequest_sensors" 1114 android:priority="800" /> 1115 1116 <!-- Allows an application to access data from sensors that the user uses to 1117 measure what is happening inside his/her body, such as heart rate. 1118 <p>Protection level: dangerous --> 1119 <permission android:name="android.permission.BODY_SENSORS" 1120 android:permissionGroup="android.permission-group.SENSORS" 1121 android:label="@string/permlab_bodySensors" 1122 android:description="@string/permdesc_bodySensors" 1123 android:protectionLevel="dangerous" /> 1124 1125 <!-- Allows an app to use fingerprint hardware. 1126 <p>Protection level: normal 1127 @deprecated Applications should request {@link 1128 android.Manifest.permission#USE_BIOMETRIC} instead 1129 --> 1130 <permission android:name="android.permission.USE_FINGERPRINT" 1131 android:permissionGroup="android.permission-group.SENSORS" 1132 android:label="@string/permlab_useFingerprint" 1133 android:description="@string/permdesc_useFingerprint" 1134 android:protectionLevel="normal" /> 1135 1136 <!-- Allows an app to use device supported biometric modalities. 1137 <p>Protection level: normal 1138 --> 1139 <permission android:name="android.permission.USE_BIOMETRIC" 1140 android:permissionGroup="android.permission-group.SENSORS" 1141 android:label="@string/permlab_useBiometric" 1142 android:description="@string/permdesc_useBiometric" 1143 android:protectionLevel="normal" /> 1144 1145 <!-- ====================================================================== --> 1146 <!-- REMOVED PERMISSIONS --> 1147 <!-- ====================================================================== --> 1148 1149 <!-- @hide We need to keep this around for backwards compatibility --> 1150 <permission android:name="android.permission.READ_PROFILE" 1151 android:protectionLevel="normal" 1152 android:permissionFlags="removed"/> 1153 1154 <!-- @hide We need to keep this around for backwards compatibility --> 1155 <permission android:name="android.permission.WRITE_PROFILE" 1156 android:protectionLevel="normal" 1157 android:permissionFlags="removed"/> 1158 1159 <!-- @hide We need to keep this around for backwards compatibility --> 1160 <permission android:name="android.permission.READ_SOCIAL_STREAM" 1161 android:protectionLevel="normal" 1162 android:permissionFlags="removed"/> 1163 1164 <!-- @hide We need to keep this around for backwards compatibility --> 1165 <permission android:name="android.permission.WRITE_SOCIAL_STREAM" 1166 android:protectionLevel="normal" 1167 android:permissionFlags="removed"/> 1168 1169 <!-- @hide We need to keep this around for backwards compatibility --> 1170 <permission android:name="android.permission.READ_USER_DICTIONARY" 1171 android:protectionLevel="normal" 1172 android:permissionFlags="removed"/> 1173 1174 <!-- @hide We need to keep this around for backwards compatibility --> 1175 <permission android:name="android.permission.WRITE_USER_DICTIONARY" 1176 android:protectionLevel="normal" 1177 android:permissionFlags="removed"/> 1178 1179 <!-- @hide We need to keep this around for backwards compatibility --> 1180 <permission android:name="android.permission.WRITE_SMS" 1181 android:protectionLevel="normal" 1182 android:permissionFlags="removed"/> 1183 1184 <!-- @hide We need to keep this around for backwards compatibility --> 1185 <permission android:name="com.android.browser.permission.READ_HISTORY_BOOKMARKS" 1186 android:protectionLevel="normal" 1187 android:permissionFlags="removed"/> 1188 1189 <!-- @hide We need to keep this around for backwards compatibility --> 1190 <permission android:name="com.android.browser.permission.WRITE_HISTORY_BOOKMARKS" 1191 android:protectionLevel="normal" 1192 android:permissionFlags="removed"/> 1193 1194 <!-- @hide We need to keep this around for backwards compatibility --> 1195 <permission android:name="android.permission.AUTHENTICATE_ACCOUNTS" 1196 android:protectionLevel="normal" 1197 android:permissionFlags="removed"/> 1198 1199 <!-- @hide We need to keep this around for backwards compatibility --> 1200 <permission android:name="android.permission.MANAGE_ACCOUNTS" 1201 android:protectionLevel="normal" 1202 android:permissionFlags="removed"/> 1203 1204 <!-- @hide We need to keep this around for backwards compatibility --> 1205 <permission android:name="android.permission.USE_CREDENTIALS" 1206 android:protectionLevel="normal" 1207 android:permissionFlags="removed"/> 1208 1209 <!-- @hide We need to keep this around for backwards compatibility --> 1210 <permission android:name="android.permission.SUBSCRIBED_FEEDS_READ" 1211 android:protectionLevel="normal" 1212 android:permissionFlags="removed"/> 1213 1214 <!-- @hide We need to keep this around for backwards compatibility --> 1215 <permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE" 1216 android:protectionLevel="normal" 1217 android:permissionFlags="removed"/> 1218 1219 <!-- @hide We need to keep this around for backwards compatibility --> 1220 <permission android:name="android.permission.FLASHLIGHT" 1221 android:protectionLevel="normal" 1222 android:permissionFlags="removed"/> 1223 1224 <!-- ====================================================================== --> 1225 <!-- INSTALL PERMISSIONS --> 1226 <!-- ====================================================================== --> 1227 1228 <!-- ================================== --> 1229 <!-- Permissions for accessing messages --> 1230 <!-- ================================== --> 1231 <eat-comment /> 1232 1233 <!-- @SystemApi Allows an application (Phone) to send a request to other applications 1234 to handle the respond-via-message action during incoming calls. 1235 <p>Not for use by third-party applications. --> 1236 <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE" 1237 android:protectionLevel="signature|privileged" /> 1238 1239 <!-- @SystemApi Allows an application to send SMS to premium shortcodes without user permission. 1240 <p>Not for use by third-party applications. 1241 @hide --> 1242 <permission android:name="android.permission.SEND_SMS_NO_CONFIRMATION" 1243 android:protectionLevel="signature|privileged" /> 1244 1245 <!-- Allows an application to filter carrier specific sms. 1246 @hide --> 1247 <permission android:name="android.permission.CARRIER_FILTER_SMS" 1248 android:protectionLevel="signature|privileged" /> 1249 1250 <!-- @SystemApi Allows an application to receive emergency cell broadcast messages, 1251 to record or display them to the user. 1252 <p>Not for use by third-party applications. 1253 @hide --> 1254 <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST" 1255 android:protectionLevel="signature|privileged" /> 1256 1257 <!-- Allows an application to monitor incoming Bluetooth MAP messages, to record 1258 or perform processing on them. --> 1259 <!-- @hide --> 1260 <permission android:name="android.permission.RECEIVE_BLUETOOTH_MAP" 1261 android:protectionLevel="signature|privileged" /> 1262 1263 <!-- @SystemApi @hide Allows an application to execute contacts directory search. 1264 This should only be used by ContactsProvider. 1265 <p>Not for use by third-party applications. --> 1266 <permission android:name="android.permission.BIND_DIRECTORY_SEARCH" 1267 android:protectionLevel="signature|privileged" /> 1268 1269 <!-- @SystemApi @hide Allows an application to modify cell broadcasts through the content provider. 1270 <p>Not for use by third-party applications. --> 1271 <permission android:name="android.permission.MODIFY_CELL_BROADCASTS" 1272 android:protectionLevel="signature|privileged" /> 1273 1274 <!-- =============================================================== --> 1275 <!-- Permissions for setting the device alarm --> 1276 <!-- =============================================================== --> 1277 <eat-comment /> 1278 1279 <!-- Allows an application to broadcast an Intent to set an alarm for the user. 1280 <p>Protection level: normal 1281 --> 1282 <permission android:name="com.android.alarm.permission.SET_ALARM" 1283 android:label="@string/permlab_setAlarm" 1284 android:description="@string/permdesc_setAlarm" 1285 android:protectionLevel="normal" /> 1286 1287 <!-- =============================================================== --> 1288 <!-- Permissions for accessing the user voicemail --> 1289 <!-- =============================================================== --> 1290 <eat-comment /> 1291 1292 <!-- Allows an application to modify and remove existing voicemails in the system. 1293 <p>Protection level: signature|privileged 1294 --> 1295 <permission android:name="com.android.voicemail.permission.WRITE_VOICEMAIL" 1296 android:protectionLevel="signature|privileged" /> 1297 1298 <!-- Allows an application to read voicemails in the system. 1299 <p>Protection level: signature|privileged 1300 --> 1301 <permission android:name="com.android.voicemail.permission.READ_VOICEMAIL" 1302 android:protectionLevel="signature|privileged" /> 1303 1304 <!-- ======================================= --> 1305 <!-- Permissions for accessing location info --> 1306 <!-- ======================================= --> 1307 <eat-comment /> 1308 1309 <!-- Allows an application to access extra location provider commands. 1310 <p>Protection level: normal 1311 --> 1312 <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS" 1313 android:label="@string/permlab_accessLocationExtraCommands" 1314 android:description="@string/permdesc_accessLocationExtraCommands" 1315 android:protectionLevel="normal" /> 1316 1317 <!-- @SystemApi Allows an application to install a location provider into the Location Manager. 1318 <p>Not for use by third-party applications. --> 1319 <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER" 1320 android:protectionLevel="signature|privileged" /> 1321 1322 <!-- @SystemApi @hide Allows HDMI-CEC service to access device and configuration files. 1323 This should only be used by HDMI-CEC service. 1324 --> 1325 <permission android:name="android.permission.HDMI_CEC" 1326 android:protectionLevel="signature|privileged" /> 1327 1328 <!-- @SystemApi Allows an application to use location features in hardware, 1329 such as the geofencing api. 1330 <p>Not for use by third-party applications. --> 1331 <permission android:name="android.permission.LOCATION_HARDWARE" 1332 android:protectionLevel="signature|privileged" /> 1333 <uses-permission android:name="android.permission.LOCATION_HARDWARE"/> 1334 1335 <!-- @SystemApi Allows an application to create mock location providers for testing. 1336 <p>Protection level: signature 1337 @hide 1338 --> 1339 <permission android:name="android.permission.ACCESS_MOCK_LOCATION" 1340 android:protectionLevel="signature" /> 1341 1342 <!-- ======================================= --> 1343 <!-- Permissions for accessing networks --> 1344 <!-- ======================================= --> 1345 <eat-comment /> 1346 1347 <!-- Allows applications to open network sockets. 1348 <p>Protection level: normal 1349 --> 1350 <permission android:name="android.permission.INTERNET" 1351 android:description="@string/permdesc_createNetworkSockets" 1352 android:label="@string/permlab_createNetworkSockets" 1353 android:protectionLevel="normal|instant" /> 1354 1355 <!-- Allows applications to access information about networks. 1356 <p>Protection level: normal 1357 --> 1358 <permission android:name="android.permission.ACCESS_NETWORK_STATE" 1359 android:description="@string/permdesc_accessNetworkState" 1360 android:label="@string/permlab_accessNetworkState" 1361 android:protectionLevel="normal|instant" /> 1362 1363 <!-- Allows applications to access information about Wi-Fi networks. 1364 <p>Protection level: normal 1365 --> 1366 <permission android:name="android.permission.ACCESS_WIFI_STATE" 1367 android:description="@string/permdesc_accessWifiState" 1368 android:label="@string/permlab_accessWifiState" 1369 android:protectionLevel="normal" /> 1370 1371 <!-- Allows applications to change Wi-Fi connectivity state. 1372 <p>Protection level: normal 1373 --> 1374 <permission android:name="android.permission.CHANGE_WIFI_STATE" 1375 android:description="@string/permdesc_changeWifiState" 1376 android:label="@string/permlab_changeWifiState" 1377 android:protectionLevel="normal" /> 1378 1379 <!-- @SystemApi @hide Allows apps to create and manage IPsec tunnels. 1380 <p>Only granted to applications that are currently bound by the 1381 system for creating and managing IPsec-based interfaces. 1382 --> 1383 <permission android:name="android.permission.MANAGE_IPSEC_TUNNELS" 1384 android:protectionLevel="signature|appop" /> 1385 1386 <!-- @SystemApi @hide Allows applications to read Wi-Fi credential. 1387 <p>Not for use by third-party applications. --> 1388 <permission android:name="android.permission.READ_WIFI_CREDENTIAL" 1389 android:protectionLevel="signature|privileged" /> 1390 1391 <!-- @SystemApi @hide Allows applications to change tether state and run 1392 tether carrier provisioning. 1393 <p>Not for use by third-party applications. --> 1394 <permission android:name="android.permission.TETHER_PRIVILEGED" 1395 android:protectionLevel="signature|privileged" /> 1396 1397 <!-- @SystemApi @hide Allow system apps to receive broadcast 1398 when a wifi network credential is changed. 1399 <p>Not for use by third-party applications. --> 1400 <permission android:name="android.permission.RECEIVE_WIFI_CREDENTIAL_CHANGE" 1401 android:protectionLevel="signature|privileged" /> 1402 1403 <!-- @SystemApi @hide Allows an application to modify any wifi configuration, even if created 1404 by another application. Once reconfigured the original creator cannot make any further 1405 modifications. 1406 <p>Not for use by third-party applications. --> 1407 <permission android:name="android.permission.OVERRIDE_WIFI_CONFIG" 1408 android:protectionLevel="signature|privileged" /> 1409 1410 <!-- @hide --> 1411 <permission android:name="android.permission.ACCESS_WIMAX_STATE" 1412 android:description="@string/permdesc_accessWimaxState" 1413 android:label="@string/permlab_accessWimaxState" 1414 android:protectionLevel="normal" /> 1415 1416 <!-- @hide --> 1417 <permission android:name="android.permission.CHANGE_WIMAX_STATE" 1418 android:description="@string/permdesc_changeWimaxState" 1419 android:label="@string/permlab_changeWimaxState" 1420 android:protectionLevel="normal" /> 1421 1422 <!-- Allows applications to act as network scorers. @hide @SystemApi--> 1423 <permission android:name="android.permission.SCORE_NETWORKS" 1424 android:protectionLevel="signature|privileged" /> 1425 1426 <!-- Allows applications to request network 1427 recommendations and scores from the NetworkScoreService. 1428 <p>Not for use by third-party applications. @hide --> 1429 <permission android:name="android.permission.REQUEST_NETWORK_SCORES" 1430 android:protectionLevel="signature|setup" /> 1431 1432 <!-- Allows network stack services (Connectivity and Wifi) to coordinate 1433 <p>Not for use by third-party or privileged applications. 1434 @hide This should only be used by Connectivity and Wifi Services. 1435 --> 1436 <permission android:name="android.permission.NETWORK_STACK" 1437 android:protectionLevel="signature" /> 1438 1439 <!-- Allows Settings and SystemUI to call methods in Networking services 1440 <p>Not for use by third-party or privileged applications. 1441 @hide This should only be used by Settings and SystemUI. 1442 --> 1443 <permission android:name="android.permission.NETWORK_SETTINGS" 1444 android:protectionLevel="signature" /> 1445 1446 <!-- Allows SetupWizard to call methods in Networking services 1447 <p>Not for use by any other third-party or privileged applications. 1448 @hide This should only be used by SetupWizard. 1449 --> 1450 <permission android:name="android.permission.NETWORK_SETUP_WIZARD" 1451 android:protectionLevel="signature|setup" /> 1452 1453 <!-- #SystemApi @hide Allows applications to access information about LoWPAN interfaces. 1454 <p>Not for use by third-party applications. --> 1455 <permission android:name="android.permission.ACCESS_LOWPAN_STATE" 1456 android:protectionLevel="signature|privileged" /> 1457 1458 <!-- #SystemApi @hide Allows applications to change LoWPAN connectivity state. 1459 <p>Not for use by third-party applications. --> 1460 <permission android:name="android.permission.CHANGE_LOWPAN_STATE" 1461 android:protectionLevel="signature|privileged" /> 1462 1463 <!-- #SystemApi @hide Allows applications to read LoWPAN credential. 1464 <p>Not for use by third-party applications. --> 1465 <permission android:name="android.permission.READ_LOWPAN_CREDENTIAL" 1466 android:protectionLevel="signature|privileged" /> 1467 1468 <!-- #SystemApi @hide Allows a service to register or unregister 1469 new LoWPAN interfaces. 1470 <p>Not for use by third-party applications. --> 1471 <permission android:name="android.permission.MANAGE_LOWPAN_INTERFACES" 1472 android:protectionLevel="signature|privileged" /> 1473 1474 <!-- @hide Allows internal management of Wi-Fi connectivity state when on 1475 permission review mode. 1476 <p>Not for use by third-party applications. --> 1477 <permission android:name="android.permission.MANAGE_WIFI_WHEN_PERMISSION_REVIEW_REQUIRED" 1478 android:protectionLevel="signature" /> 1479 1480 <!-- @hide Allows an app to bypass Private DNS. 1481 <p>Not for use by third-party applications. --> 1482 <permission android:name="android.permission.NETWORK_BYPASS_PRIVATE_DNS" 1483 android:protectionLevel="signature" /> 1484 1485 <!-- ======================================= --> 1486 <!-- Permissions for short range, peripheral networks --> 1487 <!-- ======================================= --> 1488 <eat-comment /> 1489 1490 <!-- Allows applications to connect to paired bluetooth devices. 1491 <p>Protection level: normal 1492 --> 1493 <permission android:name="android.permission.BLUETOOTH" 1494 android:description="@string/permdesc_bluetooth" 1495 android:label="@string/permlab_bluetooth" 1496 android:protectionLevel="normal" /> 1497 1498 <!-- @SystemApi Allows an application to suspend other apps, which will prevent the user 1499 from using them until they are unsuspended. 1500 @hide 1501 --> 1502 <permission android:name="android.permission.SUSPEND_APPS" 1503 android:protectionLevel="signature|privileged" /> 1504 1505 <!-- @SystemApi Must be required by activities that handle the intent action 1506 {@link Intent#ACTION_SEND_SHOW_SUSPENDED_APP_DETAILS}. This is for use by apps that 1507 hold {@link Manifest.permission#SUSPEND_APPS} to interact with the system. 1508 <p>Not for use by third-party applications. 1509 @hide --> 1510 <permission android:name="android.permission.SEND_SHOW_SUSPENDED_APP_DETAILS" 1511 android:protectionLevel="signature" /> 1512 1513 <!-- Allows applications to discover and pair bluetooth devices. 1514 <p>Protection level: normal 1515 --> 1516 <permission android:name="android.permission.BLUETOOTH_ADMIN" 1517 android:description="@string/permdesc_bluetoothAdmin" 1518 android:label="@string/permlab_bluetoothAdmin" 1519 android:protectionLevel="normal" /> 1520 1521 <!-- @SystemApi Allows applications to pair bluetooth devices without user interaction, and to 1522 allow or disallow phonebook access or message access. 1523 This is not available to third party applications. --> 1524 <permission android:name="android.permission.BLUETOOTH_PRIVILEGED" 1525 android:protectionLevel="signature|privileged" /> 1526 1527 <!-- Control access to email providers exclusively for Bluetooth 1528 @hide 1529 --> 1530 <permission android:name="android.permission.BLUETOOTH_MAP" 1531 android:protectionLevel="signature" /> 1532 1533 <!-- Allows bluetooth stack to access files 1534 @hide This should only be used by Bluetooth apk. 1535 --> 1536 <permission android:name="android.permission.BLUETOOTH_STACK" 1537 android:protectionLevel="signature" /> 1538 1539 <!-- Allows applications to perform I/O operations over NFC. 1540 <p>Protection level: normal 1541 --> 1542 <permission android:name="android.permission.NFC" 1543 android:description="@string/permdesc_nfc" 1544 android:label="@string/permlab_nfc" 1545 android:protectionLevel="normal" /> 1546 1547 <!-- Allows applications to receive NFC transaction events. 1548 <p>Protection level: normal 1549 --> 1550 <permission android:name="android.permission.NFC_TRANSACTION_EVENT" 1551 android:protectionLevel="normal" /> 1552 1553 <!-- @SystemApi Allows an internal user to use privileged ConnectivityManager APIs. 1554 @hide --> 1555 <permission android:name="android.permission.CONNECTIVITY_INTERNAL" 1556 android:protectionLevel="signature|privileged" /> 1557 1558 <!-- @SystemApi Allows an internal user to use restricted Networks. 1559 @hide --> 1560 <permission android:name="android.permission.CONNECTIVITY_USE_RESTRICTED_NETWORKS" 1561 android:protectionLevel="signature|privileged" /> 1562 1563 <!-- Allows a system application to access hardware packet offload capabilities. 1564 @hide --> 1565 <permission android:name="android.permission.PACKET_KEEPALIVE_OFFLOAD" 1566 android:protectionLevel="signature|privileged" /> 1567 1568 <!-- @SystemApi 1569 @hide --> 1570 <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE" 1571 android:protectionLevel="signature|privileged" /> 1572 1573 <!-- @SystemApi Allows access to the loop radio (Android@Home mesh network) device. 1574 @hide --> 1575 <permission android:name="android.permission.LOOP_RADIO" 1576 android:protectionLevel="signature|privileged" /> 1577 1578 <!-- Allows sending and receiving handover transfer status from Wifi and Bluetooth 1579 @hide --> 1580 <permission android:name="android.permission.NFC_HANDOVER_STATUS" 1581 android:protectionLevel="signature|privileged" /> 1582 1583 <!-- @hide Allows internal management of Bluetooth state when on permission review mode. 1584 <p>Not for use by third-party applications. --> 1585 <permission android:name="android.permission.MANAGE_BLUETOOTH_WHEN_PERMISSION_REVIEW_REQUIRED" 1586 android:protectionLevel="signature" /> 1587 1588 <!-- ================================== --> 1589 <!-- Permissions for accessing accounts --> 1590 <!-- ================================== --> 1591 <eat-comment /> 1592 1593 <!-- Allows access to the list of accounts in the Accounts Service. 1594 1595 <p class="note"><strong>Note:</strong> Beginning with Android 6.0 (API level 1596 23), if an app shares the signature of the authenticator that manages an 1597 account, it does not need <code>"GET_ACCOUNTS"</code> permission to read 1598 information about that account. On Android 5.1 and lower, all apps need 1599 <code>"GET_ACCOUNTS"</code> permission to read information about any 1600 account.</p> 1601 1602 <p>Protection level: dangerous 1603 --> 1604 <permission android:name="android.permission.GET_ACCOUNTS" 1605 android:permissionGroup="android.permission-group.CONTACTS" 1606 android:protectionLevel="dangerous" 1607 android:description="@string/permdesc_getAccounts" 1608 android:label="@string/permlab_getAccounts" /> 1609 <uses-permission android:name="android.permission.GET_ACCOUNTS"/> 1610 1611 <!-- @SystemApi Allows applications to call into AccountAuthenticators. 1612 <p>Not for use by third-party applications. --> 1613 <permission android:name="android.permission.ACCOUNT_MANAGER" 1614 android:protectionLevel="signature" /> 1615 1616 <!-- ================================== --> 1617 <!-- Permissions for accessing hardware that may effect battery life--> 1618 <!-- ================================== --> 1619 <eat-comment /> 1620 1621 <!-- Allows applications to enter Wi-Fi Multicast mode. 1622 <p>Protection level: normal 1623 --> 1624 <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE" 1625 android:description="@string/permdesc_changeWifiMulticastState" 1626 android:label="@string/permlab_changeWifiMulticastState" 1627 android:protectionLevel="normal" /> 1628 1629 <!-- Allows access to the vibrator. 1630 <p>Protection level: normal 1631 --> 1632 <permission android:name="android.permission.VIBRATE" 1633 android:label="@string/permlab_vibrate" 1634 android:description="@string/permdesc_vibrate" 1635 android:protectionLevel="normal|instant" /> 1636 1637 <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen 1638 from dimming. 1639 <p>Protection level: normal 1640 --> 1641 <permission android:name="android.permission.WAKE_LOCK" 1642 android:label="@string/permlab_wakeLock" 1643 android:description="@string/permdesc_wakeLock" 1644 android:protectionLevel="normal|instant" /> 1645 1646 <!-- Allows using the device's IR transmitter, if available. 1647 <p>Protection level: normal 1648 --> 1649 <permission android:name="android.permission.TRANSMIT_IR" 1650 android:label="@string/permlab_transmitIr" 1651 android:description="@string/permdesc_transmitIr" 1652 android:protectionLevel="normal" /> 1653 1654 <!-- ==================================================== --> 1655 <!-- Permissions related to changing audio settings --> 1656 <!-- ==================================================== --> 1657 <eat-comment /> 1658 1659 <!-- Allows an application to modify global audio settings. 1660 <p>Protection level: normal 1661 --> 1662 <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS" 1663 android:label="@string/permlab_modifyAudioSettings" 1664 android:description="@string/permdesc_modifyAudioSettings" 1665 android:protectionLevel="normal" /> 1666 1667 <!-- ================================== --> 1668 <!-- Permissions for accessing hardware --> 1669 <!-- ================================== --> 1670 <eat-comment /> 1671 1672 <!-- @SystemApi Allows an application to manage preferences and permissions for USB devices 1673 @hide --> 1674 <permission android:name="android.permission.MANAGE_USB" 1675 android:protectionLevel="signature|privileged" /> 1676 1677 <!-- @SystemApi Allows an application to access the MTP USB kernel driver. 1678 For use only by the device side MTP implementation. 1679 @hide --> 1680 <permission android:name="android.permission.ACCESS_MTP" 1681 android:protectionLevel="signature|privileged" /> 1682 1683 <!-- @SystemApi Allows access to hardware peripherals. Intended only for hardware testing. 1684 <p>Not for use by third-party applications. 1685 @hide 1686 --> 1687 <permission android:name="android.permission.HARDWARE_TEST" 1688 android:protectionLevel="signature" /> 1689 1690 <!-- @SystemApi Allows access to Broadcast Radio 1691 @hide This is not a third-party API (intended for system apps).--> 1692 <permission android:name="android.permission.ACCESS_BROADCAST_RADIO" 1693 android:protectionLevel="signature|privileged" /> 1694 1695 <!-- @deprecated @SystemApi Allows access to FM 1696 @hide This is not a third-party API (intended for system apps).--> 1697 <permission android:name="android.permission.ACCESS_FM_RADIO" 1698 android:protectionLevel="signature|privileged" /> 1699 1700 <!-- Allows access to configure network interfaces, configure/use IPSec, etc. 1701 @hide --> 1702 <permission android:name="android.permission.NET_ADMIN" 1703 android:protectionLevel="signature" /> 1704 1705 <!-- Allows registration for remote audio playback. @hide --> 1706 <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK" 1707 android:protectionLevel="signature" /> 1708 1709 <!-- @SystemApi Allows TvInputService to access underlying TV input hardware such as 1710 built-in tuners and HDMI-in's. 1711 @hide This should only be used by OEM's TvInputService's. 1712 --> 1713 <permission android:name="android.permission.TV_INPUT_HARDWARE" 1714 android:protectionLevel="signature|privileged" /> 1715 1716 <!-- @SystemApi Allows to capture a frame of TV input hardware such as 1717 built-in tuners and HDMI-in's. 1718 @hide <p>Not for use by third-party applications. 1719 --> 1720 <permission android:name="android.permission.CAPTURE_TV_INPUT" 1721 android:protectionLevel="signature|privileged" /> 1722 1723 <!-- @hide Allows TvInputService to access DVB device. 1724 <p>Not for use by third-party applications. --> 1725 <permission android:name="android.permission.DVB_DEVICE" 1726 android:protectionLevel="signature|privileged" /> 1727 1728 <!-- @SystemApi Allows reading and enabling/disabling the OEM unlock allowed by carrier state 1729 @hide <p>Not for use by third-party applications. --> 1730 <permission android:name="android.permission.MANAGE_CARRIER_OEM_UNLOCK_STATE" 1731 android:protectionLevel="signature|privileged" /> 1732 1733 <!-- @SystemApi Allows reading and enabling/disabling the OEM unlock allowed by user state 1734 @hide <p>Not for use by third-party applications. --> 1735 <permission android:name="android.permission.MANAGE_USER_OEM_UNLOCK_STATE" 1736 android:protectionLevel="signature|privileged" /> 1737 1738 <!-- @SystemApi Allows reading the OEM unlock state 1739 @hide <p>Not for use by third-party applications. --> 1740 <permission android:name="android.permission.READ_OEM_UNLOCK_STATE" 1741 android:protectionLevel="signature|privileged" /> 1742 1743 <!-- @hide Allows enabling/disabling OEM unlock 1744 <p>Not for use by third-party applications. --> 1745 <permission android:name="android.permission.OEM_UNLOCK_STATE" 1746 android:protectionLevel="signature" /> 1747 1748 <!-- @hide Allows querying state of PersistentDataBlock 1749 <p>Not for use by third-party applications. --> 1750 <permission android:name="android.permission.ACCESS_PDB_STATE" 1751 android:protectionLevel="signature" /> 1752 1753 <!-- Allows testing if a passwords is forbidden by the admins. 1754 @hide <p>Not for use by third-party applications. --> 1755 <permission android:name="android.permission.TEST_BLACKLISTED_PASSWORD" 1756 android:protectionLevel="signature" /> 1757 1758 <!-- @hide Allows system update service to notify device owner about pending updates. 1759 <p>Not for use by third-party applications. --> 1760 <permission android:name="android.permission.NOTIFY_PENDING_SYSTEM_UPDATE" 1761 android:protectionLevel="signature|privileged" /> 1762 1763 <!-- =========================================== --> 1764 <!-- Permissions associated with camera and image capture --> 1765 <!-- =========================================== --> 1766 <eat-comment /> 1767 1768 <!-- @SystemApi Allows disabling the transmit-indicator LED that is normally on when 1769 a camera is in use by an application. 1770 @hide --> 1771 <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED" 1772 android:protectionLevel="signature|privileged" /> 1773 1774 <!-- Allows sending the camera service notifications about system-wide events. 1775 @hide --> 1776 <permission android:name="android.permission.CAMERA_SEND_SYSTEM_EVENTS" 1777 android:protectionLevel="signature|privileged" /> 1778 1779 <!-- =========================================== --> 1780 <!-- Permissions associated with telephony state --> 1781 <!-- =========================================== --> 1782 <eat-comment /> 1783 1784 <!-- @SystemApi Allows modification of the telephony state - power on, mmi, etc. 1785 Does not include placing calls. 1786 <p>Not for use by third-party applications. --> 1787 <permission android:name="android.permission.MODIFY_PHONE_STATE" 1788 android:protectionLevel="signature|privileged" /> 1789 1790 <!-- Allows read only access to precise phone state. 1791 @hide Pending API council approval --> 1792 <permission android:name="android.permission.READ_PRECISE_PHONE_STATE" 1793 android:protectionLevel="signature|privileged" /> 1794 1795 <!-- @SystemApi Allows read access to privileged phone state. 1796 @hide Used internally. --> 1797 <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE" 1798 android:protectionLevel="signature|privileged" /> 1799 1800 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1801 PhoneAccount#CAPABILITY_SIM_SUBSCRIPTION. This capability indicates that the PhoneAccount 1802 corresponds to a device SIM. 1803 @hide --> 1804 <permission android:name="android.permission.REGISTER_SIM_SUBSCRIPTION" 1805 android:protectionLevel="signature|privileged" /> 1806 1807 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1808 PhoneAccount#CAPABILITY_CALL_PROVIDER. 1809 @hide --> 1810 <permission android:name="android.permission.REGISTER_CALL_PROVIDER" 1811 android:protectionLevel="signature|privileged" /> 1812 1813 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1814 PhoneAccount#CAPABILITY_CONNECTION_MANAGER 1815 @hide --> 1816 <permission android:name="android.permission.REGISTER_CONNECTION_MANAGER" 1817 android:protectionLevel="signature|privileged" /> 1818 1819 <!-- Must be required by a {@link android.telecom.InCallService}, 1820 to ensure that only the system can bind to it. 1821 <p>Protection level: signature|privileged 1822 --> 1823 <permission android:name="android.permission.BIND_INCALL_SERVICE" 1824 android:protectionLevel="signature|privileged" /> 1825 1826 <!-- Must be required by a link {@link android.telephony.VisualVoicemailService} to ensure that 1827 only the system can bind to it. 1828 <p>Protection level: signature|privileged 1829 --> 1830 <permission 1831 android:name="android.permission.BIND_VISUAL_VOICEMAIL_SERVICE" 1832 android:protectionLevel="signature|privileged"/> 1833 1834 <!-- Must be required by a {@link android.telecom.CallScreeningService}, 1835 to ensure that only the system can bind to it. 1836 <p>Protection level: signature|privileged 1837 --> 1838 <permission android:name="android.permission.BIND_SCREENING_SERVICE" 1839 android:protectionLevel="signature|privileged" /> 1840 1841 <!-- Must be required by a {@link android.telecom.ConnectionService}, 1842 to ensure that only the system can bind to it. 1843 @deprecated {@link android.telecom.ConnectionService}s should require 1844 android.permission.BIND_TELECOM_CONNECTION_SERVICE instead. 1845 @SystemApi 1846 @hide --> 1847 <permission android:name="android.permission.BIND_CONNECTION_SERVICE" 1848 android:protectionLevel="signature|privileged" /> 1849 1850 <!-- Must be required by a {@link android.telecom.ConnectionService}, 1851 to ensure that only the system can bind to it. 1852 <p>Protection level: signature|privileged 1853 --> 1854 <permission android:name="android.permission.BIND_TELECOM_CONNECTION_SERVICE" 1855 android:protectionLevel="signature|privileged" /> 1856 1857 <!-- @SystemApi Allows an application to control the in-call experience. 1858 @hide --> 1859 <permission android:name="android.permission.CONTROL_INCALL_EXPERIENCE" 1860 android:protectionLevel="signature|privileged" /> 1861 1862 <!-- Allows an application to receive STK related commands. 1863 @hide --> 1864 <permission android:name="android.permission.RECEIVE_STK_COMMANDS" 1865 android:protectionLevel="signature|privileged" /> 1866 1867 <!-- Allows an application to send EMBMS download intents to apps 1868 @hide --> 1869 <permission android:name="android.permission.SEND_EMBMS_INTENTS" 1870 android:protectionLevel="signature|privileged" /> 1871 1872 1873 <!-- Allows internal management of the sensor framework 1874 @hide --> 1875 <permission android:name="android.permission.MANAGE_SENSORS" 1876 android:protectionLevel="signature" /> 1877 1878 <!-- Must be required by an ImsService to ensure that only the 1879 system can bind to it. 1880 <p>Protection level: signature|privileged|vendorPrivileged 1881 @SystemApi 1882 @hide 1883 --> 1884 <permission android:name="android.permission.BIND_IMS_SERVICE" 1885 android:protectionLevel="signature|privileged|vendorPrivileged" /> 1886 1887 <!-- Must be required by a telephony data service to ensure that only the 1888 system can bind to it. 1889 <p>Protection level: signature 1890 @SystemApi 1891 @hide 1892 --> 1893 <permission android:name="android.permission.BIND_TELEPHONY_DATA_SERVICE" 1894 android:protectionLevel="signature" /> 1895 1896 <!-- Must be required by a NetworkService to ensure that only the 1897 system can bind to it. 1898 <p>Protection level: signature 1899 @SystemApi 1900 @hide 1901 --> 1902 <permission android:name="android.permission.BIND_TELEPHONY_NETWORK_SERVICE" 1903 android:protectionLevel="signature" /> 1904 1905 <!-- @SystemApi Allows an application to manage embedded subscriptions (those on a eUICC) 1906 through EuiccManager APIs. 1907 <p>Protection level: signature|privileged|development 1908 @hide 1909 --> 1910 <permission android:name="android.permission.WRITE_EMBEDDED_SUBSCRIPTIONS" 1911 android:protectionLevel="signature|privileged|development" /> 1912 1913 <!-- @SystemApi Must be required by an EuiccService to ensure that only the system can bind to 1914 it. 1915 <p>Protection level: signature 1916 @hide 1917 --> 1918 <permission android:name="android.permission.BIND_EUICC_SERVICE" 1919 android:protectionLevel="signature" /> 1920 1921 <!-- ================================== --> 1922 <!-- Permissions for sdcard interaction --> 1923 <!-- ================================== --> 1924 <eat-comment /> 1925 1926 <!-- @SystemApi Allows an application to write to internal media storage 1927 @hide --> 1928 <permission android:name="android.permission.WRITE_MEDIA_STORAGE" 1929 android:protectionLevel="signature|privileged" /> 1930 1931 <!-- Allows an application to manage access to documents, usually as part 1932 of a document picker. 1933 <p>This permission should <em>only</em> be requested by the platform 1934 document management app. This permission cannot be granted to 1935 third-party apps. 1936 <p>Protection level: signature 1937 --> 1938 <permission android:name="android.permission.MANAGE_DOCUMENTS" 1939 android:protectionLevel="signature" /> 1940 1941 <!-- @hide Allows an application to cache content. 1942 <p>Not for use by third-party applications. 1943 <p>Protection level: signature 1944 --> 1945 <permission android:name="android.permission.CACHE_CONTENT" 1946 android:protectionLevel="signature" /> 1947 1948 <!-- @SystemApi @hide 1949 Allows an application to aggressively allocate disk space. 1950 <p>Not for use by third-party applications. 1951 --> 1952 <permission android:name="android.permission.ALLOCATE_AGGRESSIVE" 1953 android:protectionLevel="signature|privileged" /> 1954 1955 <!-- @SystemApi @hide 1956 Allows an application to use reserved disk space. 1957 <p>Not for use by third-party applications. Should only be requested by 1958 apps that provide core system functionality, to ensure system stability 1959 when disk is otherwise completely full. 1960 --> 1961 <permission android:name="android.permission.USE_RESERVED_DISK" 1962 android:protectionLevel="signature|privileged" /> 1963 1964 <!-- ================================== --> 1965 <!-- Permissions for screenlock --> 1966 <!-- ================================== --> 1967 <eat-comment /> 1968 1969 <!-- Allows applications to disable the keyguard if it is not secure. 1970 <p>Protection level: normal 1971 --> 1972 <permission android:name="android.permission.DISABLE_KEYGUARD" 1973 android:description="@string/permdesc_disableKeyguard" 1974 android:label="@string/permlab_disableKeyguard" 1975 android:protectionLevel="normal" /> 1976 1977 <!-- ================================== --> 1978 <!-- Permissions to access other installed applications --> 1979 <!-- ================================== --> 1980 <eat-comment /> 1981 1982 <!-- @deprecated No longer enforced. --> 1983 <permission android:name="android.permission.GET_TASKS" 1984 android:label="@string/permlab_getTasks" 1985 android:description="@string/permdesc_getTasks" 1986 android:protectionLevel="normal" /> 1987 1988 <!-- New version of GET_TASKS that apps can request, since GET_TASKS doesn't really 1989 give access to task information. We need this new one because there are 1990 many existing apps that use add libraries and such that have validation 1991 code to ensure the app has requested the GET_TASKS permission by seeing 1992 if it has been granted the permission... if it hasn't, it kills the app 1993 with a message about being upset. So we need to have it continue to look 1994 like the app is getting that permission, even though it will never be 1995 checked, and new privileged apps can now request this one for real access. 1996 @hide 1997 @SystemApi --> 1998 <permission android:name="android.permission.REAL_GET_TASKS" 1999 android:protectionLevel="signature|privileged" /> 2000 2001 <!-- Allows an application to start a task from a ActivityManager#RecentTaskInfo. 2002 @hide --> 2003 <permission android:name="android.permission.START_TASKS_FROM_RECENTS" 2004 android:protectionLevel="signature|privileged" /> 2005 2006 <!-- @SystemApi @hide Allows an application to call APIs that allow it to do interactions 2007 across the users on the device, using singleton services and 2008 user-targeted broadcasts. This permission is not available to 2009 third party applications. --> 2010 <permission android:name="android.permission.INTERACT_ACROSS_USERS" 2011 android:protectionLevel="signature|privileged|development" /> 2012 2013 <!-- @SystemApi Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS} 2014 that removes restrictions on where broadcasts can be sent and allows other 2015 types of interactions 2016 @hide --> 2017 <permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL" 2018 android:protectionLevel="signature|installer" /> 2019 2020 <!-- @SystemApi @hide Allows an application to call APIs that allow it to query and manage 2021 users on the device. This permission is not available to 2022 third party applications. --> 2023 <permission android:name="android.permission.MANAGE_USERS" 2024 android:protectionLevel="signature|privileged" /> 2025 2026 <!-- @hide Allows an application to create, remove users and get the list of 2027 users on the device. Applications holding this permission can only create restricted, 2028 guest, managed, demo, and ephemeral users. For creating other kind of users, 2029 {@link android.Manifest.permission#MANAGE_USERS} is needed. 2030 This permission is not available to third party applications. --> 2031 <permission android:name="android.permission.CREATE_USERS" 2032 android:protectionLevel="signature" /> 2033 2034 <!-- @hide Allows an application to set the profile owners and the device owner. 2035 This permission is not available to third party applications.--> 2036 <permission android:name="android.permission.MANAGE_PROFILE_AND_DEVICE_OWNERS" 2037 android:protectionLevel="signature" 2038 android:label="@string/permlab_manageProfileAndDeviceOwners" 2039 android:description="@string/permdesc_manageProfileAndDeviceOwners" /> 2040 2041 <!-- Allows an application to get full detailed information about 2042 recently running tasks, with full fidelity to the real state. 2043 @hide --> 2044 <permission android:name="android.permission.GET_DETAILED_TASKS" 2045 android:protectionLevel="signature" /> 2046 2047 <!-- Allows an application to change the Z-order of tasks. 2048 <p>Protection level: normal 2049 --> 2050 <permission android:name="android.permission.REORDER_TASKS" 2051 android:label="@string/permlab_reorderTasks" 2052 android:description="@string/permdesc_reorderTasks" 2053 android:protectionLevel="normal" /> 2054 2055 <!-- @hide Allows an application to change to remove/kill tasks --> 2056 <permission android:name="android.permission.REMOVE_TASKS" 2057 android:protectionLevel="signature" /> 2058 2059 <!-- @SystemApi @TestApi @hide Allows an application to create/manage/remove stacks --> 2060 <permission android:name="android.permission.MANAGE_ACTIVITY_STACKS" 2061 android:protectionLevel="signature|privileged|development" /> 2062 2063 <!-- @SystemApi @TestApi @hide Allows an application to embed other activities --> 2064 <permission android:name="android.permission.ACTIVITY_EMBEDDING" 2065 android:protectionLevel="signature|privileged|development" /> 2066 2067 <!-- Allows an application to start any activity, regardless of permission 2068 protection or exported state. 2069 @hide --> 2070 <permission android:name="android.permission.START_ANY_ACTIVITY" 2071 android:protectionLevel="signature" /> 2072 2073 <!-- @deprecated The {@link android.app.ActivityManager#restartPackage} 2074 API is no longer supported. --> 2075 <permission android:name="android.permission.RESTART_PACKAGES" 2076 android:label="@string/permlab_killBackgroundProcesses" 2077 android:description="@string/permdesc_killBackgroundProcesses" 2078 android:protectionLevel="normal" /> 2079 2080 <!-- Allows an application to call 2081 {@link android.app.ActivityManager#killBackgroundProcesses}. 2082 <p>Protection level: normal 2083 --> 2084 <permission android:name="android.permission.KILL_BACKGROUND_PROCESSES" 2085 android:label="@string/permlab_killBackgroundProcesses" 2086 android:description="@string/permdesc_killBackgroundProcesses" 2087 android:protectionLevel="normal" /> 2088 2089 <!-- @SystemApi @hide Allows an application to query process states and current 2090 OOM adjustment scores. 2091 <p>Not for use by third-party applications. --> 2092 <permission android:name="android.permission.GET_PROCESS_STATE_AND_OOM_SCORE" 2093 android:protectionLevel="signature|privileged|development" /> 2094 2095 <!-- Allows use of PendingIntent.getIntent(). 2096 @hide --> 2097 <permission android:name="android.permission.GET_INTENT_SENDER_INTENT" 2098 android:protectionLevel="signature" /> 2099 2100 <!-- ================================== --> 2101 <!-- Permissions affecting the display of other applications --> 2102 <!-- ================================== --> 2103 <eat-comment /> 2104 2105 <!-- Allows an app to create windows using the type 2106 {@link android.view.WindowManager.LayoutParams#TYPE_APPLICATION_OVERLAY}, 2107 shown on top of all other apps. Very few apps 2108 should use this permission; these windows are intended for 2109 system-level interaction with the user. 2110 2111 <p class="note"><strong>Note:</strong> If the app 2112 targets API level 23 or higher, the app user must explicitly grant 2113 this permission to the app through a permission management screen. The app requests 2114 the user's approval by sending an intent with action 2115 {@link android.provider.Settings#ACTION_MANAGE_OVERLAY_PERMISSION}. 2116 The app can check whether it has this authorization by calling 2117 {@link android.provider.Settings#canDrawOverlays 2118 Settings.canDrawOverlays()}. 2119 <p>Protection level: signature --> 2120 <permission android:name="android.permission.SYSTEM_ALERT_WINDOW" 2121 android:label="@string/permlab_systemAlertWindow" 2122 android:description="@string/permdesc_systemAlertWindow" 2123 android:protectionLevel="signature|preinstalled|appop|pre23|development" /> 2124 2125 <!-- @deprecated Use {@link android.Manifest.permission#REQUEST_COMPANION_RUN_IN_BACKGROUND} 2126 @hide 2127 --> 2128 <permission android:name="android.permission.RUN_IN_BACKGROUND" 2129 android:label="@string/permlab_runInBackground" 2130 android:description="@string/permdesc_runInBackground" 2131 android:protectionLevel="signature" /> 2132 2133 <!-- @deprecated Use 2134 {@link android.Manifest.permission#REQUEST_COMPANION_USE_DATA_IN_BACKGROUND} 2135 @hide 2136 --> 2137 <permission android:name="android.permission.USE_DATA_IN_BACKGROUND" 2138 android:label="@string/permlab_useDataInBackground" 2139 android:description="@string/permdesc_useDataInBackground" 2140 android:protectionLevel="signature" /> 2141 2142 <!-- @hide Allows an application to set display offsets for the screen. 2143 This permission is not available to third party applications. --> 2144 <permission android:name="android.permission.SET_DISPLAY_OFFSET" 2145 android:protectionLevel="signature|privileged" /> 2146 2147 <!-- Allows a companion app to run in the background. 2148 <p>Protection level: normal 2149 --> 2150 <permission android:name="android.permission.REQUEST_COMPANION_RUN_IN_BACKGROUND" 2151 android:label="@string/permlab_runInBackground" 2152 android:description="@string/permdesc_runInBackground" 2153 android:protectionLevel="normal" /> 2154 2155 <!-- Allows a companion app to use data in the background. 2156 <p>Protection level: normal 2157 --> 2158 <permission android:name="android.permission.REQUEST_COMPANION_USE_DATA_IN_BACKGROUND" 2159 android:label="@string/permlab_useDataInBackground" 2160 android:description="@string/permdesc_useDataInBackground" 2161 android:protectionLevel="normal" /> 2162 2163 2164 <!-- ================================== --> 2165 <!-- Permissions affecting the system wallpaper --> 2166 <!-- ================================== --> 2167 <eat-comment /> 2168 2169 <!-- Allows applications to set the wallpaper. 2170 <p>Protection level: normal 2171 --> 2172 <permission android:name="android.permission.SET_WALLPAPER" 2173 android:label="@string/permlab_setWallpaper" 2174 android:description="@string/permdesc_setWallpaper" 2175 android:protectionLevel="normal" /> 2176 2177 <!-- Allows applications to set the wallpaper hints. 2178 <p>Protection level: normal 2179 --> 2180 <permission android:name="android.permission.SET_WALLPAPER_HINTS" 2181 android:label="@string/permlab_setWallpaperHints" 2182 android:description="@string/permdesc_setWallpaperHints" 2183 android:protectionLevel="normal" /> 2184 2185 <!-- Allow the app to read the system wallpaper image without 2186 holding the READ_EXTERNAL_STORAGE permission. 2187 <p>Not for use by third-party applications. 2188 @hide 2189 @SystemApi 2190 --> 2191 <permission android:name="android.permission.READ_WALLPAPER_INTERNAL" 2192 android:protectionLevel="signature|privileged" /> 2193 2194 <!-- ============================================ --> 2195 <!-- Permissions for changing the system clock --> 2196 <!-- ============================================ --> 2197 <eat-comment /> 2198 2199 <!-- @SystemApi Allows applications to set the system time. 2200 <p>Not for use by third-party applications. --> 2201 <permission android:name="android.permission.SET_TIME" 2202 android:protectionLevel="signature|privileged" /> 2203 2204 <!-- Allows applications to set the system time zone. 2205 <p>Not for use by third-party applications. 2206 --> 2207 <permission android:name="android.permission.SET_TIME_ZONE" 2208 android:label="@string/permlab_setTimeZone" 2209 android:description="@string/permdesc_setTimeZone" 2210 android:protectionLevel="signature|privileged" /> 2211 2212 <!-- ==================================================== --> 2213 <!-- Permissions related to changing status bar --> 2214 <!-- ==================================================== --> 2215 <eat-comment /> 2216 2217 <!-- Allows an application to expand or collapse the status bar. 2218 <p>Protection level: normal 2219 --> 2220 <permission android:name="android.permission.EXPAND_STATUS_BAR" 2221 android:label="@string/permlab_expandStatusBar" 2222 android:description="@string/permdesc_expandStatusBar" 2223 android:protectionLevel="normal" /> 2224 2225 <!-- ============================================================== --> 2226 <!-- Permissions related to adding/removing shortcuts from Launcher --> 2227 <!-- ============================================================== --> 2228 <eat-comment /> 2229 2230 <!-- Allows an application to install a shortcut in Launcher. 2231 <p>In Android O (API level 26) and higher, the <code>INSTALL_SHORTCUT</code> broadcast no 2232 longer has any effect on your app because it's a private, implicit 2233 broadcast. Instead, you should create an app shortcut by using the 2234 {@link android.content.pm.ShortcutManager#requestPinShortcut requestPinShortcut()} 2235 method from the {@link android.content.pm.ShortcutManager} class. 2236 <p>Protection level: normal 2237 --> 2238 <permission android:name="com.android.launcher.permission.INSTALL_SHORTCUT" 2239 android:label="@string/permlab_install_shortcut" 2240 android:description="@string/permdesc_install_shortcut" 2241 android:protectionLevel="normal"/> 2242 2243 <!--This permission is no longer supported. 2244 --> 2245 <permission android:name="com.android.launcher.permission.UNINSTALL_SHORTCUT" 2246 android:label="@string/permlab_uninstall_shortcut" 2247 android:description="@string/permdesc_uninstall_shortcut" 2248 android:protectionLevel="normal"/> 2249 2250 <!-- ==================================================== --> 2251 <!-- Permissions related to accessing sync settings --> 2252 <!-- ==================================================== --> 2253 <eat-comment /> 2254 2255 <!-- Allows applications to read the sync settings. 2256 <p>Protection level: normal 2257 --> 2258 <permission android:name="android.permission.READ_SYNC_SETTINGS" 2259 android:description="@string/permdesc_readSyncSettings" 2260 android:label="@string/permlab_readSyncSettings" 2261 android:protectionLevel="normal" /> 2262 2263 <!-- Allows applications to write the sync settings. 2264 <p>Protection level: normal 2265 --> 2266 <permission android:name="android.permission.WRITE_SYNC_SETTINGS" 2267 android:description="@string/permdesc_writeSyncSettings" 2268 android:label="@string/permlab_writeSyncSettings" 2269 android:protectionLevel="normal" /> 2270 2271 <!-- Allows applications to read the sync stats. 2272 <p>Protection level: normal 2273 --> 2274 <permission android:name="android.permission.READ_SYNC_STATS" 2275 android:description="@string/permdesc_readSyncStats" 2276 android:label="@string/permlab_readSyncStats" 2277 android:protectionLevel="normal" /> 2278 2279 <!-- ============================================ --> 2280 <!-- Permissions for low-level system interaction --> 2281 <!-- ============================================ --> 2282 <eat-comment /> 2283 2284 <!-- @SystemApi @hide Change the screen compatibility mode of applications --> 2285 <permission android:name="android.permission.SET_SCREEN_COMPATIBILITY" 2286 android:protectionLevel="signature" /> 2287 2288 <!-- @SystemApi Allows an application to modify the current configuration, such 2289 as locale. --> 2290 <permission android:name="android.permission.CHANGE_CONFIGURATION" 2291 android:protectionLevel="signature|privileged|development" /> 2292 2293 <!-- Allows an application to read or write the system settings. 2294 2295 <p class="note"><strong>Note:</strong> If the app targets API level 23 2296 or higher, the app user 2297 must explicitly grant this permission to the app through a permission management screen. 2298 The app requests the user's approval by sending an intent with action 2299 {@link android.provider.Settings#ACTION_MANAGE_WRITE_SETTINGS}. The app 2300 can check whether it has this authorization by calling {@link 2301 android.provider.Settings.System#canWrite Settings.System.canWrite()}. 2302 2303 <p>Protection level: signature 2304 --> 2305 <permission android:name="android.permission.WRITE_SETTINGS" 2306 android:label="@string/permlab_writeSettings" 2307 android:description="@string/permdesc_writeSettings" 2308 android:protectionLevel="signature|preinstalled|appop|pre23" /> 2309 2310 <!-- @SystemApi Allows an application to modify the Google service map. 2311 <p>Not for use by third-party applications. --> 2312 <permission android:name="android.permission.WRITE_GSERVICES" 2313 android:protectionLevel="signature|privileged" /> 2314 2315 <!-- @SystemApi Allows an application to call 2316 {@link android.app.ActivityManager#forceStopPackage}. 2317 @hide --> 2318 <permission android:name="android.permission.FORCE_STOP_PACKAGES" 2319 android:protectionLevel="signature|privileged" /> 2320 2321 <!-- @SystemApi @hide Allows an application to retrieve the content of the active window 2322 An active window is the window that has fired an accessibility event. --> 2323 <permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT" 2324 android:protectionLevel="signature|privileged" /> 2325 2326 <!-- @SystemApi Modify the global animation scaling factor. 2327 <p>Not for use by third-party applications. --> 2328 <permission android:name="android.permission.SET_ANIMATION_SCALE" 2329 android:protectionLevel="signature|privileged|development" /> 2330 2331 <!-- @deprecated This functionality will be removed in the future; please do 2332 not use. Allow an application to make its activities persistent. --> 2333 <permission android:name="android.permission.PERSISTENT_ACTIVITY" 2334 android:label="@string/permlab_persistentActivity" 2335 android:description="@string/permdesc_persistentActivity" 2336 android:protectionLevel="normal" /> 2337 2338 <!-- Allows an application to find out the space used by any package. 2339 <p>Protection level: normal 2340 --> 2341 <permission android:name="android.permission.GET_PACKAGE_SIZE" 2342 android:label="@string/permlab_getPackageSize" 2343 android:description="@string/permdesc_getPackageSize" 2344 android:protectionLevel="normal" /> 2345 2346 <!-- @deprecated No longer useful, see 2347 {@link android.content.pm.PackageManager#addPackageToPreferred} 2348 for details. --> 2349 <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS" 2350 android:protectionLevel="signature|verifier" /> 2351 2352 <!-- Allows an application to receive the 2353 {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is 2354 broadcast after the system finishes booting. If you don't 2355 request this permission, you will not receive the broadcast at 2356 that time. Though holding this permission does not have any 2357 security implications, it can have a negative impact on the 2358 user experience by increasing the amount of time it takes the 2359 system to start and allowing applications to have themselves 2360 running without the user being aware of them. As such, you must 2361 explicitly declare your use of this facility to make that visible 2362 to the user. 2363 <p>Protection level: normal 2364 --> 2365 <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED" 2366 android:label="@string/permlab_receiveBootCompleted" 2367 android:description="@string/permdesc_receiveBootCompleted" 2368 android:protectionLevel="normal" /> 2369 2370 <!-- Allows an application to broadcast sticky intents. These are 2371 broadcasts whose data is held by the system after being finished, 2372 so that clients can quickly retrieve that data without having 2373 to wait for the next broadcast. 2374 <p>Protection level: normal 2375 --> 2376 <permission android:name="android.permission.BROADCAST_STICKY" 2377 android:label="@string/permlab_broadcastSticky" 2378 android:description="@string/permdesc_broadcastSticky" 2379 android:protectionLevel="normal" /> 2380 2381 <!-- @SystemApi Allows mounting and unmounting file systems for removable storage. 2382 <p>Not for use by third-party applications.--> 2383 <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS" 2384 android:protectionLevel="signature|privileged" /> 2385 2386 <!-- @SystemApi Allows formatting file systems for removable storage. 2387 <p>Not for use by third-party applications. --> 2388 <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS" 2389 android:protectionLevel="signature|privileged" /> 2390 2391 <!-- @hide --> 2392 <permission android:name="android.permission.STORAGE_INTERNAL" 2393 android:protectionLevel="signature" /> 2394 2395 <!-- Allows access to ASEC non-destructive API calls 2396 @hide --> 2397 <permission android:name="android.permission.ASEC_ACCESS" 2398 android:protectionLevel="signature" /> 2399 2400 <!-- Allows creation of ASEC volumes 2401 @hide --> 2402 <permission android:name="android.permission.ASEC_CREATE" 2403 android:protectionLevel="signature" /> 2404 2405 <!-- Allows destruction of ASEC volumes 2406 @hide --> 2407 <permission android:name="android.permission.ASEC_DESTROY" 2408 android:protectionLevel="signature" /> 2409 2410 <!-- Allows mount / unmount of ASEC volumes 2411 @hide --> 2412 <permission android:name="android.permission.ASEC_MOUNT_UNMOUNT" 2413 android:protectionLevel="signature" /> 2414 2415 <!-- Allows rename of ASEC volumes 2416 @hide --> 2417 <permission android:name="android.permission.ASEC_RENAME" 2418 android:protectionLevel="signature" /> 2419 2420 <!-- @SystemApi Allows applications to write the apn settings. 2421 <p>Not for use by third-party applications. --> 2422 <permission android:name="android.permission.WRITE_APN_SETTINGS" 2423 android:protectionLevel="signature|privileged" /> 2424 2425 <!-- Allows applications to change network connectivity state. 2426 <p>Protection level: normal 2427 --> 2428 <permission android:name="android.permission.CHANGE_NETWORK_STATE" 2429 android:description="@string/permdesc_changeNetworkState" 2430 android:label="@string/permlab_changeNetworkState" 2431 android:protectionLevel="normal" /> 2432 2433 <!-- Allows an application to clear the caches of all installed 2434 applications on the device. 2435 <p>Protection level: signature|privileged 2436 --> 2437 <permission android:name="android.permission.CLEAR_APP_CACHE" 2438 android:protectionLevel="signature|privileged" /> 2439 2440 <!-- @SystemApi Allows an application to use any media decoder when decoding for playback 2441 @hide --> 2442 <permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK" 2443 android:protectionLevel="signature|privileged" /> 2444 2445 <!-- @SystemApi Allows an application to install and/or uninstall CA certificates on 2446 behalf of the user. 2447 @hide --> 2448 <permission android:name="android.permission.MANAGE_CA_CERTIFICATES" 2449 android:protectionLevel="signature|privileged" /> 2450 2451 <!-- @SystemApi Allows an application to do certain operations needed for 2452 interacting with the recovery (system update) system. 2453 @hide --> 2454 <permission android:name="android.permission.RECOVERY" 2455 android:protectionLevel="signature|privileged" /> 2456 2457 <!-- @SystemApi Allows an application to read system update info. 2458 @hide --> 2459 <permission android:name="android.permission.READ_SYSTEM_UPDATE_INFO" 2460 android:protectionLevel="signature" /> 2461 2462 <!-- Allows the system to bind to an application's task services 2463 @hide --> 2464 <permission android:name="android.permission.BIND_JOB_SERVICE" 2465 android:protectionLevel="signature" /> 2466 <uses-permission android:name="android.permission.BIND_JOB_SERVICE"/> 2467 2468 <!-- Allows an application to initiate configuration updates 2469 <p>An application requesting this permission is responsible for 2470 verifying the source and integrity of any update before passing 2471 it off to the various individual installer components 2472 @hide --> 2473 <permission android:name="android.permission.UPDATE_CONFIG" 2474 android:protectionLevel="signature|privileged" /> 2475 2476 <!-- Allows an application to query the current time zone rules state 2477 on device. 2478 @SystemApi @hide --> 2479 <permission android:name="android.permission.QUERY_TIME_ZONE_RULES" 2480 android:protectionLevel="signature|privileged" /> 2481 2482 <!-- Allows a time zone rule updater application to request 2483 the system installs / uninstalls timezone rules. 2484 <p>An application requesting this permission is responsible for 2485 verifying the source and integrity of the update before passing 2486 it off to the installer components. 2487 @SystemApi @hide --> 2488 <permission android:name="android.permission.UPDATE_TIME_ZONE_RULES" 2489 android:protectionLevel="signature|privileged" /> 2490 2491 <!-- Must be required by a time zone rule updater application, 2492 to ensure that only the system can trigger it. 2493 @hide --> 2494 <permission android:name="android.permission.TRIGGER_TIME_ZONE_RULES_CHECK" 2495 android:protectionLevel="signature" /> 2496 <uses-permission android:name="android.permission.TRIGGER_TIME_ZONE_RULES_CHECK"/> 2497 2498 <!-- Allows the system to reset throttling in shortcut manager. 2499 @hide --> 2500 <permission android:name="android.permission.RESET_SHORTCUT_MANAGER_THROTTLING" 2501 android:protectionLevel="signature" /> 2502 2503 <!-- Allows the system to bind to the discovered Network Recommendation Service. 2504 @SystemApi @hide --> 2505 <permission android:name="android.permission.BIND_NETWORK_RECOMMENDATION_SERVICE" 2506 android:protectionLevel="signature" /> 2507 <uses-permission android:name="android.permission.BIND_NETWORK_RECOMMENDATION_SERVICE"/> 2508 2509 <!-- Allows an application to enable, disable and change priority of 2510 runtime resource overlays. 2511 @hide --> 2512 <permission android:name="android.permission.CHANGE_OVERLAY_PACKAGES" 2513 android:protectionLevel="signature|privileged" /> 2514 2515 <!-- ========================================= --> 2516 <!-- Permissions for special development tools --> 2517 <!-- ========================================= --> 2518 <eat-comment /> 2519 2520 <!-- @SystemApi Allows an application to read or write the secure system settings. 2521 <p>Not for use by third-party applications. --> 2522 <permission android:name="android.permission.WRITE_SECURE_SETTINGS" 2523 android:protectionLevel="signature|privileged|development" /> 2524 2525 <!-- @SystemApi Allows an application to retrieve state dump information from system services. 2526 <p>Not for use by third-party applications. --> 2527 <permission android:name="android.permission.DUMP" 2528 android:protectionLevel="signature|privileged|development" /> 2529 2530 <!-- @SystemApi Allows an application to read the low-level system log files. 2531 <p>Not for use by third-party applications, because 2532 Log entries can contain the user's private information. --> 2533 <permission android:name="android.permission.READ_LOGS" 2534 android:protectionLevel="signature|privileged|development" /> 2535 2536 <!-- @SystemApi Configure an application for debugging. 2537 <p>Not for use by third-party applications. --> 2538 <permission android:name="android.permission.SET_DEBUG_APP" 2539 android:protectionLevel="signature|privileged|development" /> 2540 2541 <!-- @SystemApi Allows an application to set the maximum number of (not needed) 2542 application processes that can be running. 2543 <p>Not for use by third-party applications. --> 2544 <permission android:name="android.permission.SET_PROCESS_LIMIT" 2545 android:protectionLevel="signature|privileged|development" /> 2546 2547 <!-- @SystemApi Allows an application to control whether activities are immediately 2548 finished when put in the background. 2549 <p>Not for use by third-party applications. --> 2550 <permission android:name="android.permission.SET_ALWAYS_FINISH" 2551 android:protectionLevel="signature|privileged|development" /> 2552 2553 <!-- @SystemApi Allow an application to request that a signal be sent to all persistent processes. 2554 <p>Not for use by third-party applications. --> 2555 <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES" 2556 android:protectionLevel="signature|privileged|development" /> 2557 2558 <!-- ==================================== --> 2559 <!-- Private permissions --> 2560 <!-- ==================================== --> 2561 <eat-comment /> 2562 2563 <!-- @SystemApi Allows access to the list of accounts in the Accounts Service. --> 2564 <permission android:name="android.permission.GET_ACCOUNTS_PRIVILEGED" 2565 android:protectionLevel="signature|privileged" /> 2566 2567 <!-- Allows but does not guarantee access to user passwords at the conclusion of add account 2568 @hide --> 2569 <permission android:name="android.permission.GET_PASSWORD" 2570 android:protectionLevel="signature" /> 2571 2572 <!-- @SystemApi Allows applications to RW to diagnostic resources. 2573 <p>Not for use by third-party applications. --> 2574 <permission android:name="android.permission.DIAGNOSTIC" 2575 android:protectionLevel="signature" /> 2576 2577 <!-- @SystemApi Allows an application to open, close, or disable the status bar 2578 and its icons. 2579 <p>Not for use by third-party applications. --> 2580 <permission android:name="android.permission.STATUS_BAR" 2581 android:protectionLevel="signature|privileged" /> 2582 2583 <!-- Allows an application to be the status bar. Currently used only by SystemUI.apk 2584 @hide --> 2585 <permission android:name="android.permission.STATUS_BAR_SERVICE" 2586 android:protectionLevel="signature" /> 2587 2588 <!-- Allows an application to bind to third party quick settings tiles. 2589 <p>Should only be requested by the System, should be required by 2590 TileService declarations.--> 2591 <permission android:name="android.permission.BIND_QUICK_SETTINGS_TILE" 2592 android:protectionLevel="signature" /> 2593 2594 <!-- @SystemApi Allows an application to force a BACK operation on whatever is the 2595 top activity. 2596 <p>Not for use by third-party applications. 2597 @hide 2598 --> 2599 <permission android:name="android.permission.FORCE_BACK" 2600 android:protectionLevel="signature" /> 2601 2602 <!-- @SystemApi Allows an application to update device statistics. 2603 <p>Not for use by third-party applications. --> 2604 <permission android:name="android.permission.UPDATE_DEVICE_STATS" 2605 android:protectionLevel="signature|privileged" /> 2606 2607 <!-- @SystemApi @hide Allows an application to collect application operation statistics. 2608 Not for use by third party apps. --> 2609 <permission android:name="android.permission.GET_APP_OPS_STATS" 2610 android:protectionLevel="signature|privileged|development" /> 2611 2612 <!-- @SystemApi Allows an application to update application operation statistics. Not for 2613 use by third party apps. 2614 @hide --> 2615 <permission android:name="android.permission.UPDATE_APP_OPS_STATS" 2616 android:protectionLevel="signature|privileged|installer" /> 2617 2618 <!-- @SystemApi Allows an application to update the user app op restrictions. 2619 Not for use by third party apps. 2620 @hide --> 2621 <permission android:name="android.permission.MANAGE_APP_OPS_RESTRICTIONS" 2622 android:protectionLevel="signature|installer" /> 2623 2624 <!-- Allows an application to update the user app op modes. 2625 Not for use by third party apps. 2626 @hide --> 2627 <permission android:name="android.permission.MANAGE_APP_OPS_MODES" 2628 android:protectionLevel="signature|installer|verifier" /> 2629 2630 <!-- @SystemApi Allows an application to open windows that are for use by parts 2631 of the system user interface. 2632 <p>Not for use by third-party applications. 2633 @hide 2634 --> 2635 <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW" 2636 android:protectionLevel="signature" /> 2637 2638 <!-- @SystemApi Allows an application to use 2639 {@link android.view.WindowManager.LayoutsParams#PRIVATE_FLAG_HIDE_NON_SYSTEM_OVERLAY_WINDOWS} 2640 to hide non-system-overlay windows. 2641 <p>Not for use by third-party applications. 2642 @hide 2643 --> 2644 <permission android:name="android.permission.HIDE_NON_SYSTEM_OVERLAY_WINDOWS" 2645 android:protectionLevel="signature|installer" /> 2646 2647 <!-- @SystemApi Allows an application to manage (create, destroy, 2648 Z-order) application tokens in the window manager. 2649 <p>Not for use by third-party applications. 2650 @hide 2651 --> 2652 <permission android:name="android.permission.MANAGE_APP_TOKENS" 2653 android:protectionLevel="signature" /> 2654 2655 <!-- Allows System UI to register listeners for events from Window Manager. 2656 @hide --> 2657 <permission android:name="android.permission.REGISTER_WINDOW_MANAGER_LISTENERS" 2658 android:protectionLevel="signature" /> 2659 2660 <!-- @hide Allows the application to temporarily freeze the screen for a 2661 full-screen transition. --> 2662 <permission android:name="android.permission.FREEZE_SCREEN" 2663 android:protectionLevel="signature" /> 2664 2665 <!-- @SystemApi Allows an application to inject user events (keys, touch, trackball) 2666 into the event stream and deliver them to ANY window. Without this 2667 permission, you can only deliver events to windows in your own process. 2668 <p>Not for use by third-party applications. 2669 @hide 2670 --> 2671 <permission android:name="android.permission.INJECT_EVENTS" 2672 android:protectionLevel="signature" /> 2673 2674 <!-- @hide Allows an application to register an input filter which filters the stream 2675 of user events (keys, touch, trackball) before they are dispatched to any window. --> 2676 <permission android:name="android.permission.FILTER_EVENTS" 2677 android:protectionLevel="signature" /> 2678 2679 <!-- @hide Allows an application to retrieve the window token from the accessibility manager. --> 2680 <permission android:name="android.permission.RETRIEVE_WINDOW_TOKEN" 2681 android:protectionLevel="signature" /> 2682 2683 <!-- @hide Allows an application to modify accessibility information from another app. --> 2684 <permission android:name="android.permission.MODIFY_ACCESSIBILITY_DATA" 2685 android:protectionLevel="signature" /> 2686 2687 <!-- @hide Allows an application to change the accessibility volume. --> 2688 <permission android:name="android.permission.CHANGE_ACCESSIBILITY_VOLUME" 2689 android:protectionLevel="signature" /> 2690 2691 <!-- @hide Allows an application to collect frame statistics --> 2692 <permission android:name="android.permission.FRAME_STATS" 2693 android:protectionLevel="signature" /> 2694 2695 <!-- @hide Allows an application to temporary enable accessibility on the device. --> 2696 <permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY" 2697 android:protectionLevel="signature" /> 2698 2699 <!-- @SystemApi Allows an application to watch and control how activities are 2700 started globally in the system. Only for is in debugging 2701 (usually the monkey command). 2702 <p>Not for use by third-party applications. 2703 @hide 2704 --> 2705 <permission android:name="android.permission.SET_ACTIVITY_WATCHER" 2706 android:protectionLevel="signature" /> 2707 2708 <!-- @SystemApi Allows an application to call the activity manager shutdown() API 2709 to put the higher-level system there into a shutdown state. 2710 @hide --> 2711 <permission android:name="android.permission.SHUTDOWN" 2712 android:protectionLevel="signature|privileged" /> 2713 2714 <!-- @SystemApi Allows an application to tell the activity manager to temporarily 2715 stop application switches, putting it into a special mode that 2716 prevents applications from immediately switching away from some 2717 critical UI such as the home screen. 2718 @hide --> 2719 <permission android:name="android.permission.STOP_APP_SWITCHES" 2720 android:protectionLevel="signature|privileged" /> 2721 2722 <!-- @SystemApi Allows an application to retrieve private information about 2723 the current top activity, such as any assist context it can provide. 2724 <p>Not for use by third-party applications. 2725 @hide 2726 --> 2727 <permission android:name="android.permission.GET_TOP_ACTIVITY_INFO" 2728 android:protectionLevel="signature" /> 2729 2730 <!-- Allows an application to retrieve the current state of keys and 2731 switches. 2732 <p>Not for use by third-party applications. 2733 @deprecated The API that used this permission has been removed. --> 2734 <permission android:name="android.permission.READ_INPUT_STATE" 2735 android:protectionLevel="signature" /> 2736 2737 <!-- Must be required by an {@link android.inputmethodservice.InputMethodService}, 2738 to ensure that only the system can bind to it. 2739 <p>Protection level: signature 2740 --> 2741 <permission android:name="android.permission.BIND_INPUT_METHOD" 2742 android:protectionLevel="signature" /> 2743 2744 <!-- Must be required by an {@link android.media.midi.MidiDeviceService}, 2745 to ensure that only the system can bind to it. 2746 <p>Protection level: signature 2747 --> 2748 <permission android:name="android.permission.BIND_MIDI_DEVICE_SERVICE" 2749 android:protectionLevel="signature" /> 2750 2751 <!-- Must be required by an {@link android.accessibilityservice.AccessibilityService}, 2752 to ensure that only the system can bind to it. 2753 <p>Protection level: signature 2754 --> 2755 <permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE" 2756 android:protectionLevel="signature" /> 2757 2758 <!-- Must be required by a {@link android.printservice.PrintService}, 2759 to ensure that only the system can bind to it. 2760 <p>Protection level: signature 2761 --> 2762 <permission android:name="android.permission.BIND_PRINT_SERVICE" 2763 android:protectionLevel="signature" /> 2764 2765 <!-- Must be required by a {@link android.printservice.recommendation.RecommendationService}, 2766 to ensure that only the system can bind to it. 2767 @hide 2768 @SystemApi 2769 <p>Protection level: signature 2770 --> 2771 <permission android:name="android.permission.BIND_PRINT_RECOMMENDATION_SERVICE" 2772 android:protectionLevel="signature" /> 2773 2774 <!-- Allows applications to get the installed and enabled print services. 2775 @hide 2776 @SystemApi 2777 <p>Protection level: signature|preinstalled 2778 --> 2779 <permission android:name="android.permission.READ_PRINT_SERVICES" 2780 android:protectionLevel="signature|preinstalled" /> 2781 2782 <!-- Allows applications to get the currently recommended print services for printers. 2783 @hide 2784 @SystemApi 2785 <p>Protection level: signature|preinstalled 2786 --> 2787 <permission android:name="android.permission.READ_PRINT_SERVICE_RECOMMENDATIONS" 2788 android:protectionLevel="signature|preinstalled" /> 2789 2790 <!-- Must be required by a {@link android.nfc.cardemulation.HostApduService} 2791 or {@link android.nfc.cardemulation.OffHostApduService} to ensure that only 2792 the system can bind to it. 2793 <p>Protection level: signature 2794 --> 2795 <permission android:name="android.permission.BIND_NFC_SERVICE" 2796 android:protectionLevel="signature" /> 2797 2798 <!-- Must be required by the PrintSpooler to ensure that only the system can bind to it. 2799 @hide --> 2800 <permission android:name="android.permission.BIND_PRINT_SPOOLER_SERVICE" 2801 android:protectionLevel="signature" /> 2802 2803 <!-- Must be required by the CompanionDeviceManager to ensure that only the system can bind to it. 2804 @hide --> 2805 <permission android:name="android.permission.BIND_COMPANION_DEVICE_MANAGER_SERVICE" 2806 android:protectionLevel="signature" /> 2807 2808 <!-- @SystemApi Must be required by the RuntimePermissionPresenterService to ensure 2809 that only the system can bind to it. 2810 @hide --> 2811 <permission android:name="android.permission.BIND_RUNTIME_PERMISSION_PRESENTER_SERVICE" 2812 android:protectionLevel="signature" /> 2813 2814 <!-- Must be required by a TextService (e.g. SpellCheckerService) 2815 to ensure that only the system can bind to it. 2816 <p>Protection level: signature 2817 --> 2818 <permission android:name="android.permission.BIND_TEXT_SERVICE" 2819 android:protectionLevel="signature" /> 2820 2821 <!-- Must be required by a {@link android.net.VpnService}, 2822 to ensure that only the system can bind to it. 2823 <p>Protection level: signature 2824 --> 2825 <permission android:name="android.permission.BIND_VPN_SERVICE" 2826 android:protectionLevel="signature" /> 2827 2828 <!-- Must be required by a {@link android.service.wallpaper.WallpaperService}, 2829 to ensure that only the system can bind to it. 2830 <p>Protection level: signature|privileged 2831 --> 2832 <permission android:name="android.permission.BIND_WALLPAPER" 2833 android:protectionLevel="signature|privileged" /> 2834 2835 <!-- Must be required by a {@link android.service.voice.VoiceInteractionService}, 2836 to ensure that only the system can bind to it. 2837 <p>Protection level: signature 2838 --> 2839 <permission android:name="android.permission.BIND_VOICE_INTERACTION" 2840 android:protectionLevel="signature" /> 2841 2842 <!-- Must be required by a {@link android.service.autofill.AutofillService}, 2843 to ensure that only the system can bind to it. 2844 <p>Protection level: signature 2845 --> 2846 <permission android:name="android.permission.BIND_AUTOFILL_SERVICE" 2847 android:protectionLevel="signature" /> 2848 2849 <!-- Alternative version of android.permission.BIND_AUTOFILL_FIELD_CLASSIFICATION_SERVICE. 2850 This permission was renamed during the O previews but it was supported on the final O 2851 release, so we need to carry it over. 2852 <p>Protection level: signature 2853 @hide 2854 --> 2855 <permission android:name="android.permission.BIND_AUTOFILL" 2856 android:protectionLevel="signature" /> 2857 2858 <!-- Must be required by an {@link android.service.autofill.AutofillFieldClassificationService} 2859 to ensure that only the system can bind to it. 2860 @hide This is not a third-party API (intended for OEMs and system apps). 2861 --> 2862 <permission android:name="android.permission.BIND_AUTOFILL_FIELD_CLASSIFICATION_SERVICE" 2863 android:protectionLevel="signature" /> 2864 2865 <!-- Must be required by a android.service.textclassifier.TextClassifierService, 2866 to ensure that only the system can bind to it. 2867 @SystemApi @hide This is not a third-party API (intended for OEMs and system apps). 2868 <p>Protection level: signature 2869 --> 2870 <permission android:name="android.permission.BIND_TEXTCLASSIFIER_SERVICE" 2871 android:protectionLevel="signature" /> 2872 2873 <!-- Must be required by hotword enrollment application, 2874 to ensure that only the system can interact with it. 2875 @hide <p>Not for use by third-party applications.</p> --> 2876 <permission android:name="android.permission.MANAGE_VOICE_KEYPHRASES" 2877 android:protectionLevel="signature|privileged" /> 2878 2879 <!-- Must be required by a {@link com.android.media.remotedisplay.RemoteDisplayProvider}, 2880 to ensure that only the system can bind to it. 2881 @hide --> 2882 <permission android:name="android.permission.BIND_REMOTE_DISPLAY" 2883 android:protectionLevel="signature" /> 2884 2885 <!-- Must be required by a {@link android.media.tv.TvInputService} 2886 to ensure that only the system can bind to it. 2887 <p>Protection level: signature|privileged 2888 --> 2889 <permission android:name="android.permission.BIND_TV_INPUT" 2890 android:protectionLevel="signature|privileged" /> 2891 2892 <!-- @SystemApi 2893 Must be required by a {@link com.android.media.tv.remoteprovider.TvRemoteProvider} 2894 to ensure that only the system can bind to it. 2895 <p>Protection level: signature|privileged 2896 <p>Not for use by third-party applications. </p> 2897 @hide --> 2898 <permission android:name="android.permission.BIND_TV_REMOTE_SERVICE" 2899 android:protectionLevel="signature|privileged" /> 2900 2901 <!-- @SystemApi 2902 Must be required for a virtual remote controller for TV. 2903 <p>Protection level: signature|privileged 2904 <p>Not for use by third-party applications. </p> 2905 @hide --> 2906 <permission android:name="android.permission.TV_VIRTUAL_REMOTE_CONTROLLER" 2907 android:protectionLevel="signature|privileged" /> 2908 2909 <!-- Allows an application to change HDMI CEC active source. 2910 <p>Not for use by third-party applications. 2911 @hide --> 2912 <permission android:name="android.permission.CHANGE_HDMI_CEC_ACTIVE_SOURCE" 2913 android:protectionLevel="signature|privileged" /> 2914 2915 <!-- @SystemApi Allows an application to modify parental controls 2916 <p>Not for use by third-party applications. 2917 @hide --> 2918 <permission android:name="android.permission.MODIFY_PARENTAL_CONTROLS" 2919 android:protectionLevel="signature|privileged" /> 2920 2921 <!-- @SystemApi Allows an application to read TvContentRatingSystemInfo 2922 <p>Not for use by third-party applications. 2923 @hide --> 2924 <permission android:name="android.permission.READ_CONTENT_RATING_SYSTEMS" 2925 android:protectionLevel="signature|privileged" /> 2926 2927 <!-- @SystemApi Allows an application to notify TV inputs by sending broadcasts. 2928 <p>Protection level: signature|privileged 2929 <p>Not for use by third-party applications. 2930 @hide --> 2931 <permission android:name="android.permission.NOTIFY_TV_INPUTS" 2932 android:protectionLevel="signature|privileged" /> 2933 2934 <!-- Must be required by a {@link android.media.routing.MediaRouteService} 2935 to ensure that only the system can interact with it. 2936 @hide --> 2937 <permission android:name="android.permission.BIND_ROUTE_PROVIDER" 2938 android:protectionLevel="signature" /> 2939 2940 <!-- Must be required by device administration receiver, to ensure that only the 2941 system can interact with it. 2942 <p>Protection level: signature 2943 --> 2944 <permission android:name="android.permission.BIND_DEVICE_ADMIN" 2945 android:protectionLevel="signature" /> 2946 2947 <!-- @SystemApi Required to add or remove another application as a device admin. 2948 <p>Not for use by third-party applications. 2949 @hide --> 2950 <permission android:name="android.permission.MANAGE_DEVICE_ADMINS" 2951 android:protectionLevel="signature|privileged" /> 2952 2953 <!-- @SystemApi Allows low-level access to setting the orientation (actually 2954 rotation) of the screen. 2955 <p>Not for use by third-party applications. 2956 @hide 2957 --> 2958 <permission android:name="android.permission.SET_ORIENTATION" 2959 android:protectionLevel="signature" /> 2960 2961 <!-- @SystemApi Allows low-level access to setting the pointer speed. 2962 <p>Not for use by third-party applications. 2963 @hide 2964 --> 2965 <permission android:name="android.permission.SET_POINTER_SPEED" 2966 android:protectionLevel="signature" /> 2967 2968 <!-- Allows low-level access to setting input device calibration. 2969 <p>Not for use by normal applications. 2970 @hide --> 2971 <permission android:name="android.permission.SET_INPUT_CALIBRATION" 2972 android:protectionLevel="signature" /> 2973 2974 <!-- Allows low-level access to setting the keyboard layout. 2975 <p>Not for use by third-party applications. 2976 @hide --> 2977 <permission android:name="android.permission.SET_KEYBOARD_LAYOUT" 2978 android:protectionLevel="signature" /> 2979 2980 <!-- Allows an application to query tablet mode state and monitor changes 2981 in it. 2982 <p>Not for use by third-party applications. 2983 @hide --> 2984 <permission android:name="android.permission.TABLET_MODE" 2985 android:protectionLevel="signature" /> 2986 2987 <!-- Allows an application to request installing packages. Apps 2988 targeting APIs greater than 25 must hold this permission in 2989 order to use {@link android.content.Intent#ACTION_INSTALL_PACKAGE}. 2990 <p>Protection level: signature 2991 --> 2992 <permission android:name="android.permission.REQUEST_INSTALL_PACKAGES" 2993 android:label="@string/permlab_requestInstallPackages" 2994 android:description="@string/permdesc_requestInstallPackages" 2995 android:protectionLevel="signature|appop" /> 2996 2997 <!-- Allows an application to request deleting packages. Apps 2998 targeting APIs {@link android.os.Build.VERSION_CODES#P} or greater must hold this 2999 permission in order to use {@link android.content.Intent#ACTION_UNINSTALL_PACKAGE} or 3000 {@link android.content.pm.PackageInstaller#uninstall}. 3001 <p>Protection level: normal 3002 --> 3003 <permission android:name="android.permission.REQUEST_DELETE_PACKAGES" 3004 android:label="@string/permlab_requestDeletePackages" 3005 android:description="@string/permdesc_requestDeletePackages" 3006 android:protectionLevel="normal" /> 3007 3008 <!-- @SystemApi Allows an application to install packages. 3009 <p>Not for use by third-party applications. --> 3010 <permission android:name="android.permission.INSTALL_PACKAGES" 3011 android:protectionLevel="signature|privileged" /> 3012 3013 <!-- @SystemApi Allows an application to install self updates. This is a limited version 3014 of {@link android.Manifest.permission#INSTALL_PACKAGES}. 3015 <p>Not for use by third-party applications. 3016 @hide 3017 --> 3018 <permission android:name="android.permission.INSTALL_SELF_UPDATES" 3019 android:protectionLevel="signature|privileged" /> 3020 3021 <!-- @SystemApi Allows an application to install updates. This is a limited version 3022 of {@link android.Manifest.permission#INSTALL_PACKAGES}. 3023 <p>Not for use by third-party applications. 3024 @hide 3025 --> 3026 <permission android:name="android.permission.INSTALL_PACKAGE_UPDATES" 3027 android:protectionLevel="signature|privileged" /> 3028 3029 <!-- @SystemApi Allows an application to clear user data. 3030 <p>Not for use by third-party applications 3031 @hide 3032 --> 3033 <permission android:name="android.permission.CLEAR_APP_USER_DATA" 3034 android:protectionLevel="signature|installer" /> 3035 3036 <!-- @hide Allows an application to get the URI permissions 3037 granted to another application. 3038 <p>Not for use by third-party applications 3039 --> 3040 <permission android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS" 3041 android:protectionLevel="signature" /> 3042 3043 <!-- @hide Allows an application to clear the URI permissions 3044 granted to another application. 3045 <p>Not for use by third-party applications 3046 --> 3047 <permission 3048 android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS" 3049 android:protectionLevel="signature" /> 3050 3051 <!-- @hide 3052 Allows an application to change the status of Scoped Access Directory requests granted or 3053 rejected by the user. 3054 <p>This permission should <em>only</em> be requested by the platform 3055 settings app. This permission cannot be granted to third-party apps. 3056 <p>Protection level: signature 3057 --> 3058 <permission 3059 android:name="android.permission.MANAGE_SCOPED_ACCESS_DIRECTORY_PERMISSIONS" 3060 android:protectionLevel="signature" /> 3061 3062 <!-- @hide 3063 Allows an application to change the status of a persistable URI permission granted 3064 to another application. 3065 <p>This permission should <em>only</em> be requested by the platform 3066 settings app. This permission cannot be granted to third-party apps. 3067 <p>Protection level: signature 3068 --> 3069 <permission android:name="android.permission.FORCE_PERSISTABLE_URI_PERMISSIONS" 3070 android:protectionLevel="signature" /> 3071 3072 <!-- @SystemApi Old permission for deleting an app's cache files, no longer used, 3073 but signals for us to quietly ignore calls instead of throwing an exception. --> 3074 <permission android:name="android.permission.DELETE_CACHE_FILES" 3075 android:protectionLevel="signature|privileged" /> 3076 3077 <!-- Allows an application to delete cache files. 3078 @hide --> 3079 <permission android:name="android.permission.INTERNAL_DELETE_CACHE_FILES" 3080 android:protectionLevel="signature" /> 3081 3082 <!-- @SystemApi Allows an application to delete packages. 3083 <p>Not for use by third-party applications. 3084 <p>Starting in {@link android.os.Build.VERSION_CODES#N}, user confirmation is requested 3085 when the application deleting the package is not the same application that installed the 3086 package. --> 3087 <permission android:name="android.permission.DELETE_PACKAGES" 3088 android:protectionLevel="signature|privileged" /> 3089 3090 <!-- @SystemApi Allows an application to move location of installed package. 3091 @hide --> 3092 <permission android:name="android.permission.MOVE_PACKAGE" 3093 android:protectionLevel="signature|privileged" /> 3094 3095 <!-- @SystemApi Allows an application to change whether an application component (other than its own) is 3096 enabled or not. 3097 <p>Not for use by third-party applications. --> 3098 <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE" 3099 android:protectionLevel="signature|privileged" /> 3100 3101 <!-- @SystemApi Allows an application to grant specific permissions. 3102 @hide --> 3103 <permission android:name="android.permission.GRANT_RUNTIME_PERMISSIONS" 3104 android:protectionLevel="signature|installer|verifier" /> 3105 3106 <!-- @SystemApi Allows an app that has this permission and the permissions to install packages 3107 to request certain runtime permissions to be granted at installation. 3108 @hide --> 3109 <permission android:name="android.permission.INSTALL_GRANT_RUNTIME_PERMISSIONS" 3110 android:protectionLevel="signature|installer|verifier" /> 3111 3112 <!-- @SystemApi Allows an application to revoke specific permissions. 3113 @hide --> 3114 <permission android:name="android.permission.REVOKE_RUNTIME_PERMISSIONS" 3115 android:protectionLevel="signature|installer|verifier" /> 3116 3117 <!-- @hide Allows an application to observe permission changes. --> 3118 <permission android:name="android.permission.OBSERVE_GRANT_REVOKE_PERMISSIONS" 3119 android:protectionLevel="signature|privileged" /> 3120 3121 <!-- @SystemApi Allows an application to use SurfaceFlinger's low level features. 3122 <p>Not for use by third-party applications. 3123 @hide 3124 --> 3125 <permission android:name="android.permission.ACCESS_SURFACE_FLINGER" 3126 android:protectionLevel="signature" /> 3127 3128 <!-- @SystemApi Allows an application to take screen shots and more generally 3129 get access to the frame buffer data. 3130 <p>Not for use by third-party applications. --> 3131 <permission android:name="android.permission.READ_FRAME_BUFFER" 3132 android:protectionLevel="signature|privileged" /> 3133 3134 <!-- Allows an application to use InputFlinger's low level features. 3135 @hide --> 3136 <permission android:name="android.permission.ACCESS_INPUT_FLINGER" 3137 android:protectionLevel="signature" /> 3138 3139 <!-- Allows an application to disable/enable input devices. 3140 Could be used to prevent unwanted touch events 3141 on a touchscreen, for example during swimming or rain. 3142 @hide --> 3143 <permission android:name="android.permission.DISABLE_INPUT_DEVICE" 3144 android:protectionLevel="signature" /> 3145 3146 <!-- Allows an application to configure and connect to Wifi displays 3147 @hide --> 3148 <permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY" 3149 android:protectionLevel="signature" /> 3150 3151 <!-- Allows an application to control low-level features of Wifi displays 3152 such as opening an RTSP socket. This permission should only be used 3153 by the display manager. 3154 @hide --> 3155 <permission android:name="android.permission.CONTROL_WIFI_DISPLAY" 3156 android:protectionLevel="signature" /> 3157 3158 <!-- Allows an application to control the color modes set for displays system-wide. 3159 <p>Not for use by third-party applications.</p> 3160 @hide --> 3161 <permission android:name="android.permission.CONFIGURE_DISPLAY_COLOR_MODE" 3162 android:protectionLevel="signature" /> 3163 3164 <!-- Allows an application to control the color saturation of the display. 3165 @hide 3166 @SystemApi --> 3167 <permission android:name="android.permission.CONTROL_DISPLAY_SATURATION" 3168 android:protectionLevel="signature|privileged" /> 3169 3170 <!-- Allows an application to collect usage infomation about brightness slider changes. 3171 <p>Not for use by third-party applications.</p> 3172 @hide 3173 @SystemApi 3174 @TestApi --> 3175 <permission android:name="android.permission.BRIGHTNESS_SLIDER_USAGE" 3176 android:protectionLevel="signature|privileged|development" /> 3177 3178 <!-- Allows an application to collect ambient light stats. 3179 <p>Not for use by third party applications.</p> 3180 @hide 3181 @SystemApi --> 3182 <permission android:name="android.permission.ACCESS_AMBIENT_LIGHT_STATS" 3183 android:protectionLevel="signature|privileged|development" /> 3184 3185 <!-- Allows an application to modify the display brightness configuration 3186 @hide 3187 @SystemApi 3188 @TestApi --> 3189 <permission android:name="android.permission.CONFIGURE_DISPLAY_BRIGHTNESS" 3190 android:protectionLevel="signature|privileged|development" /> 3191 3192 <!-- Allows an application to control the system's display brightness 3193 @hide --> 3194 <permission android:name="android.permission.CONTROL_DISPLAY_BRIGHTNESS" 3195 android:protectionLevel="signature" /> 3196 3197 <!-- @SystemApi Allows an application to control VPN. 3198 <p>Not for use by third-party applications.</p> 3199 @hide --> 3200 <permission android:name="android.permission.CONTROL_VPN" 3201 android:protectionLevel="signature|privileged" /> 3202 <uses-permission android:name="android.permission.CONTROL_VPN" /> 3203 3204 <!-- @SystemApi Allows an application to capture audio output. 3205 <p>Not for use by third-party applications.</p> --> 3206 <permission android:name="android.permission.CAPTURE_AUDIO_OUTPUT" 3207 android:protectionLevel="signature|privileged" /> 3208 3209 <!-- @SystemApi Allows an application to capture audio for hotword detection. 3210 <p>Not for use by third-party applications.</p> 3211 @hide --> 3212 <permission android:name="android.permission.CAPTURE_AUDIO_HOTWORD" 3213 android:protectionLevel="signature|privileged" /> 3214 3215 <!-- @SystemApi Allows an application to modify audio routing and override policy decisions. 3216 <p>Not for use by third-party applications.</p> 3217 @hide --> 3218 <permission android:name="android.permission.MODIFY_AUDIO_ROUTING" 3219 android:protectionLevel="signature|privileged" /> 3220 3221 <!-- @SystemApi Allows an application to capture video output. 3222 <p>Not for use by third-party applications.</p> --> 3223 <permission android:name="android.permission.CAPTURE_VIDEO_OUTPUT" 3224 android:protectionLevel="signature|privileged" /> 3225 3226 <!-- @SystemApi Allows an application to capture secure video output. 3227 <p>Not for use by third-party applications.</p> --> 3228 <permission android:name="android.permission.CAPTURE_SECURE_VIDEO_OUTPUT" 3229 android:protectionLevel="signature|privileged" /> 3230 3231 <!-- @SystemApi Allows an application to know what content is playing and control its playback. 3232 <p>Not for use by third-party applications due to privacy of media consumption</p> --> 3233 <permission android:name="android.permission.MEDIA_CONTENT_CONTROL" 3234 android:protectionLevel="signature|privileged" /> 3235 3236 <!-- @SystemApi @hide Allows an application to set the volume key long-press listener. 3237 <p>When it's set, the application will receive the volume key long-press event 3238 instead of changing volume.</p> 3239 <p>Not for use by third-party applications</p> --> 3240 <permission android:name="android.permission.SET_VOLUME_KEY_LONG_PRESS_LISTENER" 3241 android:protectionLevel="signature|privileged|development" /> 3242 3243 <!-- @SystemApi @hide Allows an application to set media key event listener. 3244 <p>When it's set, the application will receive the media key event before 3245 any other media sessions. If the event is handled by the listener, other sessions 3246 cannot get the event.</p> 3247 <p>Not for use by third-party applications</p> --> 3248 <permission android:name="android.permission.SET_MEDIA_KEY_LISTENER" 3249 android:protectionLevel="signature|privileged|development" /> 3250 3251 <!-- @SystemApi Required to be able to disable the device (very dangerous!). 3252 <p>Not for use by third-party applications. 3253 @hide 3254 --> 3255 <permission android:name="android.permission.BRICK" 3256 android:protectionLevel="signature" /> 3257 3258 <!-- @SystemApi Required to be able to reboot the device. 3259 <p>Not for use by third-party applications. --> 3260 <permission android:name="android.permission.REBOOT" 3261 android:protectionLevel="signature|privileged" /> 3262 3263 <!-- @SystemApi Allows low-level access to power management. 3264 <p>Not for use by third-party applications. 3265 @hide 3266 --> 3267 <permission android:name="android.permission.DEVICE_POWER" 3268 android:protectionLevel="signature" /> 3269 3270 <!-- Allows access to the PowerManager.userActivity function. 3271 <p>Not for use by third-party applications. @hide @SystemApi --> 3272 <permission android:name="android.permission.USER_ACTIVITY" 3273 android:protectionLevel="signature|privileged" /> 3274 3275 <!-- @hide Allows low-level access to tun tap driver --> 3276 <permission android:name="android.permission.NET_TUNNELING" 3277 android:protectionLevel="signature" /> 3278 3279 <!-- Run as a manufacturer test application, running as the root user. 3280 Only available when the device is running in manufacturer test mode. 3281 <p>Not for use by third-party applications. 3282 --> 3283 <permission android:name="android.permission.FACTORY_TEST" 3284 android:protectionLevel="signature" /> 3285 3286 <!-- Allows an application to broadcast a notification that an application 3287 package has been removed. 3288 <p>Not for use by third-party applications. 3289 --> 3290 <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED" 3291 android:protectionLevel="signature" /> 3292 3293 <!-- Allows an application to broadcast an SMS receipt notification. 3294 <p>Not for use by third-party applications. 3295 --> 3296 <permission android:name="android.permission.BROADCAST_SMS" 3297 android:protectionLevel="signature" /> 3298 3299 <!-- Allows an application to broadcast a WAP PUSH receipt notification. 3300 <p>Not for use by third-party applications. 3301 --> 3302 <permission android:name="android.permission.BROADCAST_WAP_PUSH" 3303 android:protectionLevel="signature" /> 3304 3305 <!-- @SystemApi Allows an application to broadcast privileged networking requests. 3306 <p>Not for use by third-party applications. 3307 @hide 3308 @deprecated Use {@link android.Manifest.permission#REQUEST_NETWORK_SCORES} instead 3309 --> 3310 <permission android:name="android.permission.BROADCAST_NETWORK_PRIVILEGED" 3311 android:protectionLevel="signature|privileged" /> 3312 3313 <!-- @SystemApi Not for use by third-party applications. --> 3314 <permission android:name="android.permission.MASTER_CLEAR" 3315 android:protectionLevel="signature|privileged" /> 3316 3317 <!-- @SystemApi Allows an application to call any phone number, including emergency 3318 numbers, without going through the Dialer user interface for the user 3319 to confirm the call being placed. 3320 <p>Not for use by third-party applications. --> 3321 <permission android:name="android.permission.CALL_PRIVILEGED" 3322 android:protectionLevel="signature|privileged" /> 3323 3324 <!-- @SystemApi Allows an application to perform CDMA OTA provisioning @hide --> 3325 <permission android:name="android.permission.PERFORM_CDMA_PROVISIONING" 3326 android:protectionLevel="signature|privileged" /> 3327 3328 <!-- @SystemApi Allows an application to perform SIM Activation @hide --> 3329 <permission android:name="android.permission.PERFORM_SIM_ACTIVATION" 3330 android:protectionLevel="signature|privileged" /> 3331 3332 <!-- @SystemApi Allows enabling/disabling location update notifications from 3333 the radio. 3334 <p>Not for use by third-party applications. --> 3335 <permission android:name="android.permission.CONTROL_LOCATION_UPDATES" 3336 android:protectionLevel="signature|privileged" /> 3337 3338 <!-- @SystemApi Allows read/write access to the "properties" table in the checkin 3339 database, to change values that get uploaded. 3340 <p>Not for use by third-party applications. --> 3341 <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES" 3342 android:protectionLevel="signature|privileged" /> 3343 3344 <!-- @SystemApi Allows an application to collect component usage 3345 statistics 3346 <p>Declaring the permission implies intention to use the API and the user of the 3347 device can grant permission through the Settings application. --> 3348 <permission android:name="android.permission.PACKAGE_USAGE_STATS" 3349 android:protectionLevel="signature|privileged|development|appop" /> 3350 <uses-permission android:name="android.permission.PACKAGE_USAGE_STATS" /> 3351 3352 <!-- @hide @SystemApi Allows an application to observe usage time of apps. The app can register 3353 for callbacks when apps reach a certain usage time limit, etc. --> 3354 <permission android:name="android.permission.OBSERVE_APP_USAGE" 3355 android:protectionLevel="signature|privileged" /> 3356 3357 <!-- @hide @SystemApi Allows an application to change the app idle state of an app. 3358 <p>Not for use by third-party applications. --> 3359 <permission android:name="android.permission.CHANGE_APP_IDLE_STATE" 3360 android:protectionLevel="signature|privileged" /> 3361 3362 <!-- @hide @SystemApi Allows an application to temporarily whitelist an inactive app to 3363 access the network and acquire wakelocks. 3364 <p>Not for use by third-party applications. --> 3365 <permission android:name="android.permission.CHANGE_DEVICE_IDLE_TEMP_WHITELIST" 3366 android:protectionLevel="signature|privileged" /> 3367 3368 <!-- Permission an application must hold in order to use 3369 {@link android.provider.Settings#ACTION_REQUEST_IGNORE_BATTERY_OPTIMIZATIONS}. 3370 This is a normal permission: an app requesting it will always be granted the 3371 permission, without the user needing to approve or see it. --> 3372 <permission android:name="android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS" 3373 android:label="@string/permlab_requestIgnoreBatteryOptimizations" 3374 android:description="@string/permdesc_requestIgnoreBatteryOptimizations" 3375 android:protectionLevel="normal" /> 3376 3377 <!-- @SystemApi Allows an application to collect battery statistics --> 3378 <permission android:name="android.permission.BATTERY_STATS" 3379 android:protectionLevel="signature|privileged|development" /> 3380 3381 <!--Allows an application to manage statscompanion. 3382 <p>Not for use by third-party applications. 3383 @hide --> 3384 <permission android:name="android.permission.STATSCOMPANION" 3385 android:protectionLevel="signature" /> 3386 3387 <!-- @SystemApi Allows an application to control the backup and restore process. 3388 <p>Not for use by third-party applications. 3389 @hide pending API council --> 3390 <permission android:name="android.permission.BACKUP" 3391 android:protectionLevel="signature|privileged" /> 3392 3393 <!-- @SystemApi Allows application to manage 3394 {@link android.security.keystore.recovery.RecoveryController}. 3395 <p>Not for use by third-party applications. 3396 @hide --> 3397 <permission android:name="android.permission.RECOVER_KEYSTORE" 3398 android:protectionLevel="signature|privileged" /> 3399 3400 <!-- Allows a package to launch the secure full-backup confirmation UI. 3401 ONLY the system process may hold this permission. 3402 @hide --> 3403 <permission android:name="android.permission.CONFIRM_FULL_BACKUP" 3404 android:protectionLevel="signature" /> 3405 3406 <!-- @SystemApi Must be required by a {@link android.widget.RemoteViewsService}, 3407 to ensure that only the system can bind to it. --> 3408 <permission android:name="android.permission.BIND_REMOTEVIEWS" 3409 android:protectionLevel="signature|privileged" /> 3410 3411 <!-- @SystemApi Allows an application to tell the AppWidget service which application 3412 can access AppWidget's data. The normal user flow is that a user 3413 picks an AppWidget to go into a particular host, thereby giving that 3414 host application access to the private data from the AppWidget app. 3415 An application that has this permission should honor that contract. 3416 <p>Not for use by third-party applications. --> 3417 <permission android:name="android.permission.BIND_APPWIDGET" 3418 android:protectionLevel="signature|privileged" /> 3419 3420 <!-- @hide Allows sysui to manage user grants of slice permissions. --> 3421 <permission android:name="android.permission.MANAGE_SLICE_PERMISSIONS" 3422 android:protectionLevel="signature" /> 3423 3424 <!-- @SystemApi Private permission, to restrict who can bring up a dialog to add a new 3425 keyguard widget 3426 @hide --> 3427 <permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET" 3428 android:protectionLevel="signature|privileged" /> 3429 3430 <!-- @SystemApi Internal permission allowing an application to query/set which 3431 applications can bind AppWidgets. 3432 @hide --> 3433 <permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS" 3434 android:protectionLevel="signature|privileged" /> 3435 3436 <!-- Allows applications to change the background data setting. 3437 <p>Not for use by third-party applications. 3438 @hide pending API council --> 3439 <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING" 3440 android:protectionLevel="signature" /> 3441 3442 <!-- @SystemApi This permission can be used on content providers to allow the global 3443 search system to access their data. Typically it used when the 3444 provider has some permissions protecting it (which global search 3445 would not be expected to hold), and added as a read-only permission 3446 to the path in the provider where global search queries are 3447 performed. This permission can not be held by regular applications; 3448 it is used by applications to protect themselves from everyone else 3449 besides global search. --> 3450 <permission android:name="android.permission.GLOBAL_SEARCH" 3451 android:protectionLevel="signature|privileged" /> 3452 3453 <!-- Internal permission protecting access to the global search 3454 system: ensures that only the system can access the provider 3455 to perform queries (since this otherwise provides unrestricted 3456 access to a variety of content providers), and to write the 3457 search statistics (to keep applications from gaming the source 3458 ranking). 3459 @hide --> 3460 <permission android:name="android.permission.GLOBAL_SEARCH_CONTROL" 3461 android:protectionLevel="signature" /> 3462 3463 <!-- @SystemApi Internal permission to allows an application to read indexable data. 3464 @hide --> 3465 <permission android:name="android.permission.READ_SEARCH_INDEXABLES" 3466 android:protectionLevel="signature|privileged" /> 3467 3468 <!-- @SystemApi Internal permission to allows an application to bind to suggestion service. 3469 @hide --> 3470 <permission android:name="android.permission.BIND_SETTINGS_SUGGESTIONS_SERVICE" 3471 android:protectionLevel="signature" /> 3472 3473 <!-- @SystemApi Allows applications to set a live wallpaper. 3474 @hide XXX Change to signature once the picker is moved to its 3475 own apk as Ghod Intended. --> 3476 <permission android:name="android.permission.SET_WALLPAPER_COMPONENT" 3477 android:protectionLevel="signature|privileged" /> 3478 3479 <!-- @SystemApi Allows applications to read dream settings and dream state. 3480 @hide --> 3481 <permission android:name="android.permission.READ_DREAM_STATE" 3482 android:protectionLevel="signature|privileged" /> 3483 3484 <!-- @SystemApi Allows applications to write dream settings, and start or stop dreaming. 3485 @hide --> 3486 <permission android:name="android.permission.WRITE_DREAM_STATE" 3487 android:protectionLevel="signature|privileged" /> 3488 3489 <!-- @SystemApi Allow an application to read and write the cache partition. 3490 @hide --> 3491 <permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM" 3492 android:protectionLevel="signature|privileged" /> 3493 3494 <!-- Must be required by default container service so that only 3495 the system can bind to it and use it to copy 3496 protected data to secure containers or files 3497 accessible to the system. 3498 @hide --> 3499 <permission android:name="android.permission.COPY_PROTECTED_DATA" 3500 android:protectionLevel="signature" /> 3501 3502 <!-- @SystemApi Internal permission protecting access to the encryption methods 3503 @hide 3504 --> 3505 <permission android:name="android.permission.CRYPT_KEEPER" 3506 android:protectionLevel="signature|privileged" /> 3507 3508 <!-- @SystemApi Allows an application to read historical network usage for 3509 specific networks and applications. @hide --> 3510 <permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY" 3511 android:protectionLevel="signature|privileged" /> 3512 3513 <!-- Allows an application to manage network policies (such as warning and disable 3514 limits) and to define application-specific rules. @hide --> 3515 <permission android:name="android.permission.MANAGE_NETWORK_POLICY" 3516 android:protectionLevel="signature" /> 3517 3518 <!-- @SystemApi @hide @deprecated use UPDATE_DEVICE_STATS instead --> 3519 <permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING" 3520 android:protectionLevel="signature|privileged" /> 3521 3522 <!-- @SystemApi @hide Allows an application to manage carrier subscription plans. --> 3523 <permission android:name="android.permission.MANAGE_SUBSCRIPTION_PLANS" 3524 android:protectionLevel="signature|privileged" /> 3525 3526 <!-- C2DM permission. 3527 @hide Used internally. 3528 --> 3529 <permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE" 3530 android:protectionLevel="signature" /> 3531 <uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/> 3532 3533 <!-- @SystemApi @hide Package verifier needs to have this permission before the PackageManager will 3534 trust it to verify packages. 3535 --> 3536 <permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT" 3537 android:protectionLevel="signature|privileged" /> 3538 3539 <!-- Must be required by package verifier receiver, to ensure that only the 3540 system can interact with it. 3541 @hide 3542 --> 3543 <permission android:name="android.permission.BIND_PACKAGE_VERIFIER" 3544 android:protectionLevel="signature" /> 3545 3546 <!-- @SystemApi @hide Allows an application to mark other applications as harmful --> 3547 <permission android:name="android.permission.SET_HARMFUL_APP_WARNINGS" 3548 android:protectionLevel="signature|verifier" /> 3549 3550 <!-- @SystemApi @hide Intent filter verifier needs to have this permission before the 3551 PackageManager will trust it to verify intent filters. 3552 --> 3553 <permission android:name="android.permission.INTENT_FILTER_VERIFICATION_AGENT" 3554 android:protectionLevel="signature|privileged" /> 3555 3556 <!-- Must be required by intent filter verifier receiver, to ensure that only the 3557 system can interact with it. 3558 @hide 3559 --> 3560 <permission android:name="android.permission.BIND_INTENT_FILTER_VERIFIER" 3561 android:protectionLevel="signature" /> 3562 3563 <!-- @SystemApi Allows applications to access serial ports via the SerialManager. 3564 @hide --> 3565 <permission android:name="android.permission.SERIAL_PORT" 3566 android:protectionLevel="signature|privileged" /> 3567 3568 <!-- Allows the holder to access content providers from outside an ApplicationThread. 3569 This permission is enforced by the ActivityManagerService on the corresponding APIs, 3570 in particular ActivityManagerService#getContentProviderExternal(String) and 3571 ActivityManagerService#removeContentProviderExternal(String). 3572 @hide 3573 --> 3574 <permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY" 3575 android:protectionLevel="signature" /> 3576 3577 <!-- @SystemApi Allows an application to hold an UpdateLock, recommending that a headless 3578 OTA reboot *not* occur while the lock is held. 3579 @hide --> 3580 <permission android:name="android.permission.UPDATE_LOCK" 3581 android:protectionLevel="signature|privileged" /> 3582 3583 <!-- @SystemApi Allows an application to read the current set of notifications, including 3584 any metadata and intents attached. 3585 @hide --> 3586 <permission android:name="android.permission.ACCESS_NOTIFICATIONS" 3587 android:protectionLevel="signature|privileged|appop" /> 3588 3589 <!-- Marker permission for applications that wish to access notification policy. 3590 <p>Protection level: normal 3591 --> 3592 <permission android:name="android.permission.ACCESS_NOTIFICATION_POLICY" 3593 android:description="@string/permdesc_access_notification_policy" 3594 android:label="@string/permlab_access_notification_policy" 3595 android:protectionLevel="normal" /> 3596 3597 <!-- Allows modification of do not disturb rules and policies. Only allowed for system 3598 processes. 3599 @hide --> 3600 <permission android:name="android.permission.MANAGE_NOTIFICATIONS" 3601 android:protectionLevel="signature" /> 3602 3603 <!-- Allows notifications to be colorized 3604 <p>Not for use by third-party applications. @hide --> 3605 <permission android:name="android.permission.USE_COLORIZED_NOTIFICATIONS" 3606 android:protectionLevel="signature|setup" /> 3607 3608 <!-- Allows access to keyguard secure storage. Only allowed for system processes. 3609 @hide --> 3610 <permission android:name="android.permission.ACCESS_KEYGUARD_SECURE_STORAGE" 3611 android:protectionLevel="signature" /> 3612 3613 <!-- Allows managing (adding, removing) fingerprint templates. Reserved for the system. @hide --> 3614 <permission android:name="android.permission.MANAGE_FINGERPRINT" 3615 android:protectionLevel="signature|privileged" /> 3616 3617 <!-- Allows an app to reset fingerprint attempt counter. Reserved for the system. @hide --> 3618 <permission android:name="android.permission.RESET_FINGERPRINT_LOCKOUT" 3619 android:protectionLevel="signature" /> 3620 3621 <!-- Allows an application to control keyguard. Only allowed for system processes. 3622 @hide --> 3623 <permission android:name="android.permission.CONTROL_KEYGUARD" 3624 android:protectionLevel="signature" /> 3625 3626 <!-- Allows an application to listen to trust changes. Only allowed for system processes. 3627 @hide --> 3628 <permission android:name="android.permission.TRUST_LISTENER" 3629 android:protectionLevel="signature" /> 3630 3631 <!-- @SystemApi Allows an application to provide a trust agent. 3632 @hide For security reasons, this is a platform-only permission. --> 3633 <permission android:name="android.permission.PROVIDE_TRUST_AGENT" 3634 android:protectionLevel="signature|privileged" /> 3635 3636 <!-- @SystemApi Allows an application to show a message 3637 on the keyguard when asking to dismiss it. 3638 @hide For security reasons, this is a platform-only permission. --> 3639 <permission android:name="android.permission.SHOW_KEYGUARD_MESSAGE" 3640 android:protectionLevel="signature|privileged" /> 3641 3642 <!-- Allows an application to launch the trust agent settings activity. 3643 @hide --> 3644 <permission android:name="android.permission.LAUNCH_TRUST_AGENT_SETTINGS" 3645 android:protectionLevel="signature|privileged" /> 3646 3647 <!-- @SystemApi Must be required by an {@link 3648 android.service.trust.TrustAgentService}, 3649 to ensure that only the system can bind to it. 3650 @hide --> 3651 <permission android:name="android.permission.BIND_TRUST_AGENT" 3652 android:protectionLevel="signature" /> 3653 3654 <!-- Must be required by an {@link 3655 android.service.notification.NotificationListenerService}, 3656 to ensure that only the system can bind to it. 3657 <p>Protection level: signature 3658 --> 3659 <permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE" 3660 android:protectionLevel="signature" /> 3661 3662 <!-- @SystemApi Must be required by an {@link 3663 android.service.notification.NotificationAssistantService} to ensure that only the system 3664 can bind to it. 3665 <p>Protection level: signature 3666 @hide 3667 --> 3668 <permission android:name="android.permission.BIND_NOTIFICATION_ASSISTANT_SERVICE" 3669 android:protectionLevel="signature" /> 3670 3671 <!-- Must be required by a {@link 3672 android.service.chooser.ChooserTargetService}, to ensure that 3673 only the system can bind to it. 3674 <p>Protection level: signature 3675 --> 3676 <permission android:name="android.permission.BIND_CHOOSER_TARGET_SERVICE" 3677 android:protectionLevel="signature" /> 3678 3679 <!-- @SystemApi Must be held by services that extend 3680 {@link android.service.resolver.ResolverRankerService}. 3681 <p>Protection level: signature|privileged 3682 @hide 3683 --> 3684 <permission android:name="android.permission.PROVIDE_RESOLVER_RANKER_SERVICE" 3685 android:protectionLevel="signature|privileged" /> 3686 3687 <!-- @SystemApi Must be required by services that extend 3688 {@link android.service.resolver.ResolverRankerService}, to ensure that only the system can 3689 bind to them. 3690 <p>Protection level: signature 3691 @hide 3692 --> 3693 <permission android:name="android.permission.BIND_RESOLVER_RANKER_SERVICE" 3694 android:protectionLevel="signature" /> 3695 3696 <!-- Must be required by a {@link 3697 android.service.notification.ConditionProviderService}, 3698 to ensure that only the system can bind to it. 3699 <p>Protection level: signature 3700 --> 3701 <permission android:name="android.permission.BIND_CONDITION_PROVIDER_SERVICE" 3702 android:protectionLevel="signature" /> 3703 3704 <!-- Must be required by an {@link android.service.dreams.DreamService}, 3705 to ensure that only the system can bind to it. 3706 <p>Protection level: signature 3707 --> 3708 <permission android:name="android.permission.BIND_DREAM_SERVICE" 3709 android:protectionLevel="signature" /> 3710 3711 <!-- Must be required by an {@link android.app.usage.CacheQuotaService} to ensure that only the 3712 system can bind to it. 3713 @hide This is not a third-party API (intended for OEMs and system apps). 3714 --> 3715 <permission android:name="android.permission.BIND_CACHE_QUOTA_SERVICE" 3716 android:protectionLevel="signature" /> 3717 3718 <!-- @SystemApi Allows an application to call into a carrier setup flow. It is up to the 3719 carrier setup application to enforce that this permission is required 3720 @hide This is not a third-party API (intended for OEMs and system apps). --> 3721 <permission android:name="android.permission.INVOKE_CARRIER_SETUP" 3722 android:protectionLevel="signature|privileged" /> 3723 3724 <!-- @SystemApi Allows an application to listen for network condition observations. 3725 @hide This is not a third-party API (intended for system apps). --> 3726 <permission android:name="android.permission.ACCESS_NETWORK_CONDITIONS" 3727 android:protectionLevel="signature|privileged" /> 3728 3729 <!-- @SystemApi Allows an application to provision and access DRM certificates 3730 @hide This is not a third-party API (intended for system apps). --> 3731 <permission android:name="android.permission.ACCESS_DRM_CERTIFICATES" 3732 android:protectionLevel="signature|privileged" /> 3733 3734 <!-- Api Allows an application to manage media projection sessions. 3735 @hide This is not a third-party API (intended for system apps). --> 3736 <permission android:name="android.permission.MANAGE_MEDIA_PROJECTION" 3737 android:protectionLevel="signature" /> 3738 3739 <!-- @SystemApi Allows an application to read install sessions 3740 @hide This is not a third-party API (intended for system apps). --> 3741 <permission android:name="android.permission.READ_INSTALL_SESSIONS" 3742 android:label="@string/permlab_readInstallSessions" 3743 android:description="@string/permdesc_readInstallSessions" 3744 android:protectionLevel="normal"/> 3745 3746 <!-- @SystemApi Allows an application to remove DRM certificates 3747 @hide This is not a third-party API (intended for system apps). --> 3748 <permission android:name="android.permission.REMOVE_DRM_CERTIFICATES" 3749 android:protectionLevel="signature|privileged" /> 3750 3751 <!-- @deprecated Use {@link android.Manifest.permission#BIND_CARRIER_SERVICES} instead --> 3752 <permission android:name="android.permission.BIND_CARRIER_MESSAGING_SERVICE" 3753 android:protectionLevel="signature|privileged" /> 3754 3755 <!-- Allows an application to interact with the currently active 3756 {@link android.service.voice.VoiceInteractionService}. 3757 @hide --> 3758 <permission android:name="android.permission.ACCESS_VOICE_INTERACTION_SERVICE" 3759 android:protectionLevel="signature" /> 3760 3761 <!-- The system process that is allowed to bind to services in carrier apps will 3762 have this permission. Carrier apps should use this permission to protect 3763 their services that only the system is allowed to bind to. 3764 <p>Protection level: signature|privileged 3765 --> 3766 <permission android:name="android.permission.BIND_CARRIER_SERVICES" 3767 android:label="@string/permlab_bindCarrierServices" 3768 android:description="@string/permdesc_bindCarrierServices" 3769 android:protectionLevel="signature|privileged" /> 3770 3771 <!-- Allows an application to query whether DO_NOT_ASK_CREDENTIALS_ON_BOOT 3772 flag is set. 3773 @hide --> 3774 <permission android:name="android.permission.QUERY_DO_NOT_ASK_CREDENTIALS_ON_BOOT" 3775 android:protectionLevel="signature" /> 3776 3777 <!-- @SystemApi Allows applications to kill UIDs. 3778 <p>Not for use by third-party applications. 3779 @hide --> 3780 <permission android:name="android.permission.KILL_UID" 3781 android:protectionLevel="signature|installer" /> 3782 3783 <!-- @SystemApi Allows applications to read the local WiFi and Bluetooth MAC address. 3784 @hide --> 3785 <permission android:name="android.permission.LOCAL_MAC_ADDRESS" 3786 android:protectionLevel="signature|privileged" /> 3787 <uses-permission android:name="android.permission.LOCAL_MAC_ADDRESS"/> 3788 3789 <!-- @SystemApi Allows access to MAC addresses of WiFi and Bluetooth peer devices. 3790 @hide --> 3791 <permission android:name="android.permission.PEERS_MAC_ADDRESS" 3792 android:protectionLevel="signature|setup" /> 3793 3794 <!-- Allows the Nfc stack to dispatch Nfc messages to applications. Applications 3795 can use this permission to ensure incoming Nfc messages are from the Nfc stack 3796 and not simulated by another application. 3797 @hide --> 3798 <permission android:name="android.permission.DISPATCH_NFC_MESSAGE" 3799 android:protectionLevel="signature|privileged" /> 3800 3801 <!-- @SystemApi Allows changing day / night mode when system is configured with 3802 config_lockDayNightMode set to true. If requesting app does not have permission, 3803 it will be ignored. 3804 @hide --> 3805 <permission android:name="android.permission.MODIFY_DAY_NIGHT_MODE" 3806 android:protectionLevel="signature|privileged" /> 3807 3808 <!-- The system process is explicitly the only one allowed to launch the 3809 confirmation UI for full backup/restore --> 3810 <uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/> 3811 3812 <!-- Allows the holder to access and manage instant applications on the device. 3813 @hide --> 3814 <permission android:name="android.permission.ACCESS_INSTANT_APPS" 3815 android:protectionLevel="signature|installer|verifier" /> 3816 <uses-permission android:name="android.permission.ACCESS_INSTANT_APPS"/> 3817 3818 <!-- Allows the holder to view the instant applications on the device. 3819 @hide --> 3820 <permission android:name="android.permission.VIEW_INSTANT_APPS" 3821 android:protectionLevel="signature|preinstalled" /> 3822 3823 <!-- Allows the holder to manage whether the system can bind to services 3824 provided by instant apps. This permission is intended to protect 3825 test/development fucntionality and should be used only in such cases. 3826 @hide --> 3827 <permission android:name="android.permission.MANAGE_BIND_INSTANT_SERVICE" 3828 android:protectionLevel="signature" /> 3829 3830 <!-- Allows receiving the usage of media resource e.g. video/audio codec and 3831 graphic memory. 3832 @hide --> 3833 <permission android:name="android.permission.RECEIVE_MEDIA_RESOURCE_USAGE" 3834 android:protectionLevel="signature|privileged" /> 3835 3836 <!-- Must be required by system/priv apps when accessing the sound trigger 3837 APIs given by {@link SoundTriggerManager}. 3838 @hide 3839 @SystemApi --> 3840 <permission android:name="android.permission.MANAGE_SOUND_TRIGGER" 3841 android:protectionLevel="signature|privileged" /> 3842 3843 <!-- Must be required by system/priv apps implementing sound trigger detection services 3844 @hide 3845 @SystemApi --> 3846 <permission android:name="android.permission.BIND_SOUND_TRIGGER_DETECTION_SERVICE" 3847 android:protectionLevel="signature" /> 3848 3849 <!-- @SystemApi Allows trusted applications to dispatch managed provisioning message to Managed 3850 Provisioning app. If requesting app does not have permission, it will be ignored. 3851 @hide --> 3852 <permission android:name="android.permission.DISPATCH_PROVISIONING_MESSAGE" 3853 android:protectionLevel="signature|privileged" /> 3854 3855 <!-- Allows the holder to read blocked numbers. See 3856 {@link android.provider.BlockedNumberContract}. 3857 @hide --> 3858 <permission android:name="android.permission.READ_BLOCKED_NUMBERS" 3859 android:protectionLevel="signature" /> 3860 3861 <!-- Allows the holder to write blocked numbers. See 3862 {@link android.provider.BlockedNumberContract}. 3863 @hide --> 3864 <permission android:name="android.permission.WRITE_BLOCKED_NUMBERS" 3865 android:protectionLevel="signature" /> 3866 3867 <!-- Must be required by an {@link android.service.vr.VrListenerService}, to ensure that only 3868 the system can bind to it. 3869 <p>Protection level: signature --> 3870 <permission android:name="android.permission.BIND_VR_LISTENER_SERVICE" 3871 android:protectionLevel="signature" /> 3872 3873 <!-- Must be required by system apps when accessing restricted VR APIs. 3874 @hide 3875 @SystemApi 3876 <p>Protection level: signature --> 3877 <permission android:name="android.permission.RESTRICTED_VR_ACCESS" 3878 android:protectionLevel="signature|preinstalled" /> 3879 3880 <!-- Required to make calls to {@link android.service.vr.IVrManager}. 3881 @hide --> 3882 <permission android:name="android.permission.ACCESS_VR_MANAGER" 3883 android:protectionLevel="signature" /> 3884 3885 <!-- Required to access VR-Mode state and state change events via {android.app.VrStateCallback} 3886 @hide --> 3887 <permission android:name="android.permission.ACCESS_VR_STATE" 3888 android:protectionLevel="signature|preinstalled" /> 3889 3890 <!-- Allows an application to whitelist tasks during lock task mode 3891 @hide <p>Not for use by third-party applications.</p> --> 3892 <permission android:name="android.permission.UPDATE_LOCK_TASK_PACKAGES" 3893 android:protectionLevel="signature|setup" /> 3894 3895 <!-- @SystemApi Allows an application to replace the app name displayed alongside notifications 3896 in the N-release and later. 3897 @hide <p>Not for use by third-party applications.</p> --> 3898 <permission android:name="android.permission.SUBSTITUTE_NOTIFICATION_APP_NAME" 3899 android:protectionLevel="signature|privileged" /> 3900 3901 <!-- @SystemApi Allows an application to show notifications before the device is provisioned. 3902 @hide <p>Not for use by third-party applications.</p> --> 3903 <permission android:name="android.permission.NOTIFICATION_DURING_SETUP" 3904 android:protectionLevel="signature|privileged" /> 3905 3906 <!-- @SystemApi Allows an application to manage auto-fill sessions. 3907 @hide <p>Not for use by third-party applications.</p> --> 3908 <permission android:name="android.permission.MANAGE_AUTO_FILL" 3909 android:protectionLevel="signature" /> 3910 3911 <!-- Allows an app to set the theme overlay in /vendor/overlay 3912 being used. 3913 @hide <p>Not for use by third-party applications.</p> --> 3914 <permission android:name="android.permission.MODIFY_THEME_OVERLAY" 3915 android:protectionLevel="signature" /> 3916 3917 <!-- Allows an instant app to create foreground services. --> 3918 <permission android:name="android.permission.INSTANT_APP_FOREGROUND_SERVICE" 3919 android:protectionLevel="signature|development|instant|appop" /> 3920 3921 <!-- Allows a regular application to use {@link android.app.Service#startForeground 3922 Service.startForeground}. 3923 <p>Protection level: normal 3924 --> 3925 <permission android:name="android.permission.FOREGROUND_SERVICE" 3926 android:description="@string/permdesc_foregroundService" 3927 android:label="@string/permlab_foregroundService" 3928 android:protectionLevel="normal|instant" /> 3929 3930 <!-- @SystemApi Allows to access all app shortcuts. 3931 @hide --> 3932 <permission android:name="android.permission.ACCESS_SHORTCUTS" 3933 android:protectionLevel="signature|textClassifier" /> 3934 3935 <!-- @SystemApi Allows unlimited calls to shortcut mutation APIs. 3936 @hide --> 3937 <permission android:name="android.permission.UNLIMITED_SHORTCUTS_API_CALLS" 3938 android:protectionLevel="signature|textClassifier" /> 3939 3940 <!-- @SystemApi Allows an application to read the runtime profiles of other apps. 3941 @hide <p>Not for use by third-party applications. --> 3942 <permission android:name="android.permission.READ_RUNTIME_PROFILES" 3943 android:protectionLevel="signature|privileged" /> 3944 3945 <!-- @hide Allows audio policy management. --> 3946 <permission android:name="android.permission.MANAGE_AUDIO_POLICY" 3947 android:protectionLevel="signature" /> 3948 3949 <!-- @SystemApi Allows an application to turn on / off quiet mode. 3950 @hide <p>Not for use by third-party applications. --> 3951 <permission android:name="android.permission.MODIFY_QUIET_MODE" 3952 android:protectionLevel="signature|privileged" /> 3953 3954 <!-- Allows internal management of the camera framework 3955 @hide --> 3956 <permission android:name="android.permission.MANAGE_CAMERA" 3957 android:protectionLevel="signature" /> 3958 3959 <!-- Allows an application to control remote animations. See 3960 {@link ActivityOptions#makeRemoteAnimation} 3961 @hide <p>Not for use by third-party applications. --> 3962 <permission android:name="android.permission.CONTROL_REMOTE_APP_TRANSITION_ANIMATIONS" 3963 android:protectionLevel="signature|privileged" /> 3964 3965 <!-- Allows an application to watch changes and/or active state of app ops. 3966 @hide <p>Not for use by third-party applications. --> 3967 <permission android:name="android.permission.WATCH_APPOPS" 3968 android:protectionLevel="signature" /> 3969 3970 <!-- Allows an application to directly open the "Open by default" page inside a package's 3971 Details screen. 3972 @hide <p>Not for use by third-party applications. --> 3973 <permission android:name="android.permission.OPEN_APPLICATION_DETAILS_OPEN_BY_DEFAULT_PAGE" 3974 android:protectionLevel="signature" /> 3975 3976 <!-- Allows hidden API checks to be disabled when starting a process. 3977 @hide <p>Not for use by third-party applications. --> 3978 <permission android:name="android.permission.DISABLE_HIDDEN_API_CHECKS" 3979 android:protectionLevel="signature" /> 3980 3981 <application android:process="system" 3982 android:persistent="true" 3983 android:hasCode="false" 3984 android:label="@string/android_system_label" 3985 android:allowClearUserData="false" 3986 android:backupAgent="com.android.server.backup.SystemBackupAgent" 3987 android:killAfterRestore="false" 3988 android:icon="@drawable/ic_launcher_android" 3989 android:supportsRtl="true" 3990 android:theme="@style/Theme.DeviceDefault.Light.DarkActionBar" 3991 android:defaultToDeviceProtectedStorage="true" 3992 android:directBootAware="true"> 3993 <activity android:name="com.android.internal.app.ChooserActivity" 3994 android:theme="@style/Theme.DeviceDefault.Resolver" 3995 android:finishOnCloseSystemDialogs="true" 3996 android:excludeFromRecents="true" 3997 android:documentLaunchMode="never" 3998 android:relinquishTaskIdentity="true" 3999 android:configChanges="screenSize|smallestScreenSize|screenLayout|orientation|keyboard|keyboardHidden" 4000 android:process=":ui" 4001 android:visibleToInstantApps="true"> 4002 <intent-filter> 4003 <action android:name="android.intent.action.CHOOSER" /> 4004 <category android:name="android.intent.category.DEFAULT" /> 4005 <category android:name="android.intent.category.VOICE" /> 4006 </intent-filter> 4007 </activity> 4008 <activity android:name="com.android.internal.app.AccessibilityButtonChooserActivity" 4009 android:exported="false" 4010 android:theme="@style/Theme.DeviceDefault.Resolver" 4011 android:finishOnCloseSystemDialogs="true" 4012 android:excludeFromRecents="true" 4013 android:documentLaunchMode="never" 4014 android:relinquishTaskIdentity="true" 4015 android:configChanges="screenSize|smallestScreenSize|screenLayout|orientation|keyboard|keyboardHidden" 4016 android:process=":ui" 4017 android:visibleToInstantApps="true"> 4018 <intent-filter> 4019 <action android:name="com.android.internal.intent.action.CHOOSE_ACCESSIBILITY_BUTTON" /> 4020 <category android:name="android.intent.category.DEFAULT" /> 4021 </intent-filter> 4022 </activity> 4023 <activity android:name="com.android.internal.app.IntentForwarderActivity" 4024 android:finishOnCloseSystemDialogs="true" 4025 android:theme="@style/Theme.NoDisplay" 4026 android:excludeFromRecents="true" 4027 android:label="@string/user_owner_label" 4028 android:exported="true" 4029 android:visibleToInstantApps="true" 4030 > 4031 </activity> 4032 <activity-alias android:name="com.android.internal.app.ForwardIntentToParent" 4033 android:targetActivity="com.android.internal.app.IntentForwarderActivity" 4034 android:exported="true" 4035 android:label="@string/user_owner_label"> 4036 </activity-alias> 4037 <activity-alias android:name="com.android.internal.app.ForwardIntentToManagedProfile" 4038 android:targetActivity="com.android.internal.app.IntentForwarderActivity" 4039 android:icon="@drawable/ic_corp_badge" 4040 android:exported="true" 4041 android:label="@string/managed_profile_label"> 4042 </activity-alias> 4043 <activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity" 4044 android:theme="@style/Theme.DeviceDefault.Light.Dialog" 4045 android:label="@string/heavy_weight_switcher_title" 4046 android:finishOnCloseSystemDialogs="true" 4047 android:excludeFromRecents="true" 4048 android:process=":ui"> 4049 </activity> 4050 <activity android:name="com.android.internal.app.PlatLogoActivity" 4051 android:theme="@style/Theme.Wallpaper.NoTitleBar.Fullscreen" 4052 android:configChanges="orientation|keyboardHidden" 4053 android:process=":ui"> 4054 </activity> 4055 <activity android:name="com.android.internal.app.DisableCarModeActivity" 4056 android:theme="@style/Theme.NoDisplay" 4057 android:excludeFromRecents="true" 4058 android:process=":ui"> 4059 </activity> 4060 <activity android:name="com.android.internal.app.DumpHeapActivity" 4061 android:theme="@style/Theme.Translucent.NoTitleBar" 4062 android:label="@string/dump_heap_title" 4063 android:finishOnCloseSystemDialogs="true" 4064 android:noHistory="true" 4065 android:excludeFromRecents="true" 4066 android:process=":ui"> 4067 </activity> 4068 <provider android:name="com.android.server.am.DumpHeapProvider" 4069 android:authorities="com.android.server.heapdump" 4070 android:grantUriPermissions="true" 4071 android:multiprocess="false" 4072 android:singleUser="true" /> 4073 4074 <activity android:name="android.accounts.ChooseAccountActivity" 4075 android:excludeFromRecents="true" 4076 android:exported="true" 4077 android:theme="@style/Theme.DeviceDefault.Light.Dialog" 4078 android:label="@string/choose_account_label" 4079 android:process=":ui" 4080 android:visibleToInstantApps="true"> 4081 </activity> 4082 4083 <activity android:name="android.accounts.ChooseTypeAndAccountActivity" 4084 android:excludeFromRecents="true" 4085 android:exported="true" 4086 android:theme="@style/Theme.DeviceDefault.Light.Dialog" 4087 android:label="@string/choose_account_label" 4088 android:process=":ui" 4089 android:visibleToInstantApps="true"> 4090 </activity> 4091 4092 <activity android:name="android.accounts.ChooseAccountTypeActivity" 4093 android:excludeFromRecents="true" 4094 android:theme="@style/Theme.DeviceDefault.Light.Dialog" 4095 android:label="@string/choose_account_label" 4096 android:process=":ui" 4097 android:visibleToInstantApps="true"> 4098 </activity> 4099 4100 <activity android:name="android.accounts.CantAddAccountActivity" 4101 android:excludeFromRecents="true" 4102 android:exported="true" 4103 android:theme="@style/Theme.DeviceDefault.Light.Dialog.NoActionBar" 4104 android:process=":ui"> 4105 </activity> 4106 4107 <activity android:name="android.accounts.GrantCredentialsPermissionActivity" 4108 android:excludeFromRecents="true" 4109 android:exported="true" 4110 android:theme="@style/Theme.DeviceDefault.Light.DialogWhenLarge" 4111 android:process=":ui" 4112 android:visibleToInstantApps="true"> 4113 </activity> 4114 4115 <activity android:name="android.content.SyncActivityTooManyDeletes" 4116 android:theme="@style/Theme.DeviceDefault.Light.Dialog" 4117 android:label="@string/sync_too_many_deletes" 4118 android:process=":ui"> 4119 </activity> 4120 4121 <activity android:name="com.android.internal.app.ShutdownActivity" 4122 android:permission="android.permission.SHUTDOWN" 4123 android:theme="@style/Theme.NoDisplay" 4124 android:excludeFromRecents="true"> 4125 <intent-filter> 4126 <action android:name="com.android.internal.intent.action.REQUEST_SHUTDOWN" /> 4127 <category android:name="android.intent.category.DEFAULT" /> 4128 </intent-filter> 4129 <intent-filter> 4130 <action android:name="android.intent.action.REBOOT" /> 4131 <category android:name="android.intent.category.DEFAULT" /> 4132 </intent-filter> 4133 </activity> 4134 4135 <activity android:name="com.android.internal.app.NetInitiatedActivity" 4136 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert" 4137 android:excludeFromRecents="true" 4138 android:process=":ui"> 4139 </activity> 4140 4141 <activity android:name="com.android.internal.app.SystemUserHomeActivity" 4142 android:enabled="false" 4143 android:process=":ui" 4144 android:systemUserOnly="true" 4145 android:theme="@style/Theme.Translucent.NoTitleBar"> 4146 <intent-filter android:priority="-100"> 4147 <action android:name="android.intent.action.MAIN" /> 4148 <category android:name="android.intent.category.HOME" /> 4149 </intent-filter> 4150 </activity> 4151 4152 <!-- Activity to prompt user if it's ok to create a new user sandbox for a 4153 specified account. --> 4154 <activity android:name="com.android.internal.app.ConfirmUserCreationActivity" 4155 android:excludeFromRecents="true" 4156 android:process=":ui" 4157 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert"> 4158 <intent-filter android:priority="1000"> 4159 <action android:name="android.os.action.CREATE_USER" /> 4160 <category android:name="android.intent.category.DEFAULT" /> 4161 </intent-filter> 4162 </activity> 4163 4164 <activity android:name="com.android.internal.app.UnlaunchableAppActivity" 4165 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert" 4166 android:excludeFromRecents="true" 4167 android:process=":ui"> 4168 </activity> 4169 4170 <activity android:name="com.android.settings.notification.NotificationAccessConfirmationActivity" 4171 android:theme="@android:style/Theme.DeviceDefault.Light.Dialog.Alert" 4172 android:excludeFromRecents="true"> 4173 </activity> 4174 4175 <activity android:name="com.android.internal.app.HarmfulAppWarningActivity" 4176 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert" 4177 android:excludeFromRecents="true" 4178 android:process=":ui" 4179 android:label="@string/harmful_app_warning_title" 4180 android:exported="false"> 4181 </activity> 4182 4183 <receiver android:name="com.android.server.BootReceiver" 4184 android:systemUserOnly="true"> 4185 <intent-filter android:priority="1000"> 4186 <action android:name="android.intent.action.BOOT_COMPLETED" /> 4187 </intent-filter> 4188 </receiver> 4189 4190 <receiver android:name="com.android.server.updates.CertPinInstallReceiver" 4191 android:permission="android.permission.UPDATE_CONFIG"> 4192 <intent-filter> 4193 <action android:name="android.intent.action.UPDATE_PINS" /> 4194 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 4195 </intent-filter> 4196 </receiver> 4197 4198 <receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver" 4199 android:permission="android.permission.UPDATE_CONFIG"> 4200 <intent-filter> 4201 <action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" /> 4202 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 4203 </intent-filter> 4204 </receiver> 4205 4206 <receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver" 4207 android:permission="android.permission.UPDATE_CONFIG"> 4208 <intent-filter> 4209 <action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" /> 4210 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 4211 </intent-filter> 4212 </receiver> 4213 4214 <receiver android:name="com.android.server.updates.NetworkWatchlistInstallReceiver" 4215 android:permission="android.permission.UPDATE_CONFIG"> 4216 <intent-filter> 4217 <action android:name="android.intent.action.UPDATE_NETWORK_WATCHLIST" /> 4218 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 4219 </intent-filter> 4220 </receiver> 4221 4222 <receiver android:name="com.android.server.updates.ApnDbInstallReceiver" 4223 android:permission="android.permission.UPDATE_CONFIG"> 4224 <intent-filter> 4225 <action android:name="com.android.internal.intent.action.UPDATE_APN_DB" /> 4226 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 4227 </intent-filter> 4228 </receiver> 4229 4230 <receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver" 4231 android:permission="android.permission.UPDATE_CONFIG"> 4232 <intent-filter> 4233 <action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" /> 4234 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 4235 </intent-filter> 4236 </receiver> 4237 4238 <receiver android:name="com.android.server.updates.CertificateTransparencyLogInstallReceiver" 4239 android:permission="android.permission.UPDATE_CONFIG"> 4240 <intent-filter> 4241 <action android:name="android.intent.action.UPDATE_CT_LOGS" /> 4242 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 4243 </intent-filter> 4244 </receiver> 4245 4246 <receiver android:name="com.android.server.updates.LangIdInstallReceiver" 4247 android:permission="android.permission.UPDATE_CONFIG"> 4248 <intent-filter> 4249 <action android:name="android.intent.action.UPDATE_LANG_ID" /> 4250 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 4251 </intent-filter> 4252 </receiver> 4253 4254 <receiver android:name="com.android.server.updates.SmartSelectionInstallReceiver" 4255 android:permission="android.permission.UPDATE_CONFIG"> 4256 <intent-filter> 4257 <action android:name="android.intent.action.UPDATE_SMART_SELECTION" /> 4258 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 4259 </intent-filter> 4260 </receiver> 4261 4262 <receiver android:name="com.android.server.updates.CarrierIdInstallReceiver" 4263 android:permission="android.permission.UPDATE_CONFIG"> 4264 <intent-filter> 4265 <action android:name="android.os.action.UPDATE_CARRIER_ID_DB" /> 4266 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 4267 </intent-filter> 4268 </receiver> 4269 4270 <receiver android:name="com.android.server.MasterClearReceiver" 4271 android:permission="android.permission.MASTER_CLEAR"> 4272 <intent-filter 4273 android:priority="100" > 4274 <!-- For Checkin, Settings, etc.: action=FACTORY_RESET --> 4275 <action android:name="android.intent.action.FACTORY_RESET" /> 4276 <!-- As above until all the references to the deprecated MASTER_CLEAR get updated to 4277 FACTORY_RESET. --> 4278 <action android:name="android.intent.action.MASTER_CLEAR" /> 4279 4280 <!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR --> 4281 <action android:name="com.google.android.c2dm.intent.RECEIVE" /> 4282 <category android:name="android.intent.category.MASTER_CLEAR" /> 4283 </intent-filter> 4284 </receiver> 4285 4286 <receiver android:name="com.android.server.stats.StatsCompanionService$AnomalyAlarmReceiver" 4287 android:permission="android.permission.STATSCOMPANION" 4288 android:exported="false"> 4289 </receiver> 4290 4291 <receiver android:name="com.android.server.stats.StatsCompanionService$PullingAlarmReceiver" 4292 android:permission="android.permission.STATSCOMPANION" 4293 android:exported="false"> 4294 </receiver> 4295 4296 <receiver android:name="com.android.server.am.BatteryStatsService$UsbConnectionReceiver" 4297 android:exported="false"> 4298 <intent-filter> 4299 <action android:name="android.intent.action.BOOT_COMPLETED" /> 4300 </intent-filter> 4301 <intent-filter> 4302 <action android:name="android.hardware.usb.action.USB_STATE" /> 4303 </intent-filter> 4304 </receiver> 4305 4306 <service android:name="android.hardware.location.GeofenceHardwareService" 4307 android:permission="android.permission.LOCATION_HARDWARE" 4308 android:exported="false" /> 4309 4310 <service android:name="com.android.internal.backup.LocalTransportService" 4311 android:permission="android.permission.CONFIRM_FULL_BACKUP" 4312 android:exported="false"> 4313 <intent-filter> 4314 <action android:name="android.backup.TRANSPORT_HOST" /> 4315 </intent-filter> 4316 </service> 4317 4318 <service android:name="com.android.server.MountServiceIdler" 4319 android:exported="true" 4320 android:permission="android.permission.BIND_JOB_SERVICE" > 4321 </service> 4322 4323 <service android:name="com.android.server.backup.FullBackupJob" 4324 android:exported="true" 4325 android:permission="android.permission.BIND_JOB_SERVICE" > 4326 </service> 4327 4328 <service android:name="com.android.server.backup.KeyValueBackupJob" 4329 android:permission="android.permission.BIND_JOB_SERVICE" > 4330 </service> 4331 4332 <service android:name="com.android.server.content.SyncJobService" 4333 android:permission="android.permission.BIND_JOB_SERVICE" > 4334 </service> 4335 4336 <service android:name="com.android.server.pm.BackgroundDexOptService" 4337 android:exported="true" 4338 android:permission="android.permission.BIND_JOB_SERVICE"> 4339 </service> 4340 4341 <service android:name="com.android.server.PruneInstantAppsJobService" 4342 android:permission="android.permission.BIND_JOB_SERVICE" > 4343 </service> 4344 4345 <service android:name="com.android.server.storage.DiskStatsLoggingService" 4346 android:permission="android.permission.BIND_JOB_SERVICE" > 4347 </service> 4348 4349 <service android:name="com.android.server.PreloadsFileCacheExpirationJobService" 4350 android:permission="android.permission.BIND_JOB_SERVICE" > 4351 </service> 4352 4353 <service android:name="com.android.server.camera.CameraStatsJobService" 4354 android:permission="android.permission.BIND_JOB_SERVICE" > 4355 </service> 4356 4357 <service android:name="com.android.server.timezone.TimeZoneUpdateIdler" 4358 android:permission="android.permission.BIND_JOB_SERVICE" > 4359 </service> 4360 4361 <service android:name="com.android.server.net.watchlist.ReportWatchlistJobService" 4362 android:permission="android.permission.BIND_JOB_SERVICE" > 4363 </service> 4364 4365 <service android:name="com.android.server.display.BrightnessIdleJob" 4366 android:permission="android.permission.BIND_JOB_SERVICE" > 4367 </service> 4368 4369 <service 4370 android:name="com.android.server.autofill.AutofillCompatAccessibilityService" 4371 android:permission="android.permission.BIND_ACCESSIBILITY_SERVICE" 4372 android:exported="true"> 4373 <meta-data 4374 android:name="android.accessibilityservice" 4375 android:resource="@xml/autofill_compat_accessibility_service" /> 4376 </service> 4377 4378 </application> 4379 4380 </manifest> 4381