1<?xml version="1.0" encoding="utf-8"?> 2<!-- 3/* //device/apps/common/AndroidManifest.xml 4** 5** Copyright 2006, The Android Open Source Project 6** 7** Licensed under the Apache License, Version 2.0 (the "License"); 8** you may not use this file except in compliance with the License. 9** You may obtain a copy of the License at 10** 11** http://www.apache.org/licenses/LICENSE-2.0 12** 13** Unless required by applicable law or agreed to in writing, software 14** distributed under the License is distributed on an "AS IS" BASIS, 15** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 16** See the License for the specific language governing permissions and 17** limitations under the License. 18*/ 19--> 20<manifest xmlns:android="http://schemas.android.com/apk/res/android" 21 package="android" coreApp="true" android:sharedUserId="android.uid.system" 22 android:sharedUserLabel="@string/android_system_label"> 23 24 <!-- ================================================ --> 25 <!-- Special broadcasts that only the system can send --> 26 <!-- ================================================ --> 27 <eat-comment /> 28 29 <protected-broadcast android:name="android.intent.action.SCREEN_OFF" /> 30 <protected-broadcast android:name="android.intent.action.SCREEN_ON" /> 31 <protected-broadcast android:name="android.intent.action.USER_PRESENT" /> 32 <protected-broadcast android:name="android.intent.action.TIME_SET" /> 33 <protected-broadcast android:name="android.intent.action.TIME_TICK" /> 34 <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" /> 35 <protected-broadcast android:name="android.intent.action.DATE_CHANGED" /> 36 <protected-broadcast android:name="android.intent.action.PRE_BOOT_COMPLETED" /> 37 <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" /> 38 <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" /> 39 <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" /> 40 <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" /> 41 <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" /> 42 <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" /> 43 <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" /> 44 <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" /> 45 <protected-broadcast android:name="android.intent.action.PACKAGE_ENABLE_ROLLBACK" /> 46 <protected-broadcast android:name="android.intent.action.CANCEL_ENABLE_ROLLBACK" /> 47 <protected-broadcast android:name="android.intent.action.ROLLBACK_COMMITTED" /> 48 <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" /> 49 <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" /> 50 <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" /> 51 <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_INTEGRITY_VERIFICATION" /> 52 <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" /> 53 <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" /> 54 <protected-broadcast android:name="android.intent.action.PACKAGES_SUSPENDED" /> 55 <protected-broadcast android:name="android.intent.action.PACKAGES_UNSUSPENDED" /> 56 <protected-broadcast android:name="android.intent.action.PACKAGE_UNSUSPENDED_MANUALLY" /> 57 <protected-broadcast android:name="android.intent.action.DISTRACTING_PACKAGES_CHANGED" /> 58 <protected-broadcast android:name="android.intent.action.ACTION_PREFERRED_ACTIVITY_CHANGED" /> 59 <protected-broadcast android:name="android.intent.action.UID_REMOVED" /> 60 <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" /> 61 <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" /> 62 <protected-broadcast android:name="android.intent.action.SPLIT_CONFIGURATION_CHANGED" /> 63 <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" /> 64 <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" /> 65 <protected-broadcast android:name="android.intent.action.BATTERY_LEVEL_CHANGED" /> 66 <protected-broadcast android:name="android.intent.action.BATTERY_LOW" /> 67 <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" /> 68 <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" /> 69 <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" /> 70 <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" /> 71 <protected-broadcast android:name="android.intent.action.CHARGING" /> 72 <protected-broadcast android:name="android.intent.action.DISCHARGING" /> 73 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" /> 74 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" /> 75 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" /> 76 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" /> 77 <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" /> 78 <protected-broadcast android:name="android.intent.action.REBOOT" /> 79 <protected-broadcast android:name="android.intent.action.DOCK_EVENT" /> 80 <protected-broadcast android:name="android.intent.action.THERMAL_EVENT" /> 81 <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" /> 82 <protected-broadcast android:name="android.intent.action.USER_ADDED" /> 83 <protected-broadcast android:name="android.intent.action.USER_REMOVED" /> 84 <protected-broadcast android:name="android.intent.action.USER_STARTING" /> 85 <protected-broadcast android:name="android.intent.action.USER_STARTED" /> 86 <protected-broadcast android:name="android.intent.action.USER_STOPPING" /> 87 <protected-broadcast android:name="android.intent.action.USER_STOPPED" /> 88 <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" /> 89 <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" /> 90 <protected-broadcast android:name="android.intent.action.USER_SWITCHED" /> 91 <protected-broadcast android:name="android.intent.action.USER_INITIALIZE" /> 92 <protected-broadcast android:name="android.intent.action.INTENT_FILTER_NEEDS_VERIFICATION" /> 93 <protected-broadcast android:name="android.intent.action.OVERLAY_ADDED" /> 94 <protected-broadcast android:name="android.intent.action.OVERLAY_CHANGED" /> 95 <protected-broadcast android:name="android.intent.action.OVERLAY_REMOVED" /> 96 <protected-broadcast android:name="android.intent.action.OVERLAY_PRIORITY_CHANGED" /> 97 <protected-broadcast android:name="android.intent.action.MY_PACKAGE_SUSPENDED" /> 98 <protected-broadcast android:name="android.intent.action.MY_PACKAGE_UNSUSPENDED" /> 99 100 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED" /> 101 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGING" /> 102 <protected-broadcast android:name="android.os.action.DEVICE_IDLE_MODE_CHANGED" /> 103 <protected-broadcast android:name="android.os.action.POWER_SAVE_WHITELIST_CHANGED" /> 104 <protected-broadcast android:name="android.os.action.POWER_SAVE_TEMP_WHITELIST_CHANGED" /> 105 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED_INTERNAL" /> 106 107 <!-- @deprecated This is rarely used and will be phased out soon. --> 108 <protected-broadcast android:name="android.os.action.SCREEN_BRIGHTNESS_BOOST_CHANGED" /> 109 110 <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" /> 111 <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" /> 112 <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE_PRIORITIZED" /> 113 <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE_PRIORITIZED" /> 114 <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" /> 115 <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" /> 116 <protected-broadcast android:name="android.app.action.NEXT_ALARM_CLOCK_CHANGED" /> 117 118 <protected-broadcast android:name="android.app.action.USER_ADDED" /> 119 <protected-broadcast android:name="android.app.action.USER_REMOVED" /> 120 <protected-broadcast android:name="android.app.action.USER_STARTED" /> 121 <protected-broadcast android:name="android.app.action.USER_STOPPED" /> 122 <protected-broadcast android:name="android.app.action.USER_SWITCHED" /> 123 124 <protected-broadcast android:name="android.app.action.BUGREPORT_SHARING_DECLINED" /> 125 <protected-broadcast android:name="android.app.action.BUGREPORT_FAILED" /> 126 <protected-broadcast android:name="android.app.action.BUGREPORT_SHARE" /> 127 <protected-broadcast android:name="android.app.action.SHOW_DEVICE_MONITORING_DIALOG" /> 128 <protected-broadcast android:name="android.intent.action.PENDING_INCIDENT_REPORTS_CHANGED" /> 129 <protected-broadcast android:name="android.intent.action.INCIDENT_REPORT_READY" /> 130 131 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" /> 132 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" /> 133 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" /> 134 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" /> 135 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_HOST_RESTORED" /> 136 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_RESTORED" /> 137 138 <protected-broadcast android:name="android.os.action.SETTING_RESTORED" /> 139 140 <protected-broadcast android:name="android.app.backup.intent.CLEAR" /> 141 <protected-broadcast android:name="android.app.backup.intent.INIT" /> 142 143 <protected-broadcast android:name="android.bluetooth.intent.DISCOVERABLE_TIMEOUT" /> 144 <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" /> 145 <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" /> 146 <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" /> 147 <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" /> 148 <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" /> 149 <protected-broadcast android:name="android.bluetooth.adapter.action.BLUETOOTH_ADDRESS_CHANGED" /> 150 <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" /> 151 <protected-broadcast android:name="android.bluetooth.device.action.UUID" /> 152 <protected-broadcast android:name="android.bluetooth.device.action.MAS_INSTANCE" /> 153 <protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" /> 154 <protected-broadcast android:name="android.bluetooth.device.action.FOUND" /> 155 <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" /> 156 <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" /> 157 <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" /> 158 <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" /> 159 <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" /> 160 <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" /> 161 <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" /> 162 <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" /> 163 <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" /> 164 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" /> 165 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" /> 166 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" /> 167 <protected-broadcast android:name="android.bluetooth.device.action.SDP_RECORD" /> 168 <protected-broadcast android:name="android.bluetooth.device.action.BATTERY_LEVEL_CHANGED" /> 169 <protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" /> 170 <protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" /> 171 <protected-broadcast 172 android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" /> 173 <protected-broadcast 174 android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" /> 175 <protected-broadcast 176 android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" /> 177 <protected-broadcast 178 android:name="android.bluetooth.headset.action.HF_INDICATORS_VALUE_CHANGED" /> 179 <protected-broadcast 180 android:name="android.bluetooth.headset.profile.action.ACTIVE_DEVICE_CHANGED" /> 181 <protected-broadcast 182 android:name="android.bluetooth.headsetclient.profile.action.CONNECTION_STATE_CHANGED" /> 183 <protected-broadcast 184 android:name="android.bluetooth.headsetclient.profile.action.AUDIO_STATE_CHANGED" /> 185 <protected-broadcast 186 android:name="android.bluetooth.headsetclient.profile.action.AG_EVENT" /> 187 <protected-broadcast 188 android:name="android.bluetooth.headsetclient.profile.action.AG_CALL_CHANGED" /> 189 <protected-broadcast 190 android:name="android.bluetooth.headsetclient.profile.action.RESULT" /> 191 <protected-broadcast 192 android:name="android.bluetooth.headsetclient.profile.action.LAST_VTAG" /> 193 <protected-broadcast 194 android:name="android.bluetooth.hearingaid.profile.action.CONNECTION_STATE_CHANGED" /> 195 <protected-broadcast 196 android:name="android.bluetooth.hearingaid.profile.action.PLAYING_STATE_CHANGED" /> 197 <protected-broadcast 198 android:name="android.bluetooth.hearingaid.profile.action.ACTIVE_DEVICE_CHANGED" /> 199 <protected-broadcast 200 android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" /> 201 <protected-broadcast 202 android:name="android.bluetooth.a2dp.profile.action.ACTIVE_DEVICE_CHANGED" /> 203 <protected-broadcast 204 android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" /> 205 <protected-broadcast 206 android:name="android.bluetooth.a2dp.profile.action.CODEC_CONFIG_CHANGED" /> 207 <protected-broadcast 208 android:name="android.bluetooth.a2dp-sink.profile.action.CONNECTION_STATE_CHANGED" /> 209 <protected-broadcast 210 android:name="android.bluetooth.a2dp-sink.profile.action.PLAYING_STATE_CHANGED" /> 211 <protected-broadcast 212 android:name="android.bluetooth.a2dp-sink.profile.action.AUDIO_CONFIG_CHANGED" /> 213 <protected-broadcast 214 android:name="android.bluetooth.avrcp-controller.profile.action.BROWSE_CONNECTION_STATE_CHANGED" /> 215 <protected-broadcast 216 android:name="android.bluetooth.avrcp-controller.profile.action.CONNECTION_STATE_CHANGED" /> 217 <protected-broadcast 218 android:name="android.bluetooth.avrcp-controller.profile.action.FOLDER_LIST" /> 219 <protected-broadcast 220 android:name="android.bluetooth.avrcp-controller.profile.action.TRACK_EVENT" /> 221 <protected-broadcast 222 android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" /> 223 <protected-broadcast 224 android:name="android.bluetooth.input.profile.action.IDLE_TIME_CHANGED" /> 225 <protected-broadcast 226 android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" /> 227 <protected-broadcast 228 android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" /> 229 <protected-broadcast 230 android:name="android.bluetooth.hiddevice.profile.action.CONNECTION_STATE_CHANGED" /> 231 <protected-broadcast 232 android:name="android.bluetooth.map.profile.action.CONNECTION_STATE_CHANGED" /> 233 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.CONNECTION_STATE_CHANGED" /> 234 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_RECEIVED" /> 235 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_SENT_SUCCESSFULLY" /> 236 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_DELIVERED_SUCCESSFULLY" /> 237 <protected-broadcast 238 android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_SENT" /> 239 <protected-broadcast 240 android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_DELIVERY" /> 241 <protected-broadcast 242 android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" /> 243 <protected-broadcast android:name="android.bluetooth.pbap.profile.action.CONNECTION_STATE_CHANGED" /> 244 <protected-broadcast android:name="android.bluetooth.pbapclient.profile.action.CONNECTION_STATE_CHANGED" /> 245 <protected-broadcast android:name="android.bluetooth.sap.profile.action.CONNECTION_STATE_CHANGED" /> 246 <protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" /> 247 <protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" /> 248 <protected-broadcast android:name="android.btopp.intent.action.LIST" /> 249 <protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" /> 250 <protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" /> 251 <protected-broadcast android:name="android.btopp.intent.action.CONFIRM" /> 252 <protected-broadcast android:name="android.btopp.intent.action.HIDE" /> 253 <protected-broadcast android:name="android.btopp.intent.action.RETRY" /> 254 <protected-broadcast android:name="android.btopp.intent.action.OPEN" /> 255 <protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" /> 256 <protected-broadcast android:name="android.btopp.intent.action.TRANSFER_COMPLETE" /> 257 <protected-broadcast android:name="android.btopp.intent.action.ACCEPT" /> 258 <protected-broadcast android:name="android.btopp.intent.action.DECLINE" /> 259 <protected-broadcast android:name="com.android.bluetooth.gatt.REFRESH_BATCHED_SCAN" /> 260 <protected-broadcast android:name="com.android.bluetooth.pbap.authchall" /> 261 <protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" /> 262 <protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" /> 263 <protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" /> 264 <protected-broadcast android:name="com.android.bluetooth.sap.USER_CONFIRM_TIMEOUT" /> 265 <protected-broadcast android:name="com.android.bluetooth.sap.action.DISCONNECT_ACTION" /> 266 267 <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" /> 268 269 <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" /> 270 <protected-broadcast android:name="android.hardware.usb.action.USB_PORT_CHANGED" /> 271 <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" /> 272 <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_DETACHED" /> 273 <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" /> 274 <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" /> 275 276 <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" /> 277 <protected-broadcast android:name="android.media.action.HDMI_AUDIO_PLUG" /> 278 <protected-broadcast android:name="android.media.action.MICROPHONE_MUTE_CHANGED" /> 279 <protected-broadcast android:name="android.media.action.SPEAKERPHONE_STATE_CHANGED" /> 280 281 <protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" /> 282 <protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" /> 283 <protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" /> 284 <protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" /> 285 <protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" /> 286 <protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" /> 287 <protected-broadcast android:name="android.media.MASTER_MONO_CHANGED_ACTION" /> 288 <protected-broadcast android:name="android.media.MASTER_BALANCE_CHANGED_ACTION" /> 289 <protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" /> 290 <protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" /> 291 292 <protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" /> 293 <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" /> 294 <protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" /> 295 <protected-broadcast android:name="android.intent.action.MEDIA_NOFS" /> 296 <protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" /> 297 <protected-broadcast android:name="android.intent.action.MEDIA_SHARED" /> 298 <protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" /> 299 <protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" /> 300 <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" /> 301 <protected-broadcast android:name="android.intent.action.MEDIA_EJECT" /> 302 303 <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL" /> 304 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" /> 305 <!-- @deprecated. Only {@link android.net.ConnectivityManager.CONNECTIVITY_ACTION} is sent. --> 306 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" /> 307 <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" /> 308 <protected-broadcast android:name="android.net.conn.RESTRICT_BACKGROUND_CHANGED" /> 309 <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" /> 310 <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" /> 311 312 <protected-broadcast android:name="android.net.nsd.STATE_CHANGED" /> 313 314 <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" /> 315 <protected-broadcast android:name="android.nfc.action.PREFERRED_PAYMENT_CHANGED" /> 316 <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" /> 317 <protected-broadcast android:name="com.android.nfc.action.LLCP_UP" /> 318 <protected-broadcast android:name="com.android.nfc.action.LLCP_DOWN" /> 319 <protected-broadcast android:name="com.android.nfc.cardemulation.action.CLOSE_TAP_DIALOG" /> 320 <protected-broadcast android:name="com.android.nfc.handover.action.ALLOW_CONNECT" /> 321 <protected-broadcast android:name="com.android.nfc.handover.action.DENY_CONNECT" /> 322 <protected-broadcast android:name="com.android.nfc.handover.action.TIMEOUT_CONNECT" /> 323 <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" /> 324 <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" /> 325 <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" /> 326 <!-- For NFC to BT handover --> 327 <protected-broadcast android:name="android.btopp.intent.action.WHITELIST_DEVICE" /> 328 <protected-broadcast android:name="android.btopp.intent.action.STOP_HANDOVER_TRANSFER" /> 329 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND" /> 330 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND_MULTIPLE" /> 331 <protected-broadcast android:name="com.android.nfc.handover.action.CANCEL_HANDOVER_TRANSFER" /> 332 333 <protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" /> 334 <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" /> 335 336 <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" /> 337 338 <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" /> 339 <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" /> 340 <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" /> 341 342 <protected-broadcast android:name="com.android.server.stats.action.TRIGGER_COLLECTION" /> 343 344 <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" /> 345 <protected-broadcast android:name="com.android.server.WifiManager.action.START_PNO" /> 346 <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" /> 347 <protected-broadcast android:name="com.android.server.WifiManager.action.DEVICE_IDLE" /> 348 <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_ACCEPTED" /> 349 <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_DECLINED" /> 350 <protected-broadcast android:name="com.android.internal.action.EUICC_FACTORY_RESET" /> 351 <protected-broadcast android:name="com.android.server.usb.ACTION_OPEN_IN_APPS" /> 352 <protected-broadcast android:name="com.android.server.am.DELETE_DUMPHEAP" /> 353 <protected-broadcast android:name="com.android.server.net.action.SNOOZE_WARNING" /> 354 <protected-broadcast android:name="com.android.server.net.action.SNOOZE_RAPID" /> 355 <protected-broadcast android:name="com.android.server.wifi.ACTION_SHOW_SET_RANDOMIZATION_DETAILS" /> 356 <protected-broadcast android:name="com.android.server.wifi.action.NetworkSuggestion.USER_ALLOWED_APP" /> 357 <protected-broadcast android:name="com.android.server.wifi.action.NetworkSuggestion.USER_DISALLOWED_APP" /> 358 <protected-broadcast android:name="com.android.server.wifi.action.NetworkSuggestion.USER_DISMISSED" /> 359 <protected-broadcast android:name="com.android.server.wifi.action.CarrierNetwork.USER_ALLOWED_CARRIER" /> 360 <protected-broadcast android:name="com.android.server.wifi.action.CarrierNetwork.USER_DISALLOWED_CARRIER" /> 361 <protected-broadcast android:name="com.android.server.wifi.action.CarrierNetwork.USER_DISMISSED" /> 362 <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.USER_DISMISSED_NOTIFICATION" /> 363 <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.CONNECT_TO_NETWORK" /> 364 <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.PICK_WIFI_NETWORK" /> 365 <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.PICK_NETWORK_AFTER_FAILURE" /> 366 <protected-broadcast android:name="com.android.server.wifi.wakeup.DISMISS_NOTIFICATION" /> 367 <protected-broadcast android:name="com.android.server.wifi.wakeup.OPEN_WIFI_PREFERENCES" /> 368 <protected-broadcast android:name="com.android.server.wifi.wakeup.OPEN_WIFI_SETTINGS" /> 369 <protected-broadcast android:name="com.android.server.wifi.wakeup.TURN_OFF_WIFI_WAKE" /> 370 <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" /> 371 <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" /> 372 <protected-broadcast android:name="android.net.wifi.WIFI_CREDENTIAL_CHANGED" /> 373 <protected-broadcast android:name="android.net.wifi.aware.action.WIFI_AWARE_STATE_CHANGED" /> 374 <protected-broadcast android:name="android.net.wifi.rtt.action.WIFI_RTT_STATE_CHANGED" /> 375 <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" /> 376 <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" /> 377 <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" /> 378 <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" /> 379 <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" /> 380 <protected-broadcast android:name="android.net.wifi.action.NETWORK_SETTINGS_RESET" /> 381 <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_DEAUTH_IMMINENT" /> 382 <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_ICON" /> 383 <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_OSU_PROVIDERS_LIST" /> 384 <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_SUBSCRIPTION_REMEDIATION" /> 385 <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_LAUNCH_OSU_VIEW" /> 386 <protected-broadcast android:name="android.net.wifi.action.REFRESH_USER_PROVISIONING" /> 387 <protected-broadcast android:name="android.net.wifi.action.WIFI_NETWORK_SUGGESTION_POST_CONNECTION" /> 388 <protected-broadcast android:name="android.net.wifi.action.WIFI_SCAN_AVAILABILITY_CHANGED" /> 389 <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" /> 390 <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" /> 391 <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" /> 392 <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" /> 393 <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" /> 394 <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" /> 395 <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" /> 396 <protected-broadcast android:name="android.net.wifi.p2p.action.WIFI_P2P_PERSISTENT_GROUPS_CHANGED" /> 397 <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" /> 398 <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" /> 399 <!-- This broadcast is no longer sent in S but it should stay protected to avoid third party 400 apps broadcasting this and confusing old system apps that may not have been updated. --> 401 <protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" /> 402 <protected-broadcast 403 android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" /> 404 <protected-broadcast android:name="android.net.scoring.SCORE_NETWORKS" /> 405 <protected-broadcast android:name="android.net.scoring.SCORER_CHANGED" /> 406 <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" /> 407 <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" /> 408 <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" /> 409 <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" /> 410 <protected-broadcast android:name="android.intent.action.APPLICATION_RESTRICTIONS_CHANGED" /> 411 <protected-broadcast android:name="com.android.server.adb.WIRELESS_DEBUG_PAIRED_DEVICES" /> 412 <protected-broadcast android:name="com.android.server.adb.WIRELESS_DEBUG_PAIRING_RESULT" /> 413 <protected-broadcast android:name="com.android.server.adb.WIRELESS_DEBUG_STATUS" /> 414 415 <!-- Legacy --> 416 <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" /> 417 <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" /> 418 419 <protected-broadcast android:name="com.android.server.ACTION_TRIGGER_IDLE" /> 420 421 <protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" /> 422 423 <protected-broadcast android:name="android.intent.action.PHONE_STATE" /> 424 425 <protected-broadcast android:name="android.intent.action.SUB_DEFAULT_CHANGED" /> 426 427 <protected-broadcast android:name="android.location.PROVIDERS_CHANGED" /> 428 <protected-broadcast android:name="android.location.MODE_CHANGED" /> 429 <protected-broadcast android:name="android.net.proxy.PAC_REFRESH" /> 430 431 <protected-broadcast android:name="android.telecom.action.DEFAULT_DIALER_CHANGED" /> 432 <protected-broadcast android:name="android.provider.action.DEFAULT_SMS_PACKAGE_CHANGED" /> 433 <protected-broadcast android:name="android.provider.action.SMS_MMS_DB_CREATED" /> 434 <protected-broadcast android:name="android.provider.action.SMS_MMS_DB_LOST" /> 435 <protected-broadcast android:name="android.intent.action.CONTENT_CHANGED" /> 436 <protected-broadcast android:name="android.provider.Telephony.MMS_DOWNLOADED" /> 437 438 <protected-broadcast 439 android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" /> 440 441 <!-- Defined in RestrictionsManager --> 442 <protected-broadcast 443 android:name="android.intent.action.PERMISSION_RESPONSE_RECEIVED" /> 444 <!-- Defined in RestrictionsManager --> 445 446 <protected-broadcast android:name="android.intent.action.REQUEST_PERMISSION" /> 447 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_STARTED" /> 448 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" /> 449 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_PROGRESS" /> 450 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" /> 451 452 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_DATA_SUBSCRIPTION_CHANGED" /> 453 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_VOICE_SUBSCRIPTION_CHANGED" /> 454 <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_CONTENT_CHANGE" /> 455 <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_RECORD_UPDATED" /> 456 457 <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_DONE" /> 458 <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_FAILED" /> 459 460 <protected-broadcast android:name="android.internal.policy.action.BURN_IN_PROTECTION" /> 461 <protected-broadcast android:name="android.app.action.SYSTEM_UPDATE_POLICY_CHANGED" /> 462 <protected-broadcast android:name="android.app.action.RESET_PROTECTION_POLICY_CHANGED" /> 463 <protected-broadcast android:name="android.app.action.DEVICE_OWNER_CHANGED" /> 464 <protected-broadcast android:name="android.app.action.MANAGED_USER_CREATED" /> 465 466 <!-- Added in N --> 467 <protected-broadcast android:name="android.intent.action.ANR" /> 468 <protected-broadcast android:name="android.intent.action.CALL" /> 469 <protected-broadcast android:name="android.intent.action.CALL_PRIVILEGED" /> 470 <protected-broadcast android:name="android.intent.action.DROPBOX_ENTRY_ADDED" /> 471 <protected-broadcast android:name="android.intent.action.INPUT_METHOD_CHANGED" /> 472 <protected-broadcast android:name="android.intent.action.internal_sim_state_changed" /> 473 <protected-broadcast android:name="android.intent.action.LOCKED_BOOT_COMPLETED" /> 474 <protected-broadcast android:name="android.intent.action.PRECISE_CALL_STATE" /> 475 <protected-broadcast android:name="android.intent.action.SUBSCRIPTION_PHONE_STATE" /> 476 <protected-broadcast android:name="android.intent.action.USER_INFO_CHANGED" /> 477 <protected-broadcast android:name="android.intent.action.USER_UNLOCKED" /> 478 <protected-broadcast android:name="android.intent.action.WALLPAPER_CHANGED" /> 479 480 <protected-broadcast android:name="android.app.action.DEVICE_POLICY_MANAGER_STATE_CHANGED" /> 481 <protected-broadcast android:name="android.app.action.CHOOSE_PRIVATE_KEY_ALIAS" /> 482 <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLED" /> 483 <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLE_REQUESTED" /> 484 <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_ENABLED" /> 485 <protected-broadcast android:name="android.app.action.LOCK_TASK_ENTERING" /> 486 <protected-broadcast android:name="android.app.action.LOCK_TASK_EXITING" /> 487 <protected-broadcast android:name="android.app.action.NOTIFY_PENDING_SYSTEM_UPDATE" /> 488 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_CHANGED" /> 489 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_EXPIRING" /> 490 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_FAILED" /> 491 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_SUCCEEDED" /> 492 <protected-broadcast android:name="com.android.server.ACTION_EXPIRED_PASSWORD_NOTIFICATION" /> 493 <protected-broadcast android:name="com.android.server.ACTION_PROFILE_OFF_DEADLINE" /> 494 <protected-broadcast android:name="com.android.server.ACTION_TURN_PROFILE_ON_NOTIFICATION" /> 495 496 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_ADDED" /> 497 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNLOCKED" /> 498 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_REMOVED" /> 499 500 <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_STATE_CHANGED" /> 501 <protected-broadcast android:name="com.android.bluetooth.map.USER_CONFIRM_TIMEOUT" /> 502 <protected-broadcast android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_SENT" /> 503 <protected-broadcast android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_DELIVERY" /> 504 <protected-broadcast android:name="android.content.jobscheduler.JOB_DELAY_EXPIRED" /> 505 <protected-broadcast android:name="android.content.syncmanager.SYNC_ALARM" /> 506 <protected-broadcast android:name="android.media.INTERNAL_RINGER_MODE_CHANGED_ACTION" /> 507 <protected-broadcast android:name="android.media.STREAM_DEVICES_CHANGED_ACTION" /> 508 <protected-broadcast android:name="android.media.STREAM_MUTE_CHANGED_ACTION" /> 509 <protected-broadcast android:name="android.net.sip.SIP_SERVICE_UP" /> 510 <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" /> 511 <protected-broadcast android:name="android.os.action.CHARGING" /> 512 <protected-broadcast android:name="android.os.action.DISCHARGING" /> 513 <protected-broadcast android:name="android.search.action.SEARCHABLES_CHANGED" /> 514 <protected-broadcast android:name="android.security.STORAGE_CHANGED" /> 515 <protected-broadcast android:name="android.security.action.TRUST_STORE_CHANGED" /> 516 <protected-broadcast android:name="android.security.action.KEYCHAIN_CHANGED" /> 517 <protected-broadcast android:name="android.security.action.KEY_ACCESS_CHANGED" /> 518 <protected-broadcast android:name="android.telecom.action.NUISANCE_CALL_STATUS_CHANGED" /> 519 <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_REGISTERED" /> 520 <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_UNREGISTERED" /> 521 <protected-broadcast android:name="android.telecom.action.SHOW_MISSED_CALLS_NOTIFICATION" /> 522 <protected-broadcast android:name="android.telephony.action.CARRIER_CONFIG_CHANGED" /> 523 <protected-broadcast android:name="android.telephony.action.DEFAULT_SUBSCRIPTION_CHANGED" /> 524 <protected-broadcast android:name="android.telephony.action.DEFAULT_SMS_SUBSCRIPTION_CHANGED" /> 525 <protected-broadcast android:name="android.telephony.action.SECRET_CODE" /> 526 <protected-broadcast android:name="android.telephony.action.SHOW_VOICEMAIL_NOTIFICATION" /> 527 <protected-broadcast android:name="android.telephony.action.SUBSCRIPTION_PLANS_CHANGED" /> 528 529 <protected-broadcast android:name="com.android.bluetooth.btservice.action.ALARM_WAKEUP" /> 530 <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_POLL" /> 531 <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_UPDATED" /> 532 <protected-broadcast android:name="com.android.server.NetworkTimeUpdateService.action.POLL" /> 533 <protected-broadcast android:name="com.android.server.telecom.intent.action.CALLS_ADD_ENTRY" /> 534 <protected-broadcast android:name="com.android.settings.location.MODE_CHANGING" /> 535 <protected-broadcast android:name="com.android.settings.bluetooth.ACTION_DISMISS_PAIRING" /> 536 <protected-broadcast android:name="com.android.settings.wifi.action.NETWORK_REQUEST" /> 537 538 <protected-broadcast android:name="NotificationManagerService.TIMEOUT" /> 539 <protected-broadcast android:name="NotificationHistoryDatabase.CLEANUP" /> 540 <protected-broadcast android:name="ScheduleConditionProvider.EVALUATE" /> 541 <protected-broadcast android:name="EventConditionProvider.EVALUATE" /> 542 <protected-broadcast android:name="SnoozeHelper.EVALUATE" /> 543 <protected-broadcast android:name="wifi_scan_available" /> 544 545 <protected-broadcast android:name="action.cne.started" /> 546 <protected-broadcast android:name="android.content.jobscheduler.JOB_DEADLINE_EXPIRED" /> 547 <protected-broadcast android:name="android.intent.action.ACTION_UNSOL_RESPONSE_OEM_HOOK_RAW" /> 548 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_SUPL" /> 549 <protected-broadcast android:name="android.os.action.LIGHT_DEVICE_IDLE_MODE_CHANGED" /> 550 <protected-broadcast android:name="android.os.storage.action.VOLUME_STATE_CHANGED" /> 551 <protected-broadcast android:name="android.os.storage.action.DISK_SCANNED" /> 552 <protected-broadcast android:name="com.android.server.action.UPDATE_TWILIGHT_STATE" /> 553 <protected-broadcast android:name="com.android.server.action.RESET_TWILIGHT_AUTO" /> 554 <protected-broadcast android:name="com.android.server.device_idle.STEP_IDLE_STATE" /> 555 <protected-broadcast android:name="com.android.server.device_idle.STEP_LIGHT_IDLE_STATE" /> 556 <protected-broadcast android:name="com.android.server.Wifi.action.TOGGLE_PNO" /> 557 <protected-broadcast android:name="intent.action.ACTION_RF_BAND_INFO" /> 558 <protected-broadcast android:name="android.intent.action.MEDIA_RESOURCE_GRANTED" /> 559 <protected-broadcast android:name="android.app.action.NETWORK_LOGS_AVAILABLE" /> 560 <protected-broadcast android:name="android.app.action.SECURITY_LOGS_AVAILABLE" /> 561 562 <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED" /> 563 <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED_INTERNAL" /> 564 <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_CHANGED" /> 565 <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_ACCESS_GRANTED_CHANGED" /> 566 <protected-broadcast android:name="android.app.action.AUTOMATIC_ZEN_RULE_STATUS_CHANGED" /> 567 <protected-broadcast android:name="android.os.action.ACTION_EFFECTS_SUPPRESSOR_CHANGED" /> 568 <protected-broadcast android:name="android.app.action.NOTIFICATION_CHANNEL_BLOCK_STATE_CHANGED" /> 569 <protected-broadcast android:name="android.app.action.NOTIFICATION_CHANNEL_GROUP_BLOCK_STATE_CHANGED" /> 570 <protected-broadcast android:name="android.app.action.APP_BLOCK_STATE_CHANGED" /> 571 572 <protected-broadcast android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS" /> 573 <protected-broadcast android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS" /> 574 575 <protected-broadcast android:name="android.intent.action.DYNAMIC_SENSOR_CHANGED" /> 576 577 <protected-broadcast android:name="android.intent.action.ACTION_RADIO_OFF" /> 578 579 <protected-broadcast android:name="android.accounts.LOGIN_ACCOUNTS_CHANGED" /> 580 <protected-broadcast android:name="android.accounts.action.ACCOUNT_REMOVED" /> 581 <protected-broadcast android:name="android.accounts.action.VISIBLE_ACCOUNTS_CHANGED" /> 582 583 <protected-broadcast android:name="com.android.sync.SYNC_CONN_STATUS_CHANGED" /> 584 585 <protected-broadcast android:name="android.net.sip.action.SIP_INCOMING_CALL" /> 586 <protected-broadcast android:name="com.android.phone.SIP_ADD_PHONE" /> 587 <protected-broadcast android:name="android.net.sip.action.SIP_REMOVE_PROFILE" /> 588 <protected-broadcast android:name="android.net.sip.action.SIP_SERVICE_UP" /> 589 <protected-broadcast android:name="android.net.sip.action.SIP_CALL_OPTION_CHANGED" /> 590 <protected-broadcast android:name="android.net.sip.action.START_SIP" /> 591 592 <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_CONNECTED" /> 593 <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_DISCONNECTED" /> 594 595 <protected-broadcast android:name="android.bluetooth.input.profile.action.HANDSHAKE" /> 596 <protected-broadcast android:name="android.bluetooth.input.profile.action.REPORT" /> 597 598 <protected-broadcast android:name="android.intent.action.TWILIGHT_CHANGED" /> 599 600 <protected-broadcast android:name="com.android.server.fingerprint.ACTION_LOCKOUT_RESET" /> 601 <protected-broadcast android:name="android.net.wifi.PASSPOINT_ICON_RECEIVED" /> 602 <protected-broadcast android:name="com.android.server.notification.CountdownConditionProvider" /> 603 604 <protected-broadcast android:name="com.android.internal.location.ALARM_WAKEUP" /> 605 <protected-broadcast android:name="com.android.internal.location.ALARM_TIMEOUT" /> 606 <protected-broadcast android:name="android.intent.action.GLOBAL_BUTTON" /> 607 608 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_AVAILABLE" /> 609 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNAVAILABLE" /> 610 <protected-broadcast android:name="com.android.server.pm.DISABLE_QUIET_MODE_AFTER_UNLOCK" /> 611 612 <protected-broadcast android:name="com.android.server.retaildemo.ACTION_RESET_DEMO" /> 613 614 <protected-broadcast android:name="android.intent.action.DEVICE_LOCKED_CHANGED" /> 615 616 <!-- Added in O --> 617 <protected-broadcast android:name="android.app.action.APPLICATION_DELEGATION_SCOPES_CHANGED" /> 618 <protected-broadcast android:name="com.android.server.wm.ACTION_REVOKE_SYSTEM_ALERT_WINDOW_PERMISSION" /> 619 <protected-broadcast android:name="android.media.tv.action.PARENTAL_CONTROLS_ENABLED_CHANGED" /> 620 621 <protected-broadcast android:name="android.content.pm.action.SESSION_COMMITTED" /> 622 <protected-broadcast android:name="android.os.action.USER_RESTRICTIONS_CHANGED" /> 623 <protected-broadcast android:name="android.media.tv.action.PREVIEW_PROGRAM_ADDED_TO_WATCH_NEXT" /> 624 <protected-broadcast android:name="android.media.tv.action.PREVIEW_PROGRAM_BROWSABLE_DISABLED" /> 625 <protected-broadcast android:name="android.media.tv.action.WATCH_NEXT_PROGRAM_BROWSABLE_DISABLED" /> 626 <protected-broadcast android:name="android.media.tv.action.CHANNEL_BROWSABLE_REQUESTED" /> 627 <protected-broadcast android:name="com.android.server.inputmethod.InputMethodManagerService.SHOW_INPUT_METHOD_PICKER" /> 628 629 <!-- Time zone rules update intents fired by the system server --> 630 <protected-broadcast android:name="com.android.intent.action.timezone.RULES_UPDATE_OPERATION" /> 631 <protected-broadcast android:name="com.android.intent.action.timezone.TRIGGER_RULES_UPDATE_CHECK" /> 632 633 <!-- Made protected in P (was introduced in JB-MR2) --> 634 <protected-broadcast android:name="android.intent.action.GET_RESTRICTION_ENTRIES" /> 635 <protected-broadcast android:name="android.telephony.euicc.action.OTA_STATUS_CHANGED" /> 636 637 <!-- Added in P --> 638 <protected-broadcast android:name="android.app.action.PROFILE_OWNER_CHANGED" /> 639 <protected-broadcast android:name="android.app.action.TRANSFER_OWNERSHIP_COMPLETE" /> 640 <protected-broadcast android:name="android.app.action.AFFILIATED_PROFILE_TRANSFER_OWNERSHIP_COMPLETE" /> 641 <protected-broadcast android:name="android.app.action.DATA_SHARING_RESTRICTION_CHANGED" /> 642 <protected-broadcast android:name="android.app.action.STATSD_STARTED" /> 643 <protected-broadcast android:name="com.android.server.biometrics.fingerprint.ACTION_LOCKOUT_RESET" /> 644 <protected-broadcast android:name="com.android.server.biometrics.face.ACTION_LOCKOUT_RESET" /> 645 646 <!-- For IdleController --> 647 <protected-broadcast android:name="android.intent.action.DOCK_IDLE" /> 648 <protected-broadcast android:name="android.intent.action.DOCK_ACTIVE" /> 649 650 <!-- Added in Q --> 651 <protected-broadcast android:name="android.content.pm.action.SESSION_UPDATED" /> 652 <protected-broadcast android:name="android.settings.action.GRAYSCALE_CHANGED" /> 653 654 <!-- For CarIdlenessTracker --> 655 <protected-broadcast android:name="com.android.server.jobscheduler.GARAGE_MODE_ON" /> 656 <protected-broadcast android:name="com.android.server.jobscheduler.GARAGE_MODE_OFF" /> 657 <protected-broadcast android:name="com.android.server.jobscheduler.FORCE_IDLE" /> 658 <protected-broadcast android:name="com.android.server.jobscheduler.UNFORCE_IDLE" /> 659 660 <protected-broadcast android:name="android.provider.action.DEFAULT_SMS_PACKAGE_CHANGED_INTERNAL" /> 661 662 <protected-broadcast android:name="android.intent.action.DEVICE_CUSTOMIZATION_READY" /> 663 664 <!-- Added in R --> 665 <protected-broadcast android:name="android.app.action.RESET_PROTECTION_POLICY_CHANGED" /> 666 667 <!-- For tether entitlement recheck--> 668 <protected-broadcast 669 android:name="com.android.server.connectivity.tethering.PROVISIONING_RECHECK_ALARM" /> 670 <!-- ====================================================================== --> 671 <!-- RUNTIME PERMISSIONS --> 672 <!-- ====================================================================== --> 673 <eat-comment /> 674 675 <!-- Grouping for platform runtime permissions is not accessible to apps 676 @hide 677 @SystemApi 678 @TestApi 679 --> 680 <permission-group android:name="android.permission-group.UNDEFINED" 681 android:priority="100" /> 682 683 <!-- ====================================================================== --> 684 <!-- Permissions for accessing user's contacts including personal profile --> 685 <!-- ====================================================================== --> 686 <eat-comment /> 687 688 <!-- Used for runtime permissions related to contacts and profiles on this 689 device. --> 690 <permission-group android:name="android.permission-group.CONTACTS" 691 android:icon="@drawable/perm_group_contacts" 692 android:label="@string/permgrouplab_contacts" 693 android:description="@string/permgroupdesc_contacts" 694 android:priority="100" /> 695 696 <!-- Allows an application to read the user's contacts data. 697 <p>Protection level: dangerous 698 --> 699 <permission android:name="android.permission.READ_CONTACTS" 700 android:permissionGroup="android.permission-group.UNDEFINED" 701 android:label="@string/permlab_readContacts" 702 android:description="@string/permdesc_readContacts" 703 android:protectionLevel="dangerous" /> 704 705 <!-- Allows an application to write the user's contacts data. 706 <p>Protection level: dangerous 707 --> 708 <permission android:name="android.permission.WRITE_CONTACTS" 709 android:permissionGroup="android.permission-group.UNDEFINED" 710 android:label="@string/permlab_writeContacts" 711 android:description="@string/permdesc_writeContacts" 712 android:protectionLevel="dangerous" /> 713 714 <!-- ====================================================================== --> 715 <!-- Permissions for accessing user's calendar --> 716 <!-- ====================================================================== --> 717 <eat-comment /> 718 719 <!-- Used for runtime permissions related to user's calendar. --> 720 <permission-group android:name="android.permission-group.CALENDAR" 721 android:icon="@drawable/perm_group_calendar" 722 android:label="@string/permgrouplab_calendar" 723 android:description="@string/permgroupdesc_calendar" 724 android:priority="200" /> 725 726 <!-- Allows an application to read the user's calendar data. 727 <p>Protection level: dangerous 728 --> 729 <permission android:name="android.permission.READ_CALENDAR" 730 android:permissionGroup="android.permission-group.UNDEFINED" 731 android:label="@string/permlab_readCalendar" 732 android:description="@string/permdesc_readCalendar" 733 android:protectionLevel="dangerous" /> 734 735 <!-- Allows an application to write the user's calendar data. 736 <p>Protection level: dangerous 737 --> 738 <permission android:name="android.permission.WRITE_CALENDAR" 739 android:permissionGroup="android.permission-group.UNDEFINED" 740 android:label="@string/permlab_writeCalendar" 741 android:description="@string/permdesc_writeCalendar" 742 android:protectionLevel="dangerous" /> 743 744 <!-- ====================================================================== --> 745 <!-- Permissions for accessing and modifying user's SMS messages --> 746 <!-- ====================================================================== --> 747 <eat-comment /> 748 749 <!-- Allows accessing the messages on ICC 750 @hide Used internally. --> 751 <permission android:name="android.permission.ACCESS_MESSAGES_ON_ICC" 752 android:protectionLevel="signature" /> 753 754 <!-- Used for runtime permissions related to user's SMS messages. --> 755 <permission-group android:name="android.permission-group.SMS" 756 android:icon="@drawable/perm_group_sms" 757 android:label="@string/permgrouplab_sms" 758 android:description="@string/permgroupdesc_sms" 759 android:priority="300" /> 760 761 <!-- Allows an application to send SMS messages. 762 <p>Protection level: dangerous 763 764 <p> This is a hard restricted permission which cannot be held by an app until 765 the installer on record whitelists the permission. For more details see 766 {@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}. 767 --> 768 <permission android:name="android.permission.SEND_SMS" 769 android:permissionGroup="android.permission-group.UNDEFINED" 770 android:label="@string/permlab_sendSms" 771 android:description="@string/permdesc_sendSms" 772 android:permissionFlags="costsMoney|hardRestricted" 773 android:protectionLevel="dangerous" /> 774 775 <!-- Allows an application to receive SMS messages. 776 <p>Protection level: dangerous 777 778 <p> This is a hard restricted permission which cannot be held by an app until 779 the installer on record whitelists the permission. For more details see 780 {@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}. 781 --> 782 <permission android:name="android.permission.RECEIVE_SMS" 783 android:permissionGroup="android.permission-group.UNDEFINED" 784 android:label="@string/permlab_receiveSms" 785 android:description="@string/permdesc_receiveSms" 786 android:permissionFlags="hardRestricted" 787 android:protectionLevel="dangerous" /> 788 789 <!-- Allows an application to read SMS messages. 790 <p>Protection level: dangerous 791 792 <p> This is a hard restricted permission which cannot be held by an app until 793 the installer on record whitelists the permission. For more details see 794 {@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}. 795 --> 796 <permission android:name="android.permission.READ_SMS" 797 android:permissionGroup="android.permission-group.UNDEFINED" 798 android:label="@string/permlab_readSms" 799 android:description="@string/permdesc_readSms" 800 android:permissionFlags="hardRestricted" 801 android:protectionLevel="dangerous" /> 802 803 <!-- Allows an application to receive WAP push messages. 804 <p>Protection level: dangerous 805 806 <p> This is a hard restricted permission which cannot be held by an app until 807 the installer on record whitelists the permission. For more details see 808 {@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}. 809 --> 810 <permission android:name="android.permission.RECEIVE_WAP_PUSH" 811 android:permissionGroup="android.permission-group.UNDEFINED" 812 android:label="@string/permlab_receiveWapPush" 813 android:description="@string/permdesc_receiveWapPush" 814 android:permissionFlags="hardRestricted" 815 android:protectionLevel="dangerous" /> 816 817 <!-- Allows an application to monitor incoming MMS messages. 818 <p>Protection level: dangerous 819 820 <p> This is a hard restricted permission which cannot be held by an app until 821 the installer on record whitelists the permission. For more details see 822 {@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}. 823 --> 824 <permission android:name="android.permission.RECEIVE_MMS" 825 android:permissionGroup="android.permission-group.UNDEFINED" 826 android:label="@string/permlab_receiveMms" 827 android:description="@string/permdesc_receiveMms" 828 android:permissionFlags="hardRestricted" 829 android:protectionLevel="dangerous" /> 830 831 <!-- @SystemApi @TestApi Allows an application to forward cell broadcast messages to the cell 832 broadcast module. This is required in order to bind to the cell broadcast service, and 833 ensures that only the system can forward messages to it. 834 835 <p>Protection level: signature 836 837 @hide --> 838 <permission android:name="android.permission.BIND_CELL_BROADCAST_SERVICE" 839 android:label="@string/permlab_bindCellBroadcastService" 840 android:description="@string/permdesc_bindCellBroadcastService" 841 android:protectionLevel="signature" /> 842 843 <!-- @SystemApi @TestApi Allows an application to read previously received cell broadcast 844 messages and to register a content observer to get notifications when 845 a cell broadcast has been received and added to the database. For 846 emergency alerts, the database is updated immediately after the 847 alert dialog and notification sound/vibration/speech are presented. 848 The "read" column is then updated after the user dismisses the alert. 849 This enables supplementary emergency assistance apps to start loading 850 additional emergency information (if Internet access is available) 851 when the alert is first received, and to delay presenting the info 852 to the user until after the initial alert dialog is dismissed. 853 <p>Protection level: dangerous 854 855 <p> This is a hard restricted permission which cannot be held by an app until 856 the installer on record whitelists the permission. For more details see 857 {@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}. 858 859 @hide Pending API council approval --> 860 <permission android:name="android.permission.READ_CELL_BROADCASTS" 861 android:permissionGroup="android.permission-group.UNDEFINED" 862 android:label="@string/permlab_readCellBroadcasts" 863 android:description="@string/permdesc_readCellBroadcasts" 864 android:permissionFlags="hardRestricted" 865 android:protectionLevel="dangerous" /> 866 867 <!-- ====================================================================== --> 868 <!-- Permissions for accessing external storage --> 869 <!-- ====================================================================== --> 870 <eat-comment /> 871 872 <!-- Used for runtime permissions related to the shared external storage. --> 873 <permission-group android:name="android.permission-group.STORAGE" 874 android:icon="@drawable/perm_group_storage" 875 android:label="@string/permgrouplab_storage" 876 android:description="@string/permgroupdesc_storage" 877 android:priority="900" /> 878 879 <!-- Allows an application to read from external storage. 880 <p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly 881 granted this permission.</p> 882 <p>This permission is enforced starting in API level 19. Before API level 19, this 883 permission is not enforced and all apps still have access to read from external storage. 884 You can test your app with the permission enforced by enabling <em>Protect USB 885 storage</em> under Developer options in the Settings app on a device running Android 4.1 or 886 higher.</p> 887 <p>Also starting in API level 19, this permission is <em>not</em> required to 888 read/write files in your application-specific directories returned by 889 {@link android.content.Context#getExternalFilesDir} and 890 {@link android.content.Context#getExternalCacheDir}. 891 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 892 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 893 minSdkVersion}</a> and <a 894 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 895 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 896 grants your app this permission. If you don't need this permission, be sure your <a 897 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 898 targetSdkVersion}</a> is 4 or higher. 899 900 <p> This is a soft restricted permission which cannot be held by an app it its 901 full form until the installer on record whitelists the permission. 902 Specifically, if the permission is whitelisted the holder app can access 903 external storage and the visual and aural media collections while if the 904 permission is not whitelisted the holder app can only access to the visual 905 and aural medial collections. Also the permission is immutably restricted 906 meaning that the whitelist state can be specified only at install time and 907 cannot change until the app is installed. For more details see 908 {@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}. 909 <p>Protection level: dangerous --> 910 <permission android:name="android.permission.READ_EXTERNAL_STORAGE" 911 android:permissionGroup="android.permission-group.UNDEFINED" 912 android:label="@string/permlab_sdcardRead" 913 android:description="@string/permdesc_sdcardRead" 914 android:permissionFlags="softRestricted|immutablyRestricted" 915 android:protectionLevel="dangerous" /> 916 917 <!-- Allows an application to write to external storage. 918 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 919 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 920 minSdkVersion}</a> and <a 921 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 922 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 923 grants your app this permission. If you don't need this permission, be sure your <a 924 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 925 targetSdkVersion}</a> is 4 or higher. 926 <p>Starting in API level 19, this permission is <em>not</em> required to 927 read/write files in your application-specific directories returned by 928 {@link android.content.Context#getExternalFilesDir} and 929 {@link android.content.Context#getExternalCacheDir}. 930 <p>If this permission is not whitelisted for an app that targets an API level before 931 {@link android.os.Build.VERSION_CODES#Q} this permission cannot be granted to apps.</p> 932 <p>Protection level: dangerous</p> 933 --> 934 <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE" 935 android:permissionGroup="android.permission-group.UNDEFINED" 936 android:label="@string/permlab_sdcardWrite" 937 android:description="@string/permdesc_sdcardWrite" 938 android:permissionFlags="softRestricted|immutablyRestricted" 939 android:protectionLevel="dangerous" /> 940 941 <!-- Allows an application to access any geographic locations persisted in the 942 user's shared collection. 943 <p>Protection level: dangerous --> 944 <permission android:name="android.permission.ACCESS_MEDIA_LOCATION" 945 android:permissionGroup="android.permission-group.UNDEFINED" 946 android:label="@string/permlab_mediaLocation" 947 android:description="@string/permdesc_mediaLocation" 948 android:protectionLevel="dangerous" /> 949 950 <!-- @hide @SystemApi @TestApi 951 Allows an application to modify OBB files visible to other apps. --> 952 <permission android:name="android.permission.WRITE_OBB" 953 android:protectionLevel="signature|privileged" /> 954 955 <!-- Allows an application a broad access to external storage in scoped storage. 956 Intended to be used by few apps that need to manage files on behalf of the users. 957 <p>Protection level: signature|appop|preinstalled --> 958 <permission android:name="android.permission.MANAGE_EXTERNAL_STORAGE" 959 android:permissionGroup="android.permission-group.UNDEFINED" 960 android:protectionLevel="signature|appop|preinstalled" /> 961 962 <!-- ====================================================================== --> 963 <!-- Permissions for accessing the device location --> 964 <!-- ====================================================================== --> 965 <eat-comment /> 966 967 <!-- Used for permissions that allow accessing the device location. --> 968 <permission-group android:name="android.permission-group.LOCATION" 969 android:icon="@drawable/perm_group_location" 970 android:label="@string/permgrouplab_location" 971 android:description="@string/permgroupdesc_location" 972 android:priority="400" /> 973 974 <!-- Allows an app to access precise location. 975 Alternatively, you might want {@link #ACCESS_COARSE_LOCATION}. 976 <p>Protection level: dangerous 977 --> 978 <permission android:name="android.permission.ACCESS_FINE_LOCATION" 979 android:permissionGroup="android.permission-group.UNDEFINED" 980 android:label="@string/permlab_accessFineLocation" 981 android:description="@string/permdesc_accessFineLocation" 982 android:backgroundPermission="android.permission.ACCESS_BACKGROUND_LOCATION" 983 android:protectionLevel="dangerous|instant" /> 984 985 <!-- Allows an app to access approximate location. 986 Alternatively, you might want {@link #ACCESS_FINE_LOCATION}. 987 <p>Protection level: dangerous 988 --> 989 <permission android:name="android.permission.ACCESS_COARSE_LOCATION" 990 android:permissionGroup="android.permission-group.UNDEFINED" 991 android:label="@string/permlab_accessCoarseLocation" 992 android:description="@string/permdesc_accessCoarseLocation" 993 android:backgroundPermission="android.permission.ACCESS_BACKGROUND_LOCATION" 994 android:protectionLevel="dangerous|instant" /> 995 996 <!-- Allows an app to access location in the background. If you're requesting this permission, 997 you must also request either {@link #ACCESS_COARSE_LOCATION} or 998 {@link #ACCESS_FINE_LOCATION}. Requesting this permission by itself doesn't give you 999 location access. 1000 <p>Protection level: dangerous 1001 1002 <p> This is a hard restricted permission which cannot be held by an app until 1003 the installer on record whitelists the permission. For more details see 1004 {@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}. 1005 --> 1006 <permission android:name="android.permission.ACCESS_BACKGROUND_LOCATION" 1007 android:permissionGroup="android.permission-group.UNDEFINED" 1008 android:label="@string/permlab_accessBackgroundLocation" 1009 android:permissionFlags="hardRestricted" 1010 android:description="@string/permdesc_accessBackgroundLocation" 1011 android:protectionLevel="dangerous|instant" /> 1012 1013 <!-- ====================================================================== --> 1014 <!-- Permissions for accessing the call log --> 1015 <!-- ====================================================================== --> 1016 <eat-comment /> 1017 1018 <!-- Used for permissions that are associated telephony features. --> 1019 <permission-group android:name="android.permission-group.CALL_LOG" 1020 android:icon="@drawable/perm_group_call_log" 1021 android:label="@string/permgrouplab_calllog" 1022 android:description="@string/permgroupdesc_calllog" 1023 android:priority="450" /> 1024 1025 <!-- Allows an application to access the IMS call service: making and 1026 modifying a call 1027 <p>Protection level: signature|privileged 1028 @hide 1029 --> 1030 <permission android:name="android.permission.ACCESS_IMS_CALL_SERVICE" 1031 android:label="@string/permlab_accessImsCallService" 1032 android:description="@string/permdesc_accessImsCallService" 1033 android:protectionLevel="signature|privileged" /> 1034 1035 <!-- Allows an application to read the user's call log. 1036 <p class="note"><strong>Note:</strong> If your app uses the 1037 {@link #READ_CONTACTS} permission and <em>both</em> your <a 1038 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 1039 minSdkVersion}</a> and <a 1040 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 1041 targetSdkVersion}</a> values are set to 15 or lower, the system implicitly 1042 grants your app this permission. If you don't need this permission, be sure your <a 1043 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 1044 targetSdkVersion}</a> is 16 or higher.</p> 1045 <p>Protection level: dangerous 1046 1047 <p> This is a hard restricted permission which cannot be held by an app until 1048 the installer on record whitelists the permission. For more details see 1049 {@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}. 1050 --> 1051 <permission android:name="android.permission.READ_CALL_LOG" 1052 android:permissionGroup="android.permission-group.UNDEFINED" 1053 android:label="@string/permlab_readCallLog" 1054 android:description="@string/permdesc_readCallLog" 1055 android:permissionFlags="hardRestricted" 1056 android:protectionLevel="dangerous" /> 1057 1058 <!-- Allows an application to write (but not read) the user's 1059 call log data. 1060 <p class="note"><strong>Note:</strong> If your app uses the 1061 {@link #WRITE_CONTACTS} permission and <em>both</em> your <a 1062 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 1063 minSdkVersion}</a> and <a 1064 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 1065 targetSdkVersion}</a> values are set to 15 or lower, the system implicitly 1066 grants your app this permission. If you don't need this permission, be sure your <a 1067 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 1068 targetSdkVersion}</a> is 16 or higher.</p> 1069 <p>Protection level: dangerous 1070 1071 <p> This is a hard restricted permission which cannot be held by an app until 1072 the installer on record whitelists the permission. For more details see 1073 {@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}. 1074 --> 1075 <permission android:name="android.permission.WRITE_CALL_LOG" 1076 android:permissionGroup="android.permission-group.UNDEFINED" 1077 android:label="@string/permlab_writeCallLog" 1078 android:description="@string/permdesc_writeCallLog" 1079 android:permissionFlags="hardRestricted" 1080 android:protectionLevel="dangerous" /> 1081 1082 <!-- Allows an application to see the number being dialed during an outgoing 1083 call with the option to redirect the call to a different number or 1084 abort the call altogether. 1085 <p>Protection level: dangerous 1086 1087 <p> This is a hard restricted permission which cannot be held by an app until 1088 the installer on record whitelists the permission. For more details see 1089 {@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}. 1090 1091 @deprecated Applications should use {@link android.telecom.CallRedirectionService} instead 1092 of the {@link android.content.Intent#ACTION_NEW_OUTGOING_CALL} broadcast. 1093 --> 1094 <permission android:name="android.permission.PROCESS_OUTGOING_CALLS" 1095 android:permissionGroup="android.permission-group.UNDEFINED" 1096 android:label="@string/permlab_processOutgoingCalls" 1097 android:description="@string/permdesc_processOutgoingCalls" 1098 android:permissionFlags="hardRestricted" 1099 android:protectionLevel="dangerous" /> 1100 1101 <!-- ====================================================================== --> 1102 <!-- Permissions for accessing the device telephony --> 1103 <!-- ====================================================================== --> 1104 <eat-comment /> 1105 1106 <!-- Used for permissions that are associated telephony features. --> 1107 <permission-group android:name="android.permission-group.PHONE" 1108 android:icon="@drawable/perm_group_phone_calls" 1109 android:label="@string/permgrouplab_phone" 1110 android:description="@string/permgroupdesc_phone" 1111 android:priority="500" /> 1112 1113 <!-- Allows read only access to phone state, including the current cellular network information, 1114 the status of any ongoing calls, and a list of any {@link android.telecom.PhoneAccount}s 1115 registered on the device. 1116 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 1117 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 1118 minSdkVersion}</a> and <a 1119 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 1120 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 1121 grants your app this permission. If you don't need this permission, be sure your <a 1122 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 1123 targetSdkVersion}</a> is 4 or higher. 1124 <p>Protection level: dangerous 1125 --> 1126 <permission android:name="android.permission.READ_PHONE_STATE" 1127 android:permissionGroup="android.permission-group.UNDEFINED" 1128 android:label="@string/permlab_readPhoneState" 1129 android:description="@string/permdesc_readPhoneState" 1130 android:protectionLevel="dangerous" /> 1131 1132 <!-- Allows read access to the device's phone number(s). This is a subset of the capabilities 1133 granted by {@link #READ_PHONE_STATE} but is exposed to instant applications. 1134 <p>Protection level: dangerous--> 1135 <permission android:name="android.permission.READ_PHONE_NUMBERS" 1136 android:permissionGroup="android.permission-group.UNDEFINED" 1137 android:label="@string/permlab_readPhoneNumbers" 1138 android:description="@string/permdesc_readPhoneNumbers" 1139 android:protectionLevel="dangerous|instant" /> 1140 1141 <!-- Allows an application to initiate a phone call without going through 1142 the Dialer user interface for the user to confirm the call. 1143 <p>Protection level: dangerous 1144 --> 1145 <permission android:name="android.permission.CALL_PHONE" 1146 android:permissionGroup="android.permission-group.UNDEFINED" 1147 android:permissionFlags="costsMoney" 1148 android:label="@string/permlab_callPhone" 1149 android:description="@string/permdesc_callPhone" 1150 android:protectionLevel="dangerous" /> 1151 1152 <!-- Allows an application to add voicemails into the system. 1153 <p>Protection level: dangerous 1154 --> 1155 <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL" 1156 android:permissionGroup="android.permission-group.UNDEFINED" 1157 android:label="@string/permlab_addVoicemail" 1158 android:description="@string/permdesc_addVoicemail" 1159 android:protectionLevel="dangerous" /> 1160 1161 <!-- Allows an application to use SIP service. 1162 <p>Protection level: dangerous 1163 --> 1164 <permission android:name="android.permission.USE_SIP" 1165 android:permissionGroup="android.permission-group.UNDEFINED" 1166 android:description="@string/permdesc_use_sip" 1167 android:label="@string/permlab_use_sip" 1168 android:protectionLevel="dangerous"/> 1169 1170 <!-- Allows the app to answer an incoming phone call. 1171 <p>Protection level: dangerous 1172 --> 1173 <permission android:name="android.permission.ANSWER_PHONE_CALLS" 1174 android:permissionGroup="android.permission-group.UNDEFINED" 1175 android:label="@string/permlab_answerPhoneCalls" 1176 android:description="@string/permdesc_answerPhoneCalls" 1177 android:protectionLevel="dangerous|runtime" /> 1178 1179 <!-- Allows a calling application which manages it own calls through the self-managed 1180 {@link android.telecom.ConnectionService} APIs. See 1181 {@link android.telecom.PhoneAccount#CAPABILITY_SELF_MANAGED} for more information on the 1182 self-managed ConnectionService APIs. 1183 <p>Protection level: normal 1184 --> 1185 <permission android:name="android.permission.MANAGE_OWN_CALLS" 1186 android:label="@string/permlab_manageOwnCalls" 1187 android:description="@string/permdesc_manageOwnCalls" 1188 android:protectionLevel="normal" /> 1189 1190 <!--Allows an app which implements the 1191 {@link android.telecom.InCallService InCallService} API to be eligible to be enabled as a 1192 calling companion app. This means that the Telecom framework will bind to the app's 1193 InCallService implementation when there are calls active. The app can use the InCallService 1194 API to view information about calls on the system and control these calls. 1195 <p>Protection level: normal 1196 --> 1197 <permission android:name="android.permission.CALL_COMPANION_APP" 1198 android:label="@string/permlab_callCompanionApp" 1199 android:description="@string/permdesc_callCompanionApp" 1200 android:protectionLevel="normal" /> 1201 1202 <!-- Exempt this uid from restrictions to background audio recoding 1203 <p>Protection level: signature|privileged 1204 @hide 1205 @SystemApi 1206 --> 1207 <permission android:name="android.permission.EXEMPT_FROM_AUDIO_RECORD_RESTRICTIONS" 1208 android:label="@string/permlab_exemptFromAudioRecordRestrictions" 1209 android:description="@string/permdesc_exemptFromAudioRecordRestrictions" 1210 android:protectionLevel="signature|privileged" /> 1211 1212 <!-- Allows a calling app to continue a call which was started in another app. An example is a 1213 video calling app that wants to continue a voice call on the user's mobile network.<p> 1214 When the handover of a call from one app to another takes place, there are two devices 1215 which are involved in the handover; the initiating and receiving devices. The initiating 1216 device is where the request to handover the call was started, and the receiving device is 1217 where the handover request is confirmed by the other party.<p> 1218 This permission protects access to the 1219 {@link android.telecom.TelecomManager#acceptHandover(Uri, int, PhoneAccountHandle)} which 1220 the receiving side of the handover uses to accept a handover. 1221 <p>Protection level: dangerous 1222 --> 1223 <permission android:name="android.permission.ACCEPT_HANDOVER" 1224 android:permissionGroup="android.permission-group.UNDEFINED" 1225 android.label="@string/permlab_acceptHandover" 1226 android:description="@string/permdesc_acceptHandovers" 1227 android:protectionLevel="dangerous" /> 1228 1229 <!-- ====================================================================== --> 1230 <!-- Permissions for accessing the device microphone --> 1231 <!-- ====================================================================== --> 1232 <eat-comment /> 1233 1234 <!-- Used for permissions that are associated with accessing 1235 microphone audio from the device. Note that phone calls also capture audio 1236 but are in a separate (more visible) permission group. --> 1237 <permission-group android:name="android.permission-group.MICROPHONE" 1238 android:icon="@drawable/perm_group_microphone" 1239 android:label="@string/permgrouplab_microphone" 1240 android:description="@string/permgroupdesc_microphone" 1241 android:priority="600" /> 1242 1243 <!-- Allows an application to record audio. 1244 <p>Protection level: dangerous 1245 --> 1246 <permission android:name="android.permission.RECORD_AUDIO" 1247 android:permissionGroup="android.permission-group.UNDEFINED" 1248 android:label="@string/permlab_recordAudio" 1249 android:description="@string/permdesc_recordAudio" 1250 android:protectionLevel="dangerous|instant" /> 1251 1252 <!-- ====================================================================== --> 1253 <!-- Permissions for activity recognition --> 1254 <!-- ====================================================================== --> 1255 <eat-comment /> 1256 1257 <!-- Used for permissions that are associated with activity recognition. --> 1258 <permission-group android:name="android.permission-group.ACTIVITY_RECOGNITION" 1259 android:icon="@drawable/perm_group_activity_recognition" 1260 android:label="@string/permgrouplab_activityRecognition" 1261 android:description="@string/permgroupdesc_activityRecognition" 1262 android:priority="1000" /> 1263 1264 <!-- Allows an application to recognize physical activity. 1265 <p>Protection level: dangerous 1266 --> 1267 <permission android:name="android.permission.ACTIVITY_RECOGNITION" 1268 android:permissionGroup="android.permission-group.UNDEFINED" 1269 android:label="@string/permlab_activityRecognition" 1270 android:description="@string/permdesc_activityRecognition" 1271 android:protectionLevel="dangerous|instant" /> 1272 1273 <!-- ====================================================================== --> 1274 <!-- Permissions for accessing the UCE Service --> 1275 <!-- ====================================================================== --> 1276 1277 <!-- @hide Allows an application to Access UCE-Presence. 1278 <p>Protection level: signature|privileged 1279 --> 1280 <permission android:name="android.permission.ACCESS_UCE_PRESENCE_SERVICE" 1281 android:permissionGroup="android.permission-group.PHONE" 1282 android:protectionLevel="signature|privileged"/> 1283 1284 <!-- @hide Allows an application to Access UCE-OPTIONS. 1285 <p>Protection level: signature|privileged 1286 --> 1287 <permission android:name="android.permission.ACCESS_UCE_OPTIONS_SERVICE" 1288 android:permissionGroup="android.permission-group.PHONE" 1289 android:protectionLevel="signature|privileged"/> 1290 1291 1292 1293 <!-- ====================================================================== --> 1294 <!-- Permissions for accessing the device camera --> 1295 <!-- ====================================================================== --> 1296 <eat-comment /> 1297 1298 <!-- Used for permissions that are associated with accessing 1299 camera or capturing images/video from the device. --> 1300 <permission-group android:name="android.permission-group.CAMERA" 1301 android:icon="@drawable/perm_group_camera" 1302 android:label="@string/permgrouplab_camera" 1303 android:description="@string/permgroupdesc_camera" 1304 android:priority="700" /> 1305 1306 <!-- Required to be able to access the camera device. 1307 <p>This will automatically enforce the 1308 <a href="{@docRoot}guide/topics/manifest/uses-feature-element.html"> 1309 uses-feature</a> manifest element for <em>all</em> camera features. 1310 If you do not require all camera features or can properly operate if a camera 1311 is not available, then you must modify your manifest as appropriate in order to 1312 install on devices that don't support all camera features.</p> 1313 <p>Protection level: dangerous 1314 --> 1315 <permission android:name="android.permission.CAMERA" 1316 android:permissionGroup="android.permission-group.UNDEFINED" 1317 android:label="@string/permlab_camera" 1318 android:description="@string/permdesc_camera" 1319 android:protectionLevel="dangerous|instant" /> 1320 1321 <!-- @SystemApi Required in addition to android.permission.CAMERA to be able to access 1322 system only camera devices. 1323 <p>Protection level: system|signature 1324 @hide --> 1325 <permission android:name="android.permission.SYSTEM_CAMERA" 1326 android:permissionGroup="android.permission-group.UNDEFINED" 1327 android:label="@string/permlab_systemCamera" 1328 android:description="@string/permdesc_systemCamera" 1329 android:protectionLevel="system|signature" /> 1330 1331 <!-- Allows receiving the camera service notifications when a camera is opened 1332 (by a certain application package) or closed. 1333 @hide --> 1334 <permission android:name="android.permission.CAMERA_OPEN_CLOSE_LISTENER" 1335 android:permissionGroup="android.permission-group.UNDEFINED" 1336 android:label="@string/permlab_cameraOpenCloseListener" 1337 android:description="@string/permdesc_cameraOpenCloseListener" 1338 android:protectionLevel="signature" /> 1339 1340 <!-- ====================================================================== --> 1341 <!-- Permissions for accessing the device sensors --> 1342 <!-- ====================================================================== --> 1343 <eat-comment /> 1344 1345 <!-- Used for permissions that are associated with accessing 1346 body or environmental sensors. --> 1347 <permission-group android:name="android.permission-group.SENSORS" 1348 android:icon="@drawable/perm_group_sensors" 1349 android:label="@string/permgrouplab_sensors" 1350 android:description="@string/permgroupdesc_sensors" 1351 android:priority="800" /> 1352 1353 <!-- Allows an application to access data from sensors that the user uses to 1354 measure what is happening inside their body, such as heart rate. 1355 <p>Protection level: dangerous --> 1356 <permission android:name="android.permission.BODY_SENSORS" 1357 android:permissionGroup="android.permission-group.UNDEFINED" 1358 android:label="@string/permlab_bodySensors" 1359 android:description="@string/permdesc_bodySensors" 1360 android:protectionLevel="dangerous" /> 1361 1362 <!-- Allows an app to use fingerprint hardware. 1363 <p>Protection level: normal 1364 @deprecated Applications should request {@link 1365 android.Manifest.permission#USE_BIOMETRIC} instead 1366 --> 1367 <permission android:name="android.permission.USE_FINGERPRINT" 1368 android:permissionGroup="android.permission-group.SENSORS" 1369 android:label="@string/permlab_useFingerprint" 1370 android:description="@string/permdesc_useFingerprint" 1371 android:protectionLevel="normal" /> 1372 1373 <!-- Allows an app to use device supported biometric modalities. 1374 <p>Protection level: normal 1375 --> 1376 <permission android:name="android.permission.USE_BIOMETRIC" 1377 android:permissionGroup="android.permission-group.SENSORS" 1378 android:label="@string/permlab_useBiometric" 1379 android:description="@string/permdesc_useBiometric" 1380 android:protectionLevel="normal" /> 1381 1382 <!-- ====================================================================== --> 1383 <!-- REMOVED PERMISSIONS --> 1384 <!-- ====================================================================== --> 1385 1386 <!-- @hide We need to keep this around for backwards compatibility --> 1387 <permission android:name="android.permission.READ_PROFILE" 1388 android:protectionLevel="normal" 1389 android:permissionFlags="removed"/> 1390 1391 <!-- @hide We need to keep this around for backwards compatibility --> 1392 <permission android:name="android.permission.WRITE_PROFILE" 1393 android:protectionLevel="normal" 1394 android:permissionFlags="removed"/> 1395 1396 <!-- @hide We need to keep this around for backwards compatibility --> 1397 <permission android:name="android.permission.READ_SOCIAL_STREAM" 1398 android:protectionLevel="normal" 1399 android:permissionFlags="removed"/> 1400 1401 <!-- @hide We need to keep this around for backwards compatibility --> 1402 <permission android:name="android.permission.WRITE_SOCIAL_STREAM" 1403 android:protectionLevel="normal" 1404 android:permissionFlags="removed"/> 1405 1406 <!-- @hide We need to keep this around for backwards compatibility --> 1407 <permission android:name="android.permission.READ_USER_DICTIONARY" 1408 android:protectionLevel="normal" 1409 android:permissionFlags="removed"/> 1410 1411 <!-- @hide We need to keep this around for backwards compatibility --> 1412 <permission android:name="android.permission.WRITE_USER_DICTIONARY" 1413 android:protectionLevel="normal" 1414 android:permissionFlags="removed"/> 1415 1416 <!-- @hide We need to keep this around for backwards compatibility --> 1417 <permission android:name="android.permission.WRITE_SMS" 1418 android:protectionLevel="normal" 1419 android:permissionFlags="removed"/> 1420 1421 <!-- @hide We need to keep this around for backwards compatibility --> 1422 <permission android:name="com.android.browser.permission.READ_HISTORY_BOOKMARKS" 1423 android:protectionLevel="normal" 1424 android:permissionFlags="removed"/> 1425 1426 <!-- @hide We need to keep this around for backwards compatibility --> 1427 <permission android:name="com.android.browser.permission.WRITE_HISTORY_BOOKMARKS" 1428 android:protectionLevel="normal" 1429 android:permissionFlags="removed"/> 1430 1431 <!-- @hide We need to keep this around for backwards compatibility --> 1432 <permission android:name="android.permission.AUTHENTICATE_ACCOUNTS" 1433 android:protectionLevel="normal" 1434 android:permissionFlags="removed"/> 1435 1436 <!-- @hide We need to keep this around for backwards compatibility --> 1437 <permission android:name="android.permission.MANAGE_ACCOUNTS" 1438 android:protectionLevel="normal" 1439 android:permissionFlags="removed"/> 1440 1441 <!-- @hide We need to keep this around for backwards compatibility --> 1442 <permission android:name="android.permission.USE_CREDENTIALS" 1443 android:protectionLevel="normal" 1444 android:permissionFlags="removed"/> 1445 1446 <!-- @hide We need to keep this around for backwards compatibility --> 1447 <permission android:name="android.permission.SUBSCRIBED_FEEDS_READ" 1448 android:protectionLevel="normal" 1449 android:permissionFlags="removed"/> 1450 1451 <!-- @hide We need to keep this around for backwards compatibility --> 1452 <permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE" 1453 android:protectionLevel="normal" 1454 android:permissionFlags="removed"/> 1455 1456 <!-- @hide We need to keep this around for backwards compatibility --> 1457 <permission android:name="android.permission.FLASHLIGHT" 1458 android:protectionLevel="normal" 1459 android:permissionFlags="removed"/> 1460 1461 <!-- ====================================================================== --> 1462 <!-- INSTALL PERMISSIONS --> 1463 <!-- ====================================================================== --> 1464 1465 <!-- ================================== --> 1466 <!-- Permissions for accessing messages --> 1467 <!-- ================================== --> 1468 <eat-comment /> 1469 1470 <!-- Allows an application (Phone) to send a request to other applications 1471 to handle the respond-via-message action during incoming calls. 1472 <p>Not for use by third-party applications. --> 1473 <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE" 1474 android:protectionLevel="signature|privileged" /> 1475 1476 <!-- @SystemApi Allows an application to send SMS to premium shortcodes without user permission. 1477 <p>Not for use by third-party applications. 1478 @hide --> 1479 <permission android:name="android.permission.SEND_SMS_NO_CONFIRMATION" 1480 android:protectionLevel="signature|privileged" /> 1481 1482 <!-- Allows an application to filter carrier specific sms. 1483 @hide --> 1484 <permission android:name="android.permission.CARRIER_FILTER_SMS" 1485 android:protectionLevel="signature|privileged" /> 1486 1487 <!-- @SystemApi Allows an application to receive emergency cell broadcast messages, 1488 to record or display them to the user. 1489 <p>Not for use by third-party applications. 1490 @hide --> 1491 <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST" 1492 android:protectionLevel="signature|privileged" /> 1493 1494 <!-- Allows an application to monitor incoming Bluetooth MAP messages, to record 1495 or perform processing on them. --> 1496 <!-- @hide --> 1497 <permission android:name="android.permission.RECEIVE_BLUETOOTH_MAP" 1498 android:protectionLevel="signature|privileged" /> 1499 1500 <!-- @SystemApi @hide Allows an application to execute contacts directory search. 1501 This should only be used by ContactsProvider. 1502 <p>Not for use by third-party applications. --> 1503 <permission android:name="android.permission.BIND_DIRECTORY_SEARCH" 1504 android:protectionLevel="signature|privileged" /> 1505 1506 <!-- @SystemApi @hide Allows an application to modify cell broadcasts through the content provider. 1507 <p>Not for use by third-party applications. --> 1508 <permission android:name="android.permission.MODIFY_CELL_BROADCASTS" 1509 android:protectionLevel="signature|privileged" /> 1510 1511 <!-- =============================================================== --> 1512 <!-- Permissions for setting the device alarm --> 1513 <!-- =============================================================== --> 1514 <eat-comment /> 1515 1516 <!-- Allows an application to broadcast an Intent to set an alarm for the user. 1517 <p>Protection level: normal 1518 --> 1519 <permission android:name="com.android.alarm.permission.SET_ALARM" 1520 android:label="@string/permlab_setAlarm" 1521 android:description="@string/permdesc_setAlarm" 1522 android:protectionLevel="normal" /> 1523 1524 <!-- =============================================================== --> 1525 <!-- Permissions for accessing the user voicemail --> 1526 <!-- =============================================================== --> 1527 <eat-comment /> 1528 1529 <!-- Allows an application to modify and remove existing voicemails in the system. 1530 <p>Protection level: signature|privileged 1531 --> 1532 <permission android:name="com.android.voicemail.permission.WRITE_VOICEMAIL" 1533 android:protectionLevel="signature|privileged" /> 1534 1535 <!-- Allows an application to read voicemails in the system. 1536 <p>Protection level: signature|privileged 1537 --> 1538 <permission android:name="com.android.voicemail.permission.READ_VOICEMAIL" 1539 android:protectionLevel="signature|privileged" /> 1540 1541 <!-- ======================================= --> 1542 <!-- Permissions for accessing location info --> 1543 <!-- ======================================= --> 1544 <eat-comment /> 1545 1546 <!-- Allows an application to access extra location provider commands. 1547 <p>Protection level: normal 1548 --> 1549 <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS" 1550 android:label="@string/permlab_accessLocationExtraCommands" 1551 android:description="@string/permdesc_accessLocationExtraCommands" 1552 android:protectionLevel="normal" /> 1553 1554 <!-- Allows an application to install a location provider into the Location Manager. 1555 <p>Not for use by third-party applications. --> 1556 <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER" 1557 android:protectionLevel="signature|privileged" /> 1558 1559 <!-- @SystemApi @hide Allows HDMI-CEC service to access device and configuration files. 1560 This should only be used by HDMI-CEC service. 1561 --> 1562 <permission android:name="android.permission.HDMI_CEC" 1563 android:protectionLevel="signature|privileged|vendorPrivileged" /> 1564 1565 <!-- Allows an application to use location features in hardware, 1566 such as the geofencing api. 1567 <p>Not for use by third-party applications. --> 1568 <permission android:name="android.permission.LOCATION_HARDWARE" 1569 android:protectionLevel="signature|privileged" /> 1570 <uses-permission android:name="android.permission.LOCATION_HARDWARE"/> 1571 1572 <!-- @SystemApi Allows an application to use the Context Hub. 1573 <p>Not for use by third-party applications. 1574 @hide 1575 --> 1576 <permission android:name="android.permission.ACCESS_CONTEXT_HUB" 1577 android:protectionLevel="signature|privileged" /> 1578 <uses-permission android:name="android.permission.ACCESS_CONTEXT_HUB"/> 1579 1580 <!-- @SystemApi Allows an application to create mock location providers for testing. 1581 <p>Protection level: signature 1582 @hide 1583 --> 1584 <permission android:name="android.permission.ACCESS_MOCK_LOCATION" 1585 android:protectionLevel="signature" /> 1586 1587 <!-- ======================================= --> 1588 <!-- Permissions for accessing networks --> 1589 <!-- ======================================= --> 1590 <eat-comment /> 1591 1592 <!-- Allows applications to open network sockets. 1593 <p>Protection level: normal 1594 --> 1595 <permission android:name="android.permission.INTERNET" 1596 android:description="@string/permdesc_createNetworkSockets" 1597 android:label="@string/permlab_createNetworkSockets" 1598 android:protectionLevel="normal|instant" /> 1599 1600 <!-- Allows applications to access information about networks. 1601 <p>Protection level: normal 1602 --> 1603 <permission android:name="android.permission.ACCESS_NETWORK_STATE" 1604 android:description="@string/permdesc_accessNetworkState" 1605 android:label="@string/permlab_accessNetworkState" 1606 android:protectionLevel="normal|instant" /> 1607 1608 <!-- Allows applications to access information about Wi-Fi networks. 1609 <p>Protection level: normal 1610 --> 1611 <permission android:name="android.permission.ACCESS_WIFI_STATE" 1612 android:description="@string/permdesc_accessWifiState" 1613 android:label="@string/permlab_accessWifiState" 1614 android:protectionLevel="normal" /> 1615 1616 <!-- Allows applications to change Wi-Fi connectivity state. 1617 <p>Protection level: normal 1618 --> 1619 <permission android:name="android.permission.CHANGE_WIFI_STATE" 1620 android:description="@string/permdesc_changeWifiState" 1621 android:label="@string/permlab_changeWifiState" 1622 android:protectionLevel="normal" /> 1623 1624 <!-- @SystemApi @hide Allows apps to create and manage IPsec tunnels. 1625 <p>Only granted to applications that are currently bound by the 1626 system for creating and managing IPsec-based interfaces. 1627 --> 1628 <permission android:name="android.permission.MANAGE_IPSEC_TUNNELS" 1629 android:protectionLevel="signature|appop" /> 1630 1631 <!-- @hide Allows apps to create and manage Test Networks. 1632 <p>Granted only to shell. CTS tests will use 1633 UiAutomation.AdoptShellPermissionIdentity() to gain access. 1634 --> 1635 <permission android:name="android.permission.MANAGE_TEST_NETWORKS" 1636 android:protectionLevel="signature" /> 1637 1638 <!-- @SystemApi @hide Allows applications to read Wi-Fi credential. 1639 <p>Not for use by third-party applications. --> 1640 <permission android:name="android.permission.READ_WIFI_CREDENTIAL" 1641 android:protectionLevel="signature|privileged" /> 1642 1643 <!-- @SystemApi @hide Allows applications to change tether state and run 1644 tether carrier provisioning. 1645 <p>Not for use by third-party applications. --> 1646 <permission android:name="android.permission.TETHER_PRIVILEGED" 1647 android:protectionLevel="signature|privileged" /> 1648 1649 <!-- @SystemApi @hide Allow system apps to receive broadcast 1650 when a wifi network credential is changed. 1651 <p>Not for use by third-party applications. --> 1652 <permission android:name="android.permission.RECEIVE_WIFI_CREDENTIAL_CHANGE" 1653 android:protectionLevel="signature|privileged" /> 1654 1655 <!-- @SystemApi @hide Allows an application to modify any wifi configuration, even if created 1656 by another application. Once reconfigured the original creator cannot make any further 1657 modifications. 1658 <p>Not for use by third-party applications. --> 1659 <permission android:name="android.permission.OVERRIDE_WIFI_CONFIG" 1660 android:protectionLevel="signature|privileged" /> 1661 1662 <!-- Allows applications to act as network scorers. @hide @SystemApi--> 1663 <permission android:name="android.permission.SCORE_NETWORKS" 1664 android:protectionLevel="signature|privileged" /> 1665 1666 <!-- Allows applications to request network 1667 recommendations and scores from the NetworkScoreService. 1668 @SystemApi 1669 <p>Not for use by third-party applications. @hide --> 1670 <permission android:name="android.permission.REQUEST_NETWORK_SCORES" 1671 android:protectionLevel="signature|setup" /> 1672 1673 <!-- @SystemApi @hide Allows applications to toggle airplane mode. 1674 <p>Not for use by third-party or privileged applications. 1675 --> 1676 <permission android:name="android.permission.NETWORK_AIRPLANE_MODE" 1677 android:protectionLevel="signature" /> 1678 1679 <!-- Allows network stack services (Connectivity and Wifi) to coordinate 1680 <p>Not for use by third-party or privileged applications. 1681 @SystemApi @TestApi 1682 @hide This should only be used by Connectivity and Wifi Services. 1683 --> 1684 <permission android:name="android.permission.NETWORK_STACK" 1685 android:protectionLevel="signature" /> 1686 1687 <!-- @SystemApi @hide Allows an application to observe network policy changes. --> 1688 <permission android:name="android.permission.OBSERVE_NETWORK_POLICY" 1689 android:protectionLevel="signature" /> 1690 1691 <!-- @SystemApi @hide Allows applications to register network factory or agent --> 1692 <permission android:name="android.permission.NETWORK_FACTORY" 1693 android:protectionLevel="signature" /> 1694 1695 <!-- @SystemApi @hide Allows applications to access network stats provider --> 1696 <permission android:name="android.permission.NETWORK_STATS_PROVIDER" 1697 android:protectionLevel="signature" /> 1698 1699 <!-- Allows Settings and SystemUI to call methods in Networking services 1700 <p>Not for use by third-party or privileged applications. 1701 @SystemApi @TestApi 1702 @hide This should only be used by Settings and SystemUI. 1703 --> 1704 <permission android:name="android.permission.NETWORK_SETTINGS" 1705 android:protectionLevel="signature" /> 1706 1707 <!-- Allows holder to request bluetooth/wifi scan bypassing global "use location" setting and 1708 location permissions. 1709 <p>Not for use by third-party or privileged applications. 1710 @SystemApi 1711 @hide 1712 --> 1713 <permission android:name="android.permission.RADIO_SCAN_WITHOUT_LOCATION" 1714 android:protectionLevel="signature|companion" /> 1715 1716 <!-- Allows SetupWizard to call methods in Networking services 1717 <p>Not for use by any other third-party or privileged applications. 1718 @SystemApi 1719 @hide This should only be used by SetupWizard. 1720 --> 1721 <permission android:name="android.permission.NETWORK_SETUP_WIZARD" 1722 android:protectionLevel="signature|setup" /> 1723 1724 <!-- Allows Managed Provisioning to call methods in Networking services 1725 <p>Not for use by any other third-party or privileged applications. 1726 @SystemApi 1727 @hide This should only be used by ManagedProvisioning app. 1728 --> 1729 <permission android:name="android.permission.NETWORK_MANAGED_PROVISIONING" 1730 android:protectionLevel="signature" /> 1731 1732 <!-- Allows Carrier Provisioning to call methods in Networking services 1733 <p>Not for use by any other third-party or privileged applications. 1734 @SystemApi 1735 @hide This should only be used by CarrierProvisioning. 1736 --> 1737 <permission android:name="android.permission.NETWORK_CARRIER_PROVISIONING" 1738 android:protectionLevel="signature|privileged" /> 1739 1740 <!-- #SystemApi @hide Allows applications to access information about LoWPAN interfaces. 1741 <p>Not for use by third-party applications. --> 1742 <permission android:name="android.permission.ACCESS_LOWPAN_STATE" 1743 android:protectionLevel="signature|privileged" /> 1744 1745 <!-- #SystemApi @hide Allows applications to change LoWPAN connectivity state. 1746 <p>Not for use by third-party applications. --> 1747 <permission android:name="android.permission.CHANGE_LOWPAN_STATE" 1748 android:protectionLevel="signature|privileged" /> 1749 1750 <!-- #SystemApi @hide Allows applications to read LoWPAN credential. 1751 <p>Not for use by third-party applications. --> 1752 <permission android:name="android.permission.READ_LOWPAN_CREDENTIAL" 1753 android:protectionLevel="signature|privileged" /> 1754 1755 <!-- #SystemApi @hide Allows a service to register or unregister 1756 new LoWPAN interfaces. 1757 <p>Not for use by third-party applications. --> 1758 <permission android:name="android.permission.MANAGE_LOWPAN_INTERFACES" 1759 android:protectionLevel="signature|privileged" /> 1760 1761 <!-- #SystemApi @hide Allows an app to bypass Private DNS. 1762 <p>Not for use by third-party applications. 1763 TODO: publish as system API in next API release. --> 1764 <permission android:name="android.permission.NETWORK_BYPASS_PRIVATE_DNS" 1765 android:protectionLevel="signature" /> 1766 1767 <!-- @SystemApi @hide Allows device mobility state to be set so that Wifi scan interval can 1768 be increased when the device is stationary in order to save power. 1769 <p>Not for use by third-party applications. --> 1770 <permission android:name="android.permission.WIFI_SET_DEVICE_MOBILITY_STATE" 1771 android:protectionLevel="signature|privileged" /> 1772 1773 <!-- @SystemApi @hide Allows privileged system APK to update Wifi usability stats and score. 1774 <p>Not for use by third-party applications. --> 1775 <permission android:name="android.permission.WIFI_UPDATE_USABILITY_STATS_SCORE" 1776 android:protectionLevel="signature|privileged" /> 1777 1778 <!-- ======================================= --> 1779 <!-- Permissions for short range, peripheral networks --> 1780 <!-- ======================================= --> 1781 <eat-comment /> 1782 1783 <!-- Allows applications to connect to paired bluetooth devices. 1784 <p>Protection level: normal 1785 --> 1786 <permission android:name="android.permission.BLUETOOTH" 1787 android:description="@string/permdesc_bluetooth" 1788 android:label="@string/permlab_bluetooth" 1789 android:protectionLevel="normal" /> 1790 1791 <!-- @SystemApi @TestApi Allows an application to suspend other apps, which will prevent the 1792 user from using them until they are unsuspended. 1793 @hide 1794 --> 1795 <permission android:name="android.permission.SUSPEND_APPS" 1796 android:protectionLevel="signature|wellbeing" /> 1797 1798 <!-- Allows applications to discover and pair bluetooth devices. 1799 <p>Protection level: normal 1800 --> 1801 <permission android:name="android.permission.BLUETOOTH_ADMIN" 1802 android:description="@string/permdesc_bluetoothAdmin" 1803 android:label="@string/permlab_bluetoothAdmin" 1804 android:protectionLevel="normal" /> 1805 1806 <!-- Allows applications to pair bluetooth devices without user interaction, and to 1807 allow or disallow phonebook access or message access. 1808 <p>Not for use by third-party applications. --> 1809 <permission android:name="android.permission.BLUETOOTH_PRIVILEGED" 1810 android:protectionLevel="signature|privileged" /> 1811 1812 <!-- Control access to email providers exclusively for Bluetooth 1813 @hide 1814 --> 1815 <permission android:name="android.permission.BLUETOOTH_MAP" 1816 android:protectionLevel="signature" /> 1817 1818 <!-- Allows bluetooth stack to access files 1819 @hide This should only be used by Bluetooth apk. 1820 --> 1821 <permission android:name="android.permission.BLUETOOTH_STACK" 1822 android:protectionLevel="signature" /> 1823 1824 <!-- Allows applications to perform I/O operations over NFC. 1825 <p>Protection level: normal 1826 --> 1827 <permission android:name="android.permission.NFC" 1828 android:description="@string/permdesc_nfc" 1829 android:label="@string/permlab_nfc" 1830 android:protectionLevel="normal" /> 1831 1832 <!-- Allows applications to receive NFC transaction events. 1833 <p>Protection level: normal 1834 --> 1835 <permission android:name="android.permission.NFC_TRANSACTION_EVENT" 1836 android:protectionLevel="normal" /> 1837 1838 <!-- Allows applications to receive NFC preferred payment service information. 1839 <p>Protection level: normal 1840 --> 1841 <permission android:name="android.permission.NFC_PREFERRED_PAYMENT_INFO" 1842 android:description="@string/permdesc_preferredPaymentInfo" 1843 android:label="@string/permlab_preferredPaymentInfo" 1844 android:protectionLevel="normal" /> 1845 1846 <!-- @SystemApi Allows an internal user to use privileged SecureElement APIs. 1847 Applications holding this permission can access OMAPI reset system API 1848 and bypass OMAPI AccessControlEnforcer. 1849 <p>Not for use by third-party applications. 1850 @hide --> 1851 <permission android:name="android.permission.SECURE_ELEMENT_PRIVILEGED_OPERATION" 1852 android:protectionLevel="signature|privileged" /> 1853 1854 <!-- @deprecated This permission used to allow too broad access to sensitive methods and all its 1855 uses have been replaced by a more appropriate permission. Most uses have been replaced with 1856 a NETWORK_STACK or NETWORK_SETTINGS check. Please look up the documentation of the 1857 individual functions to figure out what permission now protects the individual function. 1858 @SystemApi Allows an internal user to use privileged ConnectivityManager APIs. 1859 @hide --> 1860 <permission android:name="android.permission.CONNECTIVITY_INTERNAL" 1861 android:protectionLevel="signature|privileged" /> 1862 1863 <!-- @SystemApi Allows an internal user to use restricted Networks. 1864 @hide --> 1865 <permission android:name="android.permission.CONNECTIVITY_USE_RESTRICTED_NETWORKS" 1866 android:protectionLevel="signature|privileged" /> 1867 <uses-permission android:name="android.permission.CONNECTIVITY_USE_RESTRICTED_NETWORKS"/> 1868 1869 <!-- @SystemApi Allows an internal user to set signal strength in NetworkRequest. This kind of 1870 request will wake up device when signal strength meets the given value. 1871 @hide --> 1872 <permission android:name="android.permission.NETWORK_SIGNAL_STRENGTH_WAKEUP" 1873 android:protectionLevel="signature|privileged" /> 1874 1875 <!-- @SystemApi Allows a system application to access hardware packet offload capabilities. 1876 @hide --> 1877 <permission android:name="android.permission.PACKET_KEEPALIVE_OFFLOAD" 1878 android:protectionLevel="signature|privileged" /> 1879 1880 <!-- @SystemApi 1881 @hide --> 1882 <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE" 1883 android:protectionLevel="signature|privileged" /> 1884 1885 <!-- @SystemApi Allows access to the loop radio (Android@Home mesh network) device. 1886 @hide --> 1887 <permission android:name="android.permission.LOOP_RADIO" 1888 android:protectionLevel="signature|privileged" /> 1889 1890 <!-- Allows sending and receiving handover transfer status from Wifi and Bluetooth 1891 @hide --> 1892 <permission android:name="android.permission.NFC_HANDOVER_STATUS" 1893 android:protectionLevel="signature|privileged" /> 1894 1895 <!-- @hide Allows internal management of Bluetooth state when on wireless consent mode. 1896 <p>Not for use by third-party applications. --> 1897 <permission android:name="android.permission.MANAGE_BLUETOOTH_WHEN_WIRELESS_CONSENT_REQUIRED" 1898 android:protectionLevel="signature" /> 1899 1900 <!-- @hide Allows the device to be reset, clearing all data and enables Test Harness Mode. --> 1901 <permission android:name="android.permission.ENABLE_TEST_HARNESS_MODE" 1902 android:protectionLevel="signature" /> 1903 1904 <!-- ================================== --> 1905 <!-- Permissions for accessing accounts --> 1906 <!-- ================================== --> 1907 <eat-comment /> 1908 1909 <!-- Allows access to the list of accounts in the Accounts Service. 1910 1911 <p class="note"><strong>Note:</strong> Beginning with Android 6.0 (API level 1912 23), if an app shares the signature of the authenticator that manages an 1913 account, it does not need <code>"GET_ACCOUNTS"</code> permission to read 1914 information about that account. On Android 5.1 and lower, all apps need 1915 <code>"GET_ACCOUNTS"</code> permission to read information about any 1916 account.</p> 1917 1918 <p>Protection level: dangerous 1919 --> 1920 <permission android:name="android.permission.GET_ACCOUNTS" 1921 android:permissionGroup="android.permission-group.UNDEFINED" 1922 android:protectionLevel="dangerous" 1923 android:description="@string/permdesc_getAccounts" 1924 android:label="@string/permlab_getAccounts" /> 1925 <uses-permission android:name="android.permission.GET_ACCOUNTS"/> 1926 1927 <!-- Allows applications to call into AccountAuthenticators. 1928 <p>Not for use by third-party applications. --> 1929 <permission android:name="android.permission.ACCOUNT_MANAGER" 1930 android:protectionLevel="signature" /> 1931 1932 <!-- ================================== --> 1933 <!-- Permissions for accessing hardware that may effect battery life--> 1934 <!-- ================================== --> 1935 <eat-comment /> 1936 1937 <!-- Allows applications to enter Wi-Fi Multicast mode. 1938 <p>Protection level: normal 1939 --> 1940 <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE" 1941 android:description="@string/permdesc_changeWifiMulticastState" 1942 android:label="@string/permlab_changeWifiMulticastState" 1943 android:protectionLevel="normal" /> 1944 1945 <!-- Allows access to the vibrator. 1946 <p>Protection level: normal 1947 --> 1948 <permission android:name="android.permission.VIBRATE" 1949 android:label="@string/permlab_vibrate" 1950 android:description="@string/permdesc_vibrate" 1951 android:protectionLevel="normal|instant" /> 1952 1953 <!-- Allows access to the vibrator always-on settings. 1954 <p>Protection level: signature 1955 @hide 1956 --> 1957 <permission android:name="android.permission.VIBRATE_ALWAYS_ON" 1958 android:protectionLevel="signature" /> 1959 1960 <!-- @SystemApi Allows access to the vibrator state. 1961 <p>Protection level: signature 1962 @hide 1963 --> 1964 <permission android:name="android.permission.ACCESS_VIBRATOR_STATE" 1965 android:label="@string/permdesc_vibrator_state" 1966 android:description="@string/permdesc_vibrator_state" 1967 android:protectionLevel="signature|privileged" /> 1968 1969 <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen 1970 from dimming. 1971 <p>Protection level: normal 1972 --> 1973 <permission android:name="android.permission.WAKE_LOCK" 1974 android:label="@string/permlab_wakeLock" 1975 android:description="@string/permdesc_wakeLock" 1976 android:protectionLevel="normal|instant" /> 1977 1978 <!-- Allows using the device's IR transmitter, if available. 1979 <p>Protection level: normal 1980 --> 1981 <permission android:name="android.permission.TRANSMIT_IR" 1982 android:label="@string/permlab_transmitIr" 1983 android:description="@string/permdesc_transmitIr" 1984 android:protectionLevel="normal" /> 1985 1986 <!-- ==================================================== --> 1987 <!-- Permissions related to changing audio settings --> 1988 <!-- ==================================================== --> 1989 <eat-comment /> 1990 1991 <!-- Allows an application to modify global audio settings. 1992 <p>Protection level: normal 1993 --> 1994 <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS" 1995 android:label="@string/permlab_modifyAudioSettings" 1996 android:description="@string/permdesc_modifyAudioSettings" 1997 android:protectionLevel="normal" /> 1998 1999 <!-- ======================================== --> 2000 <!-- Permissions for factory reset protection --> 2001 <!-- ======================================== --> 2002 <eat-comment /> 2003 2004 <!-- @SystemApi Allows an application to set a factory reset protection (FRP) policy. 2005 <p>Not for use by third-party applications. 2006 @hide 2007 --> 2008 <permission android:name="android.permission.MANAGE_FACTORY_RESET_PROTECTION" 2009 android:protectionLevel="signature|privileged"/> 2010 2011 <!-- ================================== --> 2012 <!-- Permissions for accessing hardware --> 2013 <!-- ================================== --> 2014 <eat-comment /> 2015 2016 <!-- @SystemApi Allows an application to manage preferences and permissions for USB devices 2017 @hide --> 2018 <permission android:name="android.permission.MANAGE_USB" 2019 android:protectionLevel="signature|privileged" /> 2020 2021 <!-- @SystemApi Allows an application to manage Android Debug Bridge settings. 2022 <p>Not for use by third-party applications. 2023 @hide --> 2024 <permission android:name="android.permission.MANAGE_DEBUGGING" 2025 android:protectionLevel="signature|privileged" /> 2026 2027 <!-- @SystemApi Allows an application to access the MTP USB kernel driver. 2028 For use only by the device side MTP implementation. 2029 @hide --> 2030 <permission android:name="android.permission.ACCESS_MTP" 2031 android:protectionLevel="signature|privileged" /> 2032 2033 <!-- @SystemApi Allows access to hardware peripherals. Intended only for hardware testing. 2034 <p>Not for use by third-party applications. 2035 @hide 2036 --> 2037 <permission android:name="android.permission.HARDWARE_TEST" 2038 android:protectionLevel="signature" /> 2039 2040 <!-- @hide Allows an application to manage DynamicSystem image --> 2041 <permission android:name="android.permission.MANAGE_DYNAMIC_SYSTEM" 2042 android:protectionLevel="signature" /> 2043 2044 <!-- @SystemApi Allows an application to install a DynamicSystem image and get status updates. 2045 @hide --> 2046 <permission android:name="android.permission.INSTALL_DYNAMIC_SYSTEM" 2047 android:protectionLevel="signature|privileged" /> 2048 2049 <!-- @SystemApi Allows access to Broadcast Radio 2050 @hide This is not a third-party API (intended for system apps).--> 2051 <permission android:name="android.permission.ACCESS_BROADCAST_RADIO" 2052 android:protectionLevel="signature|privileged" /> 2053 2054 <!-- @deprecated @SystemApi Allows access to FM 2055 @hide This is not a third-party API (intended for system apps).--> 2056 <permission android:name="android.permission.ACCESS_FM_RADIO" 2057 android:protectionLevel="signature|privileged" /> 2058 2059 <!-- Allows access to configure network interfaces, configure/use IPSec, etc. 2060 @hide --> 2061 <permission android:name="android.permission.NET_ADMIN" 2062 android:protectionLevel="signature" /> 2063 2064 <!-- Allows registration for remote audio playback. @hide --> 2065 <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK" 2066 android:protectionLevel="signature" /> 2067 2068 <!-- Allows TvInputService to access underlying TV input hardware such as 2069 built-in tuners and HDMI-in's. 2070 <p>This should only be used by OEM's TvInputService's. 2071 @hide @SystemApi --> 2072 <permission android:name="android.permission.TV_INPUT_HARDWARE" 2073 android:protectionLevel="signature|privileged|vendorPrivileged" /> 2074 2075 <!-- Allows to capture a frame of TV input hardware such as 2076 built-in tuners and HDMI-in's. 2077 <p>Not for use by third-party applications. 2078 @hide @SystemApi --> 2079 <permission android:name="android.permission.CAPTURE_TV_INPUT" 2080 android:protectionLevel="signature|privileged" /> 2081 2082 <!-- @hide Allows TvInputService to access DVB device. 2083 <p>Not for use by third-party applications. --> 2084 <permission android:name="android.permission.DVB_DEVICE" 2085 android:protectionLevel="signature|privileged" /> 2086 2087 <!-- @SystemApi Allows reading and enabling/disabling the OEM unlock allowed by carrier state 2088 @hide <p>Not for use by third-party applications. --> 2089 <permission android:name="android.permission.MANAGE_CARRIER_OEM_UNLOCK_STATE" 2090 android:protectionLevel="signature|privileged" /> 2091 2092 <!-- @SystemApi Allows reading and enabling/disabling the OEM unlock allowed by user state 2093 @hide <p>Not for use by third-party applications. --> 2094 <permission android:name="android.permission.MANAGE_USER_OEM_UNLOCK_STATE" 2095 android:protectionLevel="signature|privileged" /> 2096 2097 <!-- @SystemApi Allows reading the OEM unlock state 2098 @hide <p>Not for use by third-party applications. --> 2099 <permission android:name="android.permission.READ_OEM_UNLOCK_STATE" 2100 android:protectionLevel="signature|privileged" /> 2101 2102 <!-- @hide Allows enabling/disabling OEM unlock 2103 <p>Not for use by third-party applications. --> 2104 <permission android:name="android.permission.OEM_UNLOCK_STATE" 2105 android:protectionLevel="signature" /> 2106 2107 <!-- @hide Allows querying state of PersistentDataBlock 2108 <p>Not for use by third-party applications. --> 2109 <permission android:name="android.permission.ACCESS_PDB_STATE" 2110 android:protectionLevel="signature" /> 2111 2112 <!-- Allows testing if a passwords is forbidden by the admins. 2113 @hide <p>Not for use by third-party applications. --> 2114 <permission android:name="android.permission.TEST_BLACKLISTED_PASSWORD" 2115 android:protectionLevel="signature" /> 2116 2117 <!-- @hide Allows system update service to notify device owner about pending updates. 2118 <p>Not for use by third-party applications. --> 2119 <permission android:name="android.permission.NOTIFY_PENDING_SYSTEM_UPDATE" 2120 android:protectionLevel="signature|privileged" /> 2121 2122 <!-- =========================================== --> 2123 <!-- Permissions associated with camera and image capture --> 2124 <!-- =========================================== --> 2125 <eat-comment /> 2126 2127 <!-- @SystemApi Allows disabling the transmit-indicator LED that is normally on when 2128 a camera is in use by an application. 2129 @hide --> 2130 <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED" 2131 android:protectionLevel="signature|privileged" /> 2132 2133 <!-- Allows sending the camera service notifications about system-wide events. 2134 @hide --> 2135 <permission android:name="android.permission.CAMERA_SEND_SYSTEM_EVENTS" 2136 android:protectionLevel="signature|privileged" /> 2137 2138 <!-- =========================================== --> 2139 <!-- Permissions associated with telephony state --> 2140 <!-- =========================================== --> 2141 <eat-comment /> 2142 2143 <!-- @SystemApi Allows granting runtime permissions to telephony related components. 2144 @hide --> 2145 <permission android:name="android.permission.GRANT_RUNTIME_PERMISSIONS_TO_TELEPHONY_DEFAULTS" 2146 android:protectionLevel="signature" /> 2147 2148 <!-- Allows modification of the telephony state - power on, mmi, etc. 2149 Does not include placing calls. 2150 <p>Not for use by third-party applications. --> 2151 <permission android:name="android.permission.MODIFY_PHONE_STATE" 2152 android:protectionLevel="signature|privileged" /> 2153 2154 <!-- Allows read only access to precise phone state. 2155 Allows reading of detailed information about phone state for special-use applications 2156 such as dialers, carrier applications, or ims applications. --> 2157 <permission android:name="android.permission.READ_PRECISE_PHONE_STATE" 2158 android:protectionLevel="signature|privileged" /> 2159 2160 <!-- @SystemApi Allows read access to privileged phone state. 2161 @hide Used internally. --> 2162 <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE" 2163 android:protectionLevel="signature|privileged" /> 2164 2165 <!-- @SystemApi Allows read access to emergency number information for ongoing calls or SMS 2166 sessions. 2167 @hide Used internally. --> 2168 <permission android:name="android.permission.READ_ACTIVE_EMERGENCY_SESSION" 2169 android:protectionLevel="signature" /> 2170 2171 <!-- Allows listen permission to always reported signal strength. 2172 @hide Used internally. --> 2173 <permission android:name="android.permission.LISTEN_ALWAYS_REPORTED_SIGNAL_STRENGTH" 2174 android:protectionLevel="signature" /> 2175 2176 <!-- @SystemApi Protects the ability to register any PhoneAccount with 2177 PhoneAccount#CAPABILITY_SIM_SUBSCRIPTION. This capability indicates that the PhoneAccount 2178 corresponds to a device SIM. 2179 @hide --> 2180 <permission android:name="android.permission.REGISTER_SIM_SUBSCRIPTION" 2181 android:protectionLevel="signature|privileged" /> 2182 2183 <!-- @SystemApi Protects the ability to register any PhoneAccount with 2184 PhoneAccount#CAPABILITY_CALL_PROVIDER. 2185 @hide --> 2186 <permission android:name="android.permission.REGISTER_CALL_PROVIDER" 2187 android:protectionLevel="signature|privileged" /> 2188 2189 <!-- @SystemApi Protects the ability to register any PhoneAccount with 2190 PhoneAccount#CAPABILITY_CONNECTION_MANAGER 2191 @hide --> 2192 <permission android:name="android.permission.REGISTER_CONNECTION_MANAGER" 2193 android:protectionLevel="signature|privileged" /> 2194 2195 <!-- Must be required by a {@link android.telecom.InCallService}, 2196 to ensure that only the system can bind to it. 2197 <p>Protection level: signature|privileged 2198 --> 2199 <permission android:name="android.permission.BIND_INCALL_SERVICE" 2200 android:protectionLevel="signature|privileged" /> 2201 2202 <!-- Allows the app to request network scans from telephony. 2203 <p>Not for use by third-party applications. 2204 @SystemApi @hide--> 2205 <permission android:name="android.permission.NETWORK_SCAN" 2206 android:protectionLevel="signature|privileged" /> 2207 2208 <!-- Must be required by a link {@link android.telephony.VisualVoicemailService} to ensure that 2209 only the system can bind to it. 2210 <p>Protection level: signature|privileged 2211 --> 2212 <permission 2213 android:name="android.permission.BIND_VISUAL_VOICEMAIL_SERVICE" 2214 android:protectionLevel="signature|privileged"/> 2215 2216 <!-- Must be required by a {@link android.telecom.CallScreeningService}, 2217 to ensure that only the system can bind to it. 2218 <p>Protection level: signature|privileged 2219 --> 2220 <permission android:name="android.permission.BIND_SCREENING_SERVICE" 2221 android:protectionLevel="signature|privileged" /> 2222 2223 <!-- Must be required by a {@link android.telecom.PhoneAccountSuggestionService}, 2224 to ensure that only the system can bind to it. 2225 <p>Protection level: signature 2226 @SystemApi 2227 @hide 2228 --> 2229 <permission android:name="android.permission.BIND_PHONE_ACCOUNT_SUGGESTION_SERVICE" 2230 android:protectionLevel="signature" /> 2231 2232 <!-- Must be required by a {@link android.telecom.CallRedirectionService}, 2233 to ensure that only the system can bind to it. 2234 <p>Protection level: signature|privileged 2235 --> 2236 <permission android:name="android.permission.BIND_CALL_REDIRECTION_SERVICE" 2237 android:protectionLevel="signature|privileged" /> 2238 2239 <!-- Must be required by a {@link android.telecom.ConnectionService}, 2240 to ensure that only the system can bind to it. 2241 @deprecated {@link android.telecom.ConnectionService}s should require 2242 android.permission.BIND_TELECOM_CONNECTION_SERVICE instead. 2243 @SystemApi 2244 @hide --> 2245 <permission android:name="android.permission.BIND_CONNECTION_SERVICE" 2246 android:protectionLevel="signature|privileged" /> 2247 2248 <!-- Must be required by a {@link android.telecom.ConnectionService}, 2249 to ensure that only the system can bind to it. 2250 <p>Protection level: signature|privileged 2251 --> 2252 <permission android:name="android.permission.BIND_TELECOM_CONNECTION_SERVICE" 2253 android:protectionLevel="signature|privileged" /> 2254 2255 <!-- @SystemApi Allows an application to control the in-call experience. 2256 @hide --> 2257 <permission android:name="android.permission.CONTROL_INCALL_EXPERIENCE" 2258 android:protectionLevel="signature|privileged" /> 2259 2260 <!-- Allows an application to receive STK related commands. 2261 @hide --> 2262 <permission android:name="android.permission.RECEIVE_STK_COMMANDS" 2263 android:protectionLevel="signature|privileged" /> 2264 2265 <!-- Allows an application to send EMBMS download intents to apps 2266 @hide --> 2267 <permission android:name="android.permission.SEND_EMBMS_INTENTS" 2268 android:protectionLevel="signature|privileged" /> 2269 2270 2271 <!-- Allows internal management of the sensor framework 2272 @hide --> 2273 <permission android:name="android.permission.MANAGE_SENSORS" 2274 android:protectionLevel="signature" /> 2275 2276 <!-- Must be required by an ImsService to ensure that only the 2277 system can bind to it. 2278 <p>Protection level: signature|privileged|vendorPrivileged 2279 @SystemApi 2280 @hide 2281 --> 2282 <permission android:name="android.permission.BIND_IMS_SERVICE" 2283 android:protectionLevel="signature|privileged|vendorPrivileged" /> 2284 2285 <!-- Must be required by a telephony data service to ensure that only the 2286 system can bind to it. 2287 <p>Protection level: signature 2288 @SystemApi 2289 @hide 2290 --> 2291 <permission android:name="android.permission.BIND_TELEPHONY_DATA_SERVICE" 2292 android:protectionLevel="signature" /> 2293 2294 <!-- Must be required by a NetworkService to ensure that only the 2295 system can bind to it. 2296 <p>Protection level: signature 2297 @SystemApi 2298 @hide 2299 --> 2300 <permission android:name="android.permission.BIND_TELEPHONY_NETWORK_SERVICE" 2301 android:protectionLevel="signature" /> 2302 2303 <!-- @SystemApi Allows an application to manage embedded subscriptions (those on a eUICC) 2304 through EuiccManager APIs. 2305 <p>Protection level: signature|privileged|development 2306 @hide 2307 --> 2308 <permission android:name="android.permission.WRITE_EMBEDDED_SUBSCRIPTIONS" 2309 android:protectionLevel="signature|privileged|development" /> 2310 2311 <!-- @SystemApi Must be required by an EuiccService to ensure that only the system can bind to 2312 it. 2313 <p>Protection level: signature 2314 @hide 2315 --> 2316 <permission android:name="android.permission.BIND_EUICC_SERVICE" 2317 android:protectionLevel="signature" /> 2318 2319 <!-- Required for reading information about carrier apps from SystemConfigManager. 2320 <p>Protection level: signature 2321 @SystemApi 2322 @hide 2323 --> 2324 <permission android:name="android.permission.READ_CARRIER_APP_INFO" 2325 android:protectionLevel="signature" /> 2326 2327 <!-- ================================== --> 2328 <!-- Permissions for sdcard interaction --> 2329 <!-- ================================== --> 2330 <eat-comment /> 2331 2332 <!-- @SystemApi @TestApi Allows an application to write to internal media storage 2333 @deprecated This permission is no longer honored in the system and no longer adds 2334 the media_rw gid as a supplementary gid to the holder. Use the 2335 android.permission.MANAGE_EXTERNAL_STORAGE instead. 2336 @hide --> 2337 <permission android:name="android.permission.WRITE_MEDIA_STORAGE" 2338 android:protectionLevel="signature|privileged" /> 2339 2340 <!-- Allows an application to manage access to documents, usually as part 2341 of a document picker. 2342 <p>This permission should <em>only</em> be requested by the platform 2343 document management app. This permission cannot be granted to 2344 third-party apps. 2345 --> 2346 <permission android:name="android.permission.MANAGE_DOCUMENTS" 2347 android:protectionLevel="signature|documenter" /> 2348 2349 <!-- Allows an application to manage access to crates, usually as part 2350 of a crates picker. 2351 <p>This permission should <em>only</em> be requested by the platform 2352 management app. This permission cannot be granted to 2353 third-party apps. 2354 @hide 2355 @TestApi 2356 --> 2357 <permission android:name="android.permission.MANAGE_CRATES" 2358 android:protectionLevel="signature" /> 2359 2360 <!-- @hide Allows an application to cache content. 2361 <p>Not for use by third-party applications. 2362 --> 2363 <permission android:name="android.permission.CACHE_CONTENT" 2364 android:protectionLevel="signature|documenter" /> 2365 2366 <!-- @SystemApi @hide 2367 Allows an application to aggressively allocate disk space. 2368 <p>Not for use by third-party applications. 2369 --> 2370 <permission android:name="android.permission.ALLOCATE_AGGRESSIVE" 2371 android:protectionLevel="signature|privileged" /> 2372 2373 <!-- @SystemApi @hide 2374 Allows an application to use reserved disk space. 2375 <p>Not for use by third-party applications. Should only be requested by 2376 apps that provide core system functionality, to ensure system stability 2377 when disk is otherwise completely full. 2378 --> 2379 <permission android:name="android.permission.USE_RESERVED_DISK" 2380 android:protectionLevel="signature|privileged" /> 2381 2382 <!-- ================================== --> 2383 <!-- Permissions for screenlock --> 2384 <!-- ================================== --> 2385 <eat-comment /> 2386 2387 <!-- Allows applications to disable the keyguard if it is not secure. 2388 <p>Protection level: normal 2389 --> 2390 <permission android:name="android.permission.DISABLE_KEYGUARD" 2391 android:description="@string/permdesc_disableKeyguard" 2392 android:label="@string/permlab_disableKeyguard" 2393 android:protectionLevel="normal" /> 2394 2395 <!-- Allows an application to request the screen lock complexity and prompt users to update the 2396 screen lock to a certain complexity level. 2397 <p>Protection level: normal 2398 --> 2399 <permission android:name="android.permission.REQUEST_PASSWORD_COMPLEXITY" 2400 android:label="@string/permlab_requestPasswordComplexity" 2401 android:description="@string/permdesc_requestPasswordComplexity" 2402 android:protectionLevel="normal" /> 2403 2404 <!-- ================================== --> 2405 <!-- Permissions to access other installed applications --> 2406 <!-- ================================== --> 2407 <eat-comment /> 2408 2409 <!-- @deprecated No longer enforced. --> 2410 <permission android:name="android.permission.GET_TASKS" 2411 android:label="@string/permlab_getTasks" 2412 android:description="@string/permdesc_getTasks" 2413 android:protectionLevel="normal" /> 2414 2415 <!-- New version of GET_TASKS that apps can request, since GET_TASKS doesn't really 2416 give access to task information. We need this new one because there are 2417 many existing apps that use add libraries and such that have validation 2418 code to ensure the app has requested the GET_TASKS permission by seeing 2419 if it has been granted the permission... if it hasn't, it kills the app 2420 with a message about being upset. So we need to have it continue to look 2421 like the app is getting that permission, even though it will never be 2422 checked, and new privileged apps can now request this one for real access. 2423 @hide 2424 @SystemApi --> 2425 <permission android:name="android.permission.REAL_GET_TASKS" 2426 android:protectionLevel="signature|privileged" /> 2427 2428 <!-- Allows an application to start a task from a ActivityManager#RecentTaskInfo. 2429 @hide --> 2430 <permission android:name="android.permission.START_TASKS_FROM_RECENTS" 2431 android:protectionLevel="signature|privileged" /> 2432 2433 <!-- @SystemApi @hide Allows an application to call APIs that allow it to do interactions 2434 across the users on the device, using singleton services and 2435 user-targeted broadcasts. This permission is not available to 2436 third party applications. --> 2437 <permission android:name="android.permission.INTERACT_ACROSS_USERS" 2438 android:protectionLevel="signature|privileged|development" /> 2439 2440 <!-- @SystemApi Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS} 2441 that removes restrictions on where broadcasts can be sent and allows other 2442 types of interactions 2443 @hide --> 2444 <permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL" 2445 android:protectionLevel="signature|installer" /> 2446 <uses-permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL" /> 2447 2448 <!-- Allows interaction across profiles in the same profile group. --> 2449 <permission android:name="android.permission.INTERACT_ACROSS_PROFILES" 2450 android:protectionLevel="signature|appop" /> 2451 2452 <!-- Allows configuring apps to have the INTERACT_ACROSS_PROFILES permission so that they can 2453 interact across profiles in the same profile group. 2454 @hide --> 2455 <permission android:name="android.permission.CONFIGURE_INTERACT_ACROSS_PROFILES" 2456 android:protectionLevel="signature" /> 2457 2458 <!-- @SystemApi @hide Allows an application to call APIs that allow it to query and manage 2459 users on the device. This permission is not available to 2460 third party applications. --> 2461 <permission android:name="android.permission.MANAGE_USERS" 2462 android:protectionLevel="signature|privileged" /> 2463 2464 <!-- @SystemApi @hide Allows an application to create, remove users and get the list of 2465 users on the device. Applications holding this permission can only create restricted, 2466 guest, managed, demo, and ephemeral users. For creating other kind of users, 2467 {@link android.Manifest.permission#MANAGE_USERS} is needed. 2468 This permission is not available to third party applications. --> 2469 <permission android:name="android.permission.CREATE_USERS" 2470 android:protectionLevel="signature" /> 2471 2472 <!-- @hide Allows an application to set the profile owners and the device owner. 2473 This permission is not available to third party applications.--> 2474 <permission android:name="android.permission.MANAGE_PROFILE_AND_DEVICE_OWNERS" 2475 android:protectionLevel="signature" 2476 android:label="@string/permlab_manageProfileAndDeviceOwners" 2477 android:description="@string/permdesc_manageProfileAndDeviceOwners" /> 2478 2479 <!-- Allows an application to get full detailed information about 2480 recently running tasks, with full fidelity to the real state. 2481 @hide --> 2482 <permission android:name="android.permission.GET_DETAILED_TASKS" 2483 android:protectionLevel="signature" /> 2484 2485 <!-- Allows an application to change the Z-order of tasks. 2486 <p>Protection level: normal 2487 --> 2488 <permission android:name="android.permission.REORDER_TASKS" 2489 android:label="@string/permlab_reorderTasks" 2490 android:description="@string/permdesc_reorderTasks" 2491 android:protectionLevel="normal" /> 2492 2493 <!-- @SystemApi @TestApi @hide Allows an application to change to remove/kill tasks --> 2494 <permission android:name="android.permission.REMOVE_TASKS" 2495 android:protectionLevel="signature|documenter" /> 2496 2497 <!-- @SystemApi @TestApi @hide Allows an application to create/manage/remove stacks --> 2498 <permission android:name="android.permission.MANAGE_ACTIVITY_STACKS" 2499 android:protectionLevel="signature" /> 2500 2501 <!-- @SystemApi @TestApi @hide Allows an application to embed other activities --> 2502 <permission android:name="android.permission.ACTIVITY_EMBEDDING" 2503 android:protectionLevel="signature|privileged" /> 2504 2505 <!-- Allows an application to start any activity, regardless of permission 2506 protection or exported state. 2507 @hide --> 2508 <permission android:name="android.permission.START_ANY_ACTIVITY" 2509 android:protectionLevel="signature" /> 2510 2511 <!-- Allows an application to start activities from background 2512 @hide --> 2513 <permission android:name="android.permission.START_ACTIVITIES_FROM_BACKGROUND" 2514 android:protectionLevel="signature|privileged|vendorPrivileged|oem|verifier" /> 2515 2516 <!-- @SystemApi Must be required by activities that handle the intent action 2517 {@link Intent#ACTION_SEND_SHOW_SUSPENDED_APP_DETAILS}. This is for use by apps that 2518 hold {@link Manifest.permission#SUSPEND_APPS} to interact with the system. 2519 <p>Not for use by third-party applications. 2520 @hide --> 2521 <permission android:name="android.permission.SEND_SHOW_SUSPENDED_APP_DETAILS" 2522 android:protectionLevel="signature" /> 2523 <uses-permission android:name="android.permission.SEND_SHOW_SUSPENDED_APP_DETAILS" /> 2524 2525 <!-- Allows an application to start an activity as another app, provided that app has been 2526 granted a permissionToken from the ActivityManagerService. 2527 @hide --> 2528 <permission android:name="android.permission.START_ACTIVITY_AS_CALLER" 2529 android:protectionLevel="signature" /> 2530 2531 <!-- @deprecated The {@link android.app.ActivityManager#restartPackage} 2532 API is no longer supported. --> 2533 <permission android:name="android.permission.RESTART_PACKAGES" 2534 android:label="@string/permlab_killBackgroundProcesses" 2535 android:description="@string/permdesc_killBackgroundProcesses" 2536 android:protectionLevel="normal" /> 2537 2538 <!-- Allows an application to call 2539 {@link android.app.ActivityManager#killBackgroundProcesses}. 2540 <p>Protection level: normal 2541 --> 2542 <permission android:name="android.permission.KILL_BACKGROUND_PROCESSES" 2543 android:label="@string/permlab_killBackgroundProcesses" 2544 android:description="@string/permdesc_killBackgroundProcesses" 2545 android:protectionLevel="normal" /> 2546 2547 <!-- @SystemApi @hide Allows an application to query process states and current 2548 OOM adjustment scores. 2549 <p>Not for use by third-party applications. --> 2550 <permission android:name="android.permission.GET_PROCESS_STATE_AND_OOM_SCORE" 2551 android:protectionLevel="signature|privileged|development" /> 2552 2553 <!-- Allows use of PendingIntent.getIntent(). 2554 @hide --> 2555 <permission android:name="android.permission.GET_INTENT_SENDER_INTENT" 2556 android:protectionLevel="signature" /> 2557 2558 <!-- ================================== --> 2559 <!-- Permissions affecting the display of other applications --> 2560 <!-- ================================== --> 2561 <eat-comment /> 2562 2563 <!-- Allows an app to create windows using the type 2564 {@link android.view.WindowManager.LayoutParams#TYPE_APPLICATION_OVERLAY}, 2565 shown on top of all other apps. Very few apps 2566 should use this permission; these windows are intended for 2567 system-level interaction with the user. 2568 2569 <p class="note"><strong>Note:</strong> If the app 2570 targets API level 23 or higher, the app user must explicitly grant 2571 this permission to the app through a permission management screen. The app requests 2572 the user's approval by sending an intent with action 2573 {@link android.provider.Settings#ACTION_MANAGE_OVERLAY_PERMISSION}. 2574 The app can check whether it has this authorization by calling 2575 {@link android.provider.Settings#canDrawOverlays 2576 Settings.canDrawOverlays()}. 2577 <p>Protection level: signature|preinstalled|appop|pre23|development --> 2578 <permission android:name="android.permission.SYSTEM_ALERT_WINDOW" 2579 android:label="@string/permlab_systemAlertWindow" 2580 android:description="@string/permdesc_systemAlertWindow" 2581 android:protectionLevel="signature|preinstalled|appop|pre23|development" /> 2582 2583 <!-- @deprecated Use {@link android.Manifest.permission#REQUEST_COMPANION_RUN_IN_BACKGROUND} 2584 @hide 2585 --> 2586 <permission android:name="android.permission.RUN_IN_BACKGROUND" 2587 android:label="@string/permlab_runInBackground" 2588 android:description="@string/permdesc_runInBackground" 2589 android:protectionLevel="signature" /> 2590 2591 <!-- @deprecated Use 2592 {@link android.Manifest.permission#REQUEST_COMPANION_USE_DATA_IN_BACKGROUND} 2593 @hide 2594 --> 2595 <permission android:name="android.permission.USE_DATA_IN_BACKGROUND" 2596 android:label="@string/permlab_useDataInBackground" 2597 android:description="@string/permdesc_useDataInBackground" 2598 android:protectionLevel="signature" /> 2599 2600 <!-- @hide Allows an application to set display offsets for the screen. 2601 This permission is not available to third party applications. --> 2602 <permission android:name="android.permission.SET_DISPLAY_OFFSET" 2603 android:protectionLevel="signature|privileged" /> 2604 2605 <!-- Allows a companion app to run in the background. 2606 <p>Protection level: normal 2607 --> 2608 <permission android:name="android.permission.REQUEST_COMPANION_RUN_IN_BACKGROUND" 2609 android:label="@string/permlab_runInBackground" 2610 android:description="@string/permdesc_runInBackground" 2611 android:protectionLevel="normal" /> 2612 2613 <!-- Allows a companion app to use data in the background. 2614 <p>Protection level: normal 2615 --> 2616 <permission android:name="android.permission.REQUEST_COMPANION_USE_DATA_IN_BACKGROUND" 2617 android:label="@string/permlab_useDataInBackground" 2618 android:description="@string/permdesc_useDataInBackground" 2619 android:protectionLevel="normal" /> 2620 2621 <!-- Allows a companion app to associate to Wi-Fi. 2622 <p>Only for use by a single pre-approved app. 2623 @hide 2624 @SystemApi 2625 --> 2626 <permission android:name="android.permission.COMPANION_APPROVE_WIFI_CONNECTIONS" 2627 android:protectionLevel="signature|privileged" /> 2628 2629 2630 <!-- ================================== --> 2631 <!-- Permissions affecting the system wallpaper --> 2632 <!-- ================================== --> 2633 <eat-comment /> 2634 2635 <!-- Allows applications to set the wallpaper. 2636 <p>Protection level: normal 2637 --> 2638 <permission android:name="android.permission.SET_WALLPAPER" 2639 android:label="@string/permlab_setWallpaper" 2640 android:description="@string/permdesc_setWallpaper" 2641 android:protectionLevel="normal" /> 2642 2643 <!-- Allows applications to set the wallpaper hints. 2644 <p>Protection level: normal 2645 --> 2646 <permission android:name="android.permission.SET_WALLPAPER_HINTS" 2647 android:label="@string/permlab_setWallpaperHints" 2648 android:description="@string/permdesc_setWallpaperHints" 2649 android:protectionLevel="normal" /> 2650 2651 <!-- Allow the app to read the system wallpaper image without 2652 holding the READ_EXTERNAL_STORAGE permission. 2653 <p>Not for use by third-party applications. 2654 @hide 2655 @SystemApi 2656 --> 2657 <permission android:name="android.permission.READ_WALLPAPER_INTERNAL" 2658 android:protectionLevel="signature|privileged" /> 2659 2660 <!-- ===================================================== --> 2661 <!-- Permissions for changing the system clock / time zone --> 2662 <!-- ===================================================== --> 2663 <eat-comment /> 2664 2665 <!-- Allows applications to set the system time directly. 2666 <p>Not for use by third-party applications. --> 2667 <permission android:name="android.permission.SET_TIME" 2668 android:protectionLevel="signature|privileged" /> 2669 2670 <!-- Allows applications to set the system time zone directly. 2671 <p>Not for use by third-party applications. 2672 --> 2673 <permission android:name="android.permission.SET_TIME_ZONE" 2674 android:label="@string/permlab_setTimeZone" 2675 android:description="@string/permdesc_setTimeZone" 2676 android:protectionLevel="signature|privileged" /> 2677 2678 <!-- Allows telephony to suggest the time / time zone. 2679 <p>Not for use by third-party applications. 2680 @hide 2681 --> 2682 <permission android:name="android.permission.SUGGEST_TELEPHONY_TIME_AND_ZONE" 2683 android:protectionLevel="signature" /> 2684 2685 <!-- Allows applications like settings to suggest the user's manually chosen time / time zone. 2686 <p>Not for use by third-party applications. 2687 @hide 2688 --> 2689 <permission android:name="android.permission.SUGGEST_MANUAL_TIME_AND_ZONE" 2690 android:protectionLevel="signature" /> 2691 2692 <!-- ==================================================== --> 2693 <!-- Permissions related to changing status bar --> 2694 <!-- ==================================================== --> 2695 <eat-comment /> 2696 2697 <!-- Allows an application to expand or collapse the status bar. 2698 <p>Protection level: normal 2699 --> 2700 <permission android:name="android.permission.EXPAND_STATUS_BAR" 2701 android:label="@string/permlab_expandStatusBar" 2702 android:description="@string/permdesc_expandStatusBar" 2703 android:protectionLevel="normal" /> 2704 2705 <!-- ============================================================== --> 2706 <!-- Permissions related to adding/removing shortcuts from Launcher --> 2707 <!-- ============================================================== --> 2708 <eat-comment /> 2709 2710 <!-- Allows an application to install a shortcut in Launcher. 2711 <p>In Android O (API level 26) and higher, the <code>INSTALL_SHORTCUT</code> broadcast no 2712 longer has any effect on your app because it's a private, implicit 2713 broadcast. Instead, you should create an app shortcut by using the 2714 {@link android.content.pm.ShortcutManager#requestPinShortcut requestPinShortcut()} 2715 method from the {@link android.content.pm.ShortcutManager} class. 2716 <p>Protection level: normal 2717 --> 2718 <permission android:name="com.android.launcher.permission.INSTALL_SHORTCUT" 2719 android:label="@string/permlab_install_shortcut" 2720 android:description="@string/permdesc_install_shortcut" 2721 android:protectionLevel="normal"/> 2722 2723 <!-- <p class="caution"><strong>Don't use this permission in your app.</strong><br>This 2724 permission is no longer supported. 2725 --> 2726 <permission android:name="com.android.launcher.permission.UNINSTALL_SHORTCUT" 2727 android:label="@string/permlab_uninstall_shortcut" 2728 android:description="@string/permdesc_uninstall_shortcut" 2729 android:protectionLevel="normal"/> 2730 2731 <!-- ==================================================== --> 2732 <!-- Permissions related to accessing sync settings --> 2733 <!-- ==================================================== --> 2734 <eat-comment /> 2735 2736 <!-- Allows applications to read the sync settings. 2737 <p>Protection level: normal 2738 --> 2739 <permission android:name="android.permission.READ_SYNC_SETTINGS" 2740 android:description="@string/permdesc_readSyncSettings" 2741 android:label="@string/permlab_readSyncSettings" 2742 android:protectionLevel="normal" /> 2743 2744 <!-- Allows applications to write the sync settings. 2745 <p>Protection level: normal 2746 --> 2747 <permission android:name="android.permission.WRITE_SYNC_SETTINGS" 2748 android:description="@string/permdesc_writeSyncSettings" 2749 android:label="@string/permlab_writeSyncSettings" 2750 android:protectionLevel="normal" /> 2751 2752 <!-- Allows applications to read the sync stats. 2753 <p>Protection level: normal 2754 --> 2755 <permission android:name="android.permission.READ_SYNC_STATS" 2756 android:description="@string/permdesc_readSyncStats" 2757 android:label="@string/permlab_readSyncStats" 2758 android:protectionLevel="normal" /> 2759 2760 <!-- ============================================ --> 2761 <!-- Permissions for low-level system interaction --> 2762 <!-- ============================================ --> 2763 <eat-comment /> 2764 2765 <!-- @SystemApi @hide Change the screen compatibility mode of applications --> 2766 <permission android:name="android.permission.SET_SCREEN_COMPATIBILITY" 2767 android:protectionLevel="signature" /> 2768 2769 <!-- Allows an application to modify the current configuration, such 2770 as locale. 2771 <p>Protection level: signature|privileged|development --> 2772 <permission android:name="android.permission.CHANGE_CONFIGURATION" 2773 android:protectionLevel="signature|privileged|development" /> 2774 2775 <!-- Allows an application to read or write the system settings. 2776 2777 <p class="note"><strong>Note:</strong> If the app targets API level 23 2778 or higher, the app user 2779 must explicitly grant this permission to the app through a permission management screen. 2780 The app requests the user's approval by sending an intent with action 2781 {@link android.provider.Settings#ACTION_MANAGE_WRITE_SETTINGS}. The app 2782 can check whether it has this authorization by calling {@link 2783 android.provider.Settings.System#canWrite Settings.System.canWrite()}. 2784 2785 <p>Protection level: signature|preinstalled|appop|pre23 2786 --> 2787 <permission android:name="android.permission.WRITE_SETTINGS" 2788 android:label="@string/permlab_writeSettings" 2789 android:description="@string/permdesc_writeSettings" 2790 android:protectionLevel="signature|preinstalled|appop|pre23" /> 2791 2792 <!-- Allows an application to modify the Google service map. 2793 <p>Not for use by third-party applications. --> 2794 <permission android:name="android.permission.WRITE_GSERVICES" 2795 android:protectionLevel="signature|privileged" /> 2796 2797 <!-- @SystemApi @TestApi @hide Allows an application to modify config settings. 2798 <p>Not for use by third-party applications. --> 2799 <permission android:name="android.permission.WRITE_DEVICE_CONFIG" 2800 android:protectionLevel="signature|verifier|configurator"/> 2801 2802 <!-- @SystemApi @hide Allows an application to read config settings. 2803 <p>Not for use by third-party applications. --> 2804 <permission android:name="android.permission.READ_DEVICE_CONFIG" 2805 android:protectionLevel="signature|preinstalled" /> 2806 2807 <!-- @hide Allows an application to monitor {@link android.provider.Settings.Config} access. 2808 <p>Not for use by third-party applications. --> 2809 <permission android:name="android.permission.MONITOR_DEVICE_CONFIG_ACCESS" 2810 android:protectionLevel="signature"/> 2811 2812 <!-- @SystemApi @TestApi Allows an application to call 2813 {@link android.app.ActivityManager#forceStopPackage}. 2814 @hide --> 2815 <permission android:name="android.permission.FORCE_STOP_PACKAGES" 2816 android:protectionLevel="signature|privileged" /> 2817 2818 <!-- @SystemApi @hide Allows an application to retrieve the content of the active window 2819 An active window is the window that has fired an accessibility event. --> 2820 <permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT" 2821 android:protectionLevel="signature|privileged" /> 2822 2823 <!-- Modify the global animation scaling factor. 2824 <p>Not for use by third-party applications. --> 2825 <permission android:name="android.permission.SET_ANIMATION_SCALE" 2826 android:protectionLevel="signature|privileged|development" /> 2827 2828 <!-- @deprecated This functionality will be removed in the future; please do 2829 not use. Allow an application to make its activities persistent. --> 2830 <permission android:name="android.permission.PERSISTENT_ACTIVITY" 2831 android:label="@string/permlab_persistentActivity" 2832 android:description="@string/permdesc_persistentActivity" 2833 android:protectionLevel="normal" /> 2834 2835 <!-- Allows an application to find out the space used by any package. 2836 <p>Protection level: normal 2837 --> 2838 <permission android:name="android.permission.GET_PACKAGE_SIZE" 2839 android:label="@string/permlab_getPackageSize" 2840 android:description="@string/permdesc_getPackageSize" 2841 android:protectionLevel="normal" /> 2842 2843 <!-- @deprecated No longer useful, see 2844 {@link android.content.pm.PackageManager#addPackageToPreferred} 2845 for details. --> 2846 <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS" 2847 android:protectionLevel="signature|installer|verifier" /> 2848 2849 <!-- Allows an application to receive the 2850 {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is 2851 broadcast after the system finishes booting. If you don't 2852 request this permission, you will not receive the broadcast at 2853 that time. Though holding this permission does not have any 2854 security implications, it can have a negative impact on the 2855 user experience by increasing the amount of time it takes the 2856 system to start and allowing applications to have themselves 2857 running without the user being aware of them. As such, you must 2858 explicitly declare your use of this facility to make that visible 2859 to the user. 2860 <p>Protection level: normal 2861 --> 2862 <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED" 2863 android:label="@string/permlab_receiveBootCompleted" 2864 android:description="@string/permdesc_receiveBootCompleted" 2865 android:protectionLevel="normal" /> 2866 2867 <!-- Allows an application to broadcast sticky intents. These are 2868 broadcasts whose data is held by the system after being finished, 2869 so that clients can quickly retrieve that data without having 2870 to wait for the next broadcast. 2871 <p>Protection level: normal 2872 --> 2873 <permission android:name="android.permission.BROADCAST_STICKY" 2874 android:label="@string/permlab_broadcastSticky" 2875 android:description="@string/permdesc_broadcastSticky" 2876 android:protectionLevel="normal" /> 2877 2878 <!-- Allows mounting and unmounting file systems for removable storage. 2879 <p>Not for use by third-party applications.--> 2880 <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS" 2881 android:protectionLevel="signature|privileged" /> 2882 2883 <!-- Allows formatting file systems for removable storage. 2884 <p>Not for use by third-party applications. --> 2885 <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS" 2886 android:protectionLevel="signature|privileged" /> 2887 2888 <!-- @hide --> 2889 <permission android:name="android.permission.STORAGE_INTERNAL" 2890 android:protectionLevel="signature" /> 2891 2892 <!-- Allows access to ASEC non-destructive API calls 2893 @hide --> 2894 <permission android:name="android.permission.ASEC_ACCESS" 2895 android:protectionLevel="signature" /> 2896 2897 <!-- Allows creation of ASEC volumes 2898 @hide --> 2899 <permission android:name="android.permission.ASEC_CREATE" 2900 android:protectionLevel="signature" /> 2901 2902 <!-- Allows destruction of ASEC volumes 2903 @hide --> 2904 <permission android:name="android.permission.ASEC_DESTROY" 2905 android:protectionLevel="signature" /> 2906 2907 <!-- Allows mount / unmount of ASEC volumes 2908 @hide --> 2909 <permission android:name="android.permission.ASEC_MOUNT_UNMOUNT" 2910 android:protectionLevel="signature" /> 2911 2912 <!-- Allows rename of ASEC volumes 2913 @hide --> 2914 <permission android:name="android.permission.ASEC_RENAME" 2915 android:protectionLevel="signature" /> 2916 2917 <!-- Allows applications to write the apn settings and read sensitive fields of 2918 an existing apn settings like user and password. 2919 <p>Not for use by third-party applications. --> 2920 <permission android:name="android.permission.WRITE_APN_SETTINGS" 2921 android:protectionLevel="signature|privileged" /> 2922 2923 <!-- Allows applications to change network connectivity state. 2924 <p>Protection level: normal 2925 --> 2926 <permission android:name="android.permission.CHANGE_NETWORK_STATE" 2927 android:description="@string/permdesc_changeNetworkState" 2928 android:label="@string/permlab_changeNetworkState" 2929 android:protectionLevel="normal" /> 2930 2931 <!-- Allows an application to clear the caches of all installed 2932 applications on the device. 2933 <p>Protection level: signature|privileged 2934 --> 2935 <permission android:name="android.permission.CLEAR_APP_CACHE" 2936 android:protectionLevel="signature|privileged" /> 2937 2938 <!-- @SystemApi Allows an application to use any media decoder when decoding for playback 2939 @hide --> 2940 <permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK" 2941 android:protectionLevel="signature|privileged" /> 2942 2943 <!-- @SystemApi Allows an application to install and/or uninstall CA certificates on 2944 behalf of the user. 2945 @hide --> 2946 <permission android:name="android.permission.MANAGE_CA_CERTIFICATES" 2947 android:protectionLevel="signature|privileged" /> 2948 2949 <!-- @SystemApi Allows an application to do certain operations needed for 2950 interacting with the recovery (system update) system. 2951 @hide --> 2952 <permission android:name="android.permission.RECOVERY" 2953 android:protectionLevel="signature|privileged" /> 2954 2955 <!-- @SystemApi Allows an application to read system update info. 2956 @hide --> 2957 <permission android:name="android.permission.READ_SYSTEM_UPDATE_INFO" 2958 android:protectionLevel="signature" /> 2959 2960 <!-- Allows the system to bind to an application's task services 2961 @hide --> 2962 <permission android:name="android.permission.BIND_JOB_SERVICE" 2963 android:protectionLevel="signature" /> 2964 <uses-permission android:name="android.permission.BIND_JOB_SERVICE"/> 2965 2966 <!-- Allows an application to initiate configuration updates 2967 <p>An application requesting this permission is responsible for 2968 verifying the source and integrity of any update before passing 2969 it off to the various individual installer components 2970 @hide --> 2971 <permission android:name="android.permission.UPDATE_CONFIG" 2972 android:protectionLevel="signature|privileged" /> 2973 2974 <!-- Allows an application to query the current time zone rules state 2975 on device. 2976 @SystemApi @hide --> 2977 <permission android:name="android.permission.QUERY_TIME_ZONE_RULES" 2978 android:protectionLevel="signature|privileged" /> 2979 2980 <!-- Allows a time zone rule updater application to request 2981 the system installs / uninstalls timezone rules. 2982 <p>An application requesting this permission is responsible for 2983 verifying the source and integrity of the update before passing 2984 it off to the installer components. 2985 @SystemApi @hide --> 2986 <permission android:name="android.permission.UPDATE_TIME_ZONE_RULES" 2987 android:protectionLevel="signature|privileged" /> 2988 2989 <!-- Must be required by a time zone rule updater application, 2990 to ensure that only the system can trigger it. 2991 @hide --> 2992 <permission android:name="android.permission.TRIGGER_TIME_ZONE_RULES_CHECK" 2993 android:protectionLevel="signature" /> 2994 <uses-permission android:name="android.permission.TRIGGER_TIME_ZONE_RULES_CHECK"/> 2995 2996 <!-- Allows the system to reset throttling in shortcut manager. 2997 @hide --> 2998 <permission android:name="android.permission.RESET_SHORTCUT_MANAGER_THROTTLING" 2999 android:protectionLevel="signature" /> 3000 3001 <!-- Allows the system to bind to the discovered Network Recommendation Service. 3002 @SystemApi @hide --> 3003 <permission android:name="android.permission.BIND_NETWORK_RECOMMENDATION_SERVICE" 3004 android:protectionLevel="signature" /> 3005 <uses-permission android:name="android.permission.BIND_NETWORK_RECOMMENDATION_SERVICE"/> 3006 3007 <!-- Allows an application to enable, disable and change priority of 3008 runtime resource overlays. 3009 @hide --> 3010 <permission android:name="android.permission.CHANGE_OVERLAY_PACKAGES" 3011 android:protectionLevel="signature|privileged" /> 3012 3013 <!-- ========================================= --> 3014 <!-- Permissions for special development tools --> 3015 <!-- ========================================= --> 3016 <eat-comment /> 3017 3018 <!-- Allows an application to read or write the secure system settings. 3019 <p>Not for use by third-party applications. --> 3020 <permission android:name="android.permission.WRITE_SECURE_SETTINGS" 3021 android:protectionLevel="signature|privileged|development" /> 3022 3023 <!-- Allows an application to retrieve state dump information from system services. 3024 <p>Not for use by third-party applications. --> 3025 <permission android:name="android.permission.DUMP" 3026 android:protectionLevel="signature|privileged|development" /> 3027 3028 <!-- Allows an application to read the low-level system log files. 3029 <p>Not for use by third-party applications, because 3030 Log entries can contain the user's private information. --> 3031 <permission android:name="android.permission.READ_LOGS" 3032 android:protectionLevel="signature|privileged|development" /> 3033 3034 <!-- Configure an application for debugging. 3035 <p>Not for use by third-party applications. --> 3036 <permission android:name="android.permission.SET_DEBUG_APP" 3037 android:protectionLevel="signature|privileged|development" /> 3038 3039 <!-- Allows an application to set the maximum number of (not needed) 3040 application processes that can be running. 3041 <p>Not for use by third-party applications. --> 3042 <permission android:name="android.permission.SET_PROCESS_LIMIT" 3043 android:protectionLevel="signature|privileged|development" /> 3044 3045 <!-- Allows an application to control whether activities are immediately 3046 finished when put in the background. 3047 <p>Not for use by third-party applications. --> 3048 <permission android:name="android.permission.SET_ALWAYS_FINISH" 3049 android:protectionLevel="signature|privileged|development" /> 3050 3051 <!-- Allow an application to request that a signal be sent to all persistent processes. 3052 <p>Not for use by third-party applications. --> 3053 <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES" 3054 android:protectionLevel="signature|privileged|development" /> 3055 3056 <!-- @hide @SystemApi @TestApi 3057 Allow an application to approve incident and bug reports to be 3058 shared off-device. There can be only one application installed on the 3059 device with this permission, and since this is a privileged permission, it 3060 must be in priv-app. 3061 <p>Not for use by third-party applications. --> 3062 <permission android:name="android.permission.APPROVE_INCIDENT_REPORTS" 3063 android:protectionLevel="signature|incidentReportApprover" /> 3064 3065 <!-- @hide Allow an application to approve an incident or bug report approval from 3066 the system. --> 3067 <permission android:name="android.permission.REQUEST_INCIDENT_REPORT_APPROVAL" 3068 android:protectionLevel="signature|privileged" /> 3069 3070 <!-- ==================================== --> 3071 <!-- Private permissions --> 3072 <!-- ==================================== --> 3073 <eat-comment /> 3074 3075 <!-- Allows access to the list of accounts in the Accounts Service. 3076 <p>Protection level: signature|privileged --> 3077 <permission android:name="android.permission.GET_ACCOUNTS_PRIVILEGED" 3078 android:protectionLevel="signature|privileged" /> 3079 3080 <!-- Allows but does not guarantee access to user passwords at the conclusion of add account 3081 @hide --> 3082 <permission android:name="android.permission.GET_PASSWORD" 3083 android:protectionLevel="signature" /> 3084 3085 <!-- Allows applications to RW to diagnostic resources. 3086 <p>Not for use by third-party applications. --> 3087 <permission android:name="android.permission.DIAGNOSTIC" 3088 android:protectionLevel="signature" /> 3089 3090 <!-- Allows an application to open, close, or disable the status bar 3091 and its icons. 3092 <p>Not for use by third-party applications. --> 3093 <permission android:name="android.permission.STATUS_BAR" 3094 android:protectionLevel="signature|privileged" /> 3095 3096 <!-- Allows an application to trigger bugreport via shell using the bugreport API. 3097 <p>Not for use by third-party applications. 3098 @hide 3099 --> 3100 <permission android:name="android.permission.TRIGGER_SHELL_BUGREPORT" 3101 android:protectionLevel="signature" /> 3102 3103 <!-- Allows an application to be the status bar. Currently used only by SystemUI.apk 3104 @hide --> 3105 <permission android:name="android.permission.STATUS_BAR_SERVICE" 3106 android:protectionLevel="signature" /> 3107 3108 <!-- Allows an application to bind to third party quick settings tiles. 3109 <p>Should only be requested by the System, should be required by 3110 TileService declarations.--> 3111 <permission android:name="android.permission.BIND_QUICK_SETTINGS_TILE" 3112 android:protectionLevel="signature" /> 3113 3114 <!-- Allows SystemUI to request third party controls. 3115 <p>Should only be requested by the System and required by 3116 {@link android.service.controls.ControlsProviderService} declarations. 3117 --> 3118 <permission android:name="android.permission.BIND_CONTROLS" 3119 android:protectionLevel="signature" /> 3120 3121 <!-- @SystemApi Allows an application to force a BACK operation on whatever is the 3122 top activity. 3123 <p>Not for use by third-party applications. 3124 @hide 3125 --> 3126 <permission android:name="android.permission.FORCE_BACK" 3127 android:protectionLevel="signature" /> 3128 3129 <!-- Allows an application to update device statistics. 3130 <p>Not for use by third-party applications. --> 3131 <permission android:name="android.permission.UPDATE_DEVICE_STATS" 3132 android:protectionLevel="signature|privileged" /> 3133 3134 <!-- @SystemApi @hide Allows an application to collect application operation statistics. 3135 Not for use by third party apps. --> 3136 <permission android:name="android.permission.GET_APP_OPS_STATS" 3137 android:protectionLevel="signature|privileged|development" /> 3138 3139 <!-- @SystemApi Allows an application to update application operation statistics. Not for 3140 use by third party apps. 3141 @hide --> 3142 <permission android:name="android.permission.UPDATE_APP_OPS_STATS" 3143 android:protectionLevel="signature|privileged|installer" /> 3144 3145 <!-- @SystemApi Allows an application to update the user app op restrictions. 3146 Not for use by third party apps. 3147 @hide --> 3148 <permission android:name="android.permission.MANAGE_APP_OPS_RESTRICTIONS" 3149 android:protectionLevel="signature|installer" /> 3150 3151 <!-- Allows an application to update the user app op modes. 3152 Not for use by third party apps. 3153 @hide --> 3154 <permission android:name="android.permission.MANAGE_APP_OPS_MODES" 3155 android:protectionLevel="signature|installer|verifier" /> 3156 3157 <!-- @SystemApi Allows an application to open windows that are for use by parts 3158 of the system user interface. 3159 <p>Not for use by third-party applications. 3160 @hide 3161 --> 3162 <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW" 3163 android:protectionLevel="signature" /> 3164 3165 <!-- @SystemApi Allows an application to use 3166 {@link android.view.WindowManager.LayoutsParams#SYSTEM_FLAG_HIDE_NON_SYSTEM_OVERLAY_WINDOWS} 3167 to hide non-system-overlay windows. 3168 <p>Not for use by third-party applications. 3169 @hide 3170 --> 3171 <permission android:name="android.permission.HIDE_NON_SYSTEM_OVERLAY_WINDOWS" 3172 android:protectionLevel="signature|preinstalled" /> 3173 3174 <!-- @SystemApi Allows an application to manage (create, destroy, 3175 Z-order) application tokens in the window manager. 3176 <p>Not for use by third-party applications. 3177 @hide 3178 --> 3179 <permission android:name="android.permission.MANAGE_APP_TOKENS" 3180 android:protectionLevel="signature" /> 3181 3182 <!-- Allows System UI to register listeners for events from Window Manager. 3183 @hide --> 3184 <permission android:name="android.permission.REGISTER_WINDOW_MANAGER_LISTENERS" 3185 android:protectionLevel="signature" /> 3186 3187 <!-- @hide Allows the application to temporarily freeze the screen for a 3188 full-screen transition. --> 3189 <permission android:name="android.permission.FREEZE_SCREEN" 3190 android:protectionLevel="signature" /> 3191 3192 <!-- @SystemApi Allows an application to inject user events (keys, touch, trackball) 3193 into the event stream and deliver them to ANY window. Without this 3194 permission, you can only deliver events to windows in your own process. 3195 <p>Not for use by third-party applications. 3196 @hide 3197 --> 3198 <permission android:name="android.permission.INJECT_EVENTS" 3199 android:protectionLevel="signature" /> 3200 3201 <!-- @hide Allows an application to register an input filter which filters the stream 3202 of user events (keys, touch, trackball) before they are dispatched to any window. --> 3203 <permission android:name="android.permission.FILTER_EVENTS" 3204 android:protectionLevel="signature" /> 3205 3206 <!-- @hide Allows an application to retrieve the window token from the accessibility manager. --> 3207 <permission android:name="android.permission.RETRIEVE_WINDOW_TOKEN" 3208 android:protectionLevel="signature" /> 3209 3210 <!-- @hide Allows an application to modify accessibility information from another app. --> 3211 <permission android:name="android.permission.MODIFY_ACCESSIBILITY_DATA" 3212 android:protectionLevel="signature" /> 3213 3214 <!-- @hide Allows an application to perform accessibility operations (e.g. send events) on 3215 behalf of another package. --> 3216 <permission android:name="android.permission.ACT_AS_PACKAGE_FOR_ACCESSIBILITY" 3217 android:protectionLevel="signature" /> 3218 3219 <!-- @hide Allows an application to change the accessibility volume. --> 3220 <permission android:name="android.permission.CHANGE_ACCESSIBILITY_VOLUME" 3221 android:protectionLevel="signature" /> 3222 3223 <!-- @hide Allows an application to collect frame statistics --> 3224 <permission android:name="android.permission.FRAME_STATS" 3225 android:protectionLevel="signature" /> 3226 3227 <!-- @hide Allows an application to temporary enable accessibility on the device. --> 3228 <permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY" 3229 android:protectionLevel="signature" /> 3230 3231 <!-- @SystemApi Allows an application to launch detail settings activity of a particular 3232 accessibility service. 3233 <p>Not for use by third-party applications. 3234 @hide --> 3235 <permission android:name="android.permission.OPEN_ACCESSIBILITY_DETAILS_SETTINGS" 3236 android:protectionLevel="signature|installer" /> 3237 3238 <!-- @SystemApi Allows an application to watch and control how activities are 3239 started globally in the system. Only for is in debugging 3240 (usually the monkey command). 3241 <p>Not for use by third-party applications. 3242 @hide 3243 --> 3244 <permission android:name="android.permission.SET_ACTIVITY_WATCHER" 3245 android:protectionLevel="signature" /> 3246 3247 <!-- @SystemApi Allows an application to call the activity manager shutdown() API 3248 to put the higher-level system there into a shutdown state. 3249 @hide --> 3250 <permission android:name="android.permission.SHUTDOWN" 3251 android:protectionLevel="signature|privileged" /> 3252 3253 <!-- @SystemApi Allows an application to tell the activity manager to temporarily 3254 stop application switches, putting it into a special mode that 3255 prevents applications from immediately switching away from some 3256 critical UI such as the home screen. 3257 @hide --> 3258 <permission android:name="android.permission.STOP_APP_SWITCHES" 3259 android:protectionLevel="signature|privileged" /> 3260 3261 <!-- @SystemApi Allows an application to retrieve private information about 3262 the current top activity, such as any assist context it can provide. 3263 <p>Not for use by third-party applications. 3264 @hide 3265 --> 3266 <permission android:name="android.permission.GET_TOP_ACTIVITY_INFO" 3267 android:protectionLevel="signature" /> 3268 3269 <!-- Allows an application to retrieve the current state of keys and 3270 switches. 3271 <p>Not for use by third-party applications. 3272 @deprecated The API that used this permission has been removed. --> 3273 <permission android:name="android.permission.READ_INPUT_STATE" 3274 android:protectionLevel="signature" /> 3275 3276 <!-- Must be required by an {@link android.inputmethodservice.InputMethodService}, 3277 to ensure that only the system can bind to it. 3278 <p>Protection level: signature 3279 --> 3280 <permission android:name="android.permission.BIND_INPUT_METHOD" 3281 android:protectionLevel="signature" /> 3282 3283 <!-- Must be required by an {@link android.media.midi.MidiDeviceService}, 3284 to ensure that only the system can bind to it. 3285 <p>Protection level: signature 3286 --> 3287 <permission android:name="android.permission.BIND_MIDI_DEVICE_SERVICE" 3288 android:protectionLevel="signature" /> 3289 3290 <!-- Must be required by an {@link android.accessibilityservice.AccessibilityService}, 3291 to ensure that only the system can bind to it. 3292 <p>Protection level: signature 3293 --> 3294 <permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE" 3295 android:protectionLevel="signature" /> 3296 3297 <!-- Must be required by a {@link android.printservice.PrintService}, 3298 to ensure that only the system can bind to it. 3299 <p>Protection level: signature 3300 --> 3301 <permission android:name="android.permission.BIND_PRINT_SERVICE" 3302 android:protectionLevel="signature" /> 3303 3304 <!-- Must be required by a {@link android.printservice.recommendation.RecommendationService}, 3305 to ensure that only the system can bind to it. 3306 @hide 3307 @SystemApi 3308 <p>Protection level: signature 3309 --> 3310 <permission android:name="android.permission.BIND_PRINT_RECOMMENDATION_SERVICE" 3311 android:protectionLevel="signature" /> 3312 3313 <!-- Allows applications to get the installed and enabled print services. 3314 @hide 3315 @SystemApi 3316 <p>Protection level: signature|preinstalled 3317 --> 3318 <permission android:name="android.permission.READ_PRINT_SERVICES" 3319 android:protectionLevel="signature|preinstalled" /> 3320 3321 <!-- Allows applications to get the currently recommended print services for printers. 3322 @hide 3323 @SystemApi 3324 <p>Protection level: signature|preinstalled 3325 --> 3326 <permission android:name="android.permission.READ_PRINT_SERVICE_RECOMMENDATIONS" 3327 android:protectionLevel="signature|preinstalled" /> 3328 3329 <!-- Must be required by a {@link android.nfc.cardemulation.HostApduService} 3330 or {@link android.nfc.cardemulation.OffHostApduService} to ensure that only 3331 the system can bind to it. 3332 <p>Protection level: signature 3333 --> 3334 <permission android:name="android.permission.BIND_NFC_SERVICE" 3335 android:protectionLevel="signature" /> 3336 3337 <!-- Must be required by a {@link android.service.quickaccesswallet.QuickAccessWalletService} 3338 to ensure that only the system can bind to it. 3339 <p>Protection level: signature 3340 --> 3341 <permission android:name="android.permission.BIND_QUICK_ACCESS_WALLET_SERVICE" 3342 android:protectionLevel="signature" /> 3343 3344 <!-- Must be required by the PrintSpooler to ensure that only the system can bind to it. 3345 @hide --> 3346 <permission android:name="android.permission.BIND_PRINT_SPOOLER_SERVICE" 3347 android:protectionLevel="signature" /> 3348 3349 <!-- Must be required by the CompanionDeviceManager to ensure that only the system can bind to it. 3350 @hide --> 3351 <permission android:name="android.permission.BIND_COMPANION_DEVICE_MANAGER_SERVICE" 3352 android:protectionLevel="signature" /> 3353 3354 <!-- @SystemApi Must be required by the RuntimePermissionPresenterService to ensure 3355 that only the system can bind to it. 3356 @hide --> 3357 <permission android:name="android.permission.BIND_RUNTIME_PERMISSION_PRESENTER_SERVICE" 3358 android:protectionLevel="signature" /> 3359 3360 <!-- Must be required by a TextService (e.g. SpellCheckerService) 3361 to ensure that only the system can bind to it. 3362 <p>Protection level: signature 3363 --> 3364 <permission android:name="android.permission.BIND_TEXT_SERVICE" 3365 android:protectionLevel="signature" /> 3366 3367 <!-- @SystemApi Must be required by a AttentionService 3368 to ensure that only the system can bind to it. 3369 <p>Protection level: signature 3370 @hide 3371 --> 3372 <permission android:name="android.permission.BIND_ATTENTION_SERVICE" 3373 android:protectionLevel="signature" /> 3374 <uses-permission android:name="android.permission.BIND_ATTENTION_SERVICE" /> 3375 3376 <!-- Must be required by a {@link android.net.VpnService}, 3377 to ensure that only the system can bind to it. 3378 <p>Protection level: signature 3379 --> 3380 <permission android:name="android.permission.BIND_VPN_SERVICE" 3381 android:protectionLevel="signature" /> 3382 3383 <!-- Must be required by a {@link android.service.wallpaper.WallpaperService}, 3384 to ensure that only the system can bind to it. 3385 <p>Protection level: signature|privileged 3386 --> 3387 <permission android:name="android.permission.BIND_WALLPAPER" 3388 android:protectionLevel="signature|privileged" /> 3389 3390 <!-- Must be required by a {@link android.service.voice.VoiceInteractionService}, 3391 to ensure that only the system can bind to it. 3392 <p>Protection level: signature 3393 --> 3394 <permission android:name="android.permission.BIND_VOICE_INTERACTION" 3395 android:protectionLevel="signature" /> 3396 3397 <!-- Must be required by a {@link android.service.autofill.AutofillService}, 3398 to ensure that only the system can bind to it. 3399 <p>Protection level: signature 3400 --> 3401 <permission android:name="android.permission.BIND_AUTOFILL_SERVICE" 3402 android:protectionLevel="signature" /> 3403 3404 <!-- Alternative version of android.permission.BIND_AUTOFILL_FIELD_CLASSIFICATION_SERVICE. 3405 This permission was renamed during the O previews but it was supported on the final O 3406 release, so we need to carry it over. 3407 <p>Protection level: signature 3408 @hide 3409 --> 3410 <permission android:name="android.permission.BIND_AUTOFILL" 3411 android:protectionLevel="signature" /> 3412 3413 <!-- Must be required by an {@link android.service.autofill.AutofillFieldClassificationService} 3414 to ensure that only the system can bind to it. 3415 @hide This is not a third-party API (intended for OEMs and system apps). 3416 --> 3417 <permission android:name="android.permission.BIND_AUTOFILL_FIELD_CLASSIFICATION_SERVICE" 3418 android:protectionLevel="signature" /> 3419 3420 <!-- Must be required by an {@link android.service.autofill.InlineSuggestionRenderService} 3421 to ensure that only the system can bind to it. 3422 @hide This is not a third-party API (intended for OEMs and system apps). 3423 --> 3424 <permission android:name="android.permission.BIND_INLINE_SUGGESTION_RENDER_SERVICE" 3425 android:protectionLevel="signature" /> 3426 3427 <!-- Must be required by a android.service.textclassifier.TextClassifierService, 3428 to ensure that only the system can bind to it. 3429 @SystemApi @hide This is not a third-party API (intended for OEMs and system apps). 3430 <p>Protection level: signature 3431 --> 3432 <permission android:name="android.permission.BIND_TEXTCLASSIFIER_SERVICE" 3433 android:protectionLevel="signature" /> 3434 3435 <!-- Must be required by a android.service.contentcapture.ContentCaptureService, 3436 to ensure that only the system can bind to it. 3437 @SystemApi @hide This is not a third-party API (intended for OEMs and system apps). 3438 <p>Protection level: signature 3439 --> 3440 <permission android:name="android.permission.BIND_CONTENT_CAPTURE_SERVICE" 3441 android:protectionLevel="signature" /> 3442 3443 <!-- Must be required by a android.service.contentsuggestions.ContentSuggestionsService, 3444 to ensure that only the system can bind to it. 3445 @SystemApi @hide This is not a third-party API (intended for OEMs and system apps). 3446 <p>Protection level: signature 3447 --> 3448 <permission android:name="android.permission.BIND_CONTENT_SUGGESTIONS_SERVICE" 3449 android:protectionLevel="signature" /> 3450 3451 <!-- Must be required by a android.service.autofill.augmented.AugmentedAutofillService, 3452 to ensure that only the system can bind to it. 3453 @SystemApi @hide This is not a third-party API (intended for OEMs and system apps). 3454 <p>Protection level: signature 3455 --> 3456 <permission android:name="android.permission.BIND_AUGMENTED_AUTOFILL_SERVICE" 3457 android:protectionLevel="signature" /> 3458 3459 <!-- Must be required by a {@link android.service.voice.VoiceInteractionService} implementation 3460 to enroll its own sound models. This is a more restrictive permission than the higher-level 3461 permission KEYPHRASE_ENROLLMENT_APPLICATION. For the caller to enroll sound models with 3462 this permission, it must hold the permission and be the active VoiceInteractionService in 3463 the system. 3464 {@see Settings.Secure.VOICE_INTERACTION_SERVICE} 3465 @hide --> 3466 <permission android:name="android.permission.MANAGE_VOICE_KEYPHRASES" 3467 android:protectionLevel="signature|privileged" /> 3468 3469 <!-- Must be required by a keyphrase enrollment application, to enroll sound models. This is 3470 treated as a higher-level permission to MANAGE_VOICE_KEYPHRASES as a caller can enroll 3471 sound models at any time. This permission should be reserved for system enrollment 3472 applications detected by {@link android.hardware.soundtrigger.KeyphraseEnrollmentInfo} 3473 only. 3474 @hide <p>Not for use by third-party applications.</p> --> 3475 <permission android:name="android.permission.KEYPHRASE_ENROLLMENT_APPLICATION" 3476 android:protectionLevel="signature|privileged" /> 3477 3478 <!-- Must be required by a {@link com.android.media.remotedisplay.RemoteDisplayProvider}, 3479 to ensure that only the system can bind to it. 3480 @hide --> 3481 <permission android:name="android.permission.BIND_REMOTE_DISPLAY" 3482 android:protectionLevel="signature" /> 3483 3484 <!-- Must be required by a {@link android.media.tv.TvInputService} 3485 to ensure that only the system can bind to it. 3486 <p>Protection level: signature|privileged 3487 --> 3488 <permission android:name="android.permission.BIND_TV_INPUT" 3489 android:protectionLevel="signature|privileged" /> 3490 3491 <!-- @SystemApi 3492 Must be required by a {@link com.android.media.tv.remoteprovider.TvRemoteProvider} 3493 to ensure that only the system can bind to it. 3494 <p>Protection level: signature|privileged 3495 <p>Not for use by third-party applications. </p> 3496 @hide --> 3497 <permission android:name="android.permission.BIND_TV_REMOTE_SERVICE" 3498 android:protectionLevel="signature|privileged" /> 3499 3500 <!-- @SystemApi 3501 Must be required for a virtual remote controller for TV. 3502 <p>Protection level: signature|privileged 3503 <p>Not for use by third-party applications. </p> 3504 @hide --> 3505 <permission android:name="android.permission.TV_VIRTUAL_REMOTE_CONTROLLER" 3506 android:protectionLevel="signature|privileged" /> 3507 3508 <!-- Allows an application to change HDMI CEC active source. 3509 <p>Not for use by third-party applications. 3510 @hide --> 3511 <permission android:name="android.permission.CHANGE_HDMI_CEC_ACTIVE_SOURCE" 3512 android:protectionLevel="signature|privileged" /> 3513 3514 <!-- @SystemApi Allows an application to modify parental controls 3515 <p>Not for use by third-party applications. 3516 @hide --> 3517 <permission android:name="android.permission.MODIFY_PARENTAL_CONTROLS" 3518 android:protectionLevel="signature|privileged" /> 3519 3520 <!-- @SystemApi Allows an application to read TvContentRatingSystemInfo 3521 <p>Not for use by third-party applications. 3522 @hide --> 3523 <permission android:name="android.permission.READ_CONTENT_RATING_SYSTEMS" 3524 android:protectionLevel="signature|privileged" /> 3525 3526 <!-- Allows an application to notify TV inputs by sending broadcasts. 3527 <p>Protection level: signature|privileged 3528 <p>Not for use by third-party applications. 3529 @hide @SystemApi --> 3530 <permission android:name="android.permission.NOTIFY_TV_INPUTS" 3531 android:protectionLevel="signature|privileged" /> 3532 3533 <!-- This permission is required among systems services when accessing 3534 tuner resource management related APIs or information. 3535 <p>Protection level: signature|privileged 3536 <p>Not for use by third-party applications. 3537 @hide --> 3538 <permission android:name="android.permission.TUNER_RESOURCE_ACCESS" 3539 android:protectionLevel="signature|privileged" /> 3540 3541 <!-- This permission is required by Media Resource Manager Service when 3542 accessing its overridePid Api. 3543 <p>Protection level: signature 3544 <p>Not for use by third-party applications. 3545 @hide --> 3546 <permission android:name="android.permission.MEDIA_RESOURCE_OVERRIDE_PID" 3547 android:protectionLevel="signature" /> 3548 <uses-permission android:name="android.permission.MEDIA_RESOURCE_OVERRIDE_PID" /> 3549 3550 3551 <!-- Must be required by a {@link android.media.routing.MediaRouteService} 3552 to ensure that only the system can interact with it. 3553 @hide --> 3554 <permission android:name="android.permission.BIND_ROUTE_PROVIDER" 3555 android:protectionLevel="signature" /> 3556 3557 <!-- Must be required by device administration receiver, to ensure that only the 3558 system can interact with it. 3559 <p>Protection level: signature 3560 --> 3561 <permission android:name="android.permission.BIND_DEVICE_ADMIN" 3562 android:protectionLevel="signature" /> 3563 3564 <!-- @SystemApi Required to add or remove another application as a device admin. 3565 <p>Not for use by third-party applications. 3566 @hide 3567 @removed --> 3568 <permission android:name="android.permission.MANAGE_DEVICE_ADMINS" 3569 android:protectionLevel="signature" /> 3570 3571 <!-- @SystemApi Allows an app to reset the device password. 3572 <p>Not for use by third-party applications. 3573 @hide --> 3574 <permission android:name="android.permission.RESET_PASSWORD" 3575 android:protectionLevel="signature|privileged" /> 3576 3577 <!-- @SystemApi Allows an app to lock the device. 3578 <p>Not for use by third-party applications. 3579 @hide --> 3580 <permission android:name="android.permission.LOCK_DEVICE" 3581 android:protectionLevel="signature|privileged" /> 3582 3583 <!-- @SystemApi Allows low-level access to setting the orientation (actually 3584 rotation) of the screen. 3585 <p>Not for use by third-party applications. 3586 @hide 3587 --> 3588 <permission android:name="android.permission.SET_ORIENTATION" 3589 android:protectionLevel="signature" /> 3590 3591 <!-- @SystemApi Allows low-level access to setting the pointer speed. 3592 <p>Not for use by third-party applications. 3593 @hide 3594 --> 3595 <permission android:name="android.permission.SET_POINTER_SPEED" 3596 android:protectionLevel="signature" /> 3597 3598 <!-- Allows low-level access to setting input device calibration. 3599 <p>Not for use by normal applications. 3600 @hide --> 3601 <permission android:name="android.permission.SET_INPUT_CALIBRATION" 3602 android:protectionLevel="signature" /> 3603 3604 <!-- Allows low-level access to setting the keyboard layout. 3605 <p>Not for use by third-party applications. 3606 @hide --> 3607 <permission android:name="android.permission.SET_KEYBOARD_LAYOUT" 3608 android:protectionLevel="signature" /> 3609 3610 <!-- Allows an application to query tablet mode state and monitor changes 3611 in it. 3612 <p>Not for use by third-party applications. 3613 @hide --> 3614 <permission android:name="android.permission.TABLET_MODE" 3615 android:protectionLevel="signature" /> 3616 3617 <!-- Allows an application to request installing packages. Apps 3618 targeting APIs greater than 25 must hold this permission in 3619 order to use {@link android.content.Intent#ACTION_INSTALL_PACKAGE}. 3620 <p>Protection level: signature 3621 --> 3622 <permission android:name="android.permission.REQUEST_INSTALL_PACKAGES" 3623 android:label="@string/permlab_requestInstallPackages" 3624 android:description="@string/permdesc_requestInstallPackages" 3625 android:protectionLevel="signature|appop" /> 3626 3627 <!-- Allows an application to request deleting packages. Apps 3628 targeting APIs {@link android.os.Build.VERSION_CODES#P} or greater must hold this 3629 permission in order to use {@link android.content.Intent#ACTION_UNINSTALL_PACKAGE} or 3630 {@link android.content.pm.PackageInstaller#uninstall}. 3631 <p>Protection level: normal 3632 --> 3633 <permission android:name="android.permission.REQUEST_DELETE_PACKAGES" 3634 android:label="@string/permlab_requestDeletePackages" 3635 android:description="@string/permdesc_requestDeletePackages" 3636 android:protectionLevel="normal" /> 3637 3638 <!-- Allows an application to install packages. 3639 <p>Not for use by third-party applications. --> 3640 <permission android:name="android.permission.INSTALL_PACKAGES" 3641 android:protectionLevel="signature|privileged" /> 3642 3643 <!-- @SystemApi Allows an application to install self updates. This is a limited version 3644 of {@link android.Manifest.permission#INSTALL_PACKAGES}. 3645 <p>Not for use by third-party applications. 3646 @hide 3647 --> 3648 <permission android:name="android.permission.INSTALL_SELF_UPDATES" 3649 android:protectionLevel="signature|privileged" /> 3650 3651 <!-- @SystemApi Allows an application to install updates. This is a limited version 3652 of {@link android.Manifest.permission#INSTALL_PACKAGES}. 3653 <p>Not for use by third-party applications. 3654 @hide 3655 --> 3656 <permission android:name="android.permission.INSTALL_PACKAGE_UPDATES" 3657 android:protectionLevel="signature|privileged" /> 3658 3659 <!-- Allows an application to install existing system packages. This is a limited 3660 version of {@link android.Manifest.permission#INSTALL_PACKAGES}. 3661 <p>Not for use by third-party applications. 3662 TODO(b/80204953): remove this permission once we have a long-term solution. 3663 @hide 3664 --> 3665 <permission android:name="com.android.permission.INSTALL_EXISTING_PACKAGES" 3666 android:protectionLevel="signature|privileged" /> 3667 3668 <!-- Allows an application to use the package installer v2 APIs. 3669 <p>The package installer v2 APIs are still a work in progress and we're 3670 currently validating they work in all scenarios. 3671 <p>Not for use by third-party applications. 3672 TODO(b/152310230): use this permission to protect only Incremental installations 3673 once the APIs are confirmed to be sufficient. 3674 @hide 3675 --> 3676 <permission android:name="com.android.permission.USE_INSTALLER_V2" 3677 android:protectionLevel="signature|verifier" /> 3678 3679 <!-- @SystemApi @TestApi Allows an application to clear user data. 3680 <p>Not for use by third-party applications 3681 @hide 3682 --> 3683 <permission android:name="android.permission.CLEAR_APP_USER_DATA" 3684 android:protectionLevel="signature|installer" /> 3685 3686 <!-- @hide Allows an application to get the URI permissions 3687 granted to another application. 3688 <p>Not for use by third-party applications 3689 --> 3690 <permission android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS" 3691 android:protectionLevel="signature" /> 3692 3693 <!-- @hide Allows an application to clear the URI permissions 3694 granted to another application. 3695 <p>Not for use by third-party applications 3696 --> 3697 <permission 3698 android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS" 3699 android:protectionLevel="signature" /> 3700 3701 <!-- @hide 3702 Allows an application to change the status of Scoped Access Directory requests granted or 3703 rejected by the user. 3704 <p>This permission should <em>only</em> be requested by the platform 3705 settings app. This permission cannot be granted to third-party apps. 3706 <p>Protection level: signature 3707 --> 3708 <permission 3709 android:name="android.permission.MANAGE_SCOPED_ACCESS_DIRECTORY_PERMISSIONS" 3710 android:protectionLevel="signature" /> 3711 3712 <!-- @hide 3713 Allows an application to change the status of a persistable URI permission granted 3714 to another application. 3715 <p>This permission should <em>only</em> be requested by the platform 3716 settings app. This permission cannot be granted to third-party apps. 3717 <p>Protection level: signature 3718 --> 3719 <permission android:name="android.permission.FORCE_PERSISTABLE_URI_PERMISSIONS" 3720 android:protectionLevel="signature" /> 3721 3722 <!-- Old permission for deleting an app's cache files, no longer used, 3723 but signals for us to quietly ignore calls instead of throwing an exception. 3724 <p>Protection level: signature|privileged --> 3725 <permission android:name="android.permission.DELETE_CACHE_FILES" 3726 android:protectionLevel="signature|privileged" /> 3727 3728 <!-- Allows an application to delete cache files. 3729 @hide --> 3730 <permission android:name="android.permission.INTERNAL_DELETE_CACHE_FILES" 3731 android:protectionLevel="signature" /> 3732 3733 <!-- Allows an application to delete packages. 3734 <p>Not for use by third-party applications. 3735 <p>Starting in {@link android.os.Build.VERSION_CODES#N}, user confirmation is requested 3736 when the application deleting the package is not the same application that installed the 3737 package. --> 3738 <permission android:name="android.permission.DELETE_PACKAGES" 3739 android:protectionLevel="signature|privileged" /> 3740 3741 <!-- @SystemApi Allows an application to move location of installed package. 3742 @hide --> 3743 <permission android:name="android.permission.MOVE_PACKAGE" 3744 android:protectionLevel="signature|privileged" /> 3745 3746 <!-- Allows an application to change whether an application component (other than its own) is 3747 enabled or not. 3748 <p>Not for use by third-party applications. --> 3749 <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE" 3750 android:protectionLevel="signature|privileged" /> 3751 3752 <!-- @SystemApi Allows an application to grant specific permissions. 3753 @hide --> 3754 <permission android:name="android.permission.GRANT_RUNTIME_PERMISSIONS" 3755 android:protectionLevel="signature|installer|verifier" /> 3756 3757 <!-- @SystemApi Allows an app that has this permission and the permissions to install packages 3758 to request certain runtime permissions to be granted at installation. 3759 @hide --> 3760 <permission android:name="android.permission.INSTALL_GRANT_RUNTIME_PERMISSIONS" 3761 android:protectionLevel="signature|installer|verifier" /> 3762 3763 <!-- @SystemApi Allows an application to revoke specific permissions. 3764 @hide --> 3765 <permission android:name="android.permission.REVOKE_RUNTIME_PERMISSIONS" 3766 android:protectionLevel="signature|installer|verifier" /> 3767 3768 <!-- @SystemApi Allows the system to read runtime permission state. 3769 @hide --> 3770 <permission android:name="android.permission.GET_RUNTIME_PERMISSIONS" 3771 android:protectionLevel="signature" /> 3772 3773 <!-- @SystemApi Allows the system to restore runtime permission state. This might grant 3774 permissions, hence this is a more scoped, less powerful variant of GRANT_RUNTIME_PERMISSIONS. 3775 Among other restrictions this cannot override user choices. 3776 @hide --> 3777 <permission android:name="android.permission.RESTORE_RUNTIME_PERMISSIONS" 3778 android:protectionLevel="signature" /> 3779 3780 <!-- @SystemApi Allows an application to change policy_fixed permissions. 3781 @hide --> 3782 <permission android:name="android.permission.ADJUST_RUNTIME_PERMISSIONS_POLICY" 3783 android:protectionLevel="signature|installer" /> 3784 3785 <!-- @SystemApi @TestApi Allows an application to upgrade runtime permissions. 3786 @hide --> 3787 <permission android:name="android.permission.UPGRADE_RUNTIME_PERMISSIONS" 3788 android:protectionLevel="signature" /> 3789 3790 <!-- @SystemApi Allows an application to whitelist restricted permissions 3791 on any of the whitelists. 3792 @hide --> 3793 <permission android:name="android.permission.WHITELIST_RESTRICTED_PERMISSIONS" 3794 android:protectionLevel="signature|installer" /> 3795 3796 <!-- @SystemApi Allows an application to an exempt an app from having its permission be 3797 auto-revoked when unused for an extended period of time. 3798 @hide --> 3799 <permission android:name="android.permission.WHITELIST_AUTO_REVOKE_PERMISSIONS" 3800 android:protectionLevel="signature|installer" /> 3801 3802 <!-- @hide Allows an application to observe permission changes. --> 3803 <permission android:name="android.permission.OBSERVE_GRANT_REVOKE_PERMISSIONS" 3804 android:protectionLevel="signature|privileged" /> 3805 3806 <!-- @SystemApi Allows an application to start and stop one time permission sessions 3807 @hide --> 3808 <permission android:name="android.permission.MANAGE_ONE_TIME_PERMISSION_SESSIONS" 3809 android:protectionLevel="signature|installer" /> 3810 3811 <!-- @SystemApi Allows an application to manage the holders of a role. 3812 @hide --> 3813 <permission android:name="android.permission.MANAGE_ROLE_HOLDERS" 3814 android:protectionLevel="signature|installer" /> 3815 3816 <!-- @SystemApi Allows an application to observe role holder changes. 3817 @hide --> 3818 <permission android:name="android.permission.OBSERVE_ROLE_HOLDERS" 3819 android:protectionLevel="signature|installer" /> 3820 3821 <!-- Allows an application to manage the companion devices. 3822 @hide --> 3823 <permission android:name="android.permission.MANAGE_COMPANION_DEVICES" 3824 android:protectionLevel="signature" /> 3825 3826 <!-- @SystemApi Allows an application to use SurfaceFlinger's low level features. 3827 <p>Not for use by third-party applications. 3828 @hide 3829 --> 3830 <permission android:name="android.permission.ACCESS_SURFACE_FLINGER" 3831 android:protectionLevel="signature" /> 3832 3833 <!-- Allows an application to take screen shots and more generally 3834 get access to the frame buffer data. 3835 <p>Not for use by third-party applications. 3836 @hide 3837 @removed --> 3838 <permission android:name="android.permission.READ_FRAME_BUFFER" 3839 android:protectionLevel="signature" /> 3840 3841 <!-- Allows an application to use InputFlinger's low level features. 3842 @hide --> 3843 <permission android:name="android.permission.ACCESS_INPUT_FLINGER" 3844 android:protectionLevel="signature" /> 3845 3846 <!-- Allows an application to disable/enable input devices. 3847 Could be used to prevent unwanted touch events 3848 on a touchscreen, for example during swimming or rain. 3849 @hide --> 3850 <permission android:name="android.permission.DISABLE_INPUT_DEVICE" 3851 android:protectionLevel="signature" /> 3852 3853 <!-- Allows an application to configure and connect to Wifi displays 3854 @hide 3855 @SystemApi --> 3856 <permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY" 3857 android:protectionLevel="signature" /> 3858 3859 <!-- Allows an application to control low-level features of Wifi displays 3860 such as opening an RTSP socket. This permission should only be used 3861 by the display manager. 3862 @hide --> 3863 <permission android:name="android.permission.CONTROL_WIFI_DISPLAY" 3864 android:protectionLevel="signature" /> 3865 3866 <!-- Allows an application to control the color modes set for displays system-wide. 3867 <p>Not for use by third-party applications.</p> 3868 @hide --> 3869 <permission android:name="android.permission.CONFIGURE_DISPLAY_COLOR_MODE" 3870 android:protectionLevel="signature" /> 3871 3872 <!-- Allows an application to control the lights on the device. 3873 @hide 3874 @SystemApi 3875 @TestApi --> 3876 <permission android:name="android.permission.CONTROL_DEVICE_LIGHTS" 3877 android:protectionLevel="signature|privileged" /> 3878 3879 <!-- Allows an application to control the color saturation of the display. 3880 @hide 3881 @SystemApi --> 3882 <permission android:name="android.permission.CONTROL_DISPLAY_SATURATION" 3883 android:protectionLevel="signature|privileged" /> 3884 3885 <!-- Allows an application to control display color transformations. 3886 <p>Not for use by third-party applications.</p> 3887 @hide 3888 @SystemApi --> 3889 <permission android:name="android.permission.CONTROL_DISPLAY_COLOR_TRANSFORMS" 3890 android:protectionLevel="signature|privileged" /> 3891 3892 <!-- Allows an application to collect usage infomation about brightness slider changes. 3893 <p>Not for use by third-party applications.</p> 3894 @hide 3895 @SystemApi 3896 @TestApi --> 3897 <permission android:name="android.permission.BRIGHTNESS_SLIDER_USAGE" 3898 android:protectionLevel="signature|privileged|development" /> 3899 3900 <!-- Allows an application to collect ambient light stats. 3901 <p>Not for use by third party applications.</p> 3902 @hide 3903 @SystemApi --> 3904 <permission android:name="android.permission.ACCESS_AMBIENT_LIGHT_STATS" 3905 android:protectionLevel="signature|privileged|development" /> 3906 3907 <!-- Allows an application to modify the display brightness configuration 3908 @hide 3909 @SystemApi 3910 @TestApi --> 3911 <permission android:name="android.permission.CONFIGURE_DISPLAY_BRIGHTNESS" 3912 android:protectionLevel="signature|privileged|development" /> 3913 3914 <!-- Allows an application to control the system's display brightness 3915 @hide --> 3916 <permission android:name="android.permission.CONTROL_DISPLAY_BRIGHTNESS" 3917 android:protectionLevel="signature" /> 3918 3919 <!-- @SystemApi Allows an application to control VPN. 3920 <p>Not for use by third-party applications.</p> 3921 @hide --> 3922 <permission android:name="android.permission.CONTROL_VPN" 3923 android:protectionLevel="signature|privileged" /> 3924 <uses-permission android:name="android.permission.CONTROL_VPN" /> 3925 3926 <!-- Allows an application to access and modify always-on VPN configuration. 3927 <p>Not for use by third-party or privileged applications. 3928 @hide --> 3929 <permission android:name="android.permission.CONTROL_ALWAYS_ON_VPN" 3930 android:protectionLevel="signature" /> 3931 3932 <!-- Allows an application to capture audio output. 3933 Use the {@code CAPTURE_MEDIA_OUTPUT} permission if only the {@code USAGE_UNKNOWN}), 3934 {@code USAGE_MEDIA}) or {@code USAGE_GAME}) usages are intended to be captured. 3935 <p>Not for use by third-party applications.</p> --> 3936 <permission android:name="android.permission.CAPTURE_AUDIO_OUTPUT" 3937 android:protectionLevel="signature|privileged" /> 3938 3939 <!-- @SystemApi Allows an application to capture the audio played by other apps 3940 that have set an allow capture policy of 3941 {@link android.media.AudioAttributes#ALLOW_CAPTURE_BY_SYSTEM}. 3942 3943 Without this permission, only audio with an allow capture policy of 3944 {@link android.media.AudioAttributes#ALLOW_CAPTURE_BY_ALL} can be used. 3945 3946 There are strong restriction listed at 3947 {@link android.media.AudioAttributes#ALLOW_CAPTURE_BY_SYSTEM} 3948 on what an app can do with the captured audio. 3949 3950 See {@code CAPTURE_AUDIO_OUTPUT} for capturing audio use cases other than media playback. 3951 3952 <p>Not for use by third-party applications.</p> 3953 @hide --> 3954 <permission android:name="android.permission.CAPTURE_MEDIA_OUTPUT" 3955 android:protectionLevel="signature|privileged" /> 3956 3957 <!-- @SystemApi Allows an application to capture the audio played by other apps 3958 with the {@code USAGE_VOICE_COMMUNICATION} usage. 3959 3960 The application may opt out of capturing by setting an allow capture policy of 3961 {@link android.media.AudioAttributes#ALLOW_CAPTURE_BY_NONE}. 3962 3963 There are strong restriction listed at 3964 {@link android.media.AudioAttributes#ALLOW_CAPTURE_BY_SYSTEM} 3965 on what an app can do with the captured audio. 3966 3967 See {@code CAPTURE_AUDIO_OUTPUT} and {@code CAPTURE_MEDIA_OUTPUT} for capturing 3968 audio use cases other than voice communication playback. 3969 3970 <p>Not for use by third-party applications.</p> 3971 @hide --> 3972 <permission android:name="android.permission.CAPTURE_VOICE_COMMUNICATION_OUTPUT" 3973 android:protectionLevel="signature|privileged" /> 3974 3975 <!-- @SystemApi Allows an application to capture audio for hotword detection. 3976 <p>Not for use by third-party applications.</p> 3977 @hide --> 3978 <permission android:name="android.permission.CAPTURE_AUDIO_HOTWORD" 3979 android:protectionLevel="signature|privileged" /> 3980 3981 <!-- @SystemApi Allows an application to modify audio routing and override policy decisions. 3982 <p>Not for use by third-party applications.</p> 3983 @hide --> 3984 <permission android:name="android.permission.MODIFY_AUDIO_ROUTING" 3985 android:protectionLevel="signature|privileged" /> 3986 3987 <!-- Allows an application to modify what effects are applied to all audio 3988 (matching certain criteria) from any application. 3989 <p>Not for use by third-party applications.</p> 3990 @hide --> 3991 <permission android:name="android.permission.MODIFY_DEFAULT_AUDIO_EFFECTS" 3992 android:protectionLevel="signature|privileged" /> 3993 3994 <!-- @SystemApi Allows an application to provide remote displays. 3995 <p>Not for use by third-party applications.</p> 3996 @hide --> 3997 <permission android:name="android.permission.REMOTE_DISPLAY_PROVIDER" 3998 android:protectionLevel="signature|privileged" /> 3999 4000 <!-- Allows an application to capture video output. 4001 <p>Not for use by third-party applications.</p> 4002 @hide 4003 @removed --> 4004 <permission android:name="android.permission.CAPTURE_VIDEO_OUTPUT" 4005 android:protectionLevel="signature" /> 4006 4007 <!-- Allows an application to capture secure video output. 4008 <p>Not for use by third-party applications.</p> 4009 @hide 4010 @removed --> 4011 <permission android:name="android.permission.CAPTURE_SECURE_VIDEO_OUTPUT" 4012 android:protectionLevel="signature" /> 4013 4014 <!-- Allows an application to know what content is playing and control its playback. 4015 <p>Not for use by third-party applications due to privacy of media consumption</p> --> 4016 <permission android:name="android.permission.MEDIA_CONTENT_CONTROL" 4017 android:protectionLevel="signature|privileged" /> 4018 4019 <!-- @SystemApi @hide Allows an application to set the volume key long-press listener. 4020 <p>When it's set, the application will receive the volume key long-press event 4021 instead of changing volume.</p> 4022 <p>Not for use by third-party applications</p> --> 4023 <permission android:name="android.permission.SET_VOLUME_KEY_LONG_PRESS_LISTENER" 4024 android:protectionLevel="signature|privileged|development" /> 4025 4026 <!-- @SystemApi @hide Allows an application to set media key event listener. 4027 <p>When it's set, the application will receive the media key event before 4028 any other media sessions. If the event is handled by the listener, other sessions 4029 cannot get the event.</p> 4030 <p>Not for use by third-party applications</p> --> 4031 <permission android:name="android.permission.SET_MEDIA_KEY_LISTENER" 4032 android:protectionLevel="signature|privileged|development" /> 4033 4034 <!-- @SystemApi Required to be able to disable the device (very dangerous!). 4035 <p>Not for use by third-party applications. 4036 @hide 4037 --> 4038 <permission android:name="android.permission.BRICK" 4039 android:protectionLevel="signature" /> 4040 4041 <!-- Required to be able to reboot the device. 4042 <p>Not for use by third-party applications. --> 4043 <permission android:name="android.permission.REBOOT" 4044 android:protectionLevel="signature|privileged" /> 4045 4046 <!-- @SystemApi Allows low-level access to power management. 4047 <p>Not for use by third-party applications. 4048 @hide 4049 --> 4050 <permission android:name="android.permission.DEVICE_POWER" 4051 android:protectionLevel="signature" /> 4052 4053 <!-- Allows toggling battery saver on the system. 4054 Superseded by DEVICE_POWER permission. @hide @SystemApi 4055 --> 4056 <permission android:name="android.permission.POWER_SAVER" 4057 android:protectionLevel="signature|privileged" /> 4058 4059 <!-- Allows access to the PowerManager.userActivity function. 4060 <p>Not for use by third-party applications. @hide @SystemApi --> 4061 <permission android:name="android.permission.USER_ACTIVITY" 4062 android:protectionLevel="signature|privileged" /> 4063 4064 <!-- @hide Allows low-level access to tun tap driver --> 4065 <permission android:name="android.permission.NET_TUNNELING" 4066 android:protectionLevel="signature" /> 4067 4068 <!-- Run as a manufacturer test application, running as the root user. 4069 Only available when the device is running in manufacturer test mode. 4070 <p>Not for use by third-party applications. 4071 --> 4072 <permission android:name="android.permission.FACTORY_TEST" 4073 android:protectionLevel="signature" /> 4074 4075 <!-- Allows an application to broadcast a notification that an application 4076 package has been removed. 4077 <p>Not for use by third-party applications. 4078 --> 4079 <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED" 4080 android:protectionLevel="signature" /> 4081 4082 <!-- Allows an application to broadcast an SMS receipt notification. 4083 <p>Not for use by third-party applications. 4084 --> 4085 <permission android:name="android.permission.BROADCAST_SMS" 4086 android:protectionLevel="signature" /> 4087 4088 <!-- Allows an application to broadcast a WAP PUSH receipt notification. 4089 <p>Not for use by third-party applications. 4090 --> 4091 <permission android:name="android.permission.BROADCAST_WAP_PUSH" 4092 android:protectionLevel="signature" /> 4093 4094 <!-- @SystemApi Allows an application to broadcast privileged networking requests. 4095 <p>Not for use by third-party applications. 4096 @hide 4097 @deprecated Use {@link android.Manifest.permission#REQUEST_NETWORK_SCORES} instead 4098 --> 4099 <permission android:name="android.permission.BROADCAST_NETWORK_PRIVILEGED" 4100 android:protectionLevel="signature|privileged" /> 4101 4102 <!-- Not for use by third-party applications. --> 4103 <permission android:name="android.permission.MASTER_CLEAR" 4104 android:protectionLevel="signature|privileged" /> 4105 4106 <!-- Allows an application to call any phone number, including emergency 4107 numbers, without going through the Dialer user interface for the user 4108 to confirm the call being placed. 4109 <p>Not for use by third-party applications. --> 4110 <permission android:name="android.permission.CALL_PRIVILEGED" 4111 android:protectionLevel="signature|privileged" /> 4112 4113 <!-- @SystemApi Allows an application to perform CDMA OTA provisioning @hide --> 4114 <permission android:name="android.permission.PERFORM_CDMA_PROVISIONING" 4115 android:protectionLevel="signature|privileged" /> 4116 4117 <!-- @SystemApi Allows an application to perform SIM Activation @hide --> 4118 <permission android:name="android.permission.PERFORM_SIM_ACTIVATION" 4119 android:protectionLevel="signature|privileged" /> 4120 4121 <!-- Allows enabling/disabling location update notifications from 4122 the radio. 4123 <p>Not for use by third-party applications. --> 4124 <permission android:name="android.permission.CONTROL_LOCATION_UPDATES" 4125 android:protectionLevel="signature|privileged" /> 4126 4127 <!-- Allows read/write access to the "properties" table in the checkin 4128 database, to change values that get uploaded. 4129 <p>Not for use by third-party applications. --> 4130 <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES" 4131 android:protectionLevel="signature|privileged" /> 4132 4133 <!-- Allows an application to collect component usage 4134 statistics 4135 <p>Declaring the permission implies intention to use the API and the user of the 4136 device can grant permission through the Settings application. 4137 <p>Protection level: signature|privileged|development|appop|retailDemo --> 4138 <permission android:name="android.permission.PACKAGE_USAGE_STATS" 4139 android:protectionLevel="signature|privileged|development|appop|retailDemo" /> 4140 <uses-permission android:name="android.permission.PACKAGE_USAGE_STATS" /> 4141 4142 <!-- Allows a data loader to read a package's access logs. The access logs contain the 4143 set of pages referenced over time. 4144 <p>Declaring the permission implies intention to use the API and the user of the 4145 device can grant permission through the Settings application. 4146 <p>Protection level: signature|privileged|appop 4147 <p>A data loader has to be the one which provides data to install an app. 4148 <p>A data loader has to have both permission:LOADER_USAGE_STATS AND 4149 appop:LOADER_USAGE_STATS allowed to be able to access the read logs. --> 4150 <permission android:name="android.permission.LOADER_USAGE_STATS" 4151 android:protectionLevel="signature|privileged|appop" /> 4152 <uses-permission android:name="android.permission.LOADER_USAGE_STATS" /> 4153 4154 <!-- @hide @SystemApi Allows an application to observe usage time of apps. The app can register 4155 for callbacks when apps reach a certain usage time limit, etc. --> 4156 <permission android:name="android.permission.OBSERVE_APP_USAGE" 4157 android:protectionLevel="signature|privileged" /> 4158 4159 <!-- @hide @TestApi @SystemApi Allows an application to change the app idle state of an app. 4160 <p>Not for use by third-party applications. --> 4161 <permission android:name="android.permission.CHANGE_APP_IDLE_STATE" 4162 android:protectionLevel="signature|privileged" /> 4163 4164 <!-- @hide @SystemApi Allows an application to temporarily whitelist an inactive app to 4165 access the network and acquire wakelocks. 4166 <p>Not for use by third-party applications. --> 4167 <permission android:name="android.permission.CHANGE_DEVICE_IDLE_TEMP_WHITELIST" 4168 android:protectionLevel="signature|privileged" /> 4169 4170 <!-- Permission an application must hold in order to use 4171 {@link android.provider.Settings#ACTION_REQUEST_IGNORE_BATTERY_OPTIMIZATIONS}. 4172 <p>Protection level: normal --> 4173 <permission android:name="android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS" 4174 android:label="@string/permlab_requestIgnoreBatteryOptimizations" 4175 android:description="@string/permdesc_requestIgnoreBatteryOptimizations" 4176 android:protectionLevel="normal" /> 4177 4178 <!-- Allows an application to collect battery statistics 4179 <p>Protection level: signature|privileged|development --> 4180 <permission android:name="android.permission.BATTERY_STATS" 4181 android:protectionLevel="signature|privileged|development" /> 4182 4183 <!--Allows an application to manage statscompanion. 4184 <p>Not for use by third-party applications. 4185 @hide --> 4186 <permission android:name="android.permission.STATSCOMPANION" 4187 android:protectionLevel="signature" /> 4188 4189 <!--@SystemApi @hide Allows an application to register stats pull atom callbacks. 4190 <p>Not for use by third-party applications.--> 4191 <permission android:name="android.permission.REGISTER_STATS_PULL_ATOM" 4192 android:protectionLevel="signature|privileged" /> 4193 4194 <!-- @SystemApi Allows an application to control the backup and restore process. 4195 <p>Not for use by third-party applications. 4196 @hide pending API council --> 4197 <permission android:name="android.permission.BACKUP" 4198 android:protectionLevel="signature|privileged" /> 4199 4200 <!-- @SystemApi Allows an application to make modifications to device settings such that these 4201 modifications will be overridden by settings restore.. 4202 <p>Not for use by third-party applications. 4203 @hide --> 4204 <permission android:name="android.permission.MODIFY_SETTINGS_OVERRIDEABLE_BY_RESTORE" 4205 android:protectionLevel="signature|setup" /> 4206 4207 <!-- @SystemApi Allows application to manage 4208 {@link android.security.keystore.recovery.RecoveryController}. 4209 <p>Not for use by third-party applications. 4210 @hide --> 4211 <permission android:name="android.permission.RECOVER_KEYSTORE" 4212 android:protectionLevel="signature|privileged" /> 4213 4214 <!-- Allows a package to launch the secure full-backup confirmation UI. 4215 ONLY the system process may hold this permission. 4216 @hide --> 4217 <permission android:name="android.permission.CONFIRM_FULL_BACKUP" 4218 android:protectionLevel="signature" /> 4219 4220 <!-- Must be required by a {@link android.widget.RemoteViewsService}, 4221 to ensure that only the system can bind to it. 4222 <p>Protection level: signature|privileged --> 4223 <permission android:name="android.permission.BIND_REMOTEVIEWS" 4224 android:protectionLevel="signature|privileged" /> 4225 4226 <!-- Allows an application to tell the AppWidget service which application 4227 can access AppWidget's data. The normal user flow is that a user 4228 picks an AppWidget to go into a particular host, thereby giving that 4229 host application access to the private data from the AppWidget app. 4230 An application that has this permission should honor that contract. 4231 <p>Not for use by third-party applications. --> 4232 <permission android:name="android.permission.BIND_APPWIDGET" 4233 android:protectionLevel="signature|privileged" /> 4234 4235 <!-- @hide Allows sysui to manage user grants of slice permissions. --> 4236 <permission android:name="android.permission.MANAGE_SLICE_PERMISSIONS" 4237 android:protectionLevel="signature" /> 4238 4239 <!-- @SystemApi Private permission, to restrict who can bring up a dialog to add a new 4240 keyguard widget 4241 @hide --> 4242 <permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET" 4243 android:protectionLevel="signature|privileged" /> 4244 4245 <!-- @SystemApi Internal permission allowing an application to query/set which 4246 applications can bind AppWidgets. 4247 @hide --> 4248 <permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS" 4249 android:protectionLevel="signature|privileged" /> 4250 4251 <!-- Allows applications to change the background data setting. 4252 <p>Not for use by third-party applications. 4253 @hide pending API council --> 4254 <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING" 4255 android:protectionLevel="signature" /> 4256 4257 <!-- This permission can be used on content providers to allow the global 4258 search system to access their data. Typically it used when the 4259 provider has some permissions protecting it (which global search 4260 would not be expected to hold), and added as a read-only permission 4261 to the path in the provider where global search queries are 4262 performed. This permission can not be held by regular applications; 4263 it is used by applications to protect themselves from everyone else 4264 besides global search. 4265 <p>Protection level: signature|privileged --> 4266 <permission android:name="android.permission.GLOBAL_SEARCH" 4267 android:protectionLevel="signature|privileged" /> 4268 4269 <!-- Internal permission protecting access to the global search 4270 system: ensures that only the system can access the provider 4271 to perform queries (since this otherwise provides unrestricted 4272 access to a variety of content providers), and to write the 4273 search statistics (to keep applications from gaming the source 4274 ranking). 4275 @hide --> 4276 <permission android:name="android.permission.GLOBAL_SEARCH_CONTROL" 4277 android:protectionLevel="signature" /> 4278 4279 <!-- @SystemApi Internal permission to allows an application to read indexable data. 4280 @hide --> 4281 <permission android:name="android.permission.READ_SEARCH_INDEXABLES" 4282 android:protectionLevel="signature|privileged" /> 4283 4284 <!-- @SystemApi Internal permission to allows an application to bind to suggestion service. 4285 @hide --> 4286 <permission android:name="android.permission.BIND_SETTINGS_SUGGESTIONS_SERVICE" 4287 android:protectionLevel="signature" /> 4288 4289 <!-- @hide Internal permission to allows an application to access card content provider. --> 4290 <permission android:name="android.permission.WRITE_SETTINGS_HOMEPAGE_DATA" 4291 android:protectionLevel="signature|privileged" /> 4292 4293 <!-- @SystemApi Allows applications to set a live wallpaper. 4294 @hide XXX Change to signature once the picker is moved to its 4295 own apk as Ghod Intended. --> 4296 <permission android:name="android.permission.SET_WALLPAPER_COMPONENT" 4297 android:protectionLevel="signature|privileged" /> 4298 4299 <!-- @SystemApi Allows applications to read dream settings and dream state. 4300 @hide --> 4301 <permission android:name="android.permission.READ_DREAM_STATE" 4302 android:protectionLevel="signature|privileged" /> 4303 4304 <!-- @SystemApi Allows applications to write dream settings, and start or stop dreaming. 4305 @hide --> 4306 <permission android:name="android.permission.WRITE_DREAM_STATE" 4307 android:protectionLevel="signature|privileged" /> 4308 4309 <!-- @hide Allows applications to read whether ambient display is suppressed. --> 4310 <permission android:name="android.permission.READ_DREAM_SUPPRESSION" 4311 android:protectionLevel="signature" /> 4312 4313 <!-- @SystemApi Allow an application to read and write the cache partition. 4314 @hide --> 4315 <permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM" 4316 android:protectionLevel="signature|privileged" /> 4317 4318 <!-- Must be required by default container service so that only 4319 the system can bind to it and use it to copy 4320 protected data to secure containers or files 4321 accessible to the system. 4322 @hide --> 4323 <permission android:name="android.permission.COPY_PROTECTED_DATA" 4324 android:protectionLevel="signature" /> 4325 4326 <!-- @SystemApi Internal permission protecting access to the encryption methods 4327 @hide 4328 --> 4329 <permission android:name="android.permission.CRYPT_KEEPER" 4330 android:protectionLevel="signature|privileged" /> 4331 4332 <!-- @SystemApi Allows an application to read historical network usage for 4333 specific networks and applications. @hide --> 4334 <permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY" 4335 android:protectionLevel="signature|privileged" /> 4336 4337 <!-- Allows an application to manage network policies (such as warning and disable 4338 limits) and to define application-specific rules. @hide --> 4339 <permission android:name="android.permission.MANAGE_NETWORK_POLICY" 4340 android:protectionLevel="signature" /> 4341 4342 <!-- @SystemApi @hide @deprecated use UPDATE_DEVICE_STATS instead --> 4343 <permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING" 4344 android:protectionLevel="signature|privileged" /> 4345 4346 <!-- @SystemApi @hide Allows an application to manage carrier subscription plans. --> 4347 <permission android:name="android.permission.MANAGE_SUBSCRIPTION_PLANS" 4348 android:protectionLevel="signature|privileged" /> 4349 4350 <!-- C2DM permission. 4351 @hide Used internally. 4352 --> 4353 <permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE" 4354 android:protectionLevel="signature" /> 4355 <uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/> 4356 4357 <!-- @SystemApi @hide Package verifier needs to have this permission before the PackageManager will 4358 trust it to verify packages. 4359 --> 4360 <permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT" 4361 android:protectionLevel="signature|privileged" /> 4362 4363 <!-- Must be required by package verifier receiver, to ensure that only the 4364 system can interact with it. 4365 @hide 4366 --> 4367 <permission android:name="android.permission.BIND_PACKAGE_VERIFIER" 4368 android:protectionLevel="signature" /> 4369 4370 <!-- @hide Rollback manager needs to have this permission before the PackageManager will 4371 trust it to enable rollback. 4372 --> 4373 <permission android:name="android.permission.PACKAGE_ROLLBACK_AGENT" 4374 android:protectionLevel="signature" /> 4375 4376 <!-- @SystemApi @TestApi @hide Allows managing apk level rollbacks. --> 4377 <permission android:name="android.permission.MANAGE_ROLLBACKS" 4378 android:protectionLevel="signature|privileged" /> 4379 4380 <!-- @TestApi @hide Allows testing apk level rollbacks. --> 4381 <permission android:name="android.permission.TEST_MANAGE_ROLLBACKS" 4382 android:protectionLevel="signature" /> 4383 4384 <!-- @SystemApi @hide Allows an application to mark other applications as harmful --> 4385 <permission android:name="android.permission.SET_HARMFUL_APP_WARNINGS" 4386 android:protectionLevel="signature|verifier" /> 4387 4388 <!-- @SystemApi @hide Intent filter verifier needs to have this permission before the 4389 PackageManager will trust it to verify intent filters. 4390 --> 4391 <permission android:name="android.permission.INTENT_FILTER_VERIFICATION_AGENT" 4392 android:protectionLevel="signature|privileged" /> 4393 4394 <!-- Must be required by intent filter verifier rintent-filtereceiver, to ensure that only the 4395 system can interact with it. 4396 @hide 4397 --> 4398 <permission android:name="android.permission.BIND_INTENT_FILTER_VERIFIER" 4399 android:protectionLevel="signature" /> 4400 4401 <!-- @SystemApi Allows applications to access serial ports via the SerialManager. 4402 @hide --> 4403 <permission android:name="android.permission.SERIAL_PORT" 4404 android:protectionLevel="signature|privileged" /> 4405 4406 <!-- Allows the holder to access content providers from outside an ApplicationThread. 4407 This permission is enforced by the ActivityManagerService on the corresponding APIs, 4408 in particular ActivityManagerService#getContentProviderExternal(String) and 4409 ActivityManagerService#removeContentProviderExternal(String). 4410 @hide 4411 --> 4412 <permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY" 4413 android:protectionLevel="signature" /> 4414 4415 <!-- @SystemApi Allows an application to hold an UpdateLock, recommending that a headless 4416 OTA reboot *not* occur while the lock is held. 4417 @hide --> 4418 <permission android:name="android.permission.UPDATE_LOCK" 4419 android:protectionLevel="signature|privileged" /> 4420 4421 <!-- @SystemApi Allows an application the opportunity to become a 4422 {@link android.service.notification.NotificationAssistantService}. 4423 User permission is still required before access is granted. 4424 @hide --> 4425 <permission android:name="android.permission.REQUEST_NOTIFICATION_ASSISTANT_SERVICE" 4426 android:protectionLevel="signature|privileged" /> 4427 4428 <!-- @SystemApi @TestApi Allows an application to read the current set of notifications, including 4429 any metadata and intents attached. 4430 @hide --> 4431 <permission android:name="android.permission.ACCESS_NOTIFICATIONS" 4432 android:protectionLevel="signature|privileged|appop" /> 4433 4434 <!-- Marker permission for applications that wish to access notification policy. This permission 4435 is not supported on managed profiles. 4436 <p>Protection level: normal 4437 --> 4438 <permission android:name="android.permission.ACCESS_NOTIFICATION_POLICY" 4439 android:description="@string/permdesc_access_notification_policy" 4440 android:label="@string/permlab_access_notification_policy" 4441 android:protectionLevel="normal" /> 4442 4443 <!-- Allows modification of do not disturb rules and policies. Only allowed for system 4444 processes. 4445 @hide --> 4446 <permission android:name="android.permission.MANAGE_NOTIFICATIONS" 4447 android:protectionLevel="signature" /> 4448 4449 <!-- Allows notifications to be colorized 4450 <p>Not for use by third-party applications. @hide --> 4451 <permission android:name="android.permission.USE_COLORIZED_NOTIFICATIONS" 4452 android:protectionLevel="signature|setup" /> 4453 4454 <!-- Allows access to keyguard secure storage. Only allowed for system processes. 4455 @hide --> 4456 <permission android:name="android.permission.ACCESS_KEYGUARD_SECURE_STORAGE" 4457 android:protectionLevel="signature" /> 4458 4459 <!-- Allows applications to set the initial lockscreen state. 4460 <p>Not for use by third-party applications. @hide --> 4461 <permission android:name="android.permission.SET_INITIAL_LOCK" 4462 android:protectionLevel="signature|setup"/> 4463 4464 <!-- Allows managing (adding, removing) fingerprint templates. Reserved for the system. @hide --> 4465 <permission android:name="android.permission.MANAGE_FINGERPRINT" 4466 android:protectionLevel="signature|privileged" /> 4467 4468 <!-- Allows an app to reset fingerprint attempt counter. Reserved for the system. @hide --> 4469 <permission android:name="android.permission.RESET_FINGERPRINT_LOCKOUT" 4470 android:protectionLevel="signature" /> 4471 4472 <!-- Allows direct access to the <Biometric>Service interfaces. Reserved for the system. @hide --> 4473 <permission android:name="android.permission.MANAGE_BIOMETRIC" 4474 android:protectionLevel="signature" /> 4475 4476 <!-- Allows direct access to the <Biometric>Service authentication methods. Reserved for the system. @hide --> 4477 <permission android:name="android.permission.USE_BIOMETRIC_INTERNAL" 4478 android:protectionLevel="signature" /> 4479 4480 <!-- Allows the system to control the BiometricDialog (SystemUI). Reserved for the system. @hide --> 4481 <permission android:name="android.permission.MANAGE_BIOMETRIC_DIALOG" 4482 android:protectionLevel="signature" /> 4483 4484 <!-- Allows an app to reset face authentication attempt counter. Reserved for the system. @hide --> 4485 <permission android:name="android.permission.RESET_FACE_LOCKOUT" 4486 android:protectionLevel="signature" /> 4487 4488 <!-- Allows an application to control keyguard. Only allowed for system processes. 4489 @hide --> 4490 <permission android:name="android.permission.CONTROL_KEYGUARD" 4491 android:protectionLevel="signature" /> 4492 4493 <!-- @SystemApi Allows an application to control keyguard features like secure notifications. 4494 @hide --> 4495 <permission android:name="android.permission.CONTROL_KEYGUARD_SECURE_NOTIFICATIONS" 4496 android:protectionLevel="signature|privileged" /> 4497 4498 <!-- Allows an application to listen to trust changes. Only allowed for system processes. 4499 @hide --> 4500 <permission android:name="android.permission.TRUST_LISTENER" 4501 android:protectionLevel="signature" /> 4502 4503 <!-- @SystemApi Allows an application to provide a trust agent. 4504 @hide For security reasons, this is a platform-only permission. --> 4505 <permission android:name="android.permission.PROVIDE_TRUST_AGENT" 4506 android:protectionLevel="signature|privileged" /> 4507 4508 <!-- @SystemApi Allows an application to show a message 4509 on the keyguard when asking to dismiss it. 4510 @hide For security reasons, this is a platform-only permission. --> 4511 <permission android:name="android.permission.SHOW_KEYGUARD_MESSAGE" 4512 android:protectionLevel="signature|privileged" /> 4513 4514 <!-- Allows an application to launch the trust agent settings activity. 4515 @hide --> 4516 <permission android:name="android.permission.LAUNCH_TRUST_AGENT_SETTINGS" 4517 android:protectionLevel="signature|privileged" /> 4518 4519 <!-- @SystemApi Must be required by an {@link 4520 android.service.trust.TrustAgentService}, 4521 to ensure that only the system can bind to it. 4522 @hide --> 4523 <permission android:name="android.permission.BIND_TRUST_AGENT" 4524 android:protectionLevel="signature" /> 4525 4526 <!-- Must be required by an {@link 4527 android.service.notification.NotificationListenerService}, 4528 to ensure that only the system can bind to it. 4529 <p>Protection level: signature 4530 --> 4531 <permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE" 4532 android:protectionLevel="signature" /> 4533 4534 <!-- @SystemApi Must be required by an {@link 4535 android.service.notification.NotificationAssistantService} to ensure that only the system 4536 can bind to it. 4537 <p>Protection level: signature 4538 @hide 4539 --> 4540 <permission android:name="android.permission.BIND_NOTIFICATION_ASSISTANT_SERVICE" 4541 android:protectionLevel="signature" /> 4542 4543 <!-- Must be required by a {@link 4544 android.service.chooser.ChooserTargetService}, to ensure that 4545 only the system can bind to it. 4546 <p>Protection level: signature 4547 4548 @deprecated For publishing direct share targets, please follow the instructions in 4549 https://developer.android.com/training/sharing/receive.html#providing-direct-share-targets 4550 instead. 4551 --> 4552 <permission android:name="android.permission.BIND_CHOOSER_TARGET_SERVICE" 4553 android:protectionLevel="signature" /> 4554 4555 <!-- @SystemApi Must be held by services that extend 4556 {@link android.service.resolver.ResolverRankerService}. 4557 <p>Protection level: signature|privileged 4558 @hide 4559 --> 4560 <permission android:name="android.permission.PROVIDE_RESOLVER_RANKER_SERVICE" 4561 android:protectionLevel="signature|privileged" /> 4562 4563 <!-- @SystemApi Must be required by services that extend 4564 {@link android.service.resolver.ResolverRankerService}, to ensure that only the system can 4565 bind to them. 4566 <p>Protection level: signature 4567 @hide 4568 --> 4569 <permission android:name="android.permission.BIND_RESOLVER_RANKER_SERVICE" 4570 android:protectionLevel="signature" /> 4571 4572 <!-- Must be required by a {@link 4573 android.service.notification.ConditionProviderService}, 4574 to ensure that only the system can bind to it. 4575 <p>Protection level: signature 4576 --> 4577 <permission android:name="android.permission.BIND_CONDITION_PROVIDER_SERVICE" 4578 android:protectionLevel="signature" /> 4579 4580 <!-- Must be required by an {@link android.service.dreams.DreamService}, 4581 to ensure that only the system can bind to it. 4582 <p>Protection level: signature 4583 --> 4584 <permission android:name="android.permission.BIND_DREAM_SERVICE" 4585 android:protectionLevel="signature" /> 4586 4587 <!-- Must be required by an {@link android.app.usage.CacheQuotaService} to ensure that only the 4588 system can bind to it. 4589 @hide This is not a third-party API (intended for OEMs and system apps). 4590 --> 4591 <permission android:name="android.permission.BIND_CACHE_QUOTA_SERVICE" 4592 android:protectionLevel="signature" /> 4593 4594 <!-- @SystemApi Allows an application to call into a carrier setup flow. It is up to the 4595 carrier setup application to enforce that this permission is required 4596 @hide This is not a third-party API (intended for OEMs and system apps). --> 4597 <permission android:name="android.permission.INVOKE_CARRIER_SETUP" 4598 android:protectionLevel="signature|privileged" /> 4599 4600 <!-- @SystemApi Allows an application to listen for network condition observations. 4601 @hide This is not a third-party API (intended for system apps). --> 4602 <permission android:name="android.permission.ACCESS_NETWORK_CONDITIONS" 4603 android:protectionLevel="signature|privileged" /> 4604 4605 <!-- @SystemApi Allows an application to provision and access DRM certificates 4606 @hide This is not a third-party API (intended for system apps). --> 4607 <permission android:name="android.permission.ACCESS_DRM_CERTIFICATES" 4608 android:protectionLevel="signature|privileged" /> 4609 4610 <!-- Api Allows an application to manage media projection sessions. 4611 @hide This is not a third-party API (intended for system apps). --> 4612 <permission android:name="android.permission.MANAGE_MEDIA_PROJECTION" 4613 android:protectionLevel="signature" /> 4614 4615 <!-- @SystemApi Allows an application to read install sessions 4616 @hide This is not a third-party API (intended for system apps). --> 4617 <permission android:name="android.permission.READ_INSTALL_SESSIONS" 4618 android:label="@string/permlab_readInstallSessions" 4619 android:description="@string/permdesc_readInstallSessions" 4620 android:protectionLevel="normal"/> 4621 4622 <!-- @SystemApi Allows an application to remove DRM certificates 4623 @hide This is not a third-party API (intended for system apps). --> 4624 <permission android:name="android.permission.REMOVE_DRM_CERTIFICATES" 4625 android:protectionLevel="signature|privileged" /> 4626 4627 <!-- @deprecated Use {@link android.Manifest.permission#BIND_CARRIER_SERVICES} instead --> 4628 <permission android:name="android.permission.BIND_CARRIER_MESSAGING_SERVICE" 4629 android:protectionLevel="signature|privileged" /> 4630 4631 <!-- Allows an application to interact with the currently active 4632 {@link android.service.voice.VoiceInteractionService}. 4633 @hide --> 4634 <permission android:name="android.permission.ACCESS_VOICE_INTERACTION_SERVICE" 4635 android:protectionLevel="signature" /> 4636 4637 <!-- The system process that is allowed to bind to services in carrier apps will 4638 have this permission. Carrier apps should use this permission to protect 4639 their services that only the system is allowed to bind to. 4640 <p>Protection level: signature|privileged 4641 --> 4642 <permission android:name="android.permission.BIND_CARRIER_SERVICES" 4643 android:label="@string/permlab_bindCarrierServices" 4644 android:description="@string/permdesc_bindCarrierServices" 4645 android:protectionLevel="signature|privileged" /> 4646 4647 <!-- 4648 Allows the holder to start the permission usage screen for an app. 4649 <p>Protection level: signature|installer 4650 --> 4651 <permission android:name="android.permission.START_VIEW_PERMISSION_USAGE" 4652 android:label="@string/permlab_startViewPermissionUsage" 4653 android:description="@string/permdesc_startViewPermissionUsage" 4654 android:protectionLevel="signature|installer" /> 4655 4656 <!-- Allows an application to query whether DO_NOT_ASK_CREDENTIALS_ON_BOOT 4657 flag is set. 4658 @hide --> 4659 <permission android:name="android.permission.QUERY_DO_NOT_ASK_CREDENTIALS_ON_BOOT" 4660 android:protectionLevel="signature" /> 4661 4662 <!-- @SystemApi Allows applications to kill UIDs. 4663 <p>Not for use by third-party applications. 4664 @hide --> 4665 <permission android:name="android.permission.KILL_UID" 4666 android:protectionLevel="signature|installer" /> 4667 4668 <!-- @SystemApi Allows applications to read the local WiFi and Bluetooth MAC address. 4669 @hide --> 4670 <permission android:name="android.permission.LOCAL_MAC_ADDRESS" 4671 android:protectionLevel="signature|privileged" /> 4672 <uses-permission android:name="android.permission.LOCAL_MAC_ADDRESS"/> 4673 4674 <!-- @SystemApi Allows access to MAC addresses of WiFi and Bluetooth peer devices. 4675 @hide --> 4676 <permission android:name="android.permission.PEERS_MAC_ADDRESS" 4677 android:protectionLevel="signature|setup" /> 4678 4679 <!-- Allows the Nfc stack to dispatch Nfc messages to applications. Applications 4680 can use this permission to ensure incoming Nfc messages are from the Nfc stack 4681 and not simulated by another application. 4682 @hide --> 4683 <permission android:name="android.permission.DISPATCH_NFC_MESSAGE" 4684 android:protectionLevel="signature|privileged" /> 4685 4686 <!-- @SystemApi Allows changing day / night mode when system is configured with 4687 config_lockDayNightMode set to true. If requesting app does not have permission, 4688 it will be ignored. 4689 @hide --> 4690 <permission android:name="android.permission.MODIFY_DAY_NIGHT_MODE" 4691 android:protectionLevel="signature|privileged" /> 4692 4693 <!-- @SystemApi Allows entering or exiting car mode using a specified priority. 4694 This permission is required to use UiModeManager while specifying a priority for the calling 4695 app. A device manufacturer uses this permission to prioritize the apps which can 4696 potentially request to enter car-mode on a device to help establish the correct behavior 4697 where multiple such apps are active at the same time. 4698 @hide --> 4699 <permission android:name="android.permission.ENTER_CAR_MODE_PRIORITIZED" 4700 android:protectionLevel="signature|privileged" /> 4701 4702 <!-- @SystemApi Required to receive ACTION_ENTER_CAR_MODE_PRIVILEGED or 4703 ACTION_EXIT_CAR_MODE_PRIVILEGED. 4704 @hide --> 4705 <permission android:name="android.permission.HANDLE_CAR_MODE_CHANGES" 4706 android:protectionLevel="signature|privileged" /> 4707 4708 <!-- The system process is explicitly the only one allowed to launch the 4709 confirmation UI for full backup/restore --> 4710 <uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/> 4711 4712 <!-- @SystemApi Allows the holder to access and manage instant applications on the device. 4713 @hide --> 4714 <permission android:name="android.permission.ACCESS_INSTANT_APPS" 4715 android:protectionLevel="signature|installer|verifier|wellbeing" /> 4716 <uses-permission android:name="android.permission.ACCESS_INSTANT_APPS"/> 4717 4718 <!-- Allows the holder to view the instant applications on the device. 4719 @hide --> 4720 <permission android:name="android.permission.VIEW_INSTANT_APPS" 4721 android:protectionLevel="signature|preinstalled" /> 4722 4723 <!-- Allows the holder to manage whether the system can bind to services 4724 provided by instant apps. This permission is intended to protect 4725 test/development fucntionality and should be used only in such cases. 4726 @hide --> 4727 <permission android:name="android.permission.MANAGE_BIND_INSTANT_SERVICE" 4728 android:protectionLevel="signature" /> 4729 4730 <!-- Allows receiving the usage of media resource e.g. video/audio codec and 4731 graphic memory. 4732 @hide --> 4733 <permission android:name="android.permission.RECEIVE_MEDIA_RESOURCE_USAGE" 4734 android:protectionLevel="signature|privileged" /> 4735 4736 <!-- Must be required by system/priv apps when accessing the sound trigger 4737 APIs given by {@link SoundTriggerManager}. 4738 @hide 4739 @SystemApi --> 4740 <permission android:name="android.permission.MANAGE_SOUND_TRIGGER" 4741 android:protectionLevel="signature|privileged" /> 4742 4743 <!-- Must be required by system/priv apps implementing sound trigger detection services 4744 @hide 4745 @SystemApi --> 4746 <permission android:name="android.permission.BIND_SOUND_TRIGGER_DETECTION_SERVICE" 4747 android:protectionLevel="signature" /> 4748 4749 <!-- @SystemApi Allows trusted applications to dispatch managed provisioning message to Managed 4750 Provisioning app. If requesting app does not have permission, it will be ignored. 4751 @hide --> 4752 <permission android:name="android.permission.DISPATCH_PROVISIONING_MESSAGE" 4753 android:protectionLevel="signature|privileged" /> 4754 4755 <!-- Allows the holder to read blocked numbers. See 4756 {@link android.provider.BlockedNumberContract}. 4757 @hide --> 4758 <permission android:name="android.permission.READ_BLOCKED_NUMBERS" 4759 android:protectionLevel="signature" /> 4760 4761 <!-- Allows the holder to write blocked numbers. See 4762 {@link android.provider.BlockedNumberContract}. 4763 @hide --> 4764 <permission android:name="android.permission.WRITE_BLOCKED_NUMBERS" 4765 android:protectionLevel="signature" /> 4766 4767 <!-- Must be required by an {@link android.service.vr.VrListenerService}, to ensure that only 4768 the system can bind to it. 4769 <p>Protection level: signature --> 4770 <permission android:name="android.permission.BIND_VR_LISTENER_SERVICE" 4771 android:protectionLevel="signature" /> 4772 4773 <!-- Must be required by system apps when accessing restricted VR APIs. 4774 @hide 4775 @SystemApi 4776 <p>Protection level: signature --> 4777 <permission android:name="android.permission.RESTRICTED_VR_ACCESS" 4778 android:protectionLevel="signature|preinstalled" /> 4779 4780 <!-- Required to make calls to {@link android.service.vr.IVrManager}. 4781 @hide --> 4782 <permission android:name="android.permission.ACCESS_VR_MANAGER" 4783 android:protectionLevel="signature" /> 4784 4785 <!-- Required to access VR-Mode state and state change events via {android.app.VrStateCallback} 4786 @hide --> 4787 <permission android:name="android.permission.ACCESS_VR_STATE" 4788 android:protectionLevel="signature|preinstalled" /> 4789 4790 <!-- Allows an application to whitelist tasks during lock task mode 4791 @hide <p>Not for use by third-party applications.</p> --> 4792 <permission android:name="android.permission.UPDATE_LOCK_TASK_PACKAGES" 4793 android:protectionLevel="signature|setup" /> 4794 4795 <!-- @SystemApi Allows an application to replace the app name displayed alongside notifications 4796 in the N-release and later. 4797 @hide <p>Not for use by third-party applications.</p> --> 4798 <permission android:name="android.permission.SUBSTITUTE_NOTIFICATION_APP_NAME" 4799 android:protectionLevel="signature|privileged" /> 4800 4801 <!-- @SystemApi Allows an application to show notifications before the device is provisioned. 4802 @hide <p>Not for use by third-party applications.</p> --> 4803 <permission android:name="android.permission.NOTIFICATION_DURING_SETUP" 4804 android:protectionLevel="signature|privileged" /> 4805 4806 <!-- @SystemApi Allows an application to manage auto-fill sessions. 4807 @hide <p>Not for use by third-party applications.</p> --> 4808 <permission android:name="android.permission.MANAGE_AUTO_FILL" 4809 android:protectionLevel="signature" /> 4810 4811 <!-- @SystemApi Allows an application to manage the content capture service. 4812 @hide <p>Not for use by third-party applications.</p> --> 4813 <permission android:name="android.permission.MANAGE_CONTENT_CAPTURE" 4814 android:protectionLevel="signature" /> 4815 4816 <!-- @SystemApi Allows an application to manage the content suggestions service. 4817 @hide <p>Not for use by third-party applications.</p> --> 4818 <permission android:name="android.permission.MANAGE_CONTENT_SUGGESTIONS" 4819 android:protectionLevel="signature" /> 4820 4821 <!-- @SystemApi Allows an application to manage the app predictions service. 4822 @hide <p>Not for use by third-party applications.</p> --> 4823 <permission android:name="android.permission.MANAGE_APP_PREDICTIONS" 4824 android:protectionLevel="signature|appPredictor" /> 4825 4826 <!-- Allows an app to set the theme overlay in /vendor/overlay 4827 being used. 4828 @hide <p>Not for use by third-party applications.</p> --> 4829 <permission android:name="android.permission.MODIFY_THEME_OVERLAY" 4830 android:protectionLevel="signature" /> 4831 4832 <!-- Allows an instant app to create foreground services. 4833 <p>Protection level: signature|development|instant|appop --> 4834 <permission android:name="android.permission.INSTANT_APP_FOREGROUND_SERVICE" 4835 android:protectionLevel="signature|development|instant|appop" /> 4836 4837 <!-- Allows a regular application to use {@link android.app.Service#startForeground 4838 Service.startForeground}. 4839 <p>Protection level: normal 4840 --> 4841 <permission android:name="android.permission.FOREGROUND_SERVICE" 4842 android:description="@string/permdesc_foregroundService" 4843 android:label="@string/permlab_foregroundService" 4844 android:protectionLevel="normal|instant" /> 4845 4846 <!-- @SystemApi Allows to access all app shortcuts. 4847 @hide --> 4848 <permission android:name="android.permission.ACCESS_SHORTCUTS" 4849 android:protectionLevel="signature|appPredictor" /> 4850 4851 <!-- @SystemApi Allows unlimited calls to shortcut mutation APIs. 4852 @hide --> 4853 <permission android:name="android.permission.UNLIMITED_SHORTCUTS_API_CALLS" 4854 android:protectionLevel="signature|appPredictor" /> 4855 4856 <!-- @SystemApi Allows an application to read the runtime profiles of other apps. 4857 @hide <p>Not for use by third-party applications. --> 4858 <permission android:name="android.permission.READ_RUNTIME_PROFILES" 4859 android:protectionLevel="signature|privileged" /> 4860 4861 <!-- @hide Allows audio policy management. --> 4862 <permission android:name="android.permission.MANAGE_AUDIO_POLICY" 4863 android:protectionLevel="signature" /> 4864 4865 <!-- @SystemApi Allows an application to turn on / off quiet mode. 4866 @hide --> 4867 <permission android:name="android.permission.MODIFY_QUIET_MODE" 4868 android:protectionLevel="signature|privileged|wellbeing|development" /> 4869 4870 <!-- Allows internal management of the camera framework 4871 @hide --> 4872 <permission android:name="android.permission.MANAGE_CAMERA" 4873 android:protectionLevel="signature" /> 4874 4875 <!-- Allows an application to control remote animations. See 4876 {@link ActivityOptions#makeRemoteAnimation} 4877 @hide <p>Not for use by third-party applications. --> 4878 <permission android:name="android.permission.CONTROL_REMOTE_APP_TRANSITION_ANIMATIONS" 4879 android:protectionLevel="signature|privileged" /> 4880 4881 <!-- Allows an application to watch changes and/or active state of app ops. 4882 @hide <p>Not for use by third-party applications. --> 4883 <permission android:name="android.permission.WATCH_APPOPS" 4884 android:protectionLevel="signature|privileged" /> 4885 4886 <!-- Allows an application to directly open the "Open by default" page inside a package's 4887 Details screen. 4888 @hide <p>Not for use by third-party applications. --> 4889 <permission android:name="android.permission.OPEN_APP_OPEN_BY_DEFAULT_SETTINGS" 4890 android:protectionLevel="signature" /> 4891 4892 <!-- Allows hidden API checks to be disabled when starting a process. 4893 @hide <p>Not for use by third-party applications. --> 4894 <permission android:name="android.permission.DISABLE_HIDDEN_API_CHECKS" 4895 android:protectionLevel="signature" /> 4896 4897 <!-- @hide Permission that protects the 4898 {@link android.provider.Telephony.Intents#ACTION_DEFAULT_SMS_PACKAGE_CHANGED_INTERNAL} 4899 broadcast --> 4900 <permission android:name="android.permission.MONITOR_DEFAULT_SMS_PACKAGE" 4901 android:protectionLevel="signature|privileged" /> 4902 4903 <!-- A subclass of {@link android.service.carrier.CarrierMessagingClientService} must be protected with this permission. 4904 <p>Protection level: signature --> 4905 <permission android:name="android.permission.BIND_CARRIER_MESSAGING_CLIENT_SERVICE" 4906 android:protectionLevel="signature" /> 4907 4908 <!-- Must be required by an {@link android.service.watchdog.ExplicitHealthCheckService} to 4909 ensure that only the system can bind to it. 4910 @hide This is not a third-party API (intended for OEMs and system apps). 4911 --> 4912 <permission android:name="android.permission.BIND_EXPLICIT_HEALTH_CHECK_SERVICE" 4913 android:protectionLevel="signature|privileged" /> 4914 4915 <!-- @SystemApi Must be required by an {@link android.service.storage.ExternalStorageService} to 4916 ensure that only the system can bind to it. 4917 @hide This is not a third-party API (intended for OEMs and system apps). 4918 --> 4919 <permission android:name="android.permission.BIND_EXTERNAL_STORAGE_SERVICE" 4920 android:protectionLevel="signature" /> 4921 4922 <!-- @hide Permission that allows configuring appops. 4923 <p>Not for use by third-party applications. --> 4924 <permission android:name="android.permission.MANAGE_APPOPS" 4925 android:protectionLevel="signature" /> 4926 4927 <!-- @hide Permission that allows background clipboard access. 4928 <p>Not for use by third-party applications. --> 4929 <permission android:name="android.permission.READ_CLIPBOARD_IN_BACKGROUND" 4930 android:protectionLevel="signature" /> 4931 4932 <!-- @SystemApi Allows modifying accessibility state. 4933 @hide --> 4934 <permission android:name="android.permission.MANAGE_ACCESSIBILITY" 4935 android:protectionLevel="signature|setup" /> 4936 4937 <!-- @SystemApi Allows an app to grant a profile owner access to device identifiers. 4938 <p>Not for use by third-party applications. 4939 @deprecated 4940 @hide --> 4941 <permission android:name="android.permission.GRANT_PROFILE_OWNER_DEVICE_IDS_ACCESS" 4942 android:protectionLevel="signature" /> 4943 4944 <!-- Allows an app to mark a profile owner as managing an organization-owned device. 4945 <p>Not for use by third-party applications. 4946 @hide --> 4947 <permission android:name="android.permission.MARK_DEVICE_ORGANIZATION_OWNED" 4948 android:protectionLevel="signature" /> 4949 4950 <!-- Allows financial apps to read filtered sms messages. 4951 Protection level: signature|appop --> 4952 <permission android:name="android.permission.SMS_FINANCIAL_TRANSACTIONS" 4953 android:protectionLevel="signature|appop" /> 4954 4955 <!-- Required for apps targeting {@link android.os.Build.VERSION_CODES#Q} that want to use 4956 {@link android.app.Notification.Builder#setFullScreenIntent notification full screen 4957 intents}. 4958 <p>Protection level: normal --> 4959 <permission android:name="android.permission.USE_FULL_SCREEN_INTENT" 4960 android:protectionLevel="normal" /> 4961 4962 <!-- @SystemApi Allows requesting the framework broadcast the 4963 {@link Intent#ACTION_DEVICE_CUSTOMIZATION_READY} intent. 4964 @hide --> 4965 <permission android:name="android.permission.SEND_DEVICE_CUSTOMIZATION_READY" 4966 android:protectionLevel="signature|privileged" /> 4967 4968 <!-- @SystemApi Permission that protects the {@link Intent#ACTION_DEVICE_CUSTOMIZATION_READY} 4969 intent. 4970 @hide --> 4971 <permission android:name="android.permission.RECEIVE_DEVICE_CUSTOMIZATION_READY" 4972 android:protectionLevel="signature|preinstalled" /> 4973 4974 <!-- @SystemApi Allows wallpaper to be rendered in ambient mode. 4975 @hide --> 4976 <permission android:name="android.permission.AMBIENT_WALLPAPER" 4977 android:protectionLevel="signature|preinstalled" /> 4978 4979 <!-- @SystemApi Allows sensor privacy to be modified. 4980 @hide --> 4981 <permission android:name="android.permission.MANAGE_SENSOR_PRIVACY" 4982 android:protectionLevel="signature" /> 4983 <!-- @SystemApi Permission that protects the {@link Intent#ACTION_REVIEW_ACCESSIBILITY_SERVICES} 4984 intent. 4985 @hide --> 4986 <permission android:name="android.permission.REVIEW_ACCESSIBILITY_SERVICES" 4987 android:protectionLevel="signature" /> 4988 4989 <!-- @SystemApi Allows an activity to replace the app name and icon displayed in share targets 4990 in the sharesheet for the Q-release and later. 4991 @hide <p>Not for use by third-party applications.</p> --> 4992 <permission android:name="android.permission.SUBSTITUTE_SHARE_TARGET_APP_NAME_AND_ICON" 4993 android:protectionLevel="signature|privileged" /> 4994 4995 <!-- @SystemApi Allows an application to access shared libraries. 4996 @hide --> 4997 <permission android:name="android.permission.ACCESS_SHARED_LIBRARIES" 4998 android:protectionLevel="signature|installer" /> 4999 5000 <!-- Allows an app to log compat change usage. 5001 @hide <p>Not for use by third-party applications.</p> --> 5002 <permission android:name="android.permission.LOG_COMPAT_CHANGE" 5003 android:protectionLevel="signature|privileged" /> 5004 <!-- Allows an app to read compat change config. 5005 @hide <p>Not for use by third-party applications.</p> --> 5006 <permission android:name="android.permission.READ_COMPAT_CHANGE_CONFIG" 5007 android:protectionLevel="signature|privileged" /> 5008 <!-- Allows an app to override compat change config. 5009 @hide <p>Not for use by third-party applications.</p> --> 5010 <permission android:name="android.permission.OVERRIDE_COMPAT_CHANGE_CONFIG" 5011 android:protectionLevel="signature|privileged" /> 5012 5013 <!-- Allows input events to be monitored. Very dangerous! @hide --> 5014 <permission android:name="android.permission.MONITOR_INPUT" 5015 android:protectionLevel="signature" /> 5016 <!-- Allows the caller to change the associations between input devices and displays. 5017 Very dangerous! @hide --> 5018 <permission android:name="android.permission.ASSOCIATE_INPUT_DEVICE_TO_DISPLAY_BY_PORT" 5019 android:protectionLevel="signature" /> 5020 5021 <!-- Allows query of any normal app on the device, regardless of manifest declarations. 5022 <p>Protection level: normal --> 5023 <permission android:name="android.permission.QUERY_ALL_PACKAGES" 5024 android:protectionLevel="normal" /> 5025 <uses-permission android:name="android.permission.QUERY_ALL_PACKAGES"/> 5026 5027 <!-- @hide Allow the caller to collect debugging data from processes that otherwise 5028 would require USAGE_STATS. Before sharing this data with other apps, holders 5029 of this permission are REQUIRED to themselves check that the caller has 5030 PACKAGE_USAGE_STATS and OP_GET_USAGE_STATS. --> 5031 <permission android:name="android.permission.PEEK_DROPBOX_DATA" 5032 android:protectionLevel="signature" /> 5033 5034 <!-- @SystemApi Allows an application to access TV tuner HAL 5035 <p>Not for use by third-party applications. 5036 @hide --> 5037 <permission android:name="android.permission.ACCESS_TV_TUNER" 5038 android:protectionLevel="signature|privileged|vendorPrivileged" /> 5039 5040 <!-- @SystemApi Allows an application to access descrambler of TV tuner HAL 5041 <p>Not for use by third-party applications. 5042 @hide --> 5043 <permission android:name="android.permission.ACCESS_TV_DESCRAMBLER" 5044 android:protectionLevel="signature|privileged|vendorPrivileged" /> 5045 5046 <!-- Allows an application to create trusted displays. @hide --> 5047 <permission android:name="android.permission.ADD_TRUSTED_DISPLAY" 5048 android:protectionLevel="signature" /> 5049 5050 <!-- @hide @SystemApi Allows an application to access locusId events in the usage stats. --> 5051 <permission android:name="android.permission.ACCESS_LOCUS_ID_USAGE_STATS" 5052 android:protectionLevel="signature|appPredictor" /> 5053 5054 <!-- @hide Allows an application to create/destroy input consumer. --> 5055 <permission android:name="android.permission.INPUT_CONSUMER" 5056 android:protectionLevel="signature" /> 5057 5058 <!-- Attribution for Country Detector. --> 5059 <attribution android:tag="CountryDetector" android:label="@string/country_detector"/> 5060 <!-- Attribution for Location service. --> 5061 <attribution android:tag="LocationService" android:label="@string/location_service"/> 5062 <!-- Attribution for Sensor Notification service. --> 5063 <attribution android:tag="SensorNotificationService" 5064 android:label="@string/sensor_notification_service"/> 5065 <!-- Feature Id for Twilight service. --> 5066 <attribution android:tag="TwilightService" android:label="@string/twilight_service"/> 5067 5068 <application android:process="system" 5069 android:persistent="true" 5070 android:hasCode="false" 5071 android:label="@string/android_system_label" 5072 android:allowClearUserData="false" 5073 android:backupAgent="com.android.server.backup.SystemBackupAgent" 5074 android:killAfterRestore="false" 5075 android:icon="@drawable/ic_launcher_android" 5076 android:supportsRtl="true" 5077 android:theme="@style/Theme.DeviceDefault.Light.DarkActionBar" 5078 android:defaultToDeviceProtectedStorage="true" 5079 android:forceQueryable="true" 5080 android:directBootAware="true"> 5081 <activity android:name="com.android.internal.app.ChooserActivity" 5082 android:theme="@style/Theme.DeviceDefault.Chooser" 5083 android:finishOnCloseSystemDialogs="true" 5084 android:excludeFromRecents="true" 5085 android:documentLaunchMode="never" 5086 android:relinquishTaskIdentity="true" 5087 android:configChanges="screenSize|smallestScreenSize|screenLayout|orientation|keyboard|keyboardHidden" 5088 android:process=":ui" 5089 android:visibleToInstantApps="true"> 5090 <intent-filter> 5091 <action android:name="android.intent.action.CHOOSER" /> 5092 <category android:name="android.intent.category.DEFAULT" /> 5093 <category android:name="android.intent.category.VOICE" /> 5094 </intent-filter> 5095 </activity> 5096 <activity android:name="com.android.internal.accessibility.dialog.AccessibilityShortcutChooserActivity" 5097 android:exported="false" 5098 android:theme="@style/Theme.DeviceDefault.Dialog.Alert.DayNight" 5099 android:finishOnCloseSystemDialogs="true" 5100 android:excludeFromRecents="true" 5101 android:documentLaunchMode="never" 5102 android:relinquishTaskIdentity="true" 5103 android:configChanges="screenSize|smallestScreenSize|screenLayout|orientation|keyboard|keyboardHidden" 5104 android:process=":ui" 5105 android:visibleToInstantApps="true"> 5106 <intent-filter> 5107 <action android:name="com.android.internal.intent.action.CHOOSE_ACCESSIBILITY_BUTTON" /> 5108 <category android:name="android.intent.category.DEFAULT" /> 5109 </intent-filter> 5110 </activity> 5111 <activity android:name="com.android.internal.accessibility.dialog.AccessibilityButtonChooserActivity" 5112 android:exported="false" 5113 android:theme="@style/Theme.DeviceDefault.Resolver" 5114 android:finishOnCloseSystemDialogs="true" 5115 android:excludeFromRecents="true" 5116 android:documentLaunchMode="never" 5117 android:relinquishTaskIdentity="true" 5118 android:configChanges="screenSize|smallestScreenSize|screenLayout|orientation|keyboard|keyboardHidden" 5119 android:process=":ui" 5120 android:visibleToInstantApps="true"> 5121 <intent-filter> 5122 <action android:name="com.android.internal.intent.action.CHOOSE_ACCESSIBILITY_BUTTON" /> 5123 <category android:name="android.intent.category.DEFAULT" /> 5124 </intent-filter> 5125 </activity> 5126 <activity android:name="com.android.internal.app.IntentForwarderActivity" 5127 android:finishOnCloseSystemDialogs="true" 5128 android:theme="@style/Theme.Translucent.NoTitleBar" 5129 android:excludeFromRecents="true" 5130 android:label="@string/user_owner_label" 5131 android:exported="true" 5132 android:visibleToInstantApps="true" 5133 > 5134 </activity> 5135 <activity-alias android:name="com.android.internal.app.ForwardIntentToParent" 5136 android:targetActivity="com.android.internal.app.IntentForwarderActivity" 5137 android:exported="true" 5138 android:label="@string/user_owner_label"> 5139 </activity-alias> 5140 <activity-alias android:name="com.android.internal.app.ForwardIntentToManagedProfile" 5141 android:targetActivity="com.android.internal.app.IntentForwarderActivity" 5142 android:icon="@drawable/ic_corp_badge" 5143 android:exported="true" 5144 android:label="@string/managed_profile_label"> 5145 </activity-alias> 5146 <activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity" 5147 android:theme="@style/Theme.DeviceDefault.System.Dialog.Alert" 5148 android:label="@string/heavy_weight_switcher_title" 5149 android:finishOnCloseSystemDialogs="true" 5150 android:excludeFromRecents="true" 5151 android:process=":ui"> 5152 </activity> 5153 <activity android:name="com.android.internal.app.PlatLogoActivity" 5154 android:theme="@style/Theme.DeviceDefault.DayNight" 5155 android:configChanges="orientation|keyboardHidden" 5156 android:icon="@drawable/platlogo" 5157 android:process=":ui"> 5158 </activity> 5159 <activity android:name="com.android.internal.app.DisableCarModeActivity" 5160 android:theme="@style/Theme.NoDisplay" 5161 android:excludeFromRecents="true" 5162 android:process=":ui"> 5163 </activity> 5164 5165 <activity android:name="android.accounts.ChooseAccountActivity" 5166 android:excludeFromRecents="true" 5167 android:exported="true" 5168 android:theme="@style/Theme.DeviceDefault.Light.Dialog" 5169 android:label="@string/choose_account_label" 5170 android:process=":ui" 5171 android:visibleToInstantApps="true"> 5172 </activity> 5173 5174 <activity android:name="android.accounts.ChooseTypeAndAccountActivity" 5175 android:excludeFromRecents="true" 5176 android:exported="true" 5177 android:theme="@style/Theme.DeviceDefault.Light.Dialog" 5178 android:label="@string/choose_account_label" 5179 android:process=":ui" 5180 android:visibleToInstantApps="true"> 5181 </activity> 5182 5183 <activity android:name="android.accounts.ChooseAccountTypeActivity" 5184 android:excludeFromRecents="true" 5185 android:theme="@style/Theme.DeviceDefault.Light.Dialog" 5186 android:label="@string/choose_account_label" 5187 android:process=":ui" 5188 android:visibleToInstantApps="true"> 5189 </activity> 5190 5191 <activity android:name="android.accounts.CantAddAccountActivity" 5192 android:excludeFromRecents="true" 5193 android:exported="true" 5194 android:theme="@style/Theme.DeviceDefault.Light.Dialog.NoActionBar" 5195 android:process=":ui"> 5196 </activity> 5197 5198 <activity android:name="android.accounts.GrantCredentialsPermissionActivity" 5199 android:excludeFromRecents="true" 5200 android:exported="true" 5201 android:theme="@style/Theme.DeviceDefault.Light.DialogWhenLarge" 5202 android:process=":ui" 5203 android:visibleToInstantApps="true"> 5204 </activity> 5205 5206 <activity android:name="android.content.SyncActivityTooManyDeletes" 5207 android:theme="@style/Theme.DeviceDefault.Light.Dialog" 5208 android:label="@string/sync_too_many_deletes" 5209 android:process=":ui"> 5210 </activity> 5211 5212 <activity android:name="com.android.internal.app.ShutdownActivity" 5213 android:permission="android.permission.SHUTDOWN" 5214 android:theme="@style/Theme.NoDisplay" 5215 android:excludeFromRecents="true"> 5216 <intent-filter> 5217 <action android:name="com.android.internal.intent.action.REQUEST_SHUTDOWN" /> 5218 <category android:name="android.intent.category.DEFAULT" /> 5219 </intent-filter> 5220 <intent-filter> 5221 <action android:name="android.intent.action.REBOOT" /> 5222 <category android:name="android.intent.category.DEFAULT" /> 5223 </intent-filter> 5224 </activity> 5225 5226 <activity android:name="com.android.internal.app.NetInitiatedActivity" 5227 android:theme="@style/Theme.Dialog.Confirmation" 5228 android:excludeFromRecents="true" 5229 android:process=":ui"> 5230 </activity> 5231 5232 <activity android:name="com.android.internal.app.SystemUserHomeActivity" 5233 android:enabled="false" 5234 android:process=":ui" 5235 android:systemUserOnly="true" 5236 android:theme="@style/Theme.Translucent.NoTitleBar"> 5237 <intent-filter android:priority="-100"> 5238 <action android:name="android.intent.action.MAIN" /> 5239 <category android:name="android.intent.category.HOME" /> 5240 </intent-filter> 5241 </activity> 5242 5243 <!-- Activity to prompt user if it's ok to create a new user sandbox for a 5244 specified account. --> 5245 <activity android:name="com.android.internal.app.ConfirmUserCreationActivity" 5246 android:excludeFromRecents="true" 5247 android:process=":ui" 5248 android:theme="@style/Theme.Dialog.Confirmation"> 5249 <intent-filter android:priority="1000"> 5250 <action android:name="android.os.action.CREATE_USER" /> 5251 <category android:name="android.intent.category.DEFAULT" /> 5252 </intent-filter> 5253 </activity> 5254 5255 <activity android:name="com.android.internal.app.SuspendedAppActivity" 5256 android:theme="@style/Theme.DeviceDefault.Dialog.Alert.DayNight" 5257 android:excludeFromRecents="true" 5258 android:process=":ui"> 5259 </activity> 5260 5261 <activity android:name="com.android.internal.app.UnlaunchableAppActivity" 5262 android:theme="@style/Theme.Dialog.Confirmation" 5263 android:excludeFromRecents="true" 5264 android:process=":ui"> 5265 </activity> 5266 5267 <activity android:name="com.android.internal.app.BlockedAppActivity" 5268 android:theme="@style/Theme.Dialog.Confirmation" 5269 android:excludeFromRecents="true" 5270 android:lockTaskMode="always" 5271 android:process=":ui"> 5272 </activity> 5273 5274 <activity android:name="com.android.settings.notification.NotificationAccessConfirmationActivity" 5275 android:theme="@style/Theme.Dialog.Confirmation" 5276 android:excludeFromRecents="true"> 5277 </activity> 5278 5279 <activity android:name="com.android.internal.app.HarmfulAppWarningActivity" 5280 android:theme="@style/Theme.Dialog.Confirmation" 5281 android:excludeFromRecents="true" 5282 android:process=":ui" 5283 android:label="@string/harmful_app_warning_title" 5284 android:exported="false"> 5285 </activity> 5286 5287 <receiver android:name="com.android.server.BootReceiver" 5288 android:systemUserOnly="true"> 5289 <intent-filter android:priority="1000"> 5290 <action android:name="android.intent.action.BOOT_COMPLETED" /> 5291 </intent-filter> 5292 </receiver> 5293 5294 <receiver android:name="com.android.server.updates.CertPinInstallReceiver" 5295 android:permission="android.permission.UPDATE_CONFIG"> 5296 <intent-filter> 5297 <action android:name="android.intent.action.UPDATE_PINS" /> 5298 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 5299 </intent-filter> 5300 </receiver> 5301 5302 <receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver" 5303 android:permission="android.permission.UPDATE_CONFIG"> 5304 <intent-filter> 5305 <action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" /> 5306 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 5307 </intent-filter> 5308 </receiver> 5309 5310 <receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver" 5311 android:permission="android.permission.UPDATE_CONFIG"> 5312 <intent-filter> 5313 <action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" /> 5314 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 5315 </intent-filter> 5316 </receiver> 5317 5318 <receiver android:name="com.android.server.updates.NetworkWatchlistInstallReceiver" 5319 android:permission="android.permission.UPDATE_CONFIG"> 5320 <intent-filter> 5321 <action android:name="android.intent.action.UPDATE_NETWORK_WATCHLIST" /> 5322 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 5323 </intent-filter> 5324 </receiver> 5325 5326 <receiver android:name="com.android.server.updates.ApnDbInstallReceiver" 5327 android:permission="android.permission.UPDATE_CONFIG"> 5328 <intent-filter> 5329 <action android:name="com.android.internal.intent.action.UPDATE_APN_DB" /> 5330 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 5331 </intent-filter> 5332 </receiver> 5333 5334 <receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver" 5335 android:permission="android.permission.UPDATE_CONFIG"> 5336 <intent-filter> 5337 <action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" /> 5338 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 5339 </intent-filter> 5340 </receiver> 5341 5342 <receiver android:name="com.android.server.updates.CertificateTransparencyLogInstallReceiver" 5343 android:permission="android.permission.UPDATE_CONFIG"> 5344 <intent-filter> 5345 <action android:name="android.intent.action.UPDATE_CT_LOGS" /> 5346 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 5347 </intent-filter> 5348 </receiver> 5349 5350 <receiver android:name="com.android.server.updates.LangIdInstallReceiver" 5351 android:permission="android.permission.UPDATE_CONFIG"> 5352 <intent-filter> 5353 <action android:name="android.intent.action.UPDATE_LANG_ID" /> 5354 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 5355 </intent-filter> 5356 </receiver> 5357 5358 <receiver android:name="com.android.server.updates.SmartSelectionInstallReceiver" 5359 android:permission="android.permission.UPDATE_CONFIG"> 5360 <intent-filter> 5361 <action android:name="android.intent.action.UPDATE_SMART_SELECTION" /> 5362 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 5363 </intent-filter> 5364 </receiver> 5365 5366 <receiver android:name="com.android.server.updates.ConversationActionsInstallReceiver" 5367 android:permission="android.permission.UPDATE_CONFIG"> 5368 <intent-filter> 5369 <action android:name="android.intent.action.UPDATE_CONVERSATION_ACTIONS" /> 5370 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 5371 </intent-filter> 5372 </receiver> 5373 5374 <receiver android:name="com.android.server.updates.CarrierIdInstallReceiver" 5375 android:permission="android.permission.UPDATE_CONFIG"> 5376 <intent-filter> 5377 <action android:name="android.os.action.UPDATE_CARRIER_ID_DB" /> 5378 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 5379 </intent-filter> 5380 </receiver> 5381 5382 <receiver android:name="com.android.server.updates.EmergencyNumberDbInstallReceiver" 5383 android:permission="android.permission.UPDATE_CONFIG"> 5384 <intent-filter> 5385 <action android:name="android.os.action.UPDATE_EMERGENCY_NUMBER_DB" /> 5386 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 5387 </intent-filter> 5388 </receiver> 5389 5390 <receiver android:name="com.android.server.MasterClearReceiver" 5391 android:permission="android.permission.MASTER_CLEAR"> 5392 <intent-filter 5393 android:priority="100" > 5394 <!-- For Checkin, Settings, etc.: action=FACTORY_RESET --> 5395 <action android:name="android.intent.action.FACTORY_RESET" /> 5396 <!-- As above until all the references to the deprecated MASTER_CLEAR get updated to 5397 FACTORY_RESET. --> 5398 <action android:name="android.intent.action.MASTER_CLEAR" /> 5399 5400 <!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR --> 5401 <action android:name="com.google.android.c2dm.intent.RECEIVE" /> 5402 <category android:name="android.intent.category.MASTER_CLEAR" /> 5403 </intent-filter> 5404 </receiver> 5405 5406 <receiver android:name="com.android.server.WallpaperUpdateReceiver" 5407 android:permission="android.permission.RECEIVE_DEVICE_CUSTOMIZATION_READY"> 5408 <intent-filter> 5409 <action android:name="android.intent.action.DEVICE_CUSTOMIZATION_READY"/> 5410 </intent-filter> 5411 </receiver> 5412 5413 <service android:name="android.hardware.location.GeofenceHardwareService" 5414 android:permission="android.permission.LOCATION_HARDWARE" 5415 android:exported="false" /> 5416 5417 <service android:name="com.android.server.MountServiceIdler" 5418 android:exported="true" 5419 android:permission="android.permission.BIND_JOB_SERVICE" > 5420 </service> 5421 5422 <service android:name="com.android.server.ZramWriteback" 5423 android:exported="false" 5424 android:permission="android.permission.BIND_JOB_SERVICE" > 5425 </service> 5426 5427 <service android:name="com.android.server.backup.FullBackupJob" 5428 android:exported="true" 5429 android:permission="android.permission.BIND_JOB_SERVICE" > 5430 </service> 5431 5432 <service android:name="com.android.server.backup.KeyValueBackupJob" 5433 android:permission="android.permission.BIND_JOB_SERVICE" > 5434 </service> 5435 5436 <service android:name="com.android.server.content.SyncJobService" 5437 android:permission="android.permission.BIND_JOB_SERVICE" > 5438 </service> 5439 5440 <service android:name="com.android.server.pm.BackgroundDexOptService" 5441 android:exported="true" 5442 android:permission="android.permission.BIND_JOB_SERVICE"> 5443 </service> 5444 5445 <service android:name="com.android.server.pm.DynamicCodeLoggingService" 5446 android:permission="android.permission.BIND_JOB_SERVICE"> 5447 </service> 5448 5449 <service android:name="com.android.server.PruneInstantAppsJobService" 5450 android:permission="android.permission.BIND_JOB_SERVICE" > 5451 </service> 5452 5453 <service android:name="com.android.server.storage.DiskStatsLoggingService" 5454 android:permission="android.permission.BIND_JOB_SERVICE" > 5455 </service> 5456 5457 <service android:name="com.android.server.PreloadsFileCacheExpirationJobService" 5458 android:permission="android.permission.BIND_JOB_SERVICE" > 5459 </service> 5460 5461 <service android:name="com.android.server.camera.CameraStatsJobService" 5462 android:permission="android.permission.BIND_JOB_SERVICE" > 5463 </service> 5464 5465 <service android:name="com.android.server.timezone.TimeZoneUpdateIdler" 5466 android:permission="android.permission.BIND_JOB_SERVICE" > 5467 </service> 5468 5469 <service android:name="com.android.server.usage.UsageStatsIdleService" 5470 android:permission="android.permission.BIND_JOB_SERVICE" > 5471 </service> 5472 5473 <service android:name="com.android.server.net.watchlist.ReportWatchlistJobService" 5474 android:permission="android.permission.BIND_JOB_SERVICE" > 5475 </service> 5476 5477 <service android:name="com.android.server.display.BrightnessIdleJob" 5478 android:permission="android.permission.BIND_JOB_SERVICE" > 5479 </service> 5480 5481 <service android:name="com.android.server.people.data.DataMaintenanceService" 5482 android:permission="android.permission.BIND_JOB_SERVICE" > 5483 </service> 5484 5485 <service 5486 android:name="com.android.server.autofill.AutofillCompatAccessibilityService" 5487 android:permission="android.permission.BIND_ACCESSIBILITY_SERVICE" 5488 android:visibleToInstantApps="true" 5489 android:exported="true"> 5490 <meta-data 5491 android:name="android.accessibilityservice" 5492 android:resource="@xml/autofill_compat_accessibility_service" /> 5493 </service> 5494 5495 <service android:name="com.google.android.startop.iorap.IorapForwardingService$IorapdJobServiceProxy" 5496 android:permission="android.permission.BIND_JOB_SERVICE" > 5497 </service> 5498 5499 <service android:name="com.android.server.blob.BlobStoreIdleJobService" 5500 android:permission="android.permission.BIND_JOB_SERVICE"> 5501 </service> 5502 5503 <service android:name="com.android.server.pm.PackageManagerShellCommandDataLoader" 5504 android:exported="false"> 5505 <intent-filter> 5506 <action android:name="android.intent.action.LOAD_DATA"/> 5507 </intent-filter> 5508 </service> 5509 5510 <provider 5511 android:name="com.android.server.textclassifier.IconsContentProvider" 5512 android:authorities="com.android.textclassifier.icons" 5513 android:singleUser="true" 5514 android:enabled="true" 5515 android:exported="true"> 5516 </provider> 5517 5518 </application> 5519 5520</manifest> 5521