Home | History | Annotate | Download | only in raw
      1 <?xml version="1.0" encoding="utf-8"?>
      2 <!--
      3 /* //device/apps/common/AndroidManifest.xml
      4 **
      5 ** Copyright 2006, The Android Open Source Project
      6 **
      7 ** Licensed under the Apache License, Version 2.0 (the "License");
      8 ** you may not use this file except in compliance with the License.
      9 ** You may obtain a copy of the License at
     10 **
     11 **     http://www.apache.org/licenses/LICENSE-2.0
     12 **
     13 ** Unless required by applicable law or agreed to in writing, software
     14 ** distributed under the License is distributed on an "AS IS" BASIS,
     15 ** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
     16 ** See the License for the specific language governing permissions and
     17 ** limitations under the License.
     18 */
     19 -->
     20 <manifest xmlns:android="http://schemas.android.com/apk/res/android"
     21     package="android" coreApp="true" android:sharedUserId="android.uid.system"
     22     android:sharedUserLabel="@string/android_system_label">
     23 
     24     <!-- ================================================ -->
     25     <!-- Special broadcasts that only the system can send -->
     26     <!-- ================================================ -->
     27     <eat-comment />
     28 
     29     <protected-broadcast android:name="android.intent.action.SCREEN_OFF" />
     30     <protected-broadcast android:name="android.intent.action.SCREEN_ON" />
     31     <protected-broadcast android:name="android.intent.action.USER_PRESENT" />
     32     <protected-broadcast android:name="android.intent.action.TIME_SET" />
     33     <protected-broadcast android:name="android.intent.action.TIME_TICK" />
     34     <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" />
     35     <protected-broadcast android:name="android.intent.action.DATE_CHANGED" />
     36     <protected-broadcast android:name="android.intent.action.PRE_BOOT_COMPLETED" />
     37     <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" />
     38     <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" />
     39     <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" />
     40     <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" />
     41     <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" />
     42     <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" />
     43     <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" />
     44     <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" />
     45     <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" />
     46     <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" />
     47     <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" />
     48     <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" />
     49     <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" />
     50     <protected-broadcast android:name="android.intent.action.PACKAGES_SUSPENDED" />
     51     <protected-broadcast android:name="android.intent.action.PACKAGES_UNSUSPENDED" />
     52     <protected-broadcast android:name="android.intent.action.ACTION_PREFERRED_ACTIVITY_CHANGED" />
     53     <protected-broadcast android:name="android.intent.action.UID_REMOVED" />
     54     <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" />
     55     <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" />
     56     <protected-broadcast android:name="android.intent.action.SPLIT_CONFIGURATION_CHANGED" />
     57     <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" />
     58     <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" />
     59     <protected-broadcast android:name="android.intent.action.BATTERY_LEVEL_CHANGED" />
     60     <protected-broadcast android:name="android.intent.action.BATTERY_LOW" />
     61     <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" />
     62     <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" />
     63     <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" />
     64     <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" />
     65     <protected-broadcast android:name="android.intent.action.CHARGING" />
     66     <protected-broadcast android:name="android.intent.action.DISCHARGING" />
     67     <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" />
     68     <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" />
     69     <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" />
     70     <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" />
     71     <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" />
     72     <protected-broadcast android:name="android.intent.action.REBOOT" />
     73     <protected-broadcast android:name="android.intent.action.DOCK_EVENT" />
     74     <protected-broadcast android:name="android.intent.action.THERMAL_EVENT" />
     75     <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" />
     76     <protected-broadcast android:name="android.intent.action.USER_ADDED" />
     77     <protected-broadcast android:name="android.intent.action.USER_REMOVED" />
     78     <protected-broadcast android:name="android.intent.action.USER_STARTING" />
     79     <protected-broadcast android:name="android.intent.action.USER_STARTED" />
     80     <protected-broadcast android:name="android.intent.action.USER_STOPPING" />
     81     <protected-broadcast android:name="android.intent.action.USER_STOPPED" />
     82     <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" />
     83     <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" />
     84     <protected-broadcast android:name="android.intent.action.USER_SWITCHED" />
     85     <protected-broadcast android:name="android.intent.action.USER_INITIALIZE" />
     86     <protected-broadcast android:name="android.intent.action.INTENT_FILTER_NEEDS_VERIFICATION" />
     87     <protected-broadcast android:name="android.intent.action.OVERLAY_ADDED" />
     88     <protected-broadcast android:name="android.intent.action.OVERLAY_CHANGED" />
     89     <protected-broadcast android:name="android.intent.action.OVERLAY_REMOVED" />
     90     <protected-broadcast android:name="android.intent.action.OVERLAY_PRIORITY_CHANGED" />
     91     <protected-broadcast android:name="android.intent.action.USER_ACTIVITY_NOTIFICATION" />
     92     <protected-broadcast android:name="android.intent.action.MY_PACKAGE_SUSPENDED" />
     93     <protected-broadcast android:name="android.intent.action.MY_PACKAGE_UNSUSPENDED" />
     94 
     95     <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED" />
     96     <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGING" />
     97     <protected-broadcast android:name="android.os.action.DEVICE_IDLE_MODE_CHANGED" />
     98     <protected-broadcast android:name="android.os.action.POWER_SAVE_WHITELIST_CHANGED" />
     99     <protected-broadcast android:name="android.os.action.POWER_SAVE_TEMP_WHITELIST_CHANGED" />
    100     <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED_INTERNAL" />
    101 
    102     <!-- @deprecated This is rarely used and will be phased out soon. -->
    103     <protected-broadcast android:name="android.os.action.SCREEN_BRIGHTNESS_BOOST_CHANGED" />
    104 
    105     <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" />
    106     <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" />
    107     <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" />
    108     <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" />
    109     <protected-broadcast android:name="android.app.action.NEXT_ALARM_CLOCK_CHANGED" />
    110 
    111     <protected-broadcast android:name="android.app.action.BUGREPORT_SHARING_DECLINED" />
    112     <protected-broadcast android:name="android.app.action.BUGREPORT_FAILED" />
    113     <protected-broadcast android:name="android.app.action.BUGREPORT_SHARE" />
    114     <protected-broadcast android:name="android.app.action.SHOW_DEVICE_MONITORING_DIALOG" />
    115 
    116     <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" />
    117     <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" />
    118     <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" />
    119     <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" />
    120     <protected-broadcast android:name="android.appwidget.action.APPWIDGET_HOST_RESTORED" />
    121     <protected-broadcast android:name="android.appwidget.action.APPWIDGET_RESTORED" />
    122 
    123     <protected-broadcast android:name="android.os.action.SETTING_RESTORED" />
    124 
    125     <protected-broadcast android:name="android.app.backup.intent.RUN" />
    126     <protected-broadcast android:name="android.app.backup.intent.CLEAR" />
    127     <protected-broadcast android:name="android.app.backup.intent.INIT" />
    128 
    129     <protected-broadcast android:name="android.bluetooth.intent.DISCOVERABLE_TIMEOUT" />
    130     <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" />
    131     <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" />
    132     <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" />
    133     <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" />
    134     <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" />
    135     <protected-broadcast android:name="android.bluetooth.adapter.action.BLUETOOTH_ADDRESS_CHANGED" />
    136     <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" />
    137     <protected-broadcast android:name="android.bluetooth.device.action.UUID" />
    138     <protected-broadcast android:name="android.bluetooth.device.action.MAS_INSTANCE" />
    139     <protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" />
    140     <protected-broadcast android:name="android.bluetooth.device.action.FOUND" />
    141     <protected-broadcast android:name="android.bluetooth.device.action.DISAPPEARED" />
    142     <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" />
    143     <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" />
    144     <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" />
    145     <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" />
    146     <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" />
    147     <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" />
    148     <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" />
    149     <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" />
    150     <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" />
    151     <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" />
    152     <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" />
    153     <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" />
    154     <protected-broadcast android:name="android.bluetooth.device.action.SDP_RECORD" />
    155     <protected-broadcast android:name="android.bluetooth.device.action.BATTERY_LEVEL_CHANGED" />
    156     <protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" />
    157     <protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" />
    158     <protected-broadcast
    159         android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" />
    160     <protected-broadcast
    161         android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" />
    162     <protected-broadcast
    163         android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" />
    164     <protected-broadcast
    165         android:name="android.bluetooth.headset.action.HF_INDICATORS_VALUE_CHANGED" />
    166     <protected-broadcast
    167         android:name="android.bluetooth.headset.profile.action.ACTIVE_DEVICE_CHANGED" />
    168     <protected-broadcast
    169         android:name="android.bluetooth.headsetclient.profile.action.CONNECTION_STATE_CHANGED" />
    170     <protected-broadcast
    171         android:name="android.bluetooth.headsetclient.profile.action.AUDIO_STATE_CHANGED" />
    172     <protected-broadcast
    173         android:name="android.bluetooth.headsetclient.profile.action.AG_EVENT" />
    174     <protected-broadcast
    175         android:name="android.bluetooth.headsetclient.profile.action.AG_CALL_CHANGED" />
    176     <protected-broadcast
    177         android:name="android.bluetooth.headsetclient.profile.action.RESULT" />
    178     <protected-broadcast
    179         android:name="android.bluetooth.headsetclient.profile.action.LAST_VTAG" />
    180     <protected-broadcast
    181         android:name="android.bluetooth.hearingaid.profile.action.CONNECTION_STATE_CHANGED" />
    182     <protected-broadcast
    183         android:name="android.bluetooth.hearingaid.profile.action.PLAYING_STATE_CHANGED" />
    184     <protected-broadcast
    185         android:name="android.bluetooth.hearingaid.profile.action.ACTIVE_DEVICE_CHANGED" />
    186     <protected-broadcast
    187         android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" />
    188     <protected-broadcast
    189         android:name="android.bluetooth.a2dp.profile.action.ACTIVE_DEVICE_CHANGED" />
    190     <protected-broadcast
    191         android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" />
    192     <protected-broadcast
    193         android:name="android.bluetooth.a2dp.profile.action.CODEC_CONFIG_CHANGED" />
    194     <protected-broadcast
    195         android:name="android.bluetooth.a2dp-sink.profile.action.CONNECTION_STATE_CHANGED" />
    196     <protected-broadcast
    197         android:name="android.bluetooth.a2dp-sink.profile.action.PLAYING_STATE_CHANGED" />
    198     <protected-broadcast
    199         android:name="android.bluetooth.a2dp-sink.profile.action.AUDIO_CONFIG_CHANGED" />
    200     <protected-broadcast
    201         android:name="android.bluetooth.avrcp-controller.profile.action.BROWSE_CONNECTION_STATE_CHANGED" />
    202     <protected-broadcast
    203         android:name="android.bluetooth.avrcp-controller.profile.action.CONNECTION_STATE_CHANGED" />
    204     <protected-broadcast
    205         android:name="android.bluetooth.avrcp-controller.profile.action.FOLDER_LIST" />
    206     <protected-broadcast
    207         android:name="android.bluetooth.avrcp-controller.profile.action.TRACK_EVENT" />
    208     <protected-broadcast
    209         android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" />
    210     <protected-broadcast
    211         android:name="android.bluetooth.input.profile.action.IDLE_TIME_CHANGED" />
    212     <protected-broadcast
    213         android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" />
    214     <protected-broadcast
    215         android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" />
    216     <protected-broadcast
    217         android:name="android.bluetooth.hiddevice.profile.action.CONNECTION_STATE_CHANGED" />
    218     <protected-broadcast
    219         android:name="android.bluetooth.map.profile.action.CONNECTION_STATE_CHANGED" />
    220     <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.CONNECTION_STATE_CHANGED" />
    221     <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_RECEIVED" />
    222     <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_SENT_SUCCESSFULLY" />
    223     <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_DELIVERED_SUCCESSFULLY" />
    224     <protected-broadcast
    225         android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_SENT" />
    226     <protected-broadcast
    227         android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_DELIVERY" />
    228     <protected-broadcast
    229         android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" />
    230     <protected-broadcast android:name="android.bluetooth.pbap.profile.action.CONNECTION_STATE_CHANGED" />
    231     <protected-broadcast android:name="android.bluetooth.pbapclient.profile.action.CONNECTION_STATE_CHANGED" />
    232     <protected-broadcast android:name="android.bluetooth.sap.profile.action.CONNECTION_STATE_CHANGED" />
    233     <protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" />
    234     <protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" />
    235     <protected-broadcast android:name="android.btopp.intent.action.LIST" />
    236     <protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" />
    237     <protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" />
    238     <protected-broadcast android:name="android.btopp.intent.action.CONFIRM" />
    239     <protected-broadcast android:name="android.btopp.intent.action.HIDE" />
    240     <protected-broadcast android:name="android.btopp.intent.action.RETRY" />
    241     <protected-broadcast android:name="android.btopp.intent.action.OPEN" />
    242     <protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" />
    243     <protected-broadcast android:name="android.btopp.intent.action.TRANSFER_COMPLETE" />
    244     <protected-broadcast android:name="android.btopp.intent.action.ACCEPT" />
    245     <protected-broadcast android:name="android.btopp.intent.action.DECLINE" />
    246     <protected-broadcast android:name="com.android.bluetooth.gatt.REFRESH_BATCHED_SCAN" />
    247     <protected-broadcast android:name="com.android.bluetooth.pbap.authchall" />
    248     <protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" />
    249     <protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" />
    250     <protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" />
    251     <protected-broadcast android:name="com.android.bluetooth.sap.USER_CONFIRM_TIMEOUT" />
    252     <protected-broadcast android:name="com.android.bluetooth.sap.action.DISCONNECT_ACTION" />
    253 
    254     <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" />
    255 
    256     <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" />
    257     <protected-broadcast android:name="android.hardware.usb.action.USB_PORT_CHANGED" />
    258     <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" />
    259     <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_DETACHED" />
    260     <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" />
    261     <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" />
    262 
    263     <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" />
    264     <protected-broadcast android:name="android.media.action.HDMI_AUDIO_PLUG" />
    265 
    266     <protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" />
    267     <protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" />
    268     <protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" />
    269     <protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" />
    270     <protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" />
    271     <protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" />
    272     <protected-broadcast android:name="android.media.MASTER_MONO_CHANGED_ACTION" />
    273     <protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" />
    274     <protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" />
    275 
    276     <protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" />
    277     <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" />
    278     <protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" />
    279     <protected-broadcast android:name="android.intent.action.MEDIA_NOFS" />
    280     <protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" />
    281     <protected-broadcast android:name="android.intent.action.MEDIA_SHARED" />
    282     <protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" />
    283     <protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" />
    284     <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" />
    285     <protected-broadcast android:name="android.intent.action.MEDIA_EJECT" />
    286 
    287     <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL" />
    288     <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" />
    289     <!-- @deprecated.  Only {@link android.net.ConnectivityManager.CONNECTIVITY_ACTION} is sent. -->
    290     <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" />
    291     <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" />
    292     <protected-broadcast android:name="android.net.conn.RESTRICT_BACKGROUND_CHANGED" />
    293     <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" />
    294     <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" />
    295 
    296     <protected-broadcast android:name="android.net.nsd.STATE_CHANGED" />
    297 
    298     <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" />
    299     <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" />
    300     <protected-broadcast android:name="com.android.nfc.action.LLCP_UP" />
    301     <protected-broadcast android:name="com.android.nfc.action.LLCP_DOWN" />
    302     <protected-broadcast android:name="com.android.nfc.cardemulation.action.CLOSE_TAP_DIALOG" />
    303     <protected-broadcast android:name="com.android.nfc.handover.action.ALLOW_CONNECT" />
    304     <protected-broadcast android:name="com.android.nfc.handover.action.DENY_CONNECT" />
    305     <protected-broadcast android:name="com.android.nfc.handover.action.TIMEOUT_CONNECT" />
    306     <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" />
    307     <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" />
    308     <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" />
    309     <!-- For NFC to BT handover -->
    310     <protected-broadcast android:name="android.btopp.intent.action.WHITELIST_DEVICE" />
    311     <protected-broadcast android:name="android.btopp.intent.action.STOP_HANDOVER_TRANSFER" />
    312     <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND" />
    313     <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND_MULTIPLE" />
    314     <protected-broadcast android:name="com.android.nfc.handover.action.CANCEL_HANDOVER_TRANSFER" />
    315 
    316     <protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" />
    317     <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" />
    318 
    319     <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" />
    320 
    321     <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" />
    322     <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" />
    323     <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" />
    324 
    325     <protected-broadcast android:name="com.android.server.stats.action.TRIGGER_COLLECTION" />
    326 
    327     <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" />
    328     <protected-broadcast android:name="com.android.server.WifiManager.action.START_PNO" />
    329     <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" />
    330     <protected-broadcast android:name="com.android.server.WifiManager.action.DEVICE_IDLE" />
    331     <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_ACCEPTED" />
    332     <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_DECLINED" />
    333     <protected-broadcast android:name="com.android.internal.action.EUICC_FACTORY_RESET" />
    334     <protected-broadcast android:name="com.android.server.usb.ACTION_OPEN_IN_APPS" />
    335     <protected-broadcast android:name="com.android.server.am.DELETE_DUMPHEAP" />
    336     <protected-broadcast android:name="com.android.server.net.action.SNOOZE_WARNING" />
    337     <protected-broadcast android:name="com.android.server.net.action.SNOOZE_RAPID" />
    338     <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.USER_DISMISSED_NOTIFICATION" />
    339     <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.CONNECT_TO_NETWORK" />
    340     <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.PICK_WIFI_NETWORK" />
    341     <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.PICK_NETWORK_AFTER_FAILURE" />
    342     <protected-broadcast android:name="com.android.server.wifi.wakeup.DISMISS_NOTIFICATION" />
    343     <protected-broadcast android:name="com.android.server.wifi.wakeup.OPEN_WIFI_PREFERENCES" />
    344     <protected-broadcast android:name="com.android.server.wifi.wakeup.OPEN_WIFI_SETTINGS" />
    345     <protected-broadcast android:name="com.android.server.wifi.wakeup.TURN_OFF_WIFI_WAKE" />
    346     <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" />
    347     <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" />
    348     <protected-broadcast android:name="android.net.wifi.WIFI_CREDENTIAL_CHANGED" />
    349     <protected-broadcast android:name="android.net.wifi.WIFI_SCAN_AVAILABLE" />
    350     <protected-broadcast android:name="android.net.wifi.aware.action.WIFI_AWARE_STATE_CHANGED" />
    351     <protected-broadcast android:name="android.net.wifi.rtt.action.WIFI_RTT_STATE_CHANGED" />
    352     <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" />
    353     <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" />
    354     <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" />
    355     <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" />
    356     <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" />
    357     <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_DEAUTH_IMMINENT" />
    358     <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_ICON" />
    359     <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_OSU_PROVIDERS_LIST" />
    360     <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_SUBSCRIPTION_REMEDIATION" />
    361     <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" />
    362     <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" />
    363     <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" />
    364     <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" />
    365     <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" />
    366     <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" />
    367     <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" />
    368     <protected-broadcast android:name="android.net.wifi.p2p.PERSISTENT_GROUPS_CHANGED" />
    369     <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" />
    370     <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" />
    371     <protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" />
    372     <protected-broadcast
    373             android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" />
    374     <protected-broadcast android:name="android.net.scoring.SCORE_NETWORKS" />
    375     <protected-broadcast android:name="android.net.scoring.SCORER_CHANGED" />
    376     <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" />
    377     <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" />
    378     <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" />
    379     <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" />
    380     <protected-broadcast android:name="android.intent.action.APPLICATION_RESTRICTIONS_CHANGED" />
    381 
    382     <!-- Legacy -->
    383     <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" />
    384     <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" />
    385 
    386     <protected-broadcast android:name="com.android.server.ACTION_TRIGGER_IDLE" />
    387 
    388     <protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" />
    389 
    390     <protected-broadcast android:name="android.intent.action.PHONE_STATE" />
    391 
    392     <protected-broadcast android:name="android.intent.action.SUB_DEFAULT_CHANGED" />
    393 
    394     <protected-broadcast android:name="android.location.GPS_ENABLED_CHANGE" />
    395     <protected-broadcast android:name="android.location.PROVIDERS_CHANGED" />
    396     <protected-broadcast android:name="android.location.MODE_CHANGED" />
    397     <protected-broadcast android:name="android.location.GPS_FIX_CHANGE" />
    398     <protected-broadcast android:name="android.net.proxy.PAC_REFRESH" />
    399 
    400     <protected-broadcast android:name="android.telecom.action.DEFAULT_DIALER_CHANGED" />
    401     <protected-broadcast android:name="android.provider.action.DEFAULT_SMS_PACKAGE_CHANGED" />
    402     <protected-broadcast android:name="android.intent.action.CONTENT_CHANGED" />
    403     <protected-broadcast android:name="android.provider.Telephony.MMS_DOWNLOADED" />
    404 
    405     <protected-broadcast
    406         android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" />
    407 
    408     <!-- Defined in RestrictionsManager -->
    409     <protected-broadcast
    410         android:name="android.intent.action.PERMISSION_RESPONSE_RECEIVED" />
    411     <!-- Defined in RestrictionsManager -->
    412 
    413     <protected-broadcast android:name="android.intent.action.REQUEST_PERMISSION" />
    414     <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_STARTED" />
    415     <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
    416     <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_PROGRESS" />
    417     <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
    418 
    419     <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_DATA_SUBSCRIPTION_CHANGED" />
    420     <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_VOICE_SUBSCRIPTION_CHANGED" />
    421     <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_CONTENT_CHANGE" />
    422     <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_RECORD_UPDATED" />
    423 
    424     <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_DONE" />
    425     <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_FAILED" />
    426 
    427     <protected-broadcast android:name="android.internal.policy.action.BURN_IN_PROTECTION" />
    428     <protected-broadcast android:name="android.app.action.SYSTEM_UPDATE_POLICY_CHANGED" />
    429     <protected-broadcast android:name="android.app.action.DEVICE_OWNER_CHANGED" />
    430     <protected-broadcast android:name="android.app.action.MANAGED_USER_CREATED" />
    431 
    432     <!-- Added in N -->
    433     <protected-broadcast android:name="android.intent.action.ANR" />
    434     <protected-broadcast android:name="android.intent.action.CALL" />
    435     <protected-broadcast android:name="android.intent.action.CALL_PRIVILEGED" />
    436     <protected-broadcast android:name="android.intent.action.DROPBOX_ENTRY_ADDED" />
    437     <protected-broadcast android:name="android.intent.action.INPUT_METHOD_CHANGED" />
    438     <protected-broadcast android:name="android.intent.action.internal_sim_state_changed" />
    439     <protected-broadcast android:name="android.intent.action.LOCKED_BOOT_COMPLETED" />
    440     <protected-broadcast android:name="android.intent.action.PRECISE_CALL_STATE" />
    441     <protected-broadcast android:name="android.intent.action.PRECISE_DATA_CONNECTION_STATE_CHANGED" />
    442     <protected-broadcast android:name="android.intent.action.SUBSCRIPTION_PHONE_STATE" />
    443     <protected-broadcast android:name="android.intent.action.USER_INFO_CHANGED" />
    444     <protected-broadcast android:name="android.intent.action.USER_UNLOCKED" />
    445     <protected-broadcast android:name="android.intent.action.WALLPAPER_CHANGED" />
    446 
    447     <protected-broadcast android:name="android.app.action.DEVICE_POLICY_MANAGER_STATE_CHANGED" />
    448     <protected-broadcast android:name="android.app.action.CHOOSE_PRIVATE_KEY_ALIAS" />
    449     <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLED" />
    450     <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLE_REQUESTED" />
    451     <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_ENABLED" />
    452     <protected-broadcast android:name="android.app.action.LOCK_TASK_ENTERING" />
    453     <protected-broadcast android:name="android.app.action.LOCK_TASK_EXITING" />
    454     <protected-broadcast android:name="android.app.action.NOTIFY_PENDING_SYSTEM_UPDATE" />
    455     <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_CHANGED" />
    456     <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_EXPIRING" />
    457     <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_FAILED" />
    458     <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_SUCCEEDED" />
    459     <protected-broadcast android:name="com.android.server.ACTION_EXPIRED_PASSWORD_NOTIFICATION" />
    460 
    461     <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_ADDED" />
    462     <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNLOCKED" />
    463     <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_REMOVED" />
    464 
    465     <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_STATE_CHANGED" />
    466     <protected-broadcast android:name="com.android.bluetooth.map.USER_CONFIRM_TIMEOUT" />
    467     <protected-broadcast android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_SENT" />
    468     <protected-broadcast android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_DELIVERY" />
    469     <protected-broadcast android:name="android.content.jobscheduler.JOB_DELAY_EXPIRED" />
    470     <protected-broadcast android:name="android.content.syncmanager.SYNC_ALARM" />
    471     <protected-broadcast android:name="android.media.INTERNAL_RINGER_MODE_CHANGED_ACTION" />
    472     <protected-broadcast android:name="android.media.STREAM_DEVICES_CHANGED_ACTION" />
    473     <protected-broadcast android:name="android.media.STREAM_MUTE_CHANGED_ACTION" />
    474     <protected-broadcast android:name="android.net.sip.SIP_SERVICE_UP" />
    475     <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" />
    476     <protected-broadcast android:name="android.os.action.CHARGING" />
    477     <protected-broadcast android:name="android.os.action.DISCHARGING" />
    478     <protected-broadcast android:name="android.search.action.SEARCHABLES_CHANGED" />
    479     <protected-broadcast android:name="android.security.STORAGE_CHANGED" />
    480     <protected-broadcast android:name="android.security.action.TRUST_STORE_CHANGED" />
    481     <protected-broadcast android:name="android.security.action.KEYCHAIN_CHANGED" />
    482     <protected-broadcast android:name="android.security.action.KEY_ACCESS_CHANGED" />
    483     <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_REGISTERED" />
    484     <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_UNREGISTERED" />
    485     <protected-broadcast android:name="android.telecom.action.SHOW_MISSED_CALLS_NOTIFICATION" />
    486     <protected-broadcast android:name="android.telephony.action.CARRIER_CONFIG_CHANGED" />
    487     <protected-broadcast android:name="android.telephony.action.DEFAULT_SUBSCRIPTION_CHANGED" />
    488     <protected-broadcast android:name="android.telephony.action.DEFAULT_SMS_SUBSCRIPTION_CHANGED" />
    489     <protected-broadcast android:name="android.telephony.action.SHOW_VOICEMAIL_NOTIFICATION" />
    490 
    491     <protected-broadcast android:name="com.android.bluetooth.btservice.action.ALARM_WAKEUP" />
    492     <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_POLL" />
    493     <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_UPDATED" />
    494     <protected-broadcast android:name="com.android.server.NetworkTimeUpdateService.action.POLL" />
    495     <protected-broadcast android:name="com.android.server.telecom.intent.action.CALLS_ADD_ENTRY" />
    496     <protected-broadcast android:name="com.android.settings.location.MODE_CHANGING" />
    497     <protected-broadcast android:name="com.android.settings.bluetooth.ACTION_DISMISS_PAIRING" />
    498 
    499     <protected-broadcast android:name="NotificationManagerService.TIMEOUT" />
    500     <protected-broadcast android:name="ScheduleConditionProvider.EVALUATE" />
    501     <protected-broadcast android:name="EventConditionProvider.EVALUATE" />
    502     <protected-broadcast android:name="SnoozeHelper.EVALUATE" />
    503     <protected-broadcast android:name="wifi_scan_available" />
    504 
    505     <protected-broadcast android:name="action.cne.started" />
    506     <protected-broadcast android:name="android.content.jobscheduler.JOB_DEADLINE_EXPIRED" />
    507     <protected-broadcast android:name="android.intent.action.ACTION_UNSOL_RESPONSE_OEM_HOOK_RAW" />
    508     <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_SUPL" />
    509     <protected-broadcast android:name="android.os.action.LIGHT_DEVICE_IDLE_MODE_CHANGED" />
    510     <protected-broadcast android:name="android.os.storage.action.VOLUME_STATE_CHANGED" />
    511     <protected-broadcast android:name="android.os.storage.action.DISK_SCANNED" />
    512     <protected-broadcast android:name="com.android.server.action.UPDATE_TWILIGHT_STATE" />
    513     <protected-broadcast android:name="com.android.server.action.RESET_TWILIGHT_AUTO" />
    514     <protected-broadcast android:name="com.android.server.device_idle.STEP_IDLE_STATE" />
    515     <protected-broadcast android:name="com.android.server.device_idle.STEP_LIGHT_IDLE_STATE" />
    516     <protected-broadcast android:name="com.android.server.Wifi.action.TOGGLE_PNO" />
    517     <protected-broadcast android:name="intent.action.ACTION_RF_BAND_INFO" />
    518     <protected-broadcast android:name="android.intent.action.MEDIA_RESOURCE_GRANTED" />
    519     <protected-broadcast android:name="android.app.action.NETWORK_LOGS_AVAILABLE" />
    520     <protected-broadcast android:name="android.app.action.SECURITY_LOGS_AVAILABLE" />
    521 
    522     <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED" />
    523     <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED_INTERNAL" />
    524     <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_CHANGED" />
    525     <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_ACCESS_GRANTED_CHANGED" />
    526     <protected-broadcast android:name="android.os.action.ACTION_EFFECTS_SUPPRESSOR_CHANGED" />
    527     <protected-broadcast android:name="android.app.action.NOTIFICATION_CHANNEL_BLOCK_STATE_CHANGED" />
    528     <protected-broadcast android:name="android.app.action.NOTIFICATION_CHANNEL_GROUP_BLOCK_STATE_CHANGED" />
    529     <protected-broadcast android:name="android.app.action.APP_BLOCK_STATE_CHANGED" />
    530 
    531     <protected-broadcast android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS" />
    532     <protected-broadcast android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS" />
    533 
    534     <protected-broadcast android:name="android.intent.action.DYNAMIC_SENSOR_CHANGED" />
    535 
    536     <protected-broadcast android:name="android.intent.action.ACTION_RADIO_OFF" />
    537 
    538     <protected-broadcast android:name="android.accounts.LOGIN_ACCOUNTS_CHANGED" />
    539     <protected-broadcast android:name="android.accounts.action.ACCOUNT_REMOVED" />
    540     <protected-broadcast android:name="android.accounts.action.VISIBLE_ACCOUNTS_CHANGED" />
    541 
    542     <protected-broadcast android:name="com.android.sync.SYNC_CONN_STATUS_CHANGED" />
    543 
    544     <protected-broadcast android:name="com.android.phone.SIP_INCOMING_CALL" />
    545     <protected-broadcast android:name="com.android.phone.SIP_ADD_PHONE" />
    546     <protected-broadcast android:name="com.android.phone.SIP_REMOVE_PHONE" />
    547     <protected-broadcast android:name="com.android.phone.SIP_CALL_OPTION_CHANGED" />
    548 
    549     <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_CONNECTED" />
    550     <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_DISCONNECTED" />
    551 
    552     <protected-broadcast android:name="android.bluetooth.input.profile.action.HANDSHAKE" />
    553     <protected-broadcast android:name="android.bluetooth.input.profile.action.REPORT" />
    554 
    555     <protected-broadcast android:name="android.intent.action.TWILIGHT_CHANGED" />
    556 
    557     <protected-broadcast android:name="com.android.server.fingerprint.ACTION_LOCKOUT_RESET" />
    558     <protected-broadcast android:name="android.net.wifi.PASSPOINT_ICON_RECEIVED" />
    559     <protected-broadcast android:name="com.android.server.notification.CountdownConditionProvider" />
    560 
    561     <protected-broadcast android:name="com.android.internal.location.ALARM_WAKEUP" />
    562     <protected-broadcast android:name="com.android.internal.location.ALARM_TIMEOUT" />
    563     <protected-broadcast android:name="android.intent.action.GLOBAL_BUTTON" />
    564 
    565     <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_AVAILABLE" />
    566     <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNAVAILABLE" />
    567     <protected-broadcast android:name="com.android.server.pm.DISABLE_QUIET_MODE_AFTER_UNLOCK" />
    568 
    569     <protected-broadcast android:name="com.android.server.retaildemo.ACTION_RESET_DEMO" />
    570 
    571     <protected-broadcast android:name="android.intent.action.DEVICE_LOCKED_CHANGED" />
    572 
    573     <!-- Added in O -->
    574     <protected-broadcast android:name="android.app.action.APPLICATION_DELEGATION_SCOPES_CHANGED" />
    575     <protected-broadcast android:name="com.android.server.wm.ACTION_REVOKE_SYSTEM_ALERT_WINDOW_PERMISSION" />
    576     <protected-broadcast android:name="android.media.tv.action.PARENTAL_CONTROLS_ENABLED_CHANGED" />
    577 
    578     <protected-broadcast android:name="android.content.pm.action.SESSION_COMMITTED" />
    579     <protected-broadcast android:name="android.os.action.USER_RESTRICTIONS_CHANGED" />
    580     <protected-broadcast android:name="android.media.tv.action.PREVIEW_PROGRAM_ADDED_TO_WATCH_NEXT" />
    581     <protected-broadcast android:name="android.media.tv.action.PREVIEW_PROGRAM_BROWSABLE_DISABLED" />
    582     <protected-broadcast android:name="android.media.tv.action.WATCH_NEXT_PROGRAM_BROWSABLE_DISABLED" />
    583     <protected-broadcast android:name="android.media.tv.action.CHANNEL_BROWSABLE_REQUESTED" />
    584     <protected-broadcast android:name="com.android.server.InputMethodManagerService.SHOW_INPUT_METHOD_PICKER" />
    585 
    586     <!-- Time zone rules update intents fired by the system server -->
    587     <protected-broadcast android:name="com.android.intent.action.timezone.RULES_UPDATE_OPERATION" />
    588     <protected-broadcast android:name="com.android.intent.action.timezone.TRIGGER_RULES_UPDATE_CHECK" />
    589 
    590     <!-- Made protected in P (was introduced in JB-MR2) -->
    591     <protected-broadcast android:name="android.intent.action.GET_RESTRICTION_ENTRIES" />
    592     <protected-broadcast android:name="android.telephony.euicc.action.OTA_STATUS_CHANGED" />
    593 
    594     <!-- Added in P -->
    595     <protected-broadcast android:name="android.app.action.PROFILE_OWNER_CHANGED" />
    596     <protected-broadcast android:name="android.app.action.TRANSFER_OWNERSHIP_COMPLETE" />
    597     <protected-broadcast android:name="android.app.action.AFFILIATED_PROFILE_TRANSFER_OWNERSHIP_COMPLETE" />
    598     <protected-broadcast android:name="android.app.action.DATA_SHARING_RESTRICTION_CHANGED" />
    599     <protected-broadcast android:name="android.app.action.STATSD_STARTED" />
    600 
    601     <!-- ====================================================================== -->
    602     <!--                          RUNTIME PERMISSIONS                           -->
    603     <!-- ====================================================================== -->
    604     <eat-comment />
    605 
    606     <!-- ====================================================================== -->
    607     <!-- Permissions for accessing user's contacts including personal profile   -->
    608     <!-- ====================================================================== -->
    609     <eat-comment />
    610 
    611     <!-- Used for runtime permissions related to contacts and profiles on this
    612         device. -->
    613     <permission-group android:name="android.permission-group.CONTACTS"
    614         android:icon="@drawable/perm_group_contacts"
    615         android:label="@string/permgrouplab_contacts"
    616         android:description="@string/permgroupdesc_contacts"
    617         android:request="@string/permgrouprequest_contacts"
    618         android:priority="100" />
    619 
    620     <!-- Allows an application to read the user's contacts data.
    621         <p>Protection level: dangerous
    622     -->
    623     <permission android:name="android.permission.READ_CONTACTS"
    624         android:permissionGroup="android.permission-group.CONTACTS"
    625         android:label="@string/permlab_readContacts"
    626         android:description="@string/permdesc_readContacts"
    627         android:protectionLevel="dangerous" />
    628 
    629     <!-- Allows an application to write the user's contacts data.
    630          <p>Protection level: dangerous
    631     -->
    632     <permission android:name="android.permission.WRITE_CONTACTS"
    633         android:permissionGroup="android.permission-group.CONTACTS"
    634         android:label="@string/permlab_writeContacts"
    635         android:description="@string/permdesc_writeContacts"
    636         android:protectionLevel="dangerous" />
    637 
    638     <!-- ====================================================================== -->
    639     <!-- Permissions for accessing user's calendar                              -->
    640     <!-- ====================================================================== -->
    641     <eat-comment />
    642 
    643     <!-- Used for runtime permissions related to user's calendar. -->
    644     <permission-group android:name="android.permission-group.CALENDAR"
    645         android:icon="@drawable/perm_group_calendar"
    646         android:label="@string/permgrouplab_calendar"
    647         android:description="@string/permgroupdesc_calendar"
    648         android:request="@string/permgrouprequest_calendar"
    649         android:priority="200" />
    650 
    651     <!-- Allows an application to read the user's calendar data.
    652          <p>Protection level: dangerous
    653     -->
    654     <permission android:name="android.permission.READ_CALENDAR"
    655         android:permissionGroup="android.permission-group.CALENDAR"
    656         android:label="@string/permlab_readCalendar"
    657         android:description="@string/permdesc_readCalendar"
    658         android:protectionLevel="dangerous" />
    659 
    660     <!-- Allows an application to write the user's calendar data.
    661          <p>Protection level: dangerous
    662     -->
    663     <permission android:name="android.permission.WRITE_CALENDAR"
    664         android:permissionGroup="android.permission-group.CALENDAR"
    665         android:label="@string/permlab_writeCalendar"
    666         android:description="@string/permdesc_writeCalendar"
    667         android:protectionLevel="dangerous" />
    668 
    669     <!-- ====================================================================== -->
    670     <!-- Permissions for accessing and modifying user's SMS messages            -->
    671     <!-- ====================================================================== -->
    672     <eat-comment />
    673 
    674     <!-- Used for runtime permissions related to user's SMS messages. -->
    675     <permission-group android:name="android.permission-group.SMS"
    676         android:icon="@drawable/perm_group_sms"
    677         android:label="@string/permgrouplab_sms"
    678         android:description="@string/permgroupdesc_sms"
    679         android:request="@string/permgrouprequest_sms"
    680         android:priority="300" />
    681 
    682     <!-- Allows an application to send SMS messages.
    683          <p>Protection level: dangerous
    684     -->
    685     <permission android:name="android.permission.SEND_SMS"
    686         android:permissionGroup="android.permission-group.SMS"
    687         android:label="@string/permlab_sendSms"
    688         android:description="@string/permdesc_sendSms"
    689         android:permissionFlags="costsMoney"
    690         android:protectionLevel="dangerous" />
    691 
    692     <!-- Allows an application to receive SMS messages.
    693          <p>Protection level: dangerous
    694     -->
    695     <permission android:name="android.permission.RECEIVE_SMS"
    696         android:permissionGroup="android.permission-group.SMS"
    697         android:label="@string/permlab_receiveSms"
    698         android:description="@string/permdesc_receiveSms"
    699         android:protectionLevel="dangerous"/>
    700 
    701     <!-- Allows an application to read SMS messages.
    702          <p>Protection level: dangerous
    703     -->
    704     <permission android:name="android.permission.READ_SMS"
    705         android:permissionGroup="android.permission-group.SMS"
    706         android:label="@string/permlab_readSms"
    707         android:description="@string/permdesc_readSms"
    708         android:protectionLevel="dangerous" />
    709 
    710     <!-- Allows an application to receive WAP push messages.
    711          <p>Protection level: dangerous
    712     -->
    713     <permission android:name="android.permission.RECEIVE_WAP_PUSH"
    714         android:permissionGroup="android.permission-group.SMS"
    715         android:label="@string/permlab_receiveWapPush"
    716         android:description="@string/permdesc_receiveWapPush"
    717         android:protectionLevel="dangerous" />
    718 
    719     <!-- Allows an application to monitor incoming MMS messages.
    720         <p>Protection level: dangerous
    721     -->
    722     <permission android:name="android.permission.RECEIVE_MMS"
    723         android:permissionGroup="android.permission-group.SMS"
    724         android:label="@string/permlab_receiveMms"
    725         android:description="@string/permdesc_receiveMms"
    726         android:protectionLevel="dangerous" />
    727 
    728     <!-- Allows an application to read previously received cell broadcast
    729          messages and to register a content observer to get notifications when
    730          a cell broadcast has been received and added to the database. For
    731          emergency alerts, the database is updated immediately after the
    732          alert dialog and notification sound/vibration/speech are presented.
    733          The "read" column is then updated after the user dismisses the alert.
    734          This enables supplementary emergency assistance apps to start loading
    735          additional emergency information (if Internet access is available)
    736          when the alert is first received, and to delay presenting the info
    737          to the user until after the initial alert dialog is dismissed.
    738          <p>Protection level: dangerous
    739          @hide Pending API council approval -->
    740     <permission android:name="android.permission.READ_CELL_BROADCASTS"
    741         android:permissionGroup="android.permission-group.SMS"
    742         android:label="@string/permlab_readCellBroadcasts"
    743         android:description="@string/permdesc_readCellBroadcasts"
    744         android:protectionLevel="dangerous" />
    745 
    746     <!-- ====================================================================== -->
    747     <!-- Permissions for accessing external storage                             -->
    748     <!-- ====================================================================== -->
    749     <eat-comment />
    750 
    751     <!-- Used for runtime permissions related to the shared external storage. -->
    752     <permission-group android:name="android.permission-group.STORAGE"
    753         android:icon="@drawable/perm_group_storage"
    754         android:label="@string/permgrouplab_storage"
    755         android:description="@string/permgroupdesc_storage"
    756         android:request="@string/permgrouprequest_storage"
    757         android:priority="900" />
    758 
    759     <!-- Allows an application to read from external storage.
    760      <p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly
    761      granted this permission.</p>
    762      <p>This permission is enforced starting in API level 19.  Before API level 19, this
    763      permission is not enforced and all apps still have access to read from external storage.
    764      You can test your app with the permission enforced by enabling <em>Protect USB
    765      storage</em> under Developer options in the Settings app on a device running Android 4.1 or
    766      higher.</p>
    767      <p>Also starting in API level 19, this permission is <em>not</em> required to
    768      read/write files in your application-specific directories returned by
    769      {@link android.content.Context#getExternalFilesDir} and
    770      {@link android.content.Context#getExternalCacheDir}.
    771      <p class="note"><strong>Note:</strong> If <em>both</em> your <a
    772      href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
    773      minSdkVersion}</a> and <a
    774      href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
    775      targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
    776      grants your app this permission. If you don't need this permission, be sure your <a
    777      href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
    778      targetSdkVersion}</a> is 4 or higher.
    779      <p>Protection level: dangerous
    780      -->
    781     <permission android:name="android.permission.READ_EXTERNAL_STORAGE"
    782         android:permissionGroup="android.permission-group.STORAGE"
    783         android:label="@string/permlab_sdcardRead"
    784         android:description="@string/permdesc_sdcardRead"
    785         android:protectionLevel="dangerous" />
    786 
    787     <!-- Allows an application to write to external storage.
    788          <p class="note"><strong>Note:</strong> If <em>both</em> your <a
    789          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
    790          minSdkVersion}</a> and <a
    791          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
    792          targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
    793          grants your app this permission. If you don't need this permission, be sure your <a
    794          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
    795          targetSdkVersion}</a> is 4 or higher.
    796          <p>Starting in API level 19, this permission is <em>not</em> required to
    797          read/write files in your application-specific directories returned by
    798          {@link android.content.Context#getExternalFilesDir} and
    799          {@link android.content.Context#getExternalCacheDir}.
    800          <p>Protection level: dangerous
    801     -->
    802     <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE"
    803         android:permissionGroup="android.permission-group.STORAGE"
    804         android:label="@string/permlab_sdcardWrite"
    805         android:description="@string/permdesc_sdcardWrite"
    806         android:protectionLevel="dangerous" />
    807 
    808     <!-- ====================================================================== -->
    809     <!-- Permissions for accessing the device location                          -->
    810     <!-- ====================================================================== -->
    811     <eat-comment />
    812 
    813     <!-- Used for permissions that allow accessing the device location. -->
    814     <permission-group android:name="android.permission-group.LOCATION"
    815         android:icon="@drawable/perm_group_location"
    816         android:label="@string/permgrouplab_location"
    817         android:description="@string/permgroupdesc_location"
    818         android:request="@string/permgrouprequest_location"
    819         android:priority="400" />
    820 
    821     <!-- Allows an app to access precise location.
    822          Alternatively, you might want {@link #ACCESS_COARSE_LOCATION}.
    823          <p>Protection level: dangerous
    824     -->
    825     <permission android:name="android.permission.ACCESS_FINE_LOCATION"
    826         android:permissionGroup="android.permission-group.LOCATION"
    827         android:label="@string/permlab_accessFineLocation"
    828         android:description="@string/permdesc_accessFineLocation"
    829         android:protectionLevel="dangerous|instant" />
    830 
    831     <!-- Allows an app to access approximate location.
    832          Alternatively, you might want {@link #ACCESS_FINE_LOCATION}.
    833          <p>Protection level: dangerous
    834     -->
    835     <permission android:name="android.permission.ACCESS_COARSE_LOCATION"
    836         android:permissionGroup="android.permission-group.LOCATION"
    837         android:label="@string/permlab_accessCoarseLocation"
    838         android:description="@string/permdesc_accessCoarseLocation"
    839         android:protectionLevel="dangerous|instant" />
    840 
    841     <!-- ====================================================================== -->
    842     <!-- Permissions for accessing the call log                                 -->
    843     <!-- ====================================================================== -->
    844     <eat-comment />
    845 
    846     <!-- Used for permissions that are associated telephony features. -->
    847     <permission-group android:name="android.permission-group.CALL_LOG"
    848         android:icon="@drawable/perm_group_phone_calls"
    849         android:label="@string/permgrouplab_calllog"
    850         android:description="@string/permgroupdesc_calllog"
    851         android:request="@string/permgrouprequest_calllog"
    852         android:priority="450" />
    853 
    854 
    855     <!-- Used for permissions that are associated telephony features. -->
    856     <permission-group android:name="android.permission-group.CALL_LOG"
    857                       android:icon="@drawable/perm_group_phone_calls"
    858                       android:label="@string/permgrouplab_calllog"
    859                       android:description="@string/permgroupdesc_calllog"
    860                       android:request="@string/permgrouprequest_calllog"
    861                       android:priority="450" />
    862 
    863     <!-- Allows an application to access the IMS call service: making and
    864          modifying a call
    865         <p>Protection level: signature|privileged
    866         @hide
    867     -->
    868     <permission android:name="android.permission.ACCESS_IMS_CALL_SERVICE"
    869         android:label="@string/permlab_accessImsCallService"
    870         android:description="@string/permdesc_accessImsCallService"
    871         android:protectionLevel="signature|privileged" />
    872 
    873     <!-- Allows an application to read the user's call log.
    874          <p class="note"><strong>Note:</strong> If your app uses the
    875          {@link #READ_CONTACTS} permission and <em>both</em> your <a
    876          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
    877          minSdkVersion}</a> and <a
    878          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
    879          targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
    880          grants your app this permission. If you don't need this permission, be sure your <a
    881          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
    882          targetSdkVersion}</a> is 16 or higher.</p>
    883          <p>Protection level: dangerous
    884     -->
    885     <permission android:name="android.permission.READ_CALL_LOG"
    886         android:permissionGroup="android.permission-group.CALL_LOG"
    887         android:label="@string/permlab_readCallLog"
    888         android:description="@string/permdesc_readCallLog"
    889         android:protectionLevel="dangerous" />
    890 
    891     <!-- Allows an application to write (but not read) the user's
    892          call log data.
    893          <p class="note"><strong>Note:</strong> If your app uses the
    894          {@link #WRITE_CONTACTS} permission and <em>both</em> your <a
    895          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
    896          minSdkVersion}</a> and <a
    897          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
    898          targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
    899          grants your app this permission. If you don't need this permission, be sure your <a
    900          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
    901          targetSdkVersion}</a> is 16 or higher.</p>
    902          <p>Protection level: dangerous
    903     -->
    904     <permission android:name="android.permission.WRITE_CALL_LOG"
    905         android:permissionGroup="android.permission-group.CALL_LOG"
    906         android:label="@string/permlab_writeCallLog"
    907         android:description="@string/permdesc_writeCallLog"
    908         android:protectionLevel="dangerous" />
    909 
    910     <!-- Allows an application to see the number being dialed during an outgoing
    911          call with the option to redirect the call to a different number or
    912          abort the call altogether.
    913          <p>Protection level: dangerous
    914     -->
    915     <permission android:name="android.permission.PROCESS_OUTGOING_CALLS"
    916         android:permissionGroup="android.permission-group.CALL_LOG"
    917         android:label="@string/permlab_processOutgoingCalls"
    918         android:description="@string/permdesc_processOutgoingCalls"
    919         android:protectionLevel="dangerous" />
    920 
    921     <!-- ====================================================================== -->
    922     <!-- Permissions for accessing the device telephony                         -->
    923     <!-- ====================================================================== -->
    924     <eat-comment />
    925 
    926     <!-- Used for permissions that are associated telephony features. -->
    927     <permission-group android:name="android.permission-group.PHONE"
    928         android:icon="@drawable/perm_group_phone_calls"
    929         android:label="@string/permgrouplab_phone"
    930         android:description="@string/permgroupdesc_phone"
    931         android:request="@string/permgrouprequest_phone"
    932         android:priority="500" />
    933 
    934     <!-- Allows read only access to phone state, including the phone number of the device,
    935          current cellular network information, the status of any ongoing calls, and a list of any
    936          {@link android.telecom.PhoneAccount}s registered on the device.
    937          <p class="note"><strong>Note:</strong> If <em>both</em> your <a
    938          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
    939          minSdkVersion}</a> and <a
    940          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
    941          targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
    942          grants your app this permission. If you don't need this permission, be sure your <a
    943          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
    944          targetSdkVersion}</a> is 4 or higher.
    945          <p>Protection level: dangerous
    946     -->
    947     <permission android:name="android.permission.READ_PHONE_STATE"
    948         android:permissionGroup="android.permission-group.PHONE"
    949         android:label="@string/permlab_readPhoneState"
    950         android:description="@string/permdesc_readPhoneState"
    951         android:protectionLevel="dangerous" />
    952 
    953     <!-- Allows read access to the device's phone number(s). This is a subset of the capabilities
    954          granted by {@link #READ_PHONE_STATE} but is exposed to instant applications.
    955          <p>Protection level: dangerous-->
    956     <permission android:name="android.permission.READ_PHONE_NUMBERS"
    957         android:permissionGroup="android.permission-group.PHONE"
    958         android:label="@string/permlab_readPhoneNumbers"
    959         android:description="@string/permdesc_readPhoneNumbers"
    960         android:protectionLevel="dangerous|instant" />
    961 
    962     <!-- Allows an application to initiate a phone call without going through
    963         the Dialer user interface for the user to confirm the call.
    964         <p>Protection level: dangerous
    965     -->
    966     <permission android:name="android.permission.CALL_PHONE"
    967         android:permissionGroup="android.permission-group.PHONE"
    968         android:permissionFlags="costsMoney"
    969         android:label="@string/permlab_callPhone"
    970         android:description="@string/permdesc_callPhone"
    971         android:protectionLevel="dangerous" />
    972 
    973     <!-- Allows an application to add voicemails into the system.
    974          <p>Protection level: dangerous
    975     -->
    976     <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL"
    977         android:permissionGroup="android.permission-group.PHONE"
    978         android:label="@string/permlab_addVoicemail"
    979         android:description="@string/permdesc_addVoicemail"
    980         android:protectionLevel="dangerous" />
    981 
    982     <!-- Allows an application to use SIP service.
    983          <p>Protection level: dangerous
    984     -->
    985     <permission android:name="android.permission.USE_SIP"
    986         android:permissionGroup="android.permission-group.PHONE"
    987         android:description="@string/permdesc_use_sip"
    988         android:label="@string/permlab_use_sip"
    989         android:protectionLevel="dangerous"/>
    990 
    991     <!-- Allows the app to answer an incoming phone call.
    992          <p>Protection level: dangerous
    993     -->
    994     <permission android:name="android.permission.ANSWER_PHONE_CALLS"
    995         android:permissionGroup="android.permission-group.PHONE"
    996         android:label="@string/permlab_answerPhoneCalls"
    997         android:description="@string/permdesc_answerPhoneCalls"
    998         android:protectionLevel="dangerous|runtime" />
    999 
   1000     <!-- Allows a calling application which manages it own calls through the self-managed
   1001          {@link android.telecom.ConnectionService} APIs.  See
   1002          {@link android.telecom.PhoneAccount#CAPABILITY_SELF_MANAGED for more information on the
   1003          self-managed ConnectionService APIs.
   1004          <p>Protection level: normal
   1005     -->
   1006     <permission android:name="android.permission.MANAGE_OWN_CALLS"
   1007                 android:label="@string/permlab_manageOwnCalls"
   1008                 android:description="@string/permdesc_manageOwnCalls"
   1009                 android:protectionLevel="normal" />
   1010 
   1011     <!-- Allows a calling app to continue a call which was started in another app.  An example is a
   1012          video calling app that wants to continue a voice call on the user's mobile network.<p>
   1013          When the handover of a call from one app to another takes place, there are two devices
   1014          which are involved in the handover; the initiating and receiving devices.  The initiating
   1015          device is where the request to handover the call was started, and the receiving device is
   1016          where the handover request is confirmed by the other party.<p>
   1017          This permission protects access to the
   1018          {@link android.telecom.TelecomManager#acceptHandover(Uri, int, PhoneAccountHandle)} which
   1019          the receiving side of the handover uses to accept a handover.
   1020          <p>Protection level: dangerous
   1021     -->
   1022     <permission android:name="android.permission.ACCEPT_HANDOVER"
   1023                 android:permissionGroup="android.permission-group.PHONE"
   1024                 android.label="@string/permlab_acceptHandover"
   1025                 android:description="@string/permdesc_acceptHandovers"
   1026                 android:protectionLevel="dangerous" />
   1027 
   1028     <!-- ====================================================================== -->
   1029     <!-- Permissions for accessing the device microphone                        -->
   1030     <!-- ====================================================================== -->
   1031     <eat-comment />
   1032 
   1033     <!-- Used for permissions that are associated with accessing
   1034          microphone audio from the device. Note that phone calls also capture audio
   1035          but are in a separate (more visible) permission group. -->
   1036     <permission-group android:name="android.permission-group.MICROPHONE"
   1037         android:icon="@drawable/perm_group_microphone"
   1038         android:label="@string/permgrouplab_microphone"
   1039         android:description="@string/permgroupdesc_microphone"
   1040         android:request="@string/permgrouprequest_microphone"
   1041         android:priority="600" />
   1042 
   1043     <!-- Allows an application to record audio.
   1044          <p>Protection level: dangerous
   1045     -->
   1046     <permission android:name="android.permission.RECORD_AUDIO"
   1047         android:permissionGroup="android.permission-group.MICROPHONE"
   1048         android:label="@string/permlab_recordAudio"
   1049         android:description="@string/permdesc_recordAudio"
   1050         android:protectionLevel="dangerous|instant"/>
   1051 
   1052     <!-- ====================================================================== -->
   1053     <!-- Permissions for accessing the UCE Service                              -->
   1054     <!-- ====================================================================== -->
   1055 
   1056     <!-- @hide Allows an application to Access UCE-Presence.
   1057          <p>Protection level: signature|privileged
   1058     -->
   1059     <permission android:name="android.permission.ACCESS_UCE_PRESENCE_SERVICE"
   1060         android:permissionGroup="android.permission-group.PHONE"
   1061         android:protectionLevel="signature|privileged"/>
   1062 
   1063     <!-- @hide Allows an application to Access UCE-OPTIONS.
   1064          <p>Protection level: signature|privileged
   1065     -->
   1066     <permission android:name="android.permission.ACCESS_UCE_OPTIONS_SERVICE"
   1067         android:permissionGroup="android.permission-group.PHONE"
   1068         android:protectionLevel="signature|privileged"/>
   1069 
   1070 
   1071 
   1072     <!-- ====================================================================== -->
   1073     <!-- Permissions for accessing the device camera                            -->
   1074     <!-- ====================================================================== -->
   1075     <eat-comment />
   1076 
   1077     <!-- Used for permissions that are associated with accessing
   1078      camera or capturing images/video from the device. -->
   1079     <permission-group android:name="android.permission-group.CAMERA"
   1080         android:icon="@drawable/perm_group_camera"
   1081         android:label="@string/permgrouplab_camera"
   1082         android:description="@string/permgroupdesc_camera"
   1083         android:request="@string/permgrouprequest_camera"
   1084         android:priority="700" />
   1085 
   1086     <!-- Required to be able to access the camera device.
   1087          <p>This will automatically enforce the <a
   1088          href="{@docRoot}guide/topics/manifest/uses-feature-element.html">
   1089          <uses-feature>}</a> manifest element for <em>all</em> camera features.
   1090          If you do not require all camera features or can properly operate if a camera
   1091          is not available, then you must modify your manifest as appropriate in order to
   1092          install on devices that don't support all camera features.</p>
   1093          <p>Protection level: dangerous
   1094     -->
   1095     <permission android:name="android.permission.CAMERA"
   1096         android:permissionGroup="android.permission-group.CAMERA"
   1097         android:label="@string/permlab_camera"
   1098         android:description="@string/permdesc_camera"
   1099         android:protectionLevel="dangerous|instant" />
   1100 
   1101 
   1102     <!-- ====================================================================== -->
   1103     <!-- Permissions for accessing the device sensors                           -->
   1104     <!-- ====================================================================== -->
   1105     <eat-comment />
   1106 
   1107     <!-- Used for permissions that are associated with accessing
   1108          body or environmental sensors. -->
   1109     <permission-group android:name="android.permission-group.SENSORS"
   1110         android:icon="@drawable/perm_group_sensors"
   1111         android:label="@string/permgrouplab_sensors"
   1112         android:description="@string/permgroupdesc_sensors"
   1113         android:request="@string/permgrouprequest_sensors"
   1114         android:priority="800" />
   1115 
   1116     <!-- Allows an application to access data from sensors that the user uses to
   1117          measure what is happening inside his/her body, such as heart rate.
   1118          <p>Protection level: dangerous -->
   1119     <permission android:name="android.permission.BODY_SENSORS"
   1120         android:permissionGroup="android.permission-group.SENSORS"
   1121         android:label="@string/permlab_bodySensors"
   1122         android:description="@string/permdesc_bodySensors"
   1123         android:protectionLevel="dangerous" />
   1124 
   1125     <!-- Allows an app to use fingerprint hardware.
   1126          <p>Protection level: normal
   1127          @deprecated Applications should request {@link
   1128          android.Manifest.permission#USE_BIOMETRIC} instead
   1129     -->
   1130     <permission android:name="android.permission.USE_FINGERPRINT"
   1131         android:permissionGroup="android.permission-group.SENSORS"
   1132         android:label="@string/permlab_useFingerprint"
   1133         android:description="@string/permdesc_useFingerprint"
   1134         android:protectionLevel="normal" />
   1135 
   1136     <!-- Allows an app to use device supported biometric modalities.
   1137          <p>Protection level: normal
   1138     -->
   1139     <permission android:name="android.permission.USE_BIOMETRIC"
   1140         android:permissionGroup="android.permission-group.SENSORS"
   1141         android:label="@string/permlab_useBiometric"
   1142         android:description="@string/permdesc_useBiometric"
   1143         android:protectionLevel="normal" />
   1144 
   1145     <!-- ====================================================================== -->
   1146     <!-- REMOVED PERMISSIONS                                                    -->
   1147     <!-- ====================================================================== -->
   1148 
   1149     <!-- @hide We need to keep this around for backwards compatibility -->
   1150     <permission android:name="android.permission.READ_PROFILE"
   1151         android:protectionLevel="normal"
   1152         android:permissionFlags="removed"/>
   1153 
   1154     <!-- @hide We need to keep this around for backwards compatibility -->
   1155     <permission android:name="android.permission.WRITE_PROFILE"
   1156         android:protectionLevel="normal"
   1157         android:permissionFlags="removed"/>
   1158 
   1159     <!-- @hide We need to keep this around for backwards compatibility -->
   1160     <permission android:name="android.permission.READ_SOCIAL_STREAM"
   1161         android:protectionLevel="normal"
   1162         android:permissionFlags="removed"/>
   1163 
   1164     <!-- @hide We need to keep this around for backwards compatibility -->
   1165     <permission android:name="android.permission.WRITE_SOCIAL_STREAM"
   1166         android:protectionLevel="normal"
   1167         android:permissionFlags="removed"/>
   1168 
   1169     <!-- @hide We need to keep this around for backwards compatibility -->
   1170     <permission android:name="android.permission.READ_USER_DICTIONARY"
   1171         android:protectionLevel="normal"
   1172         android:permissionFlags="removed"/>
   1173 
   1174     <!-- @hide We need to keep this around for backwards compatibility -->
   1175     <permission android:name="android.permission.WRITE_USER_DICTIONARY"
   1176         android:protectionLevel="normal"
   1177         android:permissionFlags="removed"/>
   1178 
   1179     <!-- @hide We need to keep this around for backwards compatibility -->
   1180     <permission android:name="android.permission.WRITE_SMS"
   1181         android:protectionLevel="normal"
   1182         android:permissionFlags="removed"/>
   1183 
   1184     <!-- @hide We need to keep this around for backwards compatibility -->
   1185     <permission android:name="com.android.browser.permission.READ_HISTORY_BOOKMARKS"
   1186         android:protectionLevel="normal"
   1187         android:permissionFlags="removed"/>
   1188 
   1189     <!-- @hide We need to keep this around for backwards compatibility -->
   1190     <permission android:name="com.android.browser.permission.WRITE_HISTORY_BOOKMARKS"
   1191         android:protectionLevel="normal"
   1192         android:permissionFlags="removed"/>
   1193 
   1194     <!-- @hide We need to keep this around for backwards compatibility -->
   1195     <permission android:name="android.permission.AUTHENTICATE_ACCOUNTS"
   1196         android:protectionLevel="normal"
   1197         android:permissionFlags="removed"/>
   1198 
   1199     <!-- @hide We need to keep this around for backwards compatibility -->
   1200     <permission android:name="android.permission.MANAGE_ACCOUNTS"
   1201         android:protectionLevel="normal"
   1202         android:permissionFlags="removed"/>
   1203 
   1204     <!-- @hide We need to keep this around for backwards compatibility -->
   1205     <permission android:name="android.permission.USE_CREDENTIALS"
   1206         android:protectionLevel="normal"
   1207         android:permissionFlags="removed"/>
   1208 
   1209     <!-- @hide We need to keep this around for backwards compatibility -->
   1210     <permission android:name="android.permission.SUBSCRIBED_FEEDS_READ"
   1211         android:protectionLevel="normal"
   1212         android:permissionFlags="removed"/>
   1213 
   1214     <!-- @hide We need to keep this around for backwards compatibility -->
   1215     <permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE"
   1216         android:protectionLevel="normal"
   1217         android:permissionFlags="removed"/>
   1218 
   1219     <!-- @hide We need to keep this around for backwards compatibility -->
   1220     <permission android:name="android.permission.FLASHLIGHT"
   1221         android:protectionLevel="normal"
   1222         android:permissionFlags="removed"/>
   1223 
   1224     <!-- ====================================================================== -->
   1225     <!-- INSTALL PERMISSIONS                                                    -->
   1226     <!-- ====================================================================== -->
   1227 
   1228     <!-- ================================== -->
   1229     <!-- Permissions for accessing messages -->
   1230     <!-- ================================== -->
   1231     <eat-comment />
   1232 
   1233     <!-- @SystemApi Allows an application (Phone) to send a request to other applications
   1234          to handle the respond-via-message action during incoming calls.
   1235          <p>Not for use by third-party applications. -->
   1236     <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE"
   1237         android:protectionLevel="signature|privileged" />
   1238 
   1239     <!-- @SystemApi Allows an application to send SMS to premium shortcodes without user permission.
   1240          <p>Not for use by third-party applications.
   1241          @hide -->
   1242     <permission android:name="android.permission.SEND_SMS_NO_CONFIRMATION"
   1243         android:protectionLevel="signature|privileged" />
   1244 
   1245     <!-- Allows an application to filter carrier specific sms.
   1246          @hide -->
   1247     <permission android:name="android.permission.CARRIER_FILTER_SMS"
   1248         android:protectionLevel="signature|privileged" />
   1249 
   1250     <!-- @SystemApi Allows an application to receive emergency cell broadcast messages,
   1251          to record or display them to the user.
   1252          <p>Not for use by third-party applications.
   1253          @hide -->
   1254     <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST"
   1255         android:protectionLevel="signature|privileged" />
   1256 
   1257     <!-- Allows an application to monitor incoming Bluetooth MAP messages, to record
   1258          or perform processing on them. -->
   1259     <!-- @hide -->
   1260     <permission android:name="android.permission.RECEIVE_BLUETOOTH_MAP"
   1261         android:protectionLevel="signature|privileged" />
   1262 
   1263     <!-- @SystemApi @hide Allows an application to execute contacts directory search.
   1264          This should only be used by ContactsProvider.
   1265          <p>Not for use by third-party applications. -->
   1266     <permission android:name="android.permission.BIND_DIRECTORY_SEARCH"
   1267         android:protectionLevel="signature|privileged" />
   1268 
   1269     <!-- @SystemApi @hide Allows an application to modify cell broadcasts through the content provider.
   1270          <p>Not for use by third-party applications. -->
   1271     <permission android:name="android.permission.MODIFY_CELL_BROADCASTS"
   1272                 android:protectionLevel="signature|privileged" />
   1273 
   1274     <!-- =============================================================== -->
   1275     <!-- Permissions for setting the device alarm                        -->
   1276     <!-- =============================================================== -->
   1277     <eat-comment />
   1278 
   1279     <!-- Allows an application to broadcast an Intent to set an alarm for the user.
   1280          <p>Protection level: normal
   1281     -->
   1282     <permission android:name="com.android.alarm.permission.SET_ALARM"
   1283         android:label="@string/permlab_setAlarm"
   1284         android:description="@string/permdesc_setAlarm"
   1285         android:protectionLevel="normal" />
   1286 
   1287     <!-- =============================================================== -->
   1288     <!-- Permissions for accessing the user voicemail                    -->
   1289     <!-- =============================================================== -->
   1290     <eat-comment />
   1291 
   1292     <!-- Allows an application to modify and remove existing voicemails in the system.
   1293         <p>Protection level: signature|privileged
   1294     -->
   1295     <permission android:name="com.android.voicemail.permission.WRITE_VOICEMAIL"
   1296         android:protectionLevel="signature|privileged" />
   1297 
   1298     <!-- Allows an application to read voicemails in the system.
   1299          <p>Protection level: signature|privileged
   1300     -->
   1301     <permission android:name="com.android.voicemail.permission.READ_VOICEMAIL"
   1302         android:protectionLevel="signature|privileged" />
   1303 
   1304     <!-- ======================================= -->
   1305     <!-- Permissions for accessing location info -->
   1306     <!-- ======================================= -->
   1307     <eat-comment />
   1308 
   1309     <!-- Allows an application to access extra location provider commands.
   1310          <p>Protection level: normal
   1311     -->
   1312     <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS"
   1313         android:label="@string/permlab_accessLocationExtraCommands"
   1314         android:description="@string/permdesc_accessLocationExtraCommands"
   1315         android:protectionLevel="normal" />
   1316 
   1317     <!-- @SystemApi Allows an application to install a location provider into the Location Manager.
   1318     <p>Not for use by third-party applications. -->
   1319     <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER"
   1320         android:protectionLevel="signature|privileged" />
   1321 
   1322     <!-- @SystemApi @hide Allows HDMI-CEC service to access device and configuration files.
   1323          This should only be used by HDMI-CEC service.
   1324     -->
   1325     <permission android:name="android.permission.HDMI_CEC"
   1326         android:protectionLevel="signature|privileged" />
   1327 
   1328     <!-- @SystemApi Allows an application to use location features in hardware,
   1329          such as the geofencing api.
   1330          <p>Not for use by third-party applications. -->
   1331     <permission android:name="android.permission.LOCATION_HARDWARE"
   1332         android:protectionLevel="signature|privileged" />
   1333     <uses-permission android:name="android.permission.LOCATION_HARDWARE"/>
   1334 
   1335     <!-- @SystemApi Allows an application to create mock location providers for testing.
   1336          <p>Protection level: signature
   1337          @hide
   1338     -->
   1339     <permission android:name="android.permission.ACCESS_MOCK_LOCATION"
   1340         android:protectionLevel="signature" />
   1341 
   1342     <!-- ======================================= -->
   1343     <!-- Permissions for accessing networks -->
   1344     <!-- ======================================= -->
   1345     <eat-comment />
   1346 
   1347     <!-- Allows applications to open network sockets.
   1348          <p>Protection level: normal
   1349     -->
   1350     <permission android:name="android.permission.INTERNET"
   1351         android:description="@string/permdesc_createNetworkSockets"
   1352         android:label="@string/permlab_createNetworkSockets"
   1353         android:protectionLevel="normal|instant" />
   1354 
   1355     <!-- Allows applications to access information about networks.
   1356          <p>Protection level: normal
   1357     -->
   1358     <permission android:name="android.permission.ACCESS_NETWORK_STATE"
   1359         android:description="@string/permdesc_accessNetworkState"
   1360         android:label="@string/permlab_accessNetworkState"
   1361         android:protectionLevel="normal|instant" />
   1362 
   1363     <!-- Allows applications to access information about Wi-Fi networks.
   1364          <p>Protection level: normal
   1365     -->
   1366     <permission android:name="android.permission.ACCESS_WIFI_STATE"
   1367         android:description="@string/permdesc_accessWifiState"
   1368         android:label="@string/permlab_accessWifiState"
   1369         android:protectionLevel="normal" />
   1370 
   1371     <!-- Allows applications to change Wi-Fi connectivity state.
   1372          <p>Protection level: normal
   1373     -->
   1374     <permission android:name="android.permission.CHANGE_WIFI_STATE"
   1375         android:description="@string/permdesc_changeWifiState"
   1376         android:label="@string/permlab_changeWifiState"
   1377         android:protectionLevel="normal" />
   1378 
   1379     <!-- @SystemApi @hide Allows apps to create and manage IPsec tunnels.
   1380          <p>Only granted to applications that are currently bound by the
   1381          system for creating and managing IPsec-based interfaces.
   1382     -->
   1383     <permission android:name="android.permission.MANAGE_IPSEC_TUNNELS"
   1384         android:protectionLevel="signature|appop" />
   1385 
   1386     <!-- @SystemApi @hide Allows applications to read Wi-Fi credential.
   1387          <p>Not for use by third-party applications. -->
   1388     <permission android:name="android.permission.READ_WIFI_CREDENTIAL"
   1389         android:protectionLevel="signature|privileged" />
   1390 
   1391     <!-- @SystemApi @hide Allows applications to change tether state and run
   1392          tether carrier provisioning.
   1393          <p>Not for use by third-party applications. -->
   1394     <permission android:name="android.permission.TETHER_PRIVILEGED"
   1395         android:protectionLevel="signature|privileged" />
   1396 
   1397     <!-- @SystemApi @hide Allow system apps to receive broadcast
   1398          when a wifi network credential is changed.
   1399          <p>Not for use by third-party applications. -->
   1400     <permission android:name="android.permission.RECEIVE_WIFI_CREDENTIAL_CHANGE"
   1401         android:protectionLevel="signature|privileged" />
   1402 
   1403     <!-- @SystemApi @hide Allows an application to modify any wifi configuration, even if created
   1404      by another application. Once reconfigured the original creator cannot make any further
   1405      modifications.
   1406      <p>Not for use by third-party applications. -->
   1407     <permission android:name="android.permission.OVERRIDE_WIFI_CONFIG"
   1408         android:protectionLevel="signature|privileged" />
   1409 
   1410     <!-- @hide -->
   1411     <permission android:name="android.permission.ACCESS_WIMAX_STATE"
   1412         android:description="@string/permdesc_accessWimaxState"
   1413         android:label="@string/permlab_accessWimaxState"
   1414         android:protectionLevel="normal" />
   1415 
   1416     <!-- @hide -->
   1417     <permission android:name="android.permission.CHANGE_WIMAX_STATE"
   1418         android:description="@string/permdesc_changeWimaxState"
   1419         android:label="@string/permlab_changeWimaxState"
   1420         android:protectionLevel="normal" />
   1421 
   1422     <!-- Allows applications to act as network scorers. @hide @SystemApi-->
   1423     <permission android:name="android.permission.SCORE_NETWORKS"
   1424         android:protectionLevel="signature|privileged" />
   1425 
   1426     <!-- Allows applications to request network
   1427          recommendations and scores from the NetworkScoreService.
   1428          <p>Not for use by third-party applications. @hide -->
   1429     <permission android:name="android.permission.REQUEST_NETWORK_SCORES"
   1430         android:protectionLevel="signature|setup" />
   1431 
   1432     <!-- Allows network stack services (Connectivity and Wifi) to coordinate
   1433          <p>Not for use by third-party or privileged applications.
   1434          @hide This should only be used by Connectivity and Wifi Services.
   1435     -->
   1436     <permission android:name="android.permission.NETWORK_STACK"
   1437         android:protectionLevel="signature" />
   1438 
   1439     <!-- Allows Settings and SystemUI to call methods in Networking services
   1440          <p>Not for use by third-party or privileged applications.
   1441          @hide This should only be used by Settings and SystemUI.
   1442     -->
   1443     <permission android:name="android.permission.NETWORK_SETTINGS"
   1444         android:protectionLevel="signature" />
   1445 
   1446     <!-- Allows SetupWizard to call methods in Networking services
   1447          <p>Not for use by any other third-party or privileged applications.
   1448          @hide This should only be used by SetupWizard.
   1449     -->
   1450     <permission android:name="android.permission.NETWORK_SETUP_WIZARD"
   1451         android:protectionLevel="signature|setup" />
   1452 
   1453     <!-- #SystemApi @hide Allows applications to access information about LoWPAN interfaces.
   1454          <p>Not for use by third-party applications. -->
   1455     <permission android:name="android.permission.ACCESS_LOWPAN_STATE"
   1456         android:protectionLevel="signature|privileged" />
   1457 
   1458     <!-- #SystemApi @hide Allows applications to change LoWPAN connectivity state.
   1459          <p>Not for use by third-party applications. -->
   1460     <permission android:name="android.permission.CHANGE_LOWPAN_STATE"
   1461         android:protectionLevel="signature|privileged" />
   1462 
   1463     <!-- #SystemApi @hide Allows applications to read LoWPAN credential.
   1464          <p>Not for use by third-party applications. -->
   1465     <permission android:name="android.permission.READ_LOWPAN_CREDENTIAL"
   1466         android:protectionLevel="signature|privileged" />
   1467 
   1468     <!-- #SystemApi @hide Allows a service to register or unregister
   1469          new LoWPAN interfaces.
   1470          <p>Not for use by third-party applications. -->
   1471     <permission android:name="android.permission.MANAGE_LOWPAN_INTERFACES"
   1472         android:protectionLevel="signature|privileged" />
   1473 
   1474     <!-- @hide Allows internal management of Wi-Fi connectivity state when on
   1475          permission review mode.
   1476          <p>Not for use by third-party applications. -->
   1477     <permission android:name="android.permission.MANAGE_WIFI_WHEN_PERMISSION_REVIEW_REQUIRED"
   1478         android:protectionLevel="signature" />
   1479 
   1480     <!-- @hide Allows an app to bypass Private DNS.
   1481          <p>Not for use by third-party applications. -->
   1482     <permission android:name="android.permission.NETWORK_BYPASS_PRIVATE_DNS"
   1483         android:protectionLevel="signature" />
   1484 
   1485     <!-- ======================================= -->
   1486     <!-- Permissions for short range, peripheral networks -->
   1487     <!-- ======================================= -->
   1488     <eat-comment />
   1489 
   1490     <!-- Allows applications to connect to paired bluetooth devices.
   1491          <p>Protection level: normal
   1492     -->
   1493     <permission android:name="android.permission.BLUETOOTH"
   1494         android:description="@string/permdesc_bluetooth"
   1495         android:label="@string/permlab_bluetooth"
   1496         android:protectionLevel="normal" />
   1497 
   1498     <!-- @SystemApi Allows an application to suspend other apps, which will prevent the user
   1499          from using them until they are unsuspended.
   1500          @hide
   1501     -->
   1502     <permission android:name="android.permission.SUSPEND_APPS"
   1503         android:protectionLevel="signature|privileged" />
   1504 
   1505     <!-- @SystemApi Must be required by activities that handle the intent action
   1506          {@link Intent#ACTION_SEND_SHOW_SUSPENDED_APP_DETAILS}. This is for use by apps that
   1507          hold {@link Manifest.permission#SUSPEND_APPS} to interact with the system.
   1508          <p>Not for use by third-party applications.
   1509          @hide -->
   1510     <permission android:name="android.permission.SEND_SHOW_SUSPENDED_APP_DETAILS"
   1511                 android:protectionLevel="signature" />
   1512 
   1513     <!-- Allows applications to discover and pair bluetooth devices.
   1514          <p>Protection level: normal
   1515     -->
   1516     <permission android:name="android.permission.BLUETOOTH_ADMIN"
   1517         android:description="@string/permdesc_bluetoothAdmin"
   1518         android:label="@string/permlab_bluetoothAdmin"
   1519         android:protectionLevel="normal" />
   1520 
   1521     <!-- @SystemApi Allows applications to pair bluetooth devices without user interaction, and to
   1522          allow or disallow phonebook access or message access.
   1523          This is not available to third party applications. -->
   1524     <permission android:name="android.permission.BLUETOOTH_PRIVILEGED"
   1525         android:protectionLevel="signature|privileged" />
   1526 
   1527     <!-- Control access to email providers exclusively for Bluetooth
   1528          @hide
   1529     -->
   1530     <permission android:name="android.permission.BLUETOOTH_MAP"
   1531         android:protectionLevel="signature" />
   1532 
   1533     <!-- Allows bluetooth stack to access files
   1534          @hide This should only be used by Bluetooth apk.
   1535     -->
   1536     <permission android:name="android.permission.BLUETOOTH_STACK"
   1537         android:protectionLevel="signature" />
   1538 
   1539     <!-- Allows applications to perform I/O operations over NFC.
   1540          <p>Protection level: normal
   1541     -->
   1542     <permission android:name="android.permission.NFC"
   1543         android:description="@string/permdesc_nfc"
   1544         android:label="@string/permlab_nfc"
   1545         android:protectionLevel="normal" />
   1546 
   1547     <!-- Allows applications to receive NFC transaction events.
   1548          <p>Protection level: normal
   1549     -->
   1550     <permission android:name="android.permission.NFC_TRANSACTION_EVENT"
   1551         android:protectionLevel="normal" />
   1552 
   1553     <!-- @SystemApi Allows an internal user to use privileged ConnectivityManager APIs.
   1554          @hide -->
   1555     <permission android:name="android.permission.CONNECTIVITY_INTERNAL"
   1556         android:protectionLevel="signature|privileged" />
   1557 
   1558     <!-- @SystemApi Allows an internal user to use restricted Networks.
   1559          @hide -->
   1560     <permission android:name="android.permission.CONNECTIVITY_USE_RESTRICTED_NETWORKS"
   1561         android:protectionLevel="signature|privileged" />
   1562 
   1563     <!-- Allows a system application to access hardware packet offload capabilities.
   1564          @hide -->
   1565     <permission android:name="android.permission.PACKET_KEEPALIVE_OFFLOAD"
   1566         android:protectionLevel="signature|privileged" />
   1567 
   1568     <!-- @SystemApi
   1569          @hide -->
   1570     <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE"
   1571         android:protectionLevel="signature|privileged" />
   1572 
   1573     <!-- @SystemApi Allows access to the loop radio (Android@Home mesh network) device.
   1574          @hide -->
   1575     <permission android:name="android.permission.LOOP_RADIO"
   1576         android:protectionLevel="signature|privileged" />
   1577 
   1578     <!-- Allows sending and receiving handover transfer status from Wifi and Bluetooth
   1579          @hide -->
   1580     <permission android:name="android.permission.NFC_HANDOVER_STATUS"
   1581         android:protectionLevel="signature|privileged" />
   1582 
   1583     <!-- @hide Allows internal management of Bluetooth state when on permission review mode.
   1584          <p>Not for use by third-party applications. -->
   1585     <permission android:name="android.permission.MANAGE_BLUETOOTH_WHEN_PERMISSION_REVIEW_REQUIRED"
   1586         android:protectionLevel="signature" />
   1587 
   1588     <!-- ================================== -->
   1589     <!-- Permissions for accessing accounts -->
   1590     <!-- ================================== -->
   1591     <eat-comment />
   1592 
   1593     <!-- Allows access to the list of accounts in the Accounts Service.
   1594 
   1595     <p class="note"><strong>Note:</strong> Beginning with Android 6.0 (API level
   1596     23), if an app shares the signature of the authenticator that manages an
   1597     account, it does not need <code>"GET_ACCOUNTS"</code> permission to read
   1598     information about that account. On Android 5.1 and lower, all apps need
   1599     <code>"GET_ACCOUNTS"</code> permission to read information about any
   1600     account.</p>
   1601 
   1602     <p>Protection level: dangerous
   1603     -->
   1604     <permission android:name="android.permission.GET_ACCOUNTS"
   1605         android:permissionGroup="android.permission-group.CONTACTS"
   1606         android:protectionLevel="dangerous"
   1607         android:description="@string/permdesc_getAccounts"
   1608         android:label="@string/permlab_getAccounts" />
   1609     <uses-permission android:name="android.permission.GET_ACCOUNTS"/>
   1610 
   1611     <!-- @SystemApi Allows applications to call into AccountAuthenticators.
   1612     <p>Not for use by third-party applications. -->
   1613     <permission android:name="android.permission.ACCOUNT_MANAGER"
   1614         android:protectionLevel="signature" />
   1615 
   1616     <!-- ================================== -->
   1617     <!-- Permissions for accessing hardware that may effect battery life-->
   1618     <!-- ================================== -->
   1619     <eat-comment />
   1620 
   1621     <!-- Allows applications to enter Wi-Fi Multicast mode.
   1622          <p>Protection level: normal
   1623     -->
   1624     <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE"
   1625         android:description="@string/permdesc_changeWifiMulticastState"
   1626         android:label="@string/permlab_changeWifiMulticastState"
   1627         android:protectionLevel="normal" />
   1628 
   1629     <!-- Allows access to the vibrator.
   1630          <p>Protection level: normal
   1631     -->
   1632     <permission android:name="android.permission.VIBRATE"
   1633         android:label="@string/permlab_vibrate"
   1634         android:description="@string/permdesc_vibrate"
   1635         android:protectionLevel="normal|instant" />
   1636 
   1637     <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen
   1638          from dimming.
   1639          <p>Protection level: normal
   1640     -->
   1641     <permission android:name="android.permission.WAKE_LOCK"
   1642         android:label="@string/permlab_wakeLock"
   1643         android:description="@string/permdesc_wakeLock"
   1644         android:protectionLevel="normal|instant" />
   1645 
   1646     <!-- Allows using the device's IR transmitter, if available.
   1647          <p>Protection level: normal
   1648     -->
   1649     <permission android:name="android.permission.TRANSMIT_IR"
   1650         android:label="@string/permlab_transmitIr"
   1651         android:description="@string/permdesc_transmitIr"
   1652         android:protectionLevel="normal" />
   1653 
   1654     <!-- ==================================================== -->
   1655     <!-- Permissions related to changing audio settings   -->
   1656     <!-- ==================================================== -->
   1657     <eat-comment />
   1658 
   1659     <!-- Allows an application to modify global audio settings.
   1660          <p>Protection level: normal
   1661     -->
   1662     <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS"
   1663         android:label="@string/permlab_modifyAudioSettings"
   1664         android:description="@string/permdesc_modifyAudioSettings"
   1665         android:protectionLevel="normal" />
   1666 
   1667     <!-- ================================== -->
   1668     <!-- Permissions for accessing hardware -->
   1669     <!-- ================================== -->
   1670     <eat-comment />
   1671 
   1672     <!-- @SystemApi Allows an application to manage preferences and permissions for USB devices
   1673          @hide -->
   1674     <permission android:name="android.permission.MANAGE_USB"
   1675         android:protectionLevel="signature|privileged" />
   1676 
   1677     <!-- @SystemApi Allows an application to access the MTP USB kernel driver.
   1678          For use only by the device side MTP implementation.
   1679          @hide -->
   1680     <permission android:name="android.permission.ACCESS_MTP"
   1681         android:protectionLevel="signature|privileged" />
   1682 
   1683     <!-- @SystemApi Allows access to hardware peripherals.  Intended only for hardware testing.
   1684          <p>Not for use by third-party applications.
   1685          @hide
   1686     -->
   1687     <permission android:name="android.permission.HARDWARE_TEST"
   1688         android:protectionLevel="signature" />
   1689 
   1690     <!-- @SystemApi Allows access to Broadcast Radio
   1691          @hide This is not a third-party API (intended for system apps).-->
   1692     <permission android:name="android.permission.ACCESS_BROADCAST_RADIO"
   1693         android:protectionLevel="signature|privileged" />
   1694 
   1695     <!-- @deprecated @SystemApi Allows access to FM
   1696          @hide This is not a third-party API (intended for system apps).-->
   1697     <permission android:name="android.permission.ACCESS_FM_RADIO"
   1698         android:protectionLevel="signature|privileged" />
   1699 
   1700     <!-- Allows access to configure network interfaces, configure/use IPSec, etc.
   1701          @hide -->
   1702     <permission android:name="android.permission.NET_ADMIN"
   1703         android:protectionLevel="signature" />
   1704 
   1705     <!-- Allows registration for remote audio playback. @hide -->
   1706     <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK"
   1707         android:protectionLevel="signature" />
   1708 
   1709     <!-- @SystemApi Allows TvInputService to access underlying TV input hardware such as
   1710          built-in tuners and HDMI-in's.
   1711          @hide This should only be used by OEM's TvInputService's.
   1712     -->
   1713     <permission android:name="android.permission.TV_INPUT_HARDWARE"
   1714         android:protectionLevel="signature|privileged" />
   1715 
   1716     <!-- @SystemApi Allows to capture a frame of TV input hardware such as
   1717          built-in tuners and HDMI-in's.
   1718          @hide <p>Not for use by third-party applications.
   1719     -->
   1720     <permission android:name="android.permission.CAPTURE_TV_INPUT"
   1721         android:protectionLevel="signature|privileged" />
   1722 
   1723     <!-- @hide Allows TvInputService to access DVB device.
   1724    <p>Not for use by third-party applications. -->
   1725     <permission android:name="android.permission.DVB_DEVICE"
   1726         android:protectionLevel="signature|privileged" />
   1727 
   1728     <!-- @SystemApi Allows reading and enabling/disabling the OEM unlock allowed by carrier state
   1729          @hide <p>Not for use by third-party applications. -->
   1730     <permission android:name="android.permission.MANAGE_CARRIER_OEM_UNLOCK_STATE"
   1731         android:protectionLevel="signature|privileged" />
   1732 
   1733     <!-- @SystemApi Allows reading and enabling/disabling the OEM unlock allowed by user state
   1734          @hide <p>Not for use by third-party applications. -->
   1735     <permission android:name="android.permission.MANAGE_USER_OEM_UNLOCK_STATE"
   1736         android:protectionLevel="signature|privileged" />
   1737 
   1738     <!-- @SystemApi Allows reading the OEM unlock state
   1739          @hide <p>Not for use by third-party applications. -->
   1740     <permission android:name="android.permission.READ_OEM_UNLOCK_STATE"
   1741         android:protectionLevel="signature|privileged" />
   1742 
   1743     <!-- @hide Allows enabling/disabling OEM unlock
   1744    <p>Not for use by third-party applications. -->
   1745     <permission android:name="android.permission.OEM_UNLOCK_STATE"
   1746         android:protectionLevel="signature" />
   1747 
   1748     <!-- @hide Allows querying state of PersistentDataBlock
   1749    <p>Not for use by third-party applications. -->
   1750     <permission android:name="android.permission.ACCESS_PDB_STATE"
   1751         android:protectionLevel="signature" />
   1752 
   1753     <!-- Allows testing if a passwords is forbidden by the admins.
   1754          @hide <p>Not for use by third-party applications. -->
   1755     <permission android:name="android.permission.TEST_BLACKLISTED_PASSWORD"
   1756         android:protectionLevel="signature" />
   1757 
   1758     <!-- @hide Allows system update service to notify device owner about pending updates.
   1759    <p>Not for use by third-party applications. -->
   1760     <permission android:name="android.permission.NOTIFY_PENDING_SYSTEM_UPDATE"
   1761         android:protectionLevel="signature|privileged" />
   1762 
   1763     <!-- =========================================== -->
   1764     <!-- Permissions associated with camera and image capture -->
   1765     <!-- =========================================== -->
   1766     <eat-comment />
   1767 
   1768     <!-- @SystemApi Allows disabling the transmit-indicator LED that is normally on when
   1769          a camera is in use by an application.
   1770          @hide -->
   1771     <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED"
   1772         android:protectionLevel="signature|privileged" />
   1773 
   1774     <!-- Allows sending the camera service notifications about system-wide events.
   1775         @hide -->
   1776     <permission android:name="android.permission.CAMERA_SEND_SYSTEM_EVENTS"
   1777         android:protectionLevel="signature|privileged" />
   1778 
   1779     <!-- =========================================== -->
   1780     <!-- Permissions associated with telephony state -->
   1781     <!-- =========================================== -->
   1782     <eat-comment />
   1783 
   1784     <!-- @SystemApi Allows modification of the telephony state - power on, mmi, etc.
   1785          Does not include placing calls.
   1786          <p>Not for use by third-party applications. -->
   1787     <permission android:name="android.permission.MODIFY_PHONE_STATE"
   1788         android:protectionLevel="signature|privileged" />
   1789 
   1790     <!-- Allows read only access to precise phone state.
   1791          @hide Pending API council approval -->
   1792     <permission android:name="android.permission.READ_PRECISE_PHONE_STATE"
   1793         android:protectionLevel="signature|privileged" />
   1794 
   1795     <!-- @SystemApi Allows read access to privileged phone state.
   1796          @hide Used internally. -->
   1797     <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE"
   1798         android:protectionLevel="signature|privileged" />
   1799 
   1800     <!-- @SystemApi Protects the ability to register any PhoneAccount with
   1801          PhoneAccount#CAPABILITY_SIM_SUBSCRIPTION. This capability indicates that the PhoneAccount
   1802          corresponds to a device SIM.
   1803          @hide -->
   1804     <permission android:name="android.permission.REGISTER_SIM_SUBSCRIPTION"
   1805         android:protectionLevel="signature|privileged" />
   1806 
   1807     <!-- @SystemApi Protects the ability to register any PhoneAccount with
   1808          PhoneAccount#CAPABILITY_CALL_PROVIDER.
   1809          @hide -->
   1810     <permission android:name="android.permission.REGISTER_CALL_PROVIDER"
   1811         android:protectionLevel="signature|privileged" />
   1812 
   1813     <!-- @SystemApi Protects the ability to register any PhoneAccount with
   1814          PhoneAccount#CAPABILITY_CONNECTION_MANAGER
   1815          @hide -->
   1816     <permission android:name="android.permission.REGISTER_CONNECTION_MANAGER"
   1817         android:protectionLevel="signature|privileged" />
   1818 
   1819     <!-- Must be required by a {@link android.telecom.InCallService},
   1820          to ensure that only the system can bind to it.
   1821          <p>Protection level: signature|privileged
   1822     -->
   1823     <permission android:name="android.permission.BIND_INCALL_SERVICE"
   1824         android:protectionLevel="signature|privileged" />
   1825 
   1826     <!-- Must be required by a link {@link android.telephony.VisualVoicemailService} to ensure that
   1827          only the system can bind to it.
   1828          <p>Protection level: signature|privileged
   1829     -->
   1830     <permission
   1831       android:name="android.permission.BIND_VISUAL_VOICEMAIL_SERVICE"
   1832       android:protectionLevel="signature|privileged"/>
   1833 
   1834     <!-- Must be required by a {@link android.telecom.CallScreeningService},
   1835          to ensure that only the system can bind to it.
   1836          <p>Protection level: signature|privileged
   1837     -->
   1838     <permission android:name="android.permission.BIND_SCREENING_SERVICE"
   1839         android:protectionLevel="signature|privileged" />
   1840 
   1841     <!-- Must be required by a {@link android.telecom.ConnectionService},
   1842          to ensure that only the system can bind to it.
   1843          @deprecated {@link android.telecom.ConnectionService}s should require
   1844                  android.permission.BIND_TELECOM_CONNECTION_SERVICE instead.
   1845          @SystemApi
   1846          @hide -->
   1847     <permission android:name="android.permission.BIND_CONNECTION_SERVICE"
   1848         android:protectionLevel="signature|privileged" />
   1849 
   1850     <!-- Must be required by a {@link android.telecom.ConnectionService},
   1851          to ensure that only the system can bind to it.
   1852          <p>Protection level: signature|privileged
   1853     -->
   1854     <permission android:name="android.permission.BIND_TELECOM_CONNECTION_SERVICE"
   1855         android:protectionLevel="signature|privileged" />
   1856 
   1857     <!-- @SystemApi Allows an application to control the in-call experience.
   1858          @hide -->
   1859     <permission android:name="android.permission.CONTROL_INCALL_EXPERIENCE"
   1860         android:protectionLevel="signature|privileged" />
   1861 
   1862     <!-- Allows an application to receive STK related commands.
   1863          @hide -->
   1864     <permission android:name="android.permission.RECEIVE_STK_COMMANDS"
   1865         android:protectionLevel="signature|privileged" />
   1866 
   1867       <!-- Allows an application to send EMBMS download intents to apps
   1868            @hide -->
   1869     <permission android:name="android.permission.SEND_EMBMS_INTENTS"
   1870         android:protectionLevel="signature|privileged" />
   1871 
   1872 
   1873     <!-- Allows internal management of the sensor framework
   1874          @hide -->
   1875     <permission android:name="android.permission.MANAGE_SENSORS"
   1876         android:protectionLevel="signature" />
   1877 
   1878     <!-- Must be required by an ImsService to ensure that only the
   1879          system can bind to it.
   1880          <p>Protection level: signature|privileged|vendorPrivileged
   1881          @SystemApi
   1882          @hide
   1883     -->
   1884     <permission android:name="android.permission.BIND_IMS_SERVICE"
   1885         android:protectionLevel="signature|privileged|vendorPrivileged" />
   1886 
   1887     <!-- Must be required by a telephony data service to ensure that only the
   1888          system can bind to it.
   1889          <p>Protection level: signature
   1890          @SystemApi
   1891          @hide
   1892     -->
   1893     <permission android:name="android.permission.BIND_TELEPHONY_DATA_SERVICE"
   1894         android:protectionLevel="signature" />
   1895 
   1896     <!-- Must be required by a NetworkService to ensure that only the
   1897          system can bind to it.
   1898          <p>Protection level: signature
   1899          @SystemApi
   1900          @hide
   1901     -->
   1902     <permission android:name="android.permission.BIND_TELEPHONY_NETWORK_SERVICE"
   1903                 android:protectionLevel="signature" />
   1904 
   1905     <!-- @SystemApi Allows an application to manage embedded subscriptions (those on a eUICC)
   1906          through EuiccManager APIs.
   1907          <p>Protection level: signature|privileged|development
   1908          @hide
   1909     -->
   1910     <permission android:name="android.permission.WRITE_EMBEDDED_SUBSCRIPTIONS"
   1911                 android:protectionLevel="signature|privileged|development" />
   1912 
   1913     <!-- @SystemApi Must be required by an EuiccService to ensure that only the system can bind to
   1914          it.
   1915          <p>Protection level: signature
   1916          @hide
   1917     -->
   1918     <permission android:name="android.permission.BIND_EUICC_SERVICE"
   1919                 android:protectionLevel="signature" />
   1920 
   1921     <!-- ================================== -->
   1922     <!-- Permissions for sdcard interaction -->
   1923     <!-- ================================== -->
   1924     <eat-comment />
   1925 
   1926     <!-- @SystemApi Allows an application to write to internal media storage
   1927          @hide  -->
   1928     <permission android:name="android.permission.WRITE_MEDIA_STORAGE"
   1929         android:protectionLevel="signature|privileged" />
   1930 
   1931     <!-- Allows an application to manage access to documents, usually as part
   1932          of a document picker.
   1933          <p>This permission should <em>only</em> be requested by the platform
   1934          document management app.  This permission cannot be granted to
   1935          third-party apps.
   1936          <p>Protection level: signature
   1937     -->
   1938     <permission android:name="android.permission.MANAGE_DOCUMENTS"
   1939         android:protectionLevel="signature" />
   1940 
   1941     <!-- @hide Allows an application to cache content.
   1942          <p>Not for use by third-party applications.
   1943          <p>Protection level: signature
   1944     -->
   1945     <permission android:name="android.permission.CACHE_CONTENT"
   1946         android:protectionLevel="signature" />
   1947 
   1948     <!-- @SystemApi @hide
   1949          Allows an application to aggressively allocate disk space.
   1950          <p>Not for use by third-party applications.
   1951     -->
   1952     <permission android:name="android.permission.ALLOCATE_AGGRESSIVE"
   1953         android:protectionLevel="signature|privileged" />
   1954 
   1955     <!-- @SystemApi @hide
   1956          Allows an application to use reserved disk space.
   1957          <p>Not for use by third-party applications.  Should only be requested by
   1958          apps that provide core system functionality, to ensure system stability
   1959          when disk is otherwise completely full.
   1960     -->
   1961     <permission android:name="android.permission.USE_RESERVED_DISK"
   1962         android:protectionLevel="signature|privileged" />
   1963 
   1964     <!-- ================================== -->
   1965     <!-- Permissions for screenlock         -->
   1966     <!-- ================================== -->
   1967     <eat-comment />
   1968 
   1969     <!-- Allows applications to disable the keyguard if it is not secure.
   1970          <p>Protection level: normal
   1971     -->
   1972     <permission android:name="android.permission.DISABLE_KEYGUARD"
   1973         android:description="@string/permdesc_disableKeyguard"
   1974         android:label="@string/permlab_disableKeyguard"
   1975         android:protectionLevel="normal" />
   1976 
   1977     <!-- ================================== -->
   1978     <!-- Permissions to access other installed applications  -->
   1979     <!-- ================================== -->
   1980     <eat-comment />
   1981 
   1982     <!-- @deprecated No longer enforced. -->
   1983     <permission android:name="android.permission.GET_TASKS"
   1984         android:label="@string/permlab_getTasks"
   1985         android:description="@string/permdesc_getTasks"
   1986         android:protectionLevel="normal" />
   1987 
   1988     <!-- New version of GET_TASKS that apps can request, since GET_TASKS doesn't really
   1989          give access to task information.  We need this new one because there are
   1990          many existing apps that use add libraries and such that have validation
   1991          code to ensure the app has requested the GET_TASKS permission by seeing
   1992          if it has been granted the permission...  if it hasn't, it kills the app
   1993          with a message about being upset.  So we need to have it continue to look
   1994          like the app is getting that permission, even though it will never be
   1995          checked, and new privileged apps can now request this one for real access.
   1996          @hide
   1997          @SystemApi -->
   1998     <permission android:name="android.permission.REAL_GET_TASKS"
   1999         android:protectionLevel="signature|privileged" />
   2000 
   2001     <!-- Allows an application to start a task from a ActivityManager#RecentTaskInfo.
   2002          @hide -->
   2003     <permission android:name="android.permission.START_TASKS_FROM_RECENTS"
   2004         android:protectionLevel="signature|privileged" />
   2005 
   2006     <!-- @SystemApi @hide Allows an application to call APIs that allow it to do interactions
   2007          across the users on the device, using singleton services and
   2008          user-targeted broadcasts.  This permission is not available to
   2009          third party applications. -->
   2010     <permission android:name="android.permission.INTERACT_ACROSS_USERS"
   2011         android:protectionLevel="signature|privileged|development" />
   2012 
   2013     <!-- @SystemApi Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS}
   2014          that removes restrictions on where broadcasts can be sent and allows other
   2015          types of interactions
   2016          @hide -->
   2017     <permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL"
   2018         android:protectionLevel="signature|installer" />
   2019 
   2020     <!-- @SystemApi @hide Allows an application to call APIs that allow it to query and manage
   2021          users on the device. This permission is not available to
   2022          third party applications. -->
   2023     <permission android:name="android.permission.MANAGE_USERS"
   2024         android:protectionLevel="signature|privileged" />
   2025 
   2026     <!-- @hide Allows an application to create, remove users and get the list of
   2027          users on the device. Applications holding this permission can only create restricted,
   2028          guest, managed, demo, and ephemeral users. For creating other kind of users,
   2029          {@link android.Manifest.permission#MANAGE_USERS} is needed.
   2030          This permission is not available to third party applications. -->
   2031     <permission android:name="android.permission.CREATE_USERS"
   2032         android:protectionLevel="signature" />
   2033 
   2034     <!-- @hide Allows an application to set the profile owners and the device owner.
   2035          This permission is not available to third party applications.-->
   2036     <permission android:name="android.permission.MANAGE_PROFILE_AND_DEVICE_OWNERS"
   2037         android:protectionLevel="signature"
   2038         android:label="@string/permlab_manageProfileAndDeviceOwners"
   2039         android:description="@string/permdesc_manageProfileAndDeviceOwners" />
   2040 
   2041     <!-- Allows an application to get full detailed information about
   2042          recently running tasks, with full fidelity to the real state.
   2043          @hide -->
   2044     <permission android:name="android.permission.GET_DETAILED_TASKS"
   2045         android:protectionLevel="signature" />
   2046 
   2047     <!-- Allows an application to change the Z-order of tasks.
   2048          <p>Protection level: normal
   2049     -->
   2050     <permission android:name="android.permission.REORDER_TASKS"
   2051         android:label="@string/permlab_reorderTasks"
   2052         android:description="@string/permdesc_reorderTasks"
   2053         android:protectionLevel="normal" />
   2054 
   2055     <!-- @hide Allows an application to change to remove/kill tasks -->
   2056     <permission android:name="android.permission.REMOVE_TASKS"
   2057         android:protectionLevel="signature" />
   2058 
   2059     <!-- @SystemApi @TestApi @hide Allows an application to create/manage/remove stacks -->
   2060     <permission android:name="android.permission.MANAGE_ACTIVITY_STACKS"
   2061         android:protectionLevel="signature|privileged|development" />
   2062 
   2063     <!-- @SystemApi @TestApi @hide Allows an application to embed other activities -->
   2064     <permission android:name="android.permission.ACTIVITY_EMBEDDING"
   2065                 android:protectionLevel="signature|privileged|development" />
   2066 
   2067     <!-- Allows an application to start any activity, regardless of permission
   2068          protection or exported state.
   2069          @hide -->
   2070     <permission android:name="android.permission.START_ANY_ACTIVITY"
   2071         android:protectionLevel="signature" />
   2072 
   2073     <!-- @deprecated The {@link android.app.ActivityManager#restartPackage}
   2074         API is no longer supported. -->
   2075     <permission android:name="android.permission.RESTART_PACKAGES"
   2076         android:label="@string/permlab_killBackgroundProcesses"
   2077         android:description="@string/permdesc_killBackgroundProcesses"
   2078         android:protectionLevel="normal" />
   2079 
   2080     <!-- Allows an application to call
   2081         {@link android.app.ActivityManager#killBackgroundProcesses}.
   2082          <p>Protection level: normal
   2083     -->
   2084     <permission android:name="android.permission.KILL_BACKGROUND_PROCESSES"
   2085         android:label="@string/permlab_killBackgroundProcesses"
   2086         android:description="@string/permdesc_killBackgroundProcesses"
   2087         android:protectionLevel="normal" />
   2088 
   2089     <!-- @SystemApi @hide Allows an application to query process states and current
   2090          OOM adjustment scores.
   2091          <p>Not for use by third-party applications. -->
   2092     <permission android:name="android.permission.GET_PROCESS_STATE_AND_OOM_SCORE"
   2093         android:protectionLevel="signature|privileged|development" />
   2094 
   2095     <!-- Allows use of PendingIntent.getIntent().
   2096          @hide -->
   2097     <permission android:name="android.permission.GET_INTENT_SENDER_INTENT"
   2098         android:protectionLevel="signature" />
   2099 
   2100     <!-- ================================== -->
   2101     <!-- Permissions affecting the display of other applications  -->
   2102     <!-- ================================== -->
   2103     <eat-comment />
   2104 
   2105     <!-- Allows an app to create windows using the type
   2106          {@link android.view.WindowManager.LayoutParams#TYPE_APPLICATION_OVERLAY},
   2107          shown on top of all other apps.  Very few apps
   2108          should use this permission; these windows are intended for
   2109          system-level interaction with the user.
   2110 
   2111          <p class="note"><strong>Note:</strong> If the app
   2112          targets API level 23 or higher, the app user must explicitly grant
   2113          this permission to the app through a permission management screen. The app requests
   2114          the user's approval by sending an intent with action
   2115          {@link android.provider.Settings#ACTION_MANAGE_OVERLAY_PERMISSION}.
   2116          The app can check whether it has this authorization by calling
   2117          {@link android.provider.Settings#canDrawOverlays
   2118          Settings.canDrawOverlays()}.
   2119          <p>Protection level: signature -->
   2120     <permission android:name="android.permission.SYSTEM_ALERT_WINDOW"
   2121         android:label="@string/permlab_systemAlertWindow"
   2122         android:description="@string/permdesc_systemAlertWindow"
   2123         android:protectionLevel="signature|preinstalled|appop|pre23|development" />
   2124 
   2125     <!-- @deprecated Use {@link android.Manifest.permission#REQUEST_COMPANION_RUN_IN_BACKGROUND}
   2126          @hide
   2127     -->
   2128     <permission android:name="android.permission.RUN_IN_BACKGROUND"
   2129         android:label="@string/permlab_runInBackground"
   2130         android:description="@string/permdesc_runInBackground"
   2131         android:protectionLevel="signature" />
   2132 
   2133     <!-- @deprecated Use
   2134         {@link android.Manifest.permission#REQUEST_COMPANION_USE_DATA_IN_BACKGROUND}
   2135          @hide
   2136     -->
   2137     <permission android:name="android.permission.USE_DATA_IN_BACKGROUND"
   2138         android:label="@string/permlab_useDataInBackground"
   2139         android:description="@string/permdesc_useDataInBackground"
   2140         android:protectionLevel="signature" />
   2141 
   2142     <!-- @hide Allows an application to set display offsets for the screen.
   2143          This permission is not available to third party applications. -->
   2144     <permission android:name="android.permission.SET_DISPLAY_OFFSET"
   2145         android:protectionLevel="signature|privileged" />
   2146 
   2147     <!-- Allows a companion app to run in the background.
   2148          <p>Protection level: normal
   2149     -->
   2150     <permission android:name="android.permission.REQUEST_COMPANION_RUN_IN_BACKGROUND"
   2151                 android:label="@string/permlab_runInBackground"
   2152                 android:description="@string/permdesc_runInBackground"
   2153                 android:protectionLevel="normal" />
   2154 
   2155     <!-- Allows a companion app to use data in the background.
   2156          <p>Protection level: normal
   2157     -->
   2158     <permission android:name="android.permission.REQUEST_COMPANION_USE_DATA_IN_BACKGROUND"
   2159                 android:label="@string/permlab_useDataInBackground"
   2160                 android:description="@string/permdesc_useDataInBackground"
   2161                 android:protectionLevel="normal" />
   2162 
   2163 
   2164     <!-- ================================== -->
   2165     <!-- Permissions affecting the system wallpaper -->
   2166     <!-- ================================== -->
   2167     <eat-comment />
   2168 
   2169     <!-- Allows applications to set the wallpaper.
   2170          <p>Protection level: normal
   2171      -->
   2172     <permission android:name="android.permission.SET_WALLPAPER"
   2173         android:label="@string/permlab_setWallpaper"
   2174         android:description="@string/permdesc_setWallpaper"
   2175         android:protectionLevel="normal" />
   2176 
   2177     <!-- Allows applications to set the wallpaper hints.
   2178          <p>Protection level: normal
   2179     -->
   2180     <permission android:name="android.permission.SET_WALLPAPER_HINTS"
   2181         android:label="@string/permlab_setWallpaperHints"
   2182         android:description="@string/permdesc_setWallpaperHints"
   2183         android:protectionLevel="normal" />
   2184 
   2185     <!-- Allow the app to read the system wallpaper image without
   2186         holding the READ_EXTERNAL_STORAGE permission.
   2187         <p>Not for use by third-party applications.
   2188         @hide
   2189         @SystemApi
   2190     -->
   2191     <permission android:name="android.permission.READ_WALLPAPER_INTERNAL"
   2192         android:protectionLevel="signature|privileged" />
   2193 
   2194     <!-- ============================================ -->
   2195     <!-- Permissions for changing the system clock -->
   2196     <!-- ============================================ -->
   2197     <eat-comment />
   2198 
   2199     <!-- @SystemApi Allows applications to set the system time.
   2200     <p>Not for use by third-party applications. -->
   2201     <permission android:name="android.permission.SET_TIME"
   2202         android:protectionLevel="signature|privileged" />
   2203 
   2204     <!-- Allows applications to set the system time zone.
   2205          <p>Not for use by third-party applications.
   2206     -->
   2207     <permission android:name="android.permission.SET_TIME_ZONE"
   2208         android:label="@string/permlab_setTimeZone"
   2209         android:description="@string/permdesc_setTimeZone"
   2210         android:protectionLevel="signature|privileged" />
   2211 
   2212     <!-- ==================================================== -->
   2213     <!-- Permissions related to changing status bar   -->
   2214     <!-- ==================================================== -->
   2215     <eat-comment />
   2216 
   2217     <!-- Allows an application to expand or collapse the status bar.
   2218          <p>Protection level: normal
   2219     -->
   2220     <permission android:name="android.permission.EXPAND_STATUS_BAR"
   2221         android:label="@string/permlab_expandStatusBar"
   2222         android:description="@string/permdesc_expandStatusBar"
   2223         android:protectionLevel="normal" />
   2224 
   2225     <!-- ============================================================== -->
   2226     <!-- Permissions related to adding/removing shortcuts from Launcher -->
   2227     <!-- ============================================================== -->
   2228     <eat-comment />
   2229 
   2230     <!-- Allows an application to install a shortcut in Launcher.
   2231          <p>In Android O (API level 26) and higher, the <code>INSTALL_SHORTCUT</code> broadcast no
   2232          longer has any effect on your app because it's a private, implicit
   2233          broadcast. Instead, you should create an app shortcut by using the
   2234          {@link android.content.pm.ShortcutManager#requestPinShortcut requestPinShortcut()}
   2235          method from the {@link android.content.pm.ShortcutManager} class.
   2236          <p>Protection level: normal
   2237     -->
   2238     <permission android:name="com.android.launcher.permission.INSTALL_SHORTCUT"
   2239         android:label="@string/permlab_install_shortcut"
   2240         android:description="@string/permdesc_install_shortcut"
   2241         android:protectionLevel="normal"/>
   2242 
   2243     <!--This permission is no longer supported.
   2244     -->
   2245     <permission android:name="com.android.launcher.permission.UNINSTALL_SHORTCUT"
   2246         android:label="@string/permlab_uninstall_shortcut"
   2247         android:description="@string/permdesc_uninstall_shortcut"
   2248         android:protectionLevel="normal"/>
   2249 
   2250     <!-- ==================================================== -->
   2251     <!-- Permissions related to accessing sync settings   -->
   2252     <!-- ==================================================== -->
   2253     <eat-comment />
   2254 
   2255     <!-- Allows applications to read the sync settings.
   2256          <p>Protection level: normal
   2257     -->
   2258     <permission android:name="android.permission.READ_SYNC_SETTINGS"
   2259         android:description="@string/permdesc_readSyncSettings"
   2260         android:label="@string/permlab_readSyncSettings"
   2261         android:protectionLevel="normal" />
   2262 
   2263     <!-- Allows applications to write the sync settings.
   2264          <p>Protection level: normal
   2265     -->
   2266     <permission android:name="android.permission.WRITE_SYNC_SETTINGS"
   2267         android:description="@string/permdesc_writeSyncSettings"
   2268         android:label="@string/permlab_writeSyncSettings"
   2269         android:protectionLevel="normal" />
   2270 
   2271     <!-- Allows applications to read the sync stats.
   2272          <p>Protection level: normal
   2273     -->
   2274     <permission android:name="android.permission.READ_SYNC_STATS"
   2275         android:description="@string/permdesc_readSyncStats"
   2276         android:label="@string/permlab_readSyncStats"
   2277         android:protectionLevel="normal" />
   2278 
   2279     <!-- ============================================ -->
   2280     <!-- Permissions for low-level system interaction -->
   2281     <!-- ============================================ -->
   2282     <eat-comment />
   2283 
   2284     <!-- @SystemApi @hide Change the screen compatibility mode of applications -->
   2285     <permission android:name="android.permission.SET_SCREEN_COMPATIBILITY"
   2286         android:protectionLevel="signature" />
   2287 
   2288     <!-- @SystemApi Allows an application to modify the current configuration, such
   2289          as locale. -->
   2290     <permission android:name="android.permission.CHANGE_CONFIGURATION"
   2291         android:protectionLevel="signature|privileged|development" />
   2292 
   2293     <!-- Allows an application to read or write the system settings.
   2294 
   2295         <p class="note"><strong>Note:</strong> If the app targets API level 23
   2296         or higher, the app user
   2297         must explicitly grant this permission to the app through a permission management screen.
   2298         The app requests the user's approval by sending an intent with action
   2299         {@link android.provider.Settings#ACTION_MANAGE_WRITE_SETTINGS}. The app
   2300         can check whether it has this authorization by calling {@link
   2301         android.provider.Settings.System#canWrite Settings.System.canWrite()}.
   2302 
   2303         <p>Protection level: signature
   2304     -->
   2305     <permission android:name="android.permission.WRITE_SETTINGS"
   2306         android:label="@string/permlab_writeSettings"
   2307         android:description="@string/permdesc_writeSettings"
   2308         android:protectionLevel="signature|preinstalled|appop|pre23" />
   2309 
   2310     <!-- @SystemApi Allows an application to modify the Google service map.
   2311     <p>Not for use by third-party applications. -->
   2312     <permission android:name="android.permission.WRITE_GSERVICES"
   2313         android:protectionLevel="signature|privileged" />
   2314 
   2315     <!-- @SystemApi Allows an application to call
   2316         {@link android.app.ActivityManager#forceStopPackage}.
   2317         @hide -->
   2318     <permission android:name="android.permission.FORCE_STOP_PACKAGES"
   2319         android:protectionLevel="signature|privileged" />
   2320 
   2321     <!-- @SystemApi @hide Allows an application to retrieve the content of the active window
   2322          An active window is the window that has fired an accessibility event. -->
   2323     <permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT"
   2324         android:protectionLevel="signature|privileged" />
   2325 
   2326     <!-- @SystemApi Modify the global animation scaling factor.
   2327     <p>Not for use by third-party applications. -->
   2328     <permission android:name="android.permission.SET_ANIMATION_SCALE"
   2329         android:protectionLevel="signature|privileged|development" />
   2330 
   2331     <!-- @deprecated This functionality will be removed in the future; please do
   2332          not use. Allow an application to make its activities persistent. -->
   2333     <permission android:name="android.permission.PERSISTENT_ACTIVITY"
   2334         android:label="@string/permlab_persistentActivity"
   2335         android:description="@string/permdesc_persistentActivity"
   2336         android:protectionLevel="normal" />
   2337 
   2338     <!-- Allows an application to find out the space used by any package.
   2339          <p>Protection level: normal
   2340     -->
   2341     <permission android:name="android.permission.GET_PACKAGE_SIZE"
   2342         android:label="@string/permlab_getPackageSize"
   2343         android:description="@string/permdesc_getPackageSize"
   2344         android:protectionLevel="normal" />
   2345 
   2346     <!-- @deprecated No longer useful, see
   2347          {@link android.content.pm.PackageManager#addPackageToPreferred}
   2348          for details. -->
   2349     <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS"
   2350         android:protectionLevel="signature|verifier" />
   2351 
   2352     <!-- Allows an application to receive the
   2353          {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is
   2354          broadcast after the system finishes booting.  If you don't
   2355          request this permission, you will not receive the broadcast at
   2356          that time.  Though holding this permission does not have any
   2357          security implications, it can have a negative impact on the
   2358          user experience by increasing the amount of time it takes the
   2359          system to start and allowing applications to have themselves
   2360          running without the user being aware of them.  As such, you must
   2361          explicitly declare your use of this facility to make that visible
   2362          to the user.
   2363          <p>Protection level: normal
   2364     -->
   2365     <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED"
   2366         android:label="@string/permlab_receiveBootCompleted"
   2367         android:description="@string/permdesc_receiveBootCompleted"
   2368         android:protectionLevel="normal" />
   2369 
   2370     <!-- Allows an application to broadcast sticky intents.  These are
   2371          broadcasts whose data is held by the system after being finished,
   2372          so that clients can quickly retrieve that data without having
   2373          to wait for the next broadcast.
   2374          <p>Protection level: normal
   2375     -->
   2376     <permission android:name="android.permission.BROADCAST_STICKY"
   2377         android:label="@string/permlab_broadcastSticky"
   2378         android:description="@string/permdesc_broadcastSticky"
   2379         android:protectionLevel="normal" />
   2380 
   2381     <!-- @SystemApi Allows mounting and unmounting file systems for removable storage.
   2382     <p>Not for use by third-party applications.-->
   2383     <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS"
   2384         android:protectionLevel="signature|privileged" />
   2385 
   2386     <!-- @SystemApi Allows formatting file systems for removable storage.
   2387     <p>Not for use by third-party applications. -->
   2388     <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS"
   2389         android:protectionLevel="signature|privileged" />
   2390 
   2391     <!-- @hide -->
   2392     <permission android:name="android.permission.STORAGE_INTERNAL"
   2393         android:protectionLevel="signature" />
   2394 
   2395     <!-- Allows access to ASEC non-destructive API calls
   2396          @hide  -->
   2397     <permission android:name="android.permission.ASEC_ACCESS"
   2398         android:protectionLevel="signature" />
   2399 
   2400     <!-- Allows creation of ASEC volumes
   2401          @hide  -->
   2402     <permission android:name="android.permission.ASEC_CREATE"
   2403         android:protectionLevel="signature" />
   2404 
   2405     <!-- Allows destruction of ASEC volumes
   2406          @hide  -->
   2407     <permission android:name="android.permission.ASEC_DESTROY"
   2408         android:protectionLevel="signature" />
   2409 
   2410     <!-- Allows mount / unmount of ASEC volumes
   2411          @hide  -->
   2412     <permission android:name="android.permission.ASEC_MOUNT_UNMOUNT"
   2413         android:protectionLevel="signature" />
   2414 
   2415     <!-- Allows rename of ASEC volumes
   2416          @hide  -->
   2417     <permission android:name="android.permission.ASEC_RENAME"
   2418         android:protectionLevel="signature" />
   2419 
   2420     <!-- @SystemApi Allows applications to write the apn settings.
   2421     <p>Not for use by third-party applications. -->
   2422     <permission android:name="android.permission.WRITE_APN_SETTINGS"
   2423         android:protectionLevel="signature|privileged" />
   2424 
   2425     <!-- Allows applications to change network connectivity state.
   2426          <p>Protection level: normal
   2427     -->
   2428     <permission android:name="android.permission.CHANGE_NETWORK_STATE"
   2429         android:description="@string/permdesc_changeNetworkState"
   2430         android:label="@string/permlab_changeNetworkState"
   2431         android:protectionLevel="normal" />
   2432 
   2433     <!-- Allows an application to clear the caches of all installed
   2434          applications on the device.
   2435          <p>Protection level: signature|privileged
   2436     -->
   2437     <permission android:name="android.permission.CLEAR_APP_CACHE"
   2438         android:protectionLevel="signature|privileged" />
   2439 
   2440     <!-- @SystemApi Allows an application to use any media decoder when decoding for playback
   2441          @hide -->
   2442     <permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK"
   2443         android:protectionLevel="signature|privileged" />
   2444 
   2445     <!-- @SystemApi Allows an application to install and/or uninstall CA certificates on
   2446          behalf of the user.
   2447          @hide -->
   2448     <permission android:name="android.permission.MANAGE_CA_CERTIFICATES"
   2449         android:protectionLevel="signature|privileged" />
   2450 
   2451     <!-- @SystemApi Allows an application to do certain operations needed for
   2452          interacting with the recovery (system update) system.
   2453          @hide -->
   2454     <permission android:name="android.permission.RECOVERY"
   2455         android:protectionLevel="signature|privileged" />
   2456 
   2457     <!-- @SystemApi Allows an application to read system update info.
   2458          @hide -->
   2459     <permission android:name="android.permission.READ_SYSTEM_UPDATE_INFO"
   2460         android:protectionLevel="signature" />
   2461 
   2462     <!-- Allows the system to bind to an application's task services
   2463          @hide -->
   2464     <permission android:name="android.permission.BIND_JOB_SERVICE"
   2465         android:protectionLevel="signature" />
   2466     <uses-permission android:name="android.permission.BIND_JOB_SERVICE"/>
   2467 
   2468     <!-- Allows an application to initiate configuration updates
   2469          <p>An application requesting this permission is responsible for
   2470          verifying the source and integrity of any update before passing
   2471          it off to the various individual installer components
   2472          @hide -->
   2473     <permission android:name="android.permission.UPDATE_CONFIG"
   2474         android:protectionLevel="signature|privileged" />
   2475 
   2476     <!-- Allows an application to query the current time zone rules state
   2477          on device.
   2478          @SystemApi @hide -->
   2479     <permission android:name="android.permission.QUERY_TIME_ZONE_RULES"
   2480                 android:protectionLevel="signature|privileged" />
   2481 
   2482     <!-- Allows a time zone rule updater application to request
   2483          the system installs / uninstalls timezone rules.
   2484          <p>An application requesting this permission is responsible for
   2485          verifying the source and integrity of the update before passing
   2486          it off to the installer components.
   2487          @SystemApi @hide -->
   2488     <permission android:name="android.permission.UPDATE_TIME_ZONE_RULES"
   2489         android:protectionLevel="signature|privileged" />
   2490 
   2491     <!-- Must be required by a time zone rule updater application,
   2492          to ensure that only the system can trigger it.
   2493          @hide -->
   2494     <permission android:name="android.permission.TRIGGER_TIME_ZONE_RULES_CHECK"
   2495         android:protectionLevel="signature" />
   2496     <uses-permission android:name="android.permission.TRIGGER_TIME_ZONE_RULES_CHECK"/>
   2497 
   2498     <!-- Allows the system to reset throttling in shortcut manager.
   2499          @hide -->
   2500     <permission android:name="android.permission.RESET_SHORTCUT_MANAGER_THROTTLING"
   2501         android:protectionLevel="signature" />
   2502 
   2503     <!-- Allows the system to bind to the discovered Network Recommendation Service.
   2504          @SystemApi @hide -->
   2505     <permission android:name="android.permission.BIND_NETWORK_RECOMMENDATION_SERVICE"
   2506         android:protectionLevel="signature" />
   2507     <uses-permission android:name="android.permission.BIND_NETWORK_RECOMMENDATION_SERVICE"/>
   2508 
   2509     <!-- Allows an application to enable, disable and change priority of
   2510          runtime resource overlays.
   2511          @hide -->
   2512     <permission android:name="android.permission.CHANGE_OVERLAY_PACKAGES"
   2513         android:protectionLevel="signature|privileged" />
   2514 
   2515     <!-- ========================================= -->
   2516     <!-- Permissions for special development tools -->
   2517     <!-- ========================================= -->
   2518     <eat-comment />
   2519 
   2520     <!-- @SystemApi Allows an application to read or write the secure system settings.
   2521     <p>Not for use by third-party applications. -->
   2522     <permission android:name="android.permission.WRITE_SECURE_SETTINGS"
   2523         android:protectionLevel="signature|privileged|development" />
   2524 
   2525     <!-- @SystemApi Allows an application to retrieve state dump information from system services.
   2526     <p>Not for use by third-party applications. -->
   2527     <permission android:name="android.permission.DUMP"
   2528         android:protectionLevel="signature|privileged|development" />
   2529 
   2530     <!-- @SystemApi Allows an application to read the low-level system log files.
   2531     <p>Not for use by third-party applications, because
   2532     Log entries can contain the user's private information. -->
   2533     <permission android:name="android.permission.READ_LOGS"
   2534         android:protectionLevel="signature|privileged|development" />
   2535 
   2536     <!-- @SystemApi Configure an application for debugging.
   2537     <p>Not for use by third-party applications. -->
   2538     <permission android:name="android.permission.SET_DEBUG_APP"
   2539         android:protectionLevel="signature|privileged|development" />
   2540 
   2541     <!-- @SystemApi Allows an application to set the maximum number of (not needed)
   2542          application processes that can be running.
   2543          <p>Not for use by third-party applications. -->
   2544     <permission android:name="android.permission.SET_PROCESS_LIMIT"
   2545         android:protectionLevel="signature|privileged|development" />
   2546 
   2547     <!-- @SystemApi Allows an application to control whether activities are immediately
   2548          finished when put in the background.
   2549          <p>Not for use by third-party applications. -->
   2550     <permission android:name="android.permission.SET_ALWAYS_FINISH"
   2551         android:protectionLevel="signature|privileged|development" />
   2552 
   2553     <!-- @SystemApi Allow an application to request that a signal be sent to all persistent processes.
   2554     <p>Not for use by third-party applications. -->
   2555     <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES"
   2556         android:protectionLevel="signature|privileged|development" />
   2557 
   2558     <!-- ==================================== -->
   2559     <!-- Private permissions                  -->
   2560     <!-- ==================================== -->
   2561     <eat-comment />
   2562 
   2563     <!-- @SystemApi Allows access to the list of accounts in the Accounts Service. -->
   2564     <permission android:name="android.permission.GET_ACCOUNTS_PRIVILEGED"
   2565         android:protectionLevel="signature|privileged" />
   2566 
   2567     <!-- Allows but does not guarantee access to user passwords at the conclusion of add account
   2568     @hide -->
   2569     <permission android:name="android.permission.GET_PASSWORD"
   2570         android:protectionLevel="signature" />
   2571 
   2572     <!-- @SystemApi Allows applications to RW to diagnostic resources.
   2573     <p>Not for use by third-party applications. -->
   2574     <permission android:name="android.permission.DIAGNOSTIC"
   2575         android:protectionLevel="signature" />
   2576 
   2577     <!-- @SystemApi Allows an application to open, close, or disable the status bar
   2578          and its icons.
   2579          <p>Not for use by third-party applications. -->
   2580     <permission android:name="android.permission.STATUS_BAR"
   2581         android:protectionLevel="signature|privileged" />
   2582 
   2583     <!-- Allows an application to be the status bar.  Currently used only by SystemUI.apk
   2584     @hide -->
   2585     <permission android:name="android.permission.STATUS_BAR_SERVICE"
   2586         android:protectionLevel="signature" />
   2587 
   2588     <!-- Allows an application to bind to third party quick settings tiles.
   2589          <p>Should only be requested by the System, should be required by
   2590          TileService declarations.-->
   2591     <permission android:name="android.permission.BIND_QUICK_SETTINGS_TILE"
   2592         android:protectionLevel="signature" />
   2593 
   2594     <!-- @SystemApi Allows an application to force a BACK operation on whatever is the
   2595          top activity.
   2596          <p>Not for use by third-party applications.
   2597          @hide
   2598     -->
   2599     <permission android:name="android.permission.FORCE_BACK"
   2600         android:protectionLevel="signature" />
   2601 
   2602     <!-- @SystemApi Allows an application to update device statistics.
   2603     <p>Not for use by third-party applications. -->
   2604     <permission android:name="android.permission.UPDATE_DEVICE_STATS"
   2605         android:protectionLevel="signature|privileged" />
   2606 
   2607     <!-- @SystemApi @hide Allows an application to collect application operation statistics.
   2608          Not for use by third party apps. -->
   2609     <permission android:name="android.permission.GET_APP_OPS_STATS"
   2610         android:protectionLevel="signature|privileged|development" />
   2611 
   2612     <!-- @SystemApi Allows an application to update application operation statistics. Not for
   2613          use by third party apps.
   2614          @hide -->
   2615     <permission android:name="android.permission.UPDATE_APP_OPS_STATS"
   2616         android:protectionLevel="signature|privileged|installer" />
   2617 
   2618     <!-- @SystemApi Allows an application to update the user app op restrictions.
   2619          Not for use by third party apps.
   2620          @hide -->
   2621     <permission android:name="android.permission.MANAGE_APP_OPS_RESTRICTIONS"
   2622         android:protectionLevel="signature|installer" />
   2623 
   2624     <!-- Allows an application to update the user app op modes.
   2625          Not for use by third party apps.
   2626          @hide -->
   2627     <permission android:name="android.permission.MANAGE_APP_OPS_MODES"
   2628         android:protectionLevel="signature|installer|verifier" />
   2629 
   2630     <!-- @SystemApi Allows an application to open windows that are for use by parts
   2631          of the system user interface.
   2632          <p>Not for use by third-party applications.
   2633          @hide
   2634     -->
   2635     <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW"
   2636         android:protectionLevel="signature" />
   2637 
   2638     <!-- @SystemApi Allows an application to use
   2639          {@link android.view.WindowManager.LayoutsParams#PRIVATE_FLAG_HIDE_NON_SYSTEM_OVERLAY_WINDOWS}
   2640          to hide non-system-overlay windows.
   2641          <p>Not for use by third-party applications.
   2642          @hide
   2643     -->
   2644     <permission android:name="android.permission.HIDE_NON_SYSTEM_OVERLAY_WINDOWS"
   2645                 android:protectionLevel="signature|installer" />
   2646 
   2647     <!-- @SystemApi Allows an application to manage (create, destroy,
   2648          Z-order) application tokens in the window manager.
   2649          <p>Not for use by third-party applications.
   2650          @hide
   2651     -->
   2652     <permission android:name="android.permission.MANAGE_APP_TOKENS"
   2653         android:protectionLevel="signature" />
   2654 
   2655     <!-- Allows System UI to register listeners for events from Window Manager.
   2656          @hide -->
   2657     <permission android:name="android.permission.REGISTER_WINDOW_MANAGER_LISTENERS"
   2658         android:protectionLevel="signature" />
   2659 
   2660     <!-- @hide Allows the application to temporarily freeze the screen for a
   2661          full-screen transition. -->
   2662     <permission android:name="android.permission.FREEZE_SCREEN"
   2663         android:protectionLevel="signature" />
   2664 
   2665     <!-- @SystemApi Allows an application to inject user events (keys, touch, trackball)
   2666          into the event stream and deliver them to ANY window.  Without this
   2667          permission, you can only deliver events to windows in your own process.
   2668          <p>Not for use by third-party applications.
   2669          @hide
   2670     -->
   2671     <permission android:name="android.permission.INJECT_EVENTS"
   2672         android:protectionLevel="signature" />
   2673 
   2674     <!-- @hide Allows an application to register an input filter which filters the stream
   2675          of user events (keys, touch, trackball) before they are dispatched to any window. -->
   2676     <permission android:name="android.permission.FILTER_EVENTS"
   2677         android:protectionLevel="signature" />
   2678 
   2679     <!-- @hide Allows an application to retrieve the window token from the accessibility manager. -->
   2680     <permission android:name="android.permission.RETRIEVE_WINDOW_TOKEN"
   2681         android:protectionLevel="signature" />
   2682 
   2683     <!-- @hide Allows an application to modify accessibility information from another app. -->
   2684     <permission android:name="android.permission.MODIFY_ACCESSIBILITY_DATA"
   2685                 android:protectionLevel="signature" />
   2686 
   2687     <!-- @hide Allows an application to change the accessibility volume. -->
   2688     <permission android:name="android.permission.CHANGE_ACCESSIBILITY_VOLUME"
   2689                 android:protectionLevel="signature" />
   2690 
   2691     <!-- @hide Allows an application to collect frame statistics -->
   2692     <permission android:name="android.permission.FRAME_STATS"
   2693          android:protectionLevel="signature" />
   2694 
   2695     <!-- @hide Allows an application to temporary enable accessibility on the device. -->
   2696     <permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY"
   2697         android:protectionLevel="signature" />
   2698 
   2699     <!-- @SystemApi Allows an application to watch and control how activities are
   2700          started globally in the system.  Only for is in debugging
   2701          (usually the monkey command).
   2702          <p>Not for use by third-party applications.
   2703          @hide
   2704     -->
   2705     <permission android:name="android.permission.SET_ACTIVITY_WATCHER"
   2706         android:protectionLevel="signature" />
   2707 
   2708     <!-- @SystemApi Allows an application to call the activity manager shutdown() API
   2709          to put the higher-level system there into a shutdown state.
   2710          @hide -->
   2711     <permission android:name="android.permission.SHUTDOWN"
   2712         android:protectionLevel="signature|privileged" />
   2713 
   2714     <!-- @SystemApi Allows an application to tell the activity manager to temporarily
   2715          stop application switches, putting it into a special mode that
   2716          prevents applications from immediately switching away from some
   2717          critical UI such as the home screen.
   2718          @hide -->
   2719     <permission android:name="android.permission.STOP_APP_SWITCHES"
   2720         android:protectionLevel="signature|privileged" />
   2721 
   2722     <!-- @SystemApi Allows an application to retrieve private information about
   2723          the current top activity, such as any assist context it can provide.
   2724          <p>Not for use by third-party applications.
   2725          @hide
   2726     -->
   2727     <permission android:name="android.permission.GET_TOP_ACTIVITY_INFO"
   2728         android:protectionLevel="signature" />
   2729 
   2730     <!-- Allows an application to retrieve the current state of keys and
   2731          switches.
   2732          <p>Not for use by third-party applications.
   2733          @deprecated The API that used this permission has been removed. -->
   2734     <permission android:name="android.permission.READ_INPUT_STATE"
   2735         android:protectionLevel="signature" />
   2736 
   2737     <!-- Must be required by an {@link android.inputmethodservice.InputMethodService},
   2738          to ensure that only the system can bind to it.
   2739          <p>Protection level: signature
   2740     -->
   2741     <permission android:name="android.permission.BIND_INPUT_METHOD"
   2742         android:protectionLevel="signature" />
   2743 
   2744     <!-- Must be required by an {@link android.media.midi.MidiDeviceService},
   2745          to ensure that only the system can bind to it.
   2746          <p>Protection level: signature
   2747     -->
   2748     <permission android:name="android.permission.BIND_MIDI_DEVICE_SERVICE"
   2749         android:protectionLevel="signature" />
   2750 
   2751     <!-- Must be required by an {@link android.accessibilityservice.AccessibilityService},
   2752          to ensure that only the system can bind to it.
   2753          <p>Protection level: signature
   2754     -->
   2755     <permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE"
   2756         android:protectionLevel="signature" />
   2757 
   2758     <!-- Must be required by a {@link android.printservice.PrintService},
   2759          to ensure that only the system can bind to it.
   2760          <p>Protection level: signature
   2761     -->
   2762     <permission android:name="android.permission.BIND_PRINT_SERVICE"
   2763         android:protectionLevel="signature" />
   2764 
   2765     <!-- Must be required by a {@link android.printservice.recommendation.RecommendationService},
   2766      to ensure that only the system can bind to it.
   2767      @hide
   2768      @SystemApi
   2769      <p>Protection level: signature
   2770     -->
   2771     <permission android:name="android.permission.BIND_PRINT_RECOMMENDATION_SERVICE"
   2772             android:protectionLevel="signature" />
   2773 
   2774     <!-- Allows applications to get the installed and enabled print services.
   2775          @hide
   2776          @SystemApi
   2777          <p>Protection level: signature|preinstalled
   2778     -->
   2779     <permission android:name="android.permission.READ_PRINT_SERVICES"
   2780         android:protectionLevel="signature|preinstalled" />
   2781 
   2782     <!-- Allows applications to get the currently recommended print services for printers.
   2783          @hide
   2784          @SystemApi
   2785          <p>Protection level: signature|preinstalled
   2786     -->
   2787     <permission android:name="android.permission.READ_PRINT_SERVICE_RECOMMENDATIONS"
   2788         android:protectionLevel="signature|preinstalled" />
   2789 
   2790     <!-- Must be required by a {@link android.nfc.cardemulation.HostApduService}
   2791          or {@link android.nfc.cardemulation.OffHostApduService} to ensure that only
   2792          the system can bind to it.
   2793          <p>Protection level: signature
   2794     -->
   2795     <permission android:name="android.permission.BIND_NFC_SERVICE"
   2796         android:protectionLevel="signature" />
   2797 
   2798     <!-- Must be required by the PrintSpooler to ensure that only the system can bind to it.
   2799          @hide -->
   2800     <permission android:name="android.permission.BIND_PRINT_SPOOLER_SERVICE"
   2801         android:protectionLevel="signature" />
   2802 
   2803     <!-- Must be required by the CompanionDeviceManager to ensure that only the system can bind to it.
   2804          @hide -->
   2805     <permission android:name="android.permission.BIND_COMPANION_DEVICE_MANAGER_SERVICE"
   2806         android:protectionLevel="signature" />
   2807 
   2808     <!-- @SystemApi Must be required by the RuntimePermissionPresenterService to ensure
   2809          that only the system can bind to it.
   2810          @hide -->
   2811     <permission android:name="android.permission.BIND_RUNTIME_PERMISSION_PRESENTER_SERVICE"
   2812         android:protectionLevel="signature" />
   2813 
   2814     <!-- Must be required by a TextService (e.g. SpellCheckerService)
   2815          to ensure that only the system can bind to it.
   2816          <p>Protection level: signature
   2817     -->
   2818     <permission android:name="android.permission.BIND_TEXT_SERVICE"
   2819         android:protectionLevel="signature" />
   2820 
   2821     <!-- Must be required by a {@link android.net.VpnService},
   2822          to ensure that only the system can bind to it.
   2823          <p>Protection level: signature
   2824     -->
   2825     <permission android:name="android.permission.BIND_VPN_SERVICE"
   2826         android:protectionLevel="signature" />
   2827 
   2828     <!-- Must be required by a {@link android.service.wallpaper.WallpaperService},
   2829          to ensure that only the system can bind to it.
   2830          <p>Protection level: signature|privileged
   2831     -->
   2832     <permission android:name="android.permission.BIND_WALLPAPER"
   2833         android:protectionLevel="signature|privileged" />
   2834 
   2835     <!-- Must be required by a {@link android.service.voice.VoiceInteractionService},
   2836          to ensure that only the system can bind to it.
   2837          <p>Protection level: signature
   2838     -->
   2839     <permission android:name="android.permission.BIND_VOICE_INTERACTION"
   2840         android:protectionLevel="signature" />
   2841 
   2842     <!-- Must be required by a {@link android.service.autofill.AutofillService},
   2843          to ensure that only the system can bind to it.
   2844          <p>Protection level: signature
   2845     -->
   2846     <permission android:name="android.permission.BIND_AUTOFILL_SERVICE"
   2847         android:protectionLevel="signature" />
   2848 
   2849    <!-- Alternative version of android.permission.BIND_AUTOFILL_FIELD_CLASSIFICATION_SERVICE.
   2850         This permission was renamed during the O previews but it was supported on the final O
   2851         release, so we need to carry it over.
   2852         <p>Protection level: signature
   2853         @hide
   2854     -->
   2855     <permission android:name="android.permission.BIND_AUTOFILL"
   2856         android:protectionLevel="signature" />
   2857 
   2858     <!-- Must be required by an {@link android.service.autofill.AutofillFieldClassificationService}
   2859          to ensure that only the system can bind to it.
   2860          @hide This is not a third-party API (intended for OEMs and system apps).
   2861     -->
   2862     <permission android:name="android.permission.BIND_AUTOFILL_FIELD_CLASSIFICATION_SERVICE"
   2863                 android:protectionLevel="signature" />
   2864 
   2865     <!-- Must be required by a android.service.textclassifier.TextClassifierService,
   2866          to ensure that only the system can bind to it.
   2867          @SystemApi @hide This is not a third-party API (intended for OEMs and system apps).
   2868          <p>Protection level: signature
   2869     -->
   2870     <permission android:name="android.permission.BIND_TEXTCLASSIFIER_SERVICE"
   2871                 android:protectionLevel="signature" />
   2872 
   2873     <!-- Must be required by hotword enrollment application,
   2874          to ensure that only the system can interact with it.
   2875          @hide <p>Not for use by third-party applications.</p> -->
   2876     <permission android:name="android.permission.MANAGE_VOICE_KEYPHRASES"
   2877         android:protectionLevel="signature|privileged" />
   2878 
   2879     <!-- Must be required by a {@link com.android.media.remotedisplay.RemoteDisplayProvider},
   2880          to ensure that only the system can bind to it.
   2881          @hide -->
   2882     <permission android:name="android.permission.BIND_REMOTE_DISPLAY"
   2883         android:protectionLevel="signature" />
   2884 
   2885     <!-- Must be required by a {@link android.media.tv.TvInputService}
   2886          to ensure that only the system can bind to it.
   2887          <p>Protection level: signature|privileged
   2888     -->
   2889     <permission android:name="android.permission.BIND_TV_INPUT"
   2890         android:protectionLevel="signature|privileged" />
   2891 
   2892     <!-- @SystemApi
   2893          Must be required by a {@link com.android.media.tv.remoteprovider.TvRemoteProvider}
   2894          to ensure that only the system can bind to it.
   2895          <p>Protection level: signature|privileged
   2896          <p>Not for use by third-party applications. </p>
   2897          @hide  -->
   2898     <permission android:name="android.permission.BIND_TV_REMOTE_SERVICE"
   2899         android:protectionLevel="signature|privileged" />
   2900 
   2901     <!-- @SystemApi
   2902          Must be required for a virtual remote controller for TV.
   2903          <p>Protection level: signature|privileged
   2904          <p>Not for use by third-party applications. </p>
   2905          @hide  -->
   2906     <permission android:name="android.permission.TV_VIRTUAL_REMOTE_CONTROLLER"
   2907         android:protectionLevel="signature|privileged" />
   2908 
   2909     <!-- Allows an application to change HDMI CEC active source.
   2910          <p>Not for use by third-party applications.
   2911          @hide -->
   2912     <permission android:name="android.permission.CHANGE_HDMI_CEC_ACTIVE_SOURCE"
   2913         android:protectionLevel="signature|privileged" />
   2914 
   2915     <!-- @SystemApi Allows an application to modify parental controls
   2916          <p>Not for use by third-party applications.
   2917          @hide -->
   2918     <permission android:name="android.permission.MODIFY_PARENTAL_CONTROLS"
   2919         android:protectionLevel="signature|privileged" />
   2920 
   2921     <!-- @SystemApi Allows an application to read TvContentRatingSystemInfo
   2922          <p>Not for use by third-party applications.
   2923          @hide -->
   2924     <permission android:name="android.permission.READ_CONTENT_RATING_SYSTEMS"
   2925         android:protectionLevel="signature|privileged" />
   2926 
   2927     <!-- @SystemApi Allows an application to notify TV inputs by sending broadcasts.
   2928          <p>Protection level: signature|privileged
   2929          <p>Not for use by third-party applications.
   2930          @hide -->
   2931     <permission android:name="android.permission.NOTIFY_TV_INPUTS"
   2932          android:protectionLevel="signature|privileged" />
   2933 
   2934     <!-- Must be required by a {@link android.media.routing.MediaRouteService}
   2935          to ensure that only the system can interact with it.
   2936          @hide -->
   2937     <permission android:name="android.permission.BIND_ROUTE_PROVIDER"
   2938         android:protectionLevel="signature" />
   2939 
   2940     <!-- Must be required by device administration receiver, to ensure that only the
   2941          system can interact with it.
   2942          <p>Protection level: signature
   2943     -->
   2944     <permission android:name="android.permission.BIND_DEVICE_ADMIN"
   2945         android:protectionLevel="signature" />
   2946 
   2947     <!-- @SystemApi Required to add or remove another application as a device admin.
   2948          <p>Not for use by third-party applications.
   2949          @hide -->
   2950     <permission android:name="android.permission.MANAGE_DEVICE_ADMINS"
   2951         android:protectionLevel="signature|privileged" />
   2952 
   2953     <!-- @SystemApi Allows low-level access to setting the orientation (actually
   2954          rotation) of the screen.
   2955          <p>Not for use by third-party applications.
   2956          @hide
   2957     -->
   2958     <permission android:name="android.permission.SET_ORIENTATION"
   2959         android:protectionLevel="signature" />
   2960 
   2961     <!-- @SystemApi Allows low-level access to setting the pointer speed.
   2962          <p>Not for use by third-party applications.
   2963          @hide
   2964     -->
   2965     <permission android:name="android.permission.SET_POINTER_SPEED"
   2966         android:protectionLevel="signature" />
   2967 
   2968     <!-- Allows low-level access to setting input device calibration.
   2969          <p>Not for use by normal applications.
   2970          @hide -->
   2971     <permission android:name="android.permission.SET_INPUT_CALIBRATION"
   2972         android:protectionLevel="signature" />
   2973 
   2974     <!-- Allows low-level access to setting the keyboard layout.
   2975          <p>Not for use by third-party applications.
   2976          @hide -->
   2977     <permission android:name="android.permission.SET_KEYBOARD_LAYOUT"
   2978         android:protectionLevel="signature" />
   2979 
   2980     <!-- Allows an application to query tablet mode state and monitor changes
   2981          in it.
   2982          <p>Not for use by third-party applications.
   2983          @hide -->
   2984     <permission android:name="android.permission.TABLET_MODE"
   2985         android:protectionLevel="signature" />
   2986 
   2987     <!-- Allows an application to request installing packages. Apps
   2988          targeting APIs greater than 25 must hold this permission in
   2989          order to use {@link android.content.Intent#ACTION_INSTALL_PACKAGE}.
   2990          <p>Protection level: signature
   2991     -->
   2992     <permission android:name="android.permission.REQUEST_INSTALL_PACKAGES"
   2993         android:label="@string/permlab_requestInstallPackages"
   2994         android:description="@string/permdesc_requestInstallPackages"
   2995         android:protectionLevel="signature|appop" />
   2996 
   2997     <!-- Allows an application to request deleting packages. Apps
   2998          targeting APIs {@link android.os.Build.VERSION_CODES#P} or greater must hold this
   2999          permission in order to use {@link android.content.Intent#ACTION_UNINSTALL_PACKAGE} or
   3000          {@link android.content.pm.PackageInstaller#uninstall}.
   3001          <p>Protection level: normal
   3002     -->
   3003     <permission android:name="android.permission.REQUEST_DELETE_PACKAGES"
   3004         android:label="@string/permlab_requestDeletePackages"
   3005         android:description="@string/permdesc_requestDeletePackages"
   3006         android:protectionLevel="normal" />
   3007 
   3008     <!-- @SystemApi Allows an application to install packages.
   3009     <p>Not for use by third-party applications. -->
   3010     <permission android:name="android.permission.INSTALL_PACKAGES"
   3011       android:protectionLevel="signature|privileged" />
   3012 
   3013     <!-- @SystemApi Allows an application to install self updates. This is a limited version
   3014          of {@link android.Manifest.permission#INSTALL_PACKAGES}.
   3015         <p>Not for use by third-party applications.
   3016         @hide
   3017     -->
   3018     <permission android:name="android.permission.INSTALL_SELF_UPDATES"
   3019         android:protectionLevel="signature|privileged" />
   3020 
   3021     <!-- @SystemApi Allows an application to install updates. This is a limited version
   3022          of {@link android.Manifest.permission#INSTALL_PACKAGES}.
   3023         <p>Not for use by third-party applications.
   3024         @hide
   3025     -->
   3026     <permission android:name="android.permission.INSTALL_PACKAGE_UPDATES"
   3027         android:protectionLevel="signature|privileged" />
   3028 
   3029     <!-- @SystemApi Allows an application to clear user data.
   3030          <p>Not for use by third-party applications
   3031          @hide
   3032     -->
   3033     <permission android:name="android.permission.CLEAR_APP_USER_DATA"
   3034         android:protectionLevel="signature|installer" />
   3035 
   3036     <!-- @hide Allows an application to get the URI permissions
   3037          granted to another application.
   3038          <p>Not for use by third-party applications
   3039     -->
   3040     <permission android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS"
   3041         android:protectionLevel="signature" />
   3042 
   3043     <!-- @hide Allows an application to clear the URI permissions
   3044          granted to another application.
   3045          <p>Not for use by third-party applications
   3046     -->
   3047     <permission
   3048         android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS"
   3049         android:protectionLevel="signature" />
   3050 
   3051     <!-- @hide
   3052          Allows an application to change the status of Scoped Access Directory requests granted or
   3053          rejected by the user.
   3054          <p>This permission should <em>only</em> be requested by the platform
   3055          settings app.  This permission cannot be granted to third-party apps.
   3056          <p>Protection level: signature
   3057     -->
   3058     <permission
   3059          android:name="android.permission.MANAGE_SCOPED_ACCESS_DIRECTORY_PERMISSIONS"
   3060          android:protectionLevel="signature" />
   3061 
   3062     <!-- @hide
   3063          Allows an application to change the status of a persistable URI permission granted
   3064          to another application.
   3065          <p>This permission should <em>only</em> be requested by the platform
   3066          settings app.  This permission cannot be granted to third-party apps.
   3067          <p>Protection level: signature
   3068     -->
   3069     <permission android:name="android.permission.FORCE_PERSISTABLE_URI_PERMISSIONS"
   3070         android:protectionLevel="signature" />
   3071 
   3072     <!-- @SystemApi Old permission for deleting an app's cache files, no longer used,
   3073          but signals for us to quietly ignore calls instead of throwing an exception. -->
   3074     <permission android:name="android.permission.DELETE_CACHE_FILES"
   3075         android:protectionLevel="signature|privileged" />
   3076 
   3077     <!-- Allows an application to delete cache files.
   3078          @hide -->
   3079     <permission android:name="android.permission.INTERNAL_DELETE_CACHE_FILES"
   3080         android:protectionLevel="signature" />
   3081 
   3082     <!-- @SystemApi Allows an application to delete packages.
   3083          <p>Not for use by third-party applications.
   3084          <p>Starting in {@link android.os.Build.VERSION_CODES#N}, user confirmation is requested
   3085          when the application deleting the package is not the same application that installed the
   3086          package. -->
   3087     <permission android:name="android.permission.DELETE_PACKAGES"
   3088         android:protectionLevel="signature|privileged" />
   3089 
   3090     <!-- @SystemApi Allows an application to move location of installed package.
   3091          @hide -->
   3092     <permission android:name="android.permission.MOVE_PACKAGE"
   3093         android:protectionLevel="signature|privileged" />
   3094 
   3095     <!-- @SystemApi Allows an application to change whether an application component (other than its own) is
   3096          enabled or not.
   3097          <p>Not for use by third-party applications. -->
   3098     <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE"
   3099         android:protectionLevel="signature|privileged" />
   3100 
   3101     <!-- @SystemApi Allows an application to grant specific permissions.
   3102          @hide -->
   3103     <permission android:name="android.permission.GRANT_RUNTIME_PERMISSIONS"
   3104         android:protectionLevel="signature|installer|verifier" />
   3105 
   3106     <!-- @SystemApi Allows an app that has this permission and the permissions to install packages
   3107          to request certain runtime permissions to be granted at installation.
   3108          @hide -->
   3109     <permission android:name="android.permission.INSTALL_GRANT_RUNTIME_PERMISSIONS"
   3110         android:protectionLevel="signature|installer|verifier" />
   3111 
   3112     <!-- @SystemApi Allows an application to revoke specific permissions.
   3113         @hide -->
   3114     <permission android:name="android.permission.REVOKE_RUNTIME_PERMISSIONS"
   3115          android:protectionLevel="signature|installer|verifier" />
   3116 
   3117     <!-- @hide Allows an application to observe permission changes. -->
   3118     <permission android:name="android.permission.OBSERVE_GRANT_REVOKE_PERMISSIONS"
   3119         android:protectionLevel="signature|privileged" />
   3120 
   3121     <!-- @SystemApi Allows an application to use SurfaceFlinger's low level features.
   3122          <p>Not for use by third-party applications.
   3123          @hide
   3124     -->
   3125     <permission android:name="android.permission.ACCESS_SURFACE_FLINGER"
   3126         android:protectionLevel="signature" />
   3127 
   3128     <!-- @SystemApi Allows an application to take screen shots and more generally
   3129          get access to the frame buffer data.
   3130          <p>Not for use by third-party applications. -->
   3131     <permission android:name="android.permission.READ_FRAME_BUFFER"
   3132         android:protectionLevel="signature|privileged" />
   3133 
   3134     <!-- Allows an application to use InputFlinger's low level features.
   3135          @hide -->
   3136     <permission android:name="android.permission.ACCESS_INPUT_FLINGER"
   3137         android:protectionLevel="signature" />
   3138 
   3139     <!-- Allows an application to disable/enable input devices.
   3140          Could be used to prevent unwanted touch events
   3141          on a touchscreen, for example during swimming or rain.
   3142          @hide -->
   3143     <permission android:name="android.permission.DISABLE_INPUT_DEVICE"
   3144         android:protectionLevel="signature" />
   3145 
   3146     <!-- Allows an application to configure and connect to Wifi displays
   3147          @hide -->
   3148     <permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY"
   3149         android:protectionLevel="signature" />
   3150 
   3151     <!-- Allows an application to control low-level features of Wifi displays
   3152          such as opening an RTSP socket.  This permission should only be used
   3153          by the display manager.
   3154          @hide -->
   3155     <permission android:name="android.permission.CONTROL_WIFI_DISPLAY"
   3156         android:protectionLevel="signature" />
   3157 
   3158     <!-- Allows an application to control the color modes set for displays system-wide.
   3159          <p>Not for use by third-party applications.</p>
   3160          @hide -->
   3161     <permission android:name="android.permission.CONFIGURE_DISPLAY_COLOR_MODE"
   3162         android:protectionLevel="signature" />
   3163 
   3164     <!-- Allows an application to control the color saturation of the display.
   3165          @hide
   3166          @SystemApi -->
   3167     <permission android:name="android.permission.CONTROL_DISPLAY_SATURATION"
   3168         android:protectionLevel="signature|privileged" />
   3169 
   3170     <!-- Allows an application to collect usage infomation about brightness slider changes.
   3171          <p>Not for use by third-party applications.</p>
   3172          @hide
   3173          @SystemApi
   3174          @TestApi -->
   3175     <permission android:name="android.permission.BRIGHTNESS_SLIDER_USAGE"
   3176         android:protectionLevel="signature|privileged|development" />
   3177 
   3178     <!-- Allows an application to collect ambient light stats.
   3179          <p>Not for use by third party applications.</p>
   3180          @hide
   3181          @SystemApi -->
   3182     <permission android:name="android.permission.ACCESS_AMBIENT_LIGHT_STATS"
   3183         android:protectionLevel="signature|privileged|development" />
   3184 
   3185     <!-- Allows an application to modify the display brightness configuration
   3186          @hide
   3187          @SystemApi
   3188          @TestApi -->
   3189     <permission android:name="android.permission.CONFIGURE_DISPLAY_BRIGHTNESS"
   3190         android:protectionLevel="signature|privileged|development" />
   3191 
   3192     <!-- Allows an application to control the system's display brightness
   3193          @hide -->
   3194     <permission android:name="android.permission.CONTROL_DISPLAY_BRIGHTNESS"
   3195         android:protectionLevel="signature" />
   3196 
   3197     <!-- @SystemApi Allows an application to control VPN.
   3198          <p>Not for use by third-party applications.</p>
   3199          @hide -->
   3200     <permission android:name="android.permission.CONTROL_VPN"
   3201         android:protectionLevel="signature|privileged" />
   3202     <uses-permission android:name="android.permission.CONTROL_VPN" />
   3203 
   3204     <!-- @SystemApi Allows an application to capture audio output.
   3205          <p>Not for use by third-party applications.</p> -->
   3206     <permission android:name="android.permission.CAPTURE_AUDIO_OUTPUT"
   3207         android:protectionLevel="signature|privileged" />
   3208 
   3209     <!-- @SystemApi Allows an application to capture audio for hotword detection.
   3210          <p>Not for use by third-party applications.</p>
   3211          @hide -->
   3212     <permission android:name="android.permission.CAPTURE_AUDIO_HOTWORD"
   3213         android:protectionLevel="signature|privileged" />
   3214 
   3215     <!-- @SystemApi Allows an application to modify audio routing and override policy decisions.
   3216          <p>Not for use by third-party applications.</p>
   3217          @hide -->
   3218     <permission android:name="android.permission.MODIFY_AUDIO_ROUTING"
   3219         android:protectionLevel="signature|privileged" />
   3220 
   3221     <!-- @SystemApi Allows an application to capture video output.
   3222          <p>Not for use by third-party applications.</p> -->
   3223     <permission android:name="android.permission.CAPTURE_VIDEO_OUTPUT"
   3224         android:protectionLevel="signature|privileged" />
   3225 
   3226     <!-- @SystemApi Allows an application to capture secure video output.
   3227          <p>Not for use by third-party applications.</p> -->
   3228     <permission android:name="android.permission.CAPTURE_SECURE_VIDEO_OUTPUT"
   3229         android:protectionLevel="signature|privileged" />
   3230 
   3231     <!-- @SystemApi Allows an application to know what content is playing and control its playback.
   3232          <p>Not for use by third-party applications due to privacy of media consumption</p>  -->
   3233     <permission android:name="android.permission.MEDIA_CONTENT_CONTROL"
   3234         android:protectionLevel="signature|privileged" />
   3235 
   3236     <!-- @SystemApi @hide Allows an application to set the volume key long-press listener.
   3237          <p>When it's set, the application will receive the volume key long-press event
   3238          instead of changing volume.</p>
   3239          <p>Not for use by third-party applications</p> -->
   3240     <permission android:name="android.permission.SET_VOLUME_KEY_LONG_PRESS_LISTENER"
   3241         android:protectionLevel="signature|privileged|development" />
   3242 
   3243     <!-- @SystemApi @hide Allows an application to set media key event listener.
   3244          <p>When it's set, the application will receive the media key event before
   3245          any other media sessions. If the event is handled by the listener, other sessions
   3246          cannot get the event.</p>
   3247          <p>Not for use by third-party applications</p> -->
   3248     <permission android:name="android.permission.SET_MEDIA_KEY_LISTENER"
   3249         android:protectionLevel="signature|privileged|development" />
   3250 
   3251     <!-- @SystemApi Required to be able to disable the device (very dangerous!).
   3252          <p>Not for use by third-party applications.
   3253          @hide
   3254     -->
   3255     <permission android:name="android.permission.BRICK"
   3256         android:protectionLevel="signature" />
   3257 
   3258     <!-- @SystemApi Required to be able to reboot the device.
   3259     <p>Not for use by third-party applications. -->
   3260     <permission android:name="android.permission.REBOOT"
   3261         android:protectionLevel="signature|privileged" />
   3262 
   3263    <!-- @SystemApi Allows low-level access to power management.
   3264         <p>Not for use by third-party applications.
   3265         @hide
   3266     -->
   3267    <permission android:name="android.permission.DEVICE_POWER"
   3268         android:protectionLevel="signature" />
   3269 
   3270    <!-- Allows access to the PowerManager.userActivity function.
   3271    <p>Not for use by third-party applications. @hide @SystemApi -->
   3272     <permission android:name="android.permission.USER_ACTIVITY"
   3273         android:protectionLevel="signature|privileged" />
   3274 
   3275    <!-- @hide Allows low-level access to tun tap driver -->
   3276     <permission android:name="android.permission.NET_TUNNELING"
   3277         android:protectionLevel="signature" />
   3278 
   3279     <!-- Run as a manufacturer test application, running as the root user.
   3280          Only available when the device is running in manufacturer test mode.
   3281          <p>Not for use by third-party applications.
   3282     -->
   3283     <permission android:name="android.permission.FACTORY_TEST"
   3284         android:protectionLevel="signature" />
   3285 
   3286     <!-- Allows an application to broadcast a notification that an application
   3287          package has been removed.
   3288          <p>Not for use by third-party applications.
   3289     -->
   3290     <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED"
   3291         android:protectionLevel="signature" />
   3292 
   3293     <!-- Allows an application to broadcast an SMS receipt notification.
   3294          <p>Not for use by third-party applications.
   3295     -->
   3296     <permission android:name="android.permission.BROADCAST_SMS"
   3297         android:protectionLevel="signature" />
   3298 
   3299     <!-- Allows an application to broadcast a WAP PUSH receipt notification.
   3300          <p>Not for use by third-party applications.
   3301     -->
   3302     <permission android:name="android.permission.BROADCAST_WAP_PUSH"
   3303         android:protectionLevel="signature" />
   3304 
   3305     <!-- @SystemApi Allows an application to broadcast privileged networking requests.
   3306          <p>Not for use by third-party applications.
   3307          @hide
   3308          @deprecated Use {@link android.Manifest.permission#REQUEST_NETWORK_SCORES} instead
   3309     -->
   3310     <permission android:name="android.permission.BROADCAST_NETWORK_PRIVILEGED"
   3311         android:protectionLevel="signature|privileged" />
   3312 
   3313     <!-- @SystemApi Not for use by third-party applications. -->
   3314     <permission android:name="android.permission.MASTER_CLEAR"
   3315         android:protectionLevel="signature|privileged" />
   3316 
   3317     <!-- @SystemApi Allows an application to call any phone number, including emergency
   3318          numbers, without going through the Dialer user interface for the user
   3319          to confirm the call being placed.
   3320          <p>Not for use by third-party applications. -->
   3321     <permission android:name="android.permission.CALL_PRIVILEGED"
   3322         android:protectionLevel="signature|privileged" />
   3323 
   3324     <!-- @SystemApi Allows an application to perform CDMA OTA provisioning @hide -->
   3325     <permission android:name="android.permission.PERFORM_CDMA_PROVISIONING"
   3326         android:protectionLevel="signature|privileged" />
   3327 
   3328     <!-- @SystemApi Allows an application to perform SIM Activation @hide -->
   3329     <permission android:name="android.permission.PERFORM_SIM_ACTIVATION"
   3330         android:protectionLevel="signature|privileged" />
   3331 
   3332     <!-- @SystemApi Allows enabling/disabling location update notifications from
   3333          the radio.
   3334          <p>Not for use by third-party applications. -->
   3335     <permission android:name="android.permission.CONTROL_LOCATION_UPDATES"
   3336         android:protectionLevel="signature|privileged" />
   3337 
   3338     <!-- @SystemApi Allows read/write access to the "properties" table in the checkin
   3339          database, to change values that get uploaded.
   3340          <p>Not for use by third-party applications. -->
   3341     <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES"
   3342         android:protectionLevel="signature|privileged" />
   3343 
   3344     <!-- @SystemApi Allows an application to collect component usage
   3345          statistics
   3346          <p>Declaring the permission implies intention to use the API and the user of the
   3347          device can grant permission through the Settings application. -->
   3348     <permission android:name="android.permission.PACKAGE_USAGE_STATS"
   3349         android:protectionLevel="signature|privileged|development|appop" />
   3350     <uses-permission android:name="android.permission.PACKAGE_USAGE_STATS" />
   3351 
   3352     <!-- @hide @SystemApi Allows an application to observe usage time of apps. The app can register
   3353          for callbacks when apps reach a certain usage time limit, etc. -->
   3354     <permission android:name="android.permission.OBSERVE_APP_USAGE"
   3355         android:protectionLevel="signature|privileged" />
   3356 
   3357     <!-- @hide @SystemApi Allows an application to change the app idle state of an app.
   3358          <p>Not for use by third-party applications. -->
   3359     <permission android:name="android.permission.CHANGE_APP_IDLE_STATE"
   3360         android:protectionLevel="signature|privileged" />
   3361 
   3362     <!-- @hide @SystemApi Allows an application to temporarily whitelist an inactive app to
   3363          access the network and acquire wakelocks.
   3364          <p>Not for use by third-party applications. -->
   3365     <permission android:name="android.permission.CHANGE_DEVICE_IDLE_TEMP_WHITELIST"
   3366         android:protectionLevel="signature|privileged" />
   3367 
   3368     <!-- Permission an application must hold in order to use
   3369          {@link android.provider.Settings#ACTION_REQUEST_IGNORE_BATTERY_OPTIMIZATIONS}.
   3370          This is a normal permission: an app requesting it will always be granted the
   3371          permission, without the user needing to approve or see it. -->
   3372     <permission android:name="android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS"
   3373         android:label="@string/permlab_requestIgnoreBatteryOptimizations"
   3374         android:description="@string/permdesc_requestIgnoreBatteryOptimizations"
   3375         android:protectionLevel="normal" />
   3376 
   3377     <!-- @SystemApi Allows an application to collect battery statistics -->
   3378     <permission android:name="android.permission.BATTERY_STATS"
   3379         android:protectionLevel="signature|privileged|development" />
   3380 
   3381     <!--Allows an application to manage statscompanion.
   3382     <p>Not for use by third-party applications.
   3383          @hide -->
   3384     <permission android:name="android.permission.STATSCOMPANION"
   3385         android:protectionLevel="signature" />
   3386 
   3387     <!-- @SystemApi Allows an application to control the backup and restore process.
   3388     <p>Not for use by third-party applications.
   3389          @hide pending API council -->
   3390     <permission android:name="android.permission.BACKUP"
   3391         android:protectionLevel="signature|privileged" />
   3392 
   3393     <!-- @SystemApi Allows application to manage
   3394          {@link android.security.keystore.recovery.RecoveryController}.
   3395          <p>Not for use by third-party applications.
   3396          @hide -->
   3397     <permission android:name="android.permission.RECOVER_KEYSTORE"
   3398         android:protectionLevel="signature|privileged" />
   3399 
   3400     <!-- Allows a package to launch the secure full-backup confirmation UI.
   3401          ONLY the system process may hold this permission.
   3402          @hide -->
   3403     <permission android:name="android.permission.CONFIRM_FULL_BACKUP"
   3404         android:protectionLevel="signature" />
   3405 
   3406     <!-- @SystemApi Must be required by a {@link android.widget.RemoteViewsService},
   3407          to ensure that only the system can bind to it. -->
   3408     <permission android:name="android.permission.BIND_REMOTEVIEWS"
   3409         android:protectionLevel="signature|privileged" />
   3410 
   3411     <!-- @SystemApi Allows an application to tell the AppWidget service which application
   3412          can access AppWidget's data.  The normal user flow is that a user
   3413          picks an AppWidget to go into a particular host, thereby giving that
   3414          host application access to the private data from the AppWidget app.
   3415          An application that has this permission should honor that contract.
   3416          <p>Not for use by third-party applications. -->
   3417     <permission android:name="android.permission.BIND_APPWIDGET"
   3418         android:protectionLevel="signature|privileged" />
   3419 
   3420     <!-- @hide Allows sysui to manage user grants of slice permissions. -->
   3421     <permission android:name="android.permission.MANAGE_SLICE_PERMISSIONS"
   3422         android:protectionLevel="signature" />
   3423 
   3424     <!-- @SystemApi Private permission, to restrict who can bring up a dialog to add a new
   3425          keyguard widget
   3426          @hide -->
   3427     <permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET"
   3428         android:protectionLevel="signature|privileged" />
   3429 
   3430     <!-- @SystemApi Internal permission allowing an application to query/set which
   3431          applications can bind AppWidgets.
   3432          @hide -->
   3433     <permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS"
   3434         android:protectionLevel="signature|privileged" />
   3435 
   3436     <!-- Allows applications to change the background data setting.
   3437     <p>Not for use by third-party applications.
   3438          @hide pending API council -->
   3439     <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING"
   3440         android:protectionLevel="signature" />
   3441 
   3442     <!-- @SystemApi This permission can be used on content providers to allow the global
   3443          search system to access their data.  Typically it used when the
   3444          provider has some permissions protecting it (which global search
   3445          would not be expected to hold), and added as a read-only permission
   3446          to the path in the provider where global search queries are
   3447          performed.  This permission can not be held by regular applications;
   3448          it is used by applications to protect themselves from everyone else
   3449          besides global search. -->
   3450     <permission android:name="android.permission.GLOBAL_SEARCH"
   3451         android:protectionLevel="signature|privileged" />
   3452 
   3453     <!-- Internal permission protecting access to the global search
   3454          system: ensures that only the system can access the provider
   3455          to perform queries (since this otherwise provides unrestricted
   3456          access to a variety of content providers), and to write the
   3457          search statistics (to keep applications from gaming the source
   3458          ranking).
   3459          @hide -->
   3460     <permission android:name="android.permission.GLOBAL_SEARCH_CONTROL"
   3461         android:protectionLevel="signature" />
   3462 
   3463     <!-- @SystemApi Internal permission to allows an application to read indexable data.
   3464         @hide -->
   3465     <permission android:name="android.permission.READ_SEARCH_INDEXABLES"
   3466         android:protectionLevel="signature|privileged" />
   3467 
   3468     <!-- @SystemApi Internal permission to allows an application to bind to suggestion service.
   3469         @hide -->
   3470     <permission android:name="android.permission.BIND_SETTINGS_SUGGESTIONS_SERVICE"
   3471                 android:protectionLevel="signature" />
   3472 
   3473     <!-- @SystemApi Allows applications to set a live wallpaper.
   3474          @hide XXX Change to signature once the picker is moved to its
   3475          own apk as Ghod Intended. -->
   3476     <permission android:name="android.permission.SET_WALLPAPER_COMPONENT"
   3477         android:protectionLevel="signature|privileged" />
   3478 
   3479     <!-- @SystemApi Allows applications to read dream settings and dream state.
   3480          @hide -->
   3481     <permission android:name="android.permission.READ_DREAM_STATE"
   3482         android:protectionLevel="signature|privileged" />
   3483 
   3484     <!-- @SystemApi Allows applications to write dream settings, and start or stop dreaming.
   3485          @hide -->
   3486     <permission android:name="android.permission.WRITE_DREAM_STATE"
   3487         android:protectionLevel="signature|privileged" />
   3488 
   3489     <!-- @SystemApi Allow an application to read and write the cache partition.
   3490          @hide -->
   3491     <permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM"
   3492         android:protectionLevel="signature|privileged" />
   3493 
   3494     <!-- Must be required by default container service so that only
   3495          the system can bind to it and use it to copy
   3496          protected data to secure containers or files
   3497          accessible to the system.
   3498          @hide -->
   3499     <permission android:name="android.permission.COPY_PROTECTED_DATA"
   3500         android:protectionLevel="signature" />
   3501 
   3502     <!-- @SystemApi Internal permission protecting access to the encryption methods
   3503         @hide
   3504     -->
   3505     <permission android:name="android.permission.CRYPT_KEEPER"
   3506         android:protectionLevel="signature|privileged" />
   3507 
   3508     <!-- @SystemApi Allows an application to read historical network usage for
   3509          specific networks and applications. @hide -->
   3510     <permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY"
   3511         android:protectionLevel="signature|privileged" />
   3512 
   3513     <!-- Allows an application to manage network policies (such as warning and disable
   3514          limits) and to define application-specific rules. @hide -->
   3515     <permission android:name="android.permission.MANAGE_NETWORK_POLICY"
   3516         android:protectionLevel="signature" />
   3517 
   3518     <!-- @SystemApi @hide @deprecated use UPDATE_DEVICE_STATS instead -->
   3519     <permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING"
   3520         android:protectionLevel="signature|privileged" />
   3521 
   3522     <!-- @SystemApi @hide Allows an application to manage carrier subscription plans. -->
   3523     <permission android:name="android.permission.MANAGE_SUBSCRIPTION_PLANS"
   3524         android:protectionLevel="signature|privileged" />
   3525 
   3526     <!-- C2DM permission.
   3527          @hide Used internally.
   3528      -->
   3529     <permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"
   3530           android:protectionLevel="signature" />
   3531     <uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/>
   3532 
   3533     <!-- @SystemApi @hide Package verifier needs to have this permission before the PackageManager will
   3534          trust it to verify packages.
   3535     -->
   3536     <permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT"
   3537         android:protectionLevel="signature|privileged" />
   3538 
   3539     <!-- Must be required by package verifier receiver, to ensure that only the
   3540          system can interact with it.
   3541          @hide
   3542     -->
   3543     <permission android:name="android.permission.BIND_PACKAGE_VERIFIER"
   3544         android:protectionLevel="signature" />
   3545 
   3546     <!-- @SystemApi @hide Allows an application to mark other applications as harmful -->
   3547     <permission android:name="android.permission.SET_HARMFUL_APP_WARNINGS"
   3548         android:protectionLevel="signature|verifier" />
   3549 
   3550     <!-- @SystemApi @hide Intent filter verifier needs to have this permission before the
   3551          PackageManager will trust it to verify intent filters.
   3552     -->
   3553     <permission android:name="android.permission.INTENT_FILTER_VERIFICATION_AGENT"
   3554         android:protectionLevel="signature|privileged" />
   3555 
   3556     <!-- Must be required by intent filter verifier receiver, to ensure that only the
   3557          system can interact with it.
   3558          @hide
   3559     -->
   3560     <permission android:name="android.permission.BIND_INTENT_FILTER_VERIFIER"
   3561         android:protectionLevel="signature" />
   3562 
   3563     <!-- @SystemApi Allows applications to access serial ports via the SerialManager.
   3564          @hide -->
   3565     <permission android:name="android.permission.SERIAL_PORT"
   3566         android:protectionLevel="signature|privileged" />
   3567 
   3568     <!-- Allows the holder to access content providers from outside an ApplicationThread.
   3569          This permission is enforced by the ActivityManagerService on the corresponding APIs,
   3570          in particular ActivityManagerService#getContentProviderExternal(String) and
   3571          ActivityManagerService#removeContentProviderExternal(String).
   3572          @hide
   3573     -->
   3574     <permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY"
   3575         android:protectionLevel="signature" />
   3576 
   3577     <!-- @SystemApi Allows an application to hold an UpdateLock, recommending that a headless
   3578          OTA reboot *not* occur while the lock is held.
   3579          @hide -->
   3580     <permission android:name="android.permission.UPDATE_LOCK"
   3581         android:protectionLevel="signature|privileged" />
   3582 
   3583     <!-- @SystemApi Allows an application to read the current set of notifications, including
   3584          any metadata and intents attached.
   3585          @hide -->
   3586     <permission android:name="android.permission.ACCESS_NOTIFICATIONS"
   3587         android:protectionLevel="signature|privileged|appop" />
   3588 
   3589     <!-- Marker permission for applications that wish to access notification policy.
   3590          <p>Protection level: normal
   3591     -->
   3592     <permission android:name="android.permission.ACCESS_NOTIFICATION_POLICY"
   3593         android:description="@string/permdesc_access_notification_policy"
   3594         android:label="@string/permlab_access_notification_policy"
   3595         android:protectionLevel="normal" />
   3596 
   3597     <!-- Allows modification of do not disturb rules and policies. Only allowed for system
   3598         processes.
   3599         @hide -->
   3600     <permission android:name="android.permission.MANAGE_NOTIFICATIONS"
   3601                 android:protectionLevel="signature" />
   3602 
   3603     <!-- Allows notifications to be colorized
   3604          <p>Not for use by third-party applications. @hide -->
   3605     <permission android:name="android.permission.USE_COLORIZED_NOTIFICATIONS"
   3606                 android:protectionLevel="signature|setup" />
   3607 
   3608     <!-- Allows access to keyguard secure storage.  Only allowed for system processes.
   3609         @hide -->
   3610     <permission android:name="android.permission.ACCESS_KEYGUARD_SECURE_STORAGE"
   3611         android:protectionLevel="signature" />
   3612 
   3613     <!-- Allows managing (adding, removing) fingerprint templates. Reserved for the system. @hide -->
   3614     <permission android:name="android.permission.MANAGE_FINGERPRINT"
   3615         android:protectionLevel="signature|privileged" />
   3616 
   3617     <!-- Allows an app to reset fingerprint attempt counter. Reserved for the system. @hide -->
   3618     <permission android:name="android.permission.RESET_FINGERPRINT_LOCKOUT"
   3619         android:protectionLevel="signature" />
   3620 
   3621     <!-- Allows an application to control keyguard.  Only allowed for system processes.
   3622         @hide -->
   3623     <permission android:name="android.permission.CONTROL_KEYGUARD"
   3624         android:protectionLevel="signature" />
   3625 
   3626     <!-- Allows an application to listen to trust changes.  Only allowed for system processes.
   3627         @hide -->
   3628     <permission android:name="android.permission.TRUST_LISTENER"
   3629         android:protectionLevel="signature" />
   3630 
   3631     <!-- @SystemApi Allows an application to provide a trust agent.
   3632          @hide For security reasons, this is a platform-only permission. -->
   3633     <permission android:name="android.permission.PROVIDE_TRUST_AGENT"
   3634         android:protectionLevel="signature|privileged" />
   3635 
   3636     <!-- @SystemApi Allows an application to show a message
   3637          on the keyguard when asking to dismiss it.
   3638          @hide For security reasons, this is a platform-only permission. -->
   3639     <permission android:name="android.permission.SHOW_KEYGUARD_MESSAGE"
   3640         android:protectionLevel="signature|privileged" />
   3641 
   3642     <!-- Allows an application to launch the trust agent settings activity.
   3643         @hide -->
   3644     <permission android:name="android.permission.LAUNCH_TRUST_AGENT_SETTINGS"
   3645         android:protectionLevel="signature|privileged" />
   3646 
   3647     <!-- @SystemApi Must be required by an {@link
   3648         android.service.trust.TrustAgentService},
   3649         to ensure that only the system can bind to it.
   3650         @hide -->
   3651     <permission android:name="android.permission.BIND_TRUST_AGENT"
   3652         android:protectionLevel="signature" />
   3653 
   3654     <!-- Must be required by an {@link
   3655          android.service.notification.NotificationListenerService},
   3656          to ensure that only the system can bind to it.
   3657          <p>Protection level: signature
   3658     -->
   3659     <permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE"
   3660         android:protectionLevel="signature" />
   3661 
   3662     <!-- @SystemApi Must be required by an {@link
   3663          android.service.notification.NotificationAssistantService} to ensure that only the system
   3664          can bind to it.
   3665          <p>Protection level: signature
   3666          @hide
   3667     -->
   3668     <permission android:name="android.permission.BIND_NOTIFICATION_ASSISTANT_SERVICE"
   3669         android:protectionLevel="signature" />
   3670 
   3671     <!-- Must be required by a {@link
   3672          android.service.chooser.ChooserTargetService}, to ensure that
   3673          only the system can bind to it.
   3674          <p>Protection level: signature
   3675     -->
   3676     <permission android:name="android.permission.BIND_CHOOSER_TARGET_SERVICE"
   3677         android:protectionLevel="signature" />
   3678 
   3679     <!-- @SystemApi Must be held by services that extend
   3680          {@link android.service.resolver.ResolverRankerService}.
   3681          <p>Protection level: signature|privileged
   3682          @hide
   3683     -->
   3684     <permission android:name="android.permission.PROVIDE_RESOLVER_RANKER_SERVICE"
   3685                 android:protectionLevel="signature|privileged" />
   3686 
   3687     <!-- @SystemApi Must be required by services that extend
   3688          {@link android.service.resolver.ResolverRankerService}, to ensure that only the system can
   3689          bind to them.
   3690          <p>Protection level: signature
   3691          @hide
   3692     -->
   3693     <permission android:name="android.permission.BIND_RESOLVER_RANKER_SERVICE"
   3694         android:protectionLevel="signature" />
   3695 
   3696     <!-- Must be required by a {@link
   3697          android.service.notification.ConditionProviderService},
   3698          to ensure that only the system can bind to it.
   3699          <p>Protection level: signature
   3700          -->
   3701     <permission android:name="android.permission.BIND_CONDITION_PROVIDER_SERVICE"
   3702         android:protectionLevel="signature" />
   3703 
   3704     <!-- Must be required by an {@link android.service.dreams.DreamService},
   3705          to ensure that only the system can bind to it.
   3706          <p>Protection level: signature
   3707     -->
   3708     <permission android:name="android.permission.BIND_DREAM_SERVICE"
   3709         android:protectionLevel="signature" />
   3710 
   3711     <!-- Must be required by an {@link android.app.usage.CacheQuotaService} to ensure that only the
   3712          system can bind to it.
   3713          @hide This is not a third-party API (intended for OEMs and system apps).
   3714     -->
   3715     <permission android:name="android.permission.BIND_CACHE_QUOTA_SERVICE"
   3716                 android:protectionLevel="signature" />
   3717 
   3718     <!-- @SystemApi Allows an application to call into a carrier setup flow. It is up to the
   3719          carrier setup application to enforce that this permission is required
   3720          @hide This is not a third-party API (intended for OEMs and system apps). -->
   3721     <permission android:name="android.permission.INVOKE_CARRIER_SETUP"
   3722         android:protectionLevel="signature|privileged" />
   3723 
   3724     <!-- @SystemApi Allows an application to listen for network condition observations.
   3725          @hide This is not a third-party API (intended for system apps). -->
   3726     <permission android:name="android.permission.ACCESS_NETWORK_CONDITIONS"
   3727         android:protectionLevel="signature|privileged" />
   3728 
   3729     <!-- @SystemApi Allows an application to provision and access DRM certificates
   3730          @hide This is not a third-party API (intended for system apps). -->
   3731     <permission android:name="android.permission.ACCESS_DRM_CERTIFICATES"
   3732         android:protectionLevel="signature|privileged" />
   3733 
   3734     <!-- Api Allows an application to manage media projection sessions.
   3735          @hide This is not a third-party API (intended for system apps). -->
   3736     <permission android:name="android.permission.MANAGE_MEDIA_PROJECTION"
   3737         android:protectionLevel="signature" />
   3738 
   3739     <!-- @SystemApi Allows an application to read install sessions
   3740          @hide This is not a third-party API (intended for system apps). -->
   3741     <permission android:name="android.permission.READ_INSTALL_SESSIONS"
   3742         android:label="@string/permlab_readInstallSessions"
   3743         android:description="@string/permdesc_readInstallSessions"
   3744         android:protectionLevel="normal"/>
   3745 
   3746     <!-- @SystemApi Allows an application to remove DRM certificates
   3747          @hide This is not a third-party API (intended for system apps). -->
   3748     <permission android:name="android.permission.REMOVE_DRM_CERTIFICATES"
   3749         android:protectionLevel="signature|privileged" />
   3750 
   3751     <!-- @deprecated Use {@link android.Manifest.permission#BIND_CARRIER_SERVICES} instead -->
   3752     <permission android:name="android.permission.BIND_CARRIER_MESSAGING_SERVICE"
   3753         android:protectionLevel="signature|privileged" />
   3754 
   3755     <!-- Allows an application to interact with the currently active
   3756          {@link android.service.voice.VoiceInteractionService}.
   3757          @hide -->
   3758     <permission android:name="android.permission.ACCESS_VOICE_INTERACTION_SERVICE"
   3759         android:protectionLevel="signature" />
   3760 
   3761     <!-- The system process that is allowed to bind to services in carrier apps will
   3762          have this permission. Carrier apps should use this permission to protect
   3763          their services that only the system is allowed to bind to.
   3764          <p>Protection level: signature|privileged
   3765     -->
   3766     <permission android:name="android.permission.BIND_CARRIER_SERVICES"
   3767         android:label="@string/permlab_bindCarrierServices"
   3768         android:description="@string/permdesc_bindCarrierServices"
   3769         android:protectionLevel="signature|privileged" />
   3770 
   3771     <!-- Allows an application to query whether DO_NOT_ASK_CREDENTIALS_ON_BOOT
   3772          flag is set.
   3773          @hide -->
   3774     <permission android:name="android.permission.QUERY_DO_NOT_ASK_CREDENTIALS_ON_BOOT"
   3775                 android:protectionLevel="signature" />
   3776 
   3777     <!-- @SystemApi Allows applications to kill UIDs.
   3778         <p>Not for use by third-party applications.
   3779          @hide -->
   3780     <permission android:name="android.permission.KILL_UID"
   3781                 android:protectionLevel="signature|installer" />
   3782 
   3783     <!-- @SystemApi Allows applications to read the local WiFi and Bluetooth MAC address.
   3784         @hide -->
   3785     <permission android:name="android.permission.LOCAL_MAC_ADDRESS"
   3786                 android:protectionLevel="signature|privileged" />
   3787     <uses-permission android:name="android.permission.LOCAL_MAC_ADDRESS"/>
   3788 
   3789     <!-- @SystemApi Allows access to MAC addresses of WiFi and Bluetooth peer devices.
   3790         @hide -->
   3791     <permission android:name="android.permission.PEERS_MAC_ADDRESS"
   3792                 android:protectionLevel="signature|setup" />
   3793 
   3794     <!-- Allows the Nfc stack to dispatch Nfc messages to applications. Applications
   3795         can use this permission to ensure incoming Nfc messages are from the Nfc stack
   3796         and not simulated by another application.
   3797         @hide -->
   3798     <permission android:name="android.permission.DISPATCH_NFC_MESSAGE"
   3799                 android:protectionLevel="signature|privileged" />
   3800 
   3801     <!-- @SystemApi Allows changing day / night mode when system is configured with
   3802          config_lockDayNightMode set to true. If requesting app does not have permission,
   3803          it will be ignored.
   3804         @hide -->
   3805     <permission android:name="android.permission.MODIFY_DAY_NIGHT_MODE"
   3806                 android:protectionLevel="signature|privileged" />
   3807 
   3808     <!-- The system process is explicitly the only one allowed to launch the
   3809          confirmation UI for full backup/restore -->
   3810     <uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/>
   3811 
   3812     <!-- Allows the holder to access and manage instant applications on the device.
   3813     @hide -->
   3814     <permission android:name="android.permission.ACCESS_INSTANT_APPS"
   3815             android:protectionLevel="signature|installer|verifier" />
   3816     <uses-permission android:name="android.permission.ACCESS_INSTANT_APPS"/>
   3817 
   3818     <!-- Allows the holder to view the instant applications on the device.
   3819     @hide -->
   3820     <permission android:name="android.permission.VIEW_INSTANT_APPS"
   3821                 android:protectionLevel="signature|preinstalled" />
   3822 
   3823     <!-- Allows the holder to manage whether the system can bind to services
   3824          provided by instant apps. This permission is intended to protect
   3825          test/development fucntionality and should be used only in such cases.
   3826     @hide -->
   3827     <permission android:name="android.permission.MANAGE_BIND_INSTANT_SERVICE"
   3828                 android:protectionLevel="signature" />
   3829 
   3830     <!-- Allows receiving the usage of media resource e.g. video/audio codec and
   3831          graphic memory.
   3832          @hide -->
   3833     <permission android:name="android.permission.RECEIVE_MEDIA_RESOURCE_USAGE"
   3834                 android:protectionLevel="signature|privileged" />
   3835 
   3836     <!-- Must be required by system/priv apps when accessing the sound trigger
   3837          APIs given by {@link SoundTriggerManager}.
   3838          @hide
   3839          @SystemApi -->
   3840     <permission android:name="android.permission.MANAGE_SOUND_TRIGGER"
   3841         android:protectionLevel="signature|privileged" />
   3842 
   3843     <!-- Must be required by system/priv apps implementing sound trigger detection services
   3844          @hide
   3845          @SystemApi -->
   3846     <permission android:name="android.permission.BIND_SOUND_TRIGGER_DETECTION_SERVICE"
   3847         android:protectionLevel="signature" />
   3848 
   3849     <!-- @SystemApi Allows trusted applications to dispatch managed provisioning message to Managed
   3850          Provisioning app. If requesting app does not have permission, it will be ignored.
   3851          @hide -->
   3852     <permission android:name="android.permission.DISPATCH_PROVISIONING_MESSAGE"
   3853                 android:protectionLevel="signature|privileged" />
   3854 
   3855     <!-- Allows the holder to read blocked numbers. See
   3856          {@link android.provider.BlockedNumberContract}.
   3857          @hide -->
   3858     <permission android:name="android.permission.READ_BLOCKED_NUMBERS"
   3859                 android:protectionLevel="signature" />
   3860 
   3861     <!-- Allows the holder to write blocked numbers. See
   3862          {@link android.provider.BlockedNumberContract}.
   3863          @hide -->
   3864     <permission android:name="android.permission.WRITE_BLOCKED_NUMBERS"
   3865                 android:protectionLevel="signature" />
   3866 
   3867     <!-- Must be required by an {@link android.service.vr.VrListenerService}, to ensure that only
   3868          the system can bind to it.
   3869          <p>Protection level: signature -->
   3870     <permission android:name="android.permission.BIND_VR_LISTENER_SERVICE"
   3871         android:protectionLevel="signature" />
   3872 
   3873     <!-- Must be required by system apps when accessing restricted VR APIs.
   3874          @hide
   3875          @SystemApi
   3876          <p>Protection level: signature -->
   3877     <permission android:name="android.permission.RESTRICTED_VR_ACCESS"
   3878         android:protectionLevel="signature|preinstalled" />
   3879 
   3880     <!-- Required to make calls to {@link android.service.vr.IVrManager}.
   3881          @hide -->
   3882     <permission android:name="android.permission.ACCESS_VR_MANAGER"
   3883             android:protectionLevel="signature" />
   3884 
   3885     <!-- Required to access VR-Mode state and state change events via {android.app.VrStateCallback}
   3886          @hide -->
   3887     <permission android:name="android.permission.ACCESS_VR_STATE"
   3888         android:protectionLevel="signature|preinstalled" />
   3889 
   3890     <!-- Allows an application to whitelist tasks during lock task mode
   3891          @hide <p>Not for use by third-party applications.</p> -->
   3892     <permission android:name="android.permission.UPDATE_LOCK_TASK_PACKAGES"
   3893         android:protectionLevel="signature|setup" />
   3894 
   3895     <!-- @SystemApi Allows an application to replace the app name displayed alongside notifications
   3896          in the N-release and later.
   3897          @hide  <p>Not for use by third-party applications.</p> -->
   3898     <permission android:name="android.permission.SUBSTITUTE_NOTIFICATION_APP_NAME"
   3899                 android:protectionLevel="signature|privileged" />
   3900 
   3901     <!-- @SystemApi Allows an application to show notifications before the device is provisioned.
   3902          @hide  <p>Not for use by third-party applications.</p> -->
   3903     <permission android:name="android.permission.NOTIFICATION_DURING_SETUP"
   3904                 android:protectionLevel="signature|privileged" />
   3905 
   3906     <!-- @SystemApi Allows an application to manage auto-fill sessions.
   3907          @hide  <p>Not for use by third-party applications.</p> -->
   3908     <permission android:name="android.permission.MANAGE_AUTO_FILL"
   3909         android:protectionLevel="signature" />
   3910 
   3911     <!-- Allows an app to set the theme overlay in /vendor/overlay
   3912          being used.
   3913          @hide  <p>Not for use by third-party applications.</p> -->
   3914     <permission android:name="android.permission.MODIFY_THEME_OVERLAY"
   3915                 android:protectionLevel="signature" />
   3916 
   3917     <!-- Allows an instant app to create foreground services. -->
   3918     <permission android:name="android.permission.INSTANT_APP_FOREGROUND_SERVICE"
   3919         android:protectionLevel="signature|development|instant|appop" />
   3920 
   3921     <!-- Allows a regular application to use {@link android.app.Service#startForeground
   3922          Service.startForeground}.
   3923          <p>Protection level: normal
   3924     -->
   3925     <permission android:name="android.permission.FOREGROUND_SERVICE"
   3926         android:description="@string/permdesc_foregroundService"
   3927         android:label="@string/permlab_foregroundService"
   3928         android:protectionLevel="normal|instant" />
   3929 
   3930     <!-- @SystemApi Allows to access all app shortcuts.
   3931          @hide -->
   3932     <permission android:name="android.permission.ACCESS_SHORTCUTS"
   3933         android:protectionLevel="signature|textClassifier" />
   3934 
   3935     <!-- @SystemApi Allows unlimited calls to shortcut mutation APIs.
   3936          @hide -->
   3937     <permission android:name="android.permission.UNLIMITED_SHORTCUTS_API_CALLS"
   3938         android:protectionLevel="signature|textClassifier" />
   3939 
   3940     <!-- @SystemApi Allows an application to read the runtime profiles of other apps.
   3941          @hide <p>Not for use by third-party applications. -->
   3942     <permission android:name="android.permission.READ_RUNTIME_PROFILES"
   3943                 android:protectionLevel="signature|privileged" />
   3944 
   3945     <!-- @hide Allows audio policy management. -->
   3946     <permission android:name="android.permission.MANAGE_AUDIO_POLICY"
   3947         android:protectionLevel="signature" />
   3948 
   3949     <!-- @SystemApi Allows an application to turn on / off quiet mode.
   3950          @hide <p>Not for use by third-party applications. -->
   3951     <permission android:name="android.permission.MODIFY_QUIET_MODE"
   3952                 android:protectionLevel="signature|privileged" />
   3953 
   3954     <!-- Allows internal management of the camera framework
   3955          @hide -->
   3956     <permission android:name="android.permission.MANAGE_CAMERA"
   3957         android:protectionLevel="signature" />
   3958 
   3959     <!-- Allows an application to control remote animations. See
   3960          {@link ActivityOptions#makeRemoteAnimation}
   3961          @hide <p>Not for use by third-party applications. -->
   3962     <permission android:name="android.permission.CONTROL_REMOTE_APP_TRANSITION_ANIMATIONS"
   3963         android:protectionLevel="signature|privileged" />
   3964 
   3965     <!-- Allows an application to watch changes and/or active state of app ops.
   3966          @hide <p>Not for use by third-party applications. -->
   3967     <permission android:name="android.permission.WATCH_APPOPS"
   3968         android:protectionLevel="signature" />
   3969 
   3970     <!-- Allows an application to directly open the "Open by default" page inside a package's
   3971          Details screen.
   3972          @hide <p>Not for use by third-party applications. -->
   3973     <permission android:name="android.permission.OPEN_APPLICATION_DETAILS_OPEN_BY_DEFAULT_PAGE"
   3974                 android:protectionLevel="signature" />
   3975 
   3976     <!-- Allows hidden API checks to be disabled when starting a process.
   3977          @hide <p>Not for use by third-party applications. -->
   3978     <permission android:name="android.permission.DISABLE_HIDDEN_API_CHECKS"
   3979                 android:protectionLevel="signature" />
   3980 
   3981     <application android:process="system"
   3982                  android:persistent="true"
   3983                  android:hasCode="false"
   3984                  android:label="@string/android_system_label"
   3985                  android:allowClearUserData="false"
   3986                  android:backupAgent="com.android.server.backup.SystemBackupAgent"
   3987                  android:killAfterRestore="false"
   3988                  android:icon="@drawable/ic_launcher_android"
   3989                  android:supportsRtl="true"
   3990                  android:theme="@style/Theme.DeviceDefault.Light.DarkActionBar"
   3991                  android:defaultToDeviceProtectedStorage="true"
   3992                  android:directBootAware="true">
   3993         <activity android:name="com.android.internal.app.ChooserActivity"
   3994                 android:theme="@style/Theme.DeviceDefault.Resolver"
   3995                 android:finishOnCloseSystemDialogs="true"
   3996                 android:excludeFromRecents="true"
   3997                 android:documentLaunchMode="never"
   3998                 android:relinquishTaskIdentity="true"
   3999                 android:configChanges="screenSize|smallestScreenSize|screenLayout|orientation|keyboard|keyboardHidden"
   4000                 android:process=":ui"
   4001                 android:visibleToInstantApps="true">
   4002             <intent-filter>
   4003                 <action android:name="android.intent.action.CHOOSER" />
   4004                 <category android:name="android.intent.category.DEFAULT" />
   4005                 <category android:name="android.intent.category.VOICE" />
   4006             </intent-filter>
   4007         </activity>
   4008         <activity android:name="com.android.internal.app.AccessibilityButtonChooserActivity"
   4009                   android:exported="false"
   4010                   android:theme="@style/Theme.DeviceDefault.Resolver"
   4011                   android:finishOnCloseSystemDialogs="true"
   4012                   android:excludeFromRecents="true"
   4013                   android:documentLaunchMode="never"
   4014                   android:relinquishTaskIdentity="true"
   4015                   android:configChanges="screenSize|smallestScreenSize|screenLayout|orientation|keyboard|keyboardHidden"
   4016                   android:process=":ui"
   4017                   android:visibleToInstantApps="true">
   4018             <intent-filter>
   4019                 <action android:name="com.android.internal.intent.action.CHOOSE_ACCESSIBILITY_BUTTON" />
   4020                 <category android:name="android.intent.category.DEFAULT" />
   4021             </intent-filter>
   4022         </activity>
   4023         <activity android:name="com.android.internal.app.IntentForwarderActivity"
   4024                 android:finishOnCloseSystemDialogs="true"
   4025                 android:theme="@style/Theme.NoDisplay"
   4026                 android:excludeFromRecents="true"
   4027                 android:label="@string/user_owner_label"
   4028                 android:exported="true"
   4029                 android:visibleToInstantApps="true"
   4030                 >
   4031         </activity>
   4032         <activity-alias android:name="com.android.internal.app.ForwardIntentToParent"
   4033                 android:targetActivity="com.android.internal.app.IntentForwarderActivity"
   4034                 android:exported="true"
   4035                 android:label="@string/user_owner_label">
   4036         </activity-alias>
   4037         <activity-alias android:name="com.android.internal.app.ForwardIntentToManagedProfile"
   4038                 android:targetActivity="com.android.internal.app.IntentForwarderActivity"
   4039                 android:icon="@drawable/ic_corp_badge"
   4040                 android:exported="true"
   4041                 android:label="@string/managed_profile_label">
   4042         </activity-alias>
   4043         <activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity"
   4044                 android:theme="@style/Theme.DeviceDefault.Light.Dialog"
   4045                 android:label="@string/heavy_weight_switcher_title"
   4046                 android:finishOnCloseSystemDialogs="true"
   4047                 android:excludeFromRecents="true"
   4048                 android:process=":ui">
   4049         </activity>
   4050         <activity android:name="com.android.internal.app.PlatLogoActivity"
   4051                 android:theme="@style/Theme.Wallpaper.NoTitleBar.Fullscreen"
   4052                 android:configChanges="orientation|keyboardHidden"
   4053                 android:process=":ui">
   4054         </activity>
   4055         <activity android:name="com.android.internal.app.DisableCarModeActivity"
   4056                 android:theme="@style/Theme.NoDisplay"
   4057                 android:excludeFromRecents="true"
   4058                 android:process=":ui">
   4059         </activity>
   4060         <activity android:name="com.android.internal.app.DumpHeapActivity"
   4061                 android:theme="@style/Theme.Translucent.NoTitleBar"
   4062                 android:label="@string/dump_heap_title"
   4063                 android:finishOnCloseSystemDialogs="true"
   4064                 android:noHistory="true"
   4065                 android:excludeFromRecents="true"
   4066                 android:process=":ui">
   4067         </activity>
   4068         <provider android:name="com.android.server.am.DumpHeapProvider"
   4069                 android:authorities="com.android.server.heapdump"
   4070                 android:grantUriPermissions="true"
   4071                 android:multiprocess="false"
   4072                 android:singleUser="true" />
   4073 
   4074         <activity android:name="android.accounts.ChooseAccountActivity"
   4075                 android:excludeFromRecents="true"
   4076                 android:exported="true"
   4077                 android:theme="@style/Theme.DeviceDefault.Light.Dialog"
   4078                 android:label="@string/choose_account_label"
   4079                 android:process=":ui"
   4080                 android:visibleToInstantApps="true">
   4081         </activity>
   4082 
   4083         <activity android:name="android.accounts.ChooseTypeAndAccountActivity"
   4084                 android:excludeFromRecents="true"
   4085                 android:exported="true"
   4086                 android:theme="@style/Theme.DeviceDefault.Light.Dialog"
   4087                 android:label="@string/choose_account_label"
   4088                 android:process=":ui"
   4089                 android:visibleToInstantApps="true">
   4090         </activity>
   4091 
   4092         <activity android:name="android.accounts.ChooseAccountTypeActivity"
   4093                 android:excludeFromRecents="true"
   4094                 android:theme="@style/Theme.DeviceDefault.Light.Dialog"
   4095                 android:label="@string/choose_account_label"
   4096                 android:process=":ui"
   4097                 android:visibleToInstantApps="true">
   4098         </activity>
   4099 
   4100         <activity android:name="android.accounts.CantAddAccountActivity"
   4101                 android:excludeFromRecents="true"
   4102                 android:exported="true"
   4103                 android:theme="@style/Theme.DeviceDefault.Light.Dialog.NoActionBar"
   4104                 android:process=":ui">
   4105         </activity>
   4106 
   4107         <activity android:name="android.accounts.GrantCredentialsPermissionActivity"
   4108                 android:excludeFromRecents="true"
   4109                 android:exported="true"
   4110                 android:theme="@style/Theme.DeviceDefault.Light.DialogWhenLarge"
   4111                 android:process=":ui"
   4112                 android:visibleToInstantApps="true">
   4113         </activity>
   4114 
   4115         <activity android:name="android.content.SyncActivityTooManyDeletes"
   4116                android:theme="@style/Theme.DeviceDefault.Light.Dialog"
   4117                android:label="@string/sync_too_many_deletes"
   4118                android:process=":ui">
   4119         </activity>
   4120 
   4121         <activity android:name="com.android.internal.app.ShutdownActivity"
   4122             android:permission="android.permission.SHUTDOWN"
   4123             android:theme="@style/Theme.NoDisplay"
   4124             android:excludeFromRecents="true">
   4125             <intent-filter>
   4126                 <action android:name="com.android.internal.intent.action.REQUEST_SHUTDOWN" />
   4127                 <category android:name="android.intent.category.DEFAULT" />
   4128             </intent-filter>
   4129             <intent-filter>
   4130                 <action android:name="android.intent.action.REBOOT" />
   4131                 <category android:name="android.intent.category.DEFAULT" />
   4132             </intent-filter>
   4133         </activity>
   4134 
   4135         <activity android:name="com.android.internal.app.NetInitiatedActivity"
   4136                 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert"
   4137                 android:excludeFromRecents="true"
   4138                 android:process=":ui">
   4139         </activity>
   4140 
   4141         <activity android:name="com.android.internal.app.SystemUserHomeActivity"
   4142                   android:enabled="false"
   4143                   android:process=":ui"
   4144                   android:systemUserOnly="true"
   4145                   android:theme="@style/Theme.Translucent.NoTitleBar">
   4146             <intent-filter android:priority="-100">
   4147                 <action android:name="android.intent.action.MAIN" />
   4148                 <category android:name="android.intent.category.HOME" />
   4149             </intent-filter>
   4150         </activity>
   4151 
   4152         <!-- Activity to prompt user if it's ok to create a new user sandbox for a
   4153              specified account. -->
   4154         <activity android:name="com.android.internal.app.ConfirmUserCreationActivity"
   4155                 android:excludeFromRecents="true"
   4156                 android:process=":ui"
   4157                 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert">
   4158             <intent-filter android:priority="1000">
   4159                 <action android:name="android.os.action.CREATE_USER" />
   4160                 <category android:name="android.intent.category.DEFAULT" />
   4161             </intent-filter>
   4162         </activity>
   4163 
   4164         <activity android:name="com.android.internal.app.UnlaunchableAppActivity"
   4165                 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert"
   4166                 android:excludeFromRecents="true"
   4167                 android:process=":ui">
   4168         </activity>
   4169 
   4170         <activity android:name="com.android.settings.notification.NotificationAccessConfirmationActivity"
   4171                   android:theme="@android:style/Theme.DeviceDefault.Light.Dialog.Alert"
   4172                   android:excludeFromRecents="true">
   4173         </activity>
   4174 
   4175         <activity android:name="com.android.internal.app.HarmfulAppWarningActivity"
   4176                   android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert"
   4177                   android:excludeFromRecents="true"
   4178                   android:process=":ui"
   4179                   android:label="@string/harmful_app_warning_title"
   4180                   android:exported="false">
   4181         </activity>
   4182 
   4183         <receiver android:name="com.android.server.BootReceiver"
   4184                 android:systemUserOnly="true">
   4185             <intent-filter android:priority="1000">
   4186                 <action android:name="android.intent.action.BOOT_COMPLETED" />
   4187             </intent-filter>
   4188         </receiver>
   4189 
   4190         <receiver android:name="com.android.server.updates.CertPinInstallReceiver"
   4191                 android:permission="android.permission.UPDATE_CONFIG">
   4192             <intent-filter>
   4193                 <action android:name="android.intent.action.UPDATE_PINS" />
   4194                 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
   4195             </intent-filter>
   4196         </receiver>
   4197 
   4198         <receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver"
   4199                 android:permission="android.permission.UPDATE_CONFIG">
   4200             <intent-filter>
   4201                 <action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" />
   4202                 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
   4203             </intent-filter>
   4204         </receiver>
   4205 
   4206         <receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver"
   4207                 android:permission="android.permission.UPDATE_CONFIG">
   4208             <intent-filter>
   4209                 <action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" />
   4210                 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
   4211             </intent-filter>
   4212         </receiver>
   4213 
   4214         <receiver android:name="com.android.server.updates.NetworkWatchlistInstallReceiver"
   4215                   android:permission="android.permission.UPDATE_CONFIG">
   4216             <intent-filter>
   4217                 <action android:name="android.intent.action.UPDATE_NETWORK_WATCHLIST" />
   4218                 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
   4219             </intent-filter>
   4220         </receiver>
   4221 
   4222         <receiver android:name="com.android.server.updates.ApnDbInstallReceiver"
   4223                 android:permission="android.permission.UPDATE_CONFIG">
   4224             <intent-filter>
   4225                 <action android:name="com.android.internal.intent.action.UPDATE_APN_DB" />
   4226                 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
   4227             </intent-filter>
   4228         </receiver>
   4229 
   4230         <receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver"
   4231                 android:permission="android.permission.UPDATE_CONFIG">
   4232             <intent-filter>
   4233                 <action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" />
   4234                 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
   4235             </intent-filter>
   4236         </receiver>
   4237 
   4238         <receiver android:name="com.android.server.updates.CertificateTransparencyLogInstallReceiver"
   4239                 android:permission="android.permission.UPDATE_CONFIG">
   4240             <intent-filter>
   4241                 <action android:name="android.intent.action.UPDATE_CT_LOGS" />
   4242                 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
   4243             </intent-filter>
   4244         </receiver>
   4245 
   4246         <receiver android:name="com.android.server.updates.LangIdInstallReceiver"
   4247                 android:permission="android.permission.UPDATE_CONFIG">
   4248             <intent-filter>
   4249                 <action android:name="android.intent.action.UPDATE_LANG_ID" />
   4250                 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
   4251             </intent-filter>
   4252         </receiver>
   4253 
   4254         <receiver android:name="com.android.server.updates.SmartSelectionInstallReceiver"
   4255                 android:permission="android.permission.UPDATE_CONFIG">
   4256             <intent-filter>
   4257                 <action android:name="android.intent.action.UPDATE_SMART_SELECTION" />
   4258                 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
   4259             </intent-filter>
   4260         </receiver>
   4261 
   4262         <receiver android:name="com.android.server.updates.CarrierIdInstallReceiver"
   4263                   android:permission="android.permission.UPDATE_CONFIG">
   4264             <intent-filter>
   4265                 <action android:name="android.os.action.UPDATE_CARRIER_ID_DB" />
   4266                 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
   4267             </intent-filter>
   4268         </receiver>
   4269 
   4270         <receiver android:name="com.android.server.MasterClearReceiver"
   4271             android:permission="android.permission.MASTER_CLEAR">
   4272             <intent-filter
   4273                     android:priority="100" >
   4274                 <!-- For Checkin, Settings, etc.: action=FACTORY_RESET -->
   4275                 <action android:name="android.intent.action.FACTORY_RESET" />
   4276                 <!-- As above until all the references to the deprecated MASTER_CLEAR get updated to
   4277                      FACTORY_RESET. -->
   4278                 <action android:name="android.intent.action.MASTER_CLEAR" />
   4279 
   4280                 <!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR -->
   4281                 <action android:name="com.google.android.c2dm.intent.RECEIVE" />
   4282                 <category android:name="android.intent.category.MASTER_CLEAR" />
   4283             </intent-filter>
   4284         </receiver>
   4285 
   4286         <receiver android:name="com.android.server.stats.StatsCompanionService$AnomalyAlarmReceiver"
   4287                   android:permission="android.permission.STATSCOMPANION"
   4288                   android:exported="false">
   4289         </receiver>
   4290 
   4291         <receiver android:name="com.android.server.stats.StatsCompanionService$PullingAlarmReceiver"
   4292                   android:permission="android.permission.STATSCOMPANION"
   4293                   android:exported="false">
   4294         </receiver>
   4295 
   4296         <receiver android:name="com.android.server.am.BatteryStatsService$UsbConnectionReceiver"
   4297                   android:exported="false">
   4298             <intent-filter>
   4299                 <action android:name="android.intent.action.BOOT_COMPLETED" />
   4300             </intent-filter>
   4301             <intent-filter>
   4302                 <action android:name="android.hardware.usb.action.USB_STATE" />
   4303             </intent-filter>
   4304         </receiver>
   4305 
   4306         <service android:name="android.hardware.location.GeofenceHardwareService"
   4307             android:permission="android.permission.LOCATION_HARDWARE"
   4308             android:exported="false" />
   4309 
   4310         <service android:name="com.android.internal.backup.LocalTransportService"
   4311                 android:permission="android.permission.CONFIRM_FULL_BACKUP"
   4312                 android:exported="false">
   4313             <intent-filter>
   4314                 <action android:name="android.backup.TRANSPORT_HOST" />
   4315             </intent-filter>
   4316         </service>
   4317 
   4318         <service android:name="com.android.server.MountServiceIdler"
   4319                  android:exported="true"
   4320                  android:permission="android.permission.BIND_JOB_SERVICE" >
   4321         </service>
   4322 
   4323         <service android:name="com.android.server.backup.FullBackupJob"
   4324                  android:exported="true"
   4325                  android:permission="android.permission.BIND_JOB_SERVICE" >
   4326         </service>
   4327 
   4328         <service android:name="com.android.server.backup.KeyValueBackupJob"
   4329                  android:permission="android.permission.BIND_JOB_SERVICE" >
   4330         </service>
   4331 
   4332         <service android:name="com.android.server.content.SyncJobService"
   4333                  android:permission="android.permission.BIND_JOB_SERVICE" >
   4334         </service>
   4335 
   4336         <service android:name="com.android.server.pm.BackgroundDexOptService"
   4337                  android:exported="true"
   4338                  android:permission="android.permission.BIND_JOB_SERVICE">
   4339         </service>
   4340 
   4341         <service android:name="com.android.server.PruneInstantAppsJobService"
   4342                  android:permission="android.permission.BIND_JOB_SERVICE" >
   4343         </service>
   4344 
   4345         <service android:name="com.android.server.storage.DiskStatsLoggingService"
   4346                  android:permission="android.permission.BIND_JOB_SERVICE" >
   4347         </service>
   4348 
   4349         <service android:name="com.android.server.PreloadsFileCacheExpirationJobService"
   4350                  android:permission="android.permission.BIND_JOB_SERVICE" >
   4351         </service>
   4352 
   4353         <service android:name="com.android.server.camera.CameraStatsJobService"
   4354                  android:permission="android.permission.BIND_JOB_SERVICE" >
   4355         </service>
   4356 
   4357         <service android:name="com.android.server.timezone.TimeZoneUpdateIdler"
   4358                  android:permission="android.permission.BIND_JOB_SERVICE" >
   4359         </service>
   4360 
   4361         <service android:name="com.android.server.net.watchlist.ReportWatchlistJobService"
   4362                  android:permission="android.permission.BIND_JOB_SERVICE" >
   4363         </service>
   4364 
   4365         <service android:name="com.android.server.display.BrightnessIdleJob"
   4366                  android:permission="android.permission.BIND_JOB_SERVICE" >
   4367         </service>
   4368 
   4369         <service
   4370                 android:name="com.android.server.autofill.AutofillCompatAccessibilityService"
   4371                 android:permission="android.permission.BIND_ACCESSIBILITY_SERVICE"
   4372                 android:exported="true">
   4373             <meta-data
   4374                     android:name="android.accessibilityservice"
   4375                     android:resource="@xml/autofill_compat_accessibility_service" />
   4376         </service>
   4377 
   4378 </application>
   4379 
   4380 </manifest>
   4381