• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1<?xml version="1.0" encoding="utf-8"?>
2<!--
3/* //device/apps/common/AndroidManifest.xml
4**
5** Copyright 2006, The Android Open Source Project
6**
7** Licensed under the Apache License, Version 2.0 (the "License");
8** you may not use this file except in compliance with the License.
9** You may obtain a copy of the License at
10**
11**     http://www.apache.org/licenses/LICENSE-2.0
12**
13** Unless required by applicable law or agreed to in writing, software
14** distributed under the License is distributed on an "AS IS" BASIS,
15** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16** See the License for the specific language governing permissions and
17** limitations under the License.
18*/
19-->
20<manifest xmlns:android="http://schemas.android.com/apk/res/android"
21    package="android" coreApp="true" android:sharedUserId="android.uid.system"
22    android:sharedUserLabel="@string/android_system_label">
23
24    <!-- ================================================ -->
25    <!-- Special broadcasts that only the system can send -->
26    <!-- ================================================ -->
27    <eat-comment />
28
29    <protected-broadcast android:name="android.intent.action.SCREEN_OFF" />
30    <protected-broadcast android:name="android.intent.action.SCREEN_ON" />
31    <protected-broadcast android:name="android.intent.action.USER_PRESENT" />
32    <protected-broadcast android:name="android.intent.action.TIME_SET" />
33    <protected-broadcast android:name="android.intent.action.TIME_TICK" />
34    <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" />
35    <protected-broadcast android:name="android.intent.action.DATE_CHANGED" />
36    <protected-broadcast android:name="android.intent.action.PRE_BOOT_COMPLETED" />
37    <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" />
38    <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" />
39    <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" />
40    <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" />
41    <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" />
42    <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" />
43    <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" />
44    <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" />
45    <protected-broadcast android:name="android.intent.action.PACKAGE_ENABLE_ROLLBACK" />
46    <protected-broadcast android:name="android.intent.action.CANCEL_ENABLE_ROLLBACK" />
47    <protected-broadcast android:name="android.intent.action.ROLLBACK_COMMITTED" />
48    <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" />
49    <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" />
50    <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" />
51    <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_INTEGRITY_VERIFICATION" />
52    <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" />
53    <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" />
54    <protected-broadcast android:name="android.intent.action.PACKAGES_SUSPENDED" />
55    <protected-broadcast android:name="android.intent.action.PACKAGES_UNSUSPENDED" />
56    <protected-broadcast android:name="android.intent.action.PACKAGE_UNSUSPENDED_MANUALLY" />
57    <protected-broadcast android:name="android.intent.action.DISTRACTING_PACKAGES_CHANGED" />
58    <protected-broadcast android:name="android.intent.action.ACTION_PREFERRED_ACTIVITY_CHANGED" />
59    <protected-broadcast android:name="android.intent.action.UID_REMOVED" />
60    <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" />
61    <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" />
62    <protected-broadcast android:name="android.intent.action.SPLIT_CONFIGURATION_CHANGED" />
63    <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" />
64    <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" />
65    <protected-broadcast android:name="android.intent.action.BATTERY_LEVEL_CHANGED" />
66    <protected-broadcast android:name="android.intent.action.BATTERY_LOW" />
67    <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" />
68    <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" />
69    <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" />
70    <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" />
71    <protected-broadcast android:name="android.intent.action.CHARGING" />
72    <protected-broadcast android:name="android.intent.action.DISCHARGING" />
73    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" />
74    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" />
75    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" />
76    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" />
77    <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" />
78    <protected-broadcast android:name="android.intent.action.REBOOT" />
79    <protected-broadcast android:name="android.intent.action.DOCK_EVENT" />
80    <protected-broadcast android:name="android.intent.action.THERMAL_EVENT" />
81    <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" />
82    <protected-broadcast android:name="android.intent.action.USER_ADDED" />
83    <protected-broadcast android:name="android.intent.action.USER_REMOVED" />
84    <protected-broadcast android:name="android.intent.action.USER_STARTING" />
85    <protected-broadcast android:name="android.intent.action.USER_STARTED" />
86    <protected-broadcast android:name="android.intent.action.USER_STOPPING" />
87    <protected-broadcast android:name="android.intent.action.USER_STOPPED" />
88    <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" />
89    <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" />
90    <protected-broadcast android:name="android.intent.action.USER_SWITCHED" />
91    <protected-broadcast android:name="android.intent.action.USER_INITIALIZE" />
92    <protected-broadcast android:name="android.intent.action.INTENT_FILTER_NEEDS_VERIFICATION" />
93    <protected-broadcast android:name="android.intent.action.OVERLAY_ADDED" />
94    <protected-broadcast android:name="android.intent.action.OVERLAY_CHANGED" />
95    <protected-broadcast android:name="android.intent.action.OVERLAY_REMOVED" />
96    <protected-broadcast android:name="android.intent.action.OVERLAY_PRIORITY_CHANGED" />
97    <protected-broadcast android:name="android.intent.action.MY_PACKAGE_SUSPENDED" />
98    <protected-broadcast android:name="android.intent.action.MY_PACKAGE_UNSUSPENDED" />
99
100    <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED" />
101    <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGING" />
102    <protected-broadcast android:name="android.os.action.DEVICE_IDLE_MODE_CHANGED" />
103    <protected-broadcast android:name="android.os.action.POWER_SAVE_WHITELIST_CHANGED" />
104    <protected-broadcast android:name="android.os.action.POWER_SAVE_TEMP_WHITELIST_CHANGED" />
105    <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED_INTERNAL" />
106
107    <!-- @deprecated This is rarely used and will be phased out soon. -->
108    <protected-broadcast android:name="android.os.action.SCREEN_BRIGHTNESS_BOOST_CHANGED" />
109
110    <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" />
111    <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" />
112    <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE_PRIORITIZED" />
113    <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE_PRIORITIZED" />
114    <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" />
115    <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" />
116    <protected-broadcast android:name="android.app.action.NEXT_ALARM_CLOCK_CHANGED" />
117
118    <protected-broadcast android:name="android.app.action.USER_ADDED" />
119    <protected-broadcast android:name="android.app.action.USER_REMOVED" />
120    <protected-broadcast android:name="android.app.action.USER_STARTED" />
121    <protected-broadcast android:name="android.app.action.USER_STOPPED" />
122    <protected-broadcast android:name="android.app.action.USER_SWITCHED" />
123
124    <protected-broadcast android:name="android.app.action.BUGREPORT_SHARING_DECLINED" />
125    <protected-broadcast android:name="android.app.action.BUGREPORT_FAILED" />
126    <protected-broadcast android:name="android.app.action.BUGREPORT_SHARE" />
127    <protected-broadcast android:name="android.app.action.SHOW_DEVICE_MONITORING_DIALOG" />
128    <protected-broadcast android:name="android.intent.action.PENDING_INCIDENT_REPORTS_CHANGED" />
129    <protected-broadcast android:name="android.intent.action.INCIDENT_REPORT_READY" />
130
131    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" />
132    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" />
133    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" />
134    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" />
135    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_HOST_RESTORED" />
136    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_RESTORED" />
137
138    <protected-broadcast android:name="android.os.action.SETTING_RESTORED" />
139
140    <protected-broadcast android:name="android.app.backup.intent.CLEAR" />
141    <protected-broadcast android:name="android.app.backup.intent.INIT" />
142
143    <protected-broadcast android:name="android.bluetooth.intent.DISCOVERABLE_TIMEOUT" />
144    <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" />
145    <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" />
146    <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" />
147    <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" />
148    <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" />
149    <protected-broadcast android:name="android.bluetooth.adapter.action.BLUETOOTH_ADDRESS_CHANGED" />
150    <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" />
151    <protected-broadcast android:name="android.bluetooth.device.action.UUID" />
152    <protected-broadcast android:name="android.bluetooth.device.action.MAS_INSTANCE" />
153    <protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" />
154    <protected-broadcast android:name="android.bluetooth.device.action.FOUND" />
155    <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" />
156    <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" />
157    <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" />
158    <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" />
159    <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" />
160    <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" />
161    <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" />
162    <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" />
163    <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" />
164    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" />
165    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" />
166    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" />
167    <protected-broadcast android:name="android.bluetooth.device.action.SDP_RECORD" />
168    <protected-broadcast android:name="android.bluetooth.device.action.BATTERY_LEVEL_CHANGED" />
169    <protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" />
170    <protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" />
171    <protected-broadcast
172        android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" />
173    <protected-broadcast
174        android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" />
175    <protected-broadcast
176        android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" />
177    <protected-broadcast
178        android:name="android.bluetooth.headset.action.HF_INDICATORS_VALUE_CHANGED" />
179    <protected-broadcast
180        android:name="android.bluetooth.headset.profile.action.ACTIVE_DEVICE_CHANGED" />
181    <protected-broadcast
182        android:name="android.bluetooth.headsetclient.profile.action.CONNECTION_STATE_CHANGED" />
183    <protected-broadcast
184        android:name="android.bluetooth.headsetclient.profile.action.AUDIO_STATE_CHANGED" />
185    <protected-broadcast
186        android:name="android.bluetooth.headsetclient.profile.action.AG_EVENT" />
187    <protected-broadcast
188        android:name="android.bluetooth.headsetclient.profile.action.AG_CALL_CHANGED" />
189    <protected-broadcast
190        android:name="android.bluetooth.headsetclient.profile.action.RESULT" />
191    <protected-broadcast
192        android:name="android.bluetooth.headsetclient.profile.action.LAST_VTAG" />
193    <protected-broadcast
194        android:name="android.bluetooth.hearingaid.profile.action.CONNECTION_STATE_CHANGED" />
195    <protected-broadcast
196        android:name="android.bluetooth.hearingaid.profile.action.PLAYING_STATE_CHANGED" />
197    <protected-broadcast
198        android:name="android.bluetooth.hearingaid.profile.action.ACTIVE_DEVICE_CHANGED" />
199    <protected-broadcast
200        android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" />
201    <protected-broadcast
202        android:name="android.bluetooth.a2dp.profile.action.ACTIVE_DEVICE_CHANGED" />
203    <protected-broadcast
204        android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" />
205    <protected-broadcast
206        android:name="android.bluetooth.a2dp.profile.action.CODEC_CONFIG_CHANGED" />
207    <protected-broadcast
208        android:name="android.bluetooth.a2dp-sink.profile.action.CONNECTION_STATE_CHANGED" />
209    <protected-broadcast
210        android:name="android.bluetooth.a2dp-sink.profile.action.PLAYING_STATE_CHANGED" />
211    <protected-broadcast
212        android:name="android.bluetooth.a2dp-sink.profile.action.AUDIO_CONFIG_CHANGED" />
213    <protected-broadcast
214        android:name="android.bluetooth.avrcp-controller.profile.action.BROWSE_CONNECTION_STATE_CHANGED" />
215    <protected-broadcast
216        android:name="android.bluetooth.avrcp-controller.profile.action.CONNECTION_STATE_CHANGED" />
217    <protected-broadcast
218        android:name="android.bluetooth.avrcp-controller.profile.action.FOLDER_LIST" />
219    <protected-broadcast
220        android:name="android.bluetooth.avrcp-controller.profile.action.TRACK_EVENT" />
221    <protected-broadcast
222        android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" />
223    <protected-broadcast
224        android:name="android.bluetooth.input.profile.action.IDLE_TIME_CHANGED" />
225    <protected-broadcast
226        android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" />
227    <protected-broadcast
228        android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" />
229    <protected-broadcast
230        android:name="android.bluetooth.hiddevice.profile.action.CONNECTION_STATE_CHANGED" />
231    <protected-broadcast
232        android:name="android.bluetooth.map.profile.action.CONNECTION_STATE_CHANGED" />
233    <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.CONNECTION_STATE_CHANGED" />
234    <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_RECEIVED" />
235    <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_SENT_SUCCESSFULLY" />
236    <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_DELIVERED_SUCCESSFULLY" />
237    <protected-broadcast
238        android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_SENT" />
239    <protected-broadcast
240        android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_DELIVERY" />
241    <protected-broadcast
242        android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" />
243    <protected-broadcast android:name="android.bluetooth.pbap.profile.action.CONNECTION_STATE_CHANGED" />
244    <protected-broadcast android:name="android.bluetooth.pbapclient.profile.action.CONNECTION_STATE_CHANGED" />
245    <protected-broadcast android:name="android.bluetooth.sap.profile.action.CONNECTION_STATE_CHANGED" />
246    <protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" />
247    <protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" />
248    <protected-broadcast android:name="android.btopp.intent.action.LIST" />
249    <protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" />
250    <protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" />
251    <protected-broadcast android:name="android.btopp.intent.action.CONFIRM" />
252    <protected-broadcast android:name="android.btopp.intent.action.HIDE" />
253    <protected-broadcast android:name="android.btopp.intent.action.RETRY" />
254    <protected-broadcast android:name="android.btopp.intent.action.OPEN" />
255    <protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" />
256    <protected-broadcast android:name="android.btopp.intent.action.TRANSFER_COMPLETE" />
257    <protected-broadcast android:name="android.btopp.intent.action.ACCEPT" />
258    <protected-broadcast android:name="android.btopp.intent.action.DECLINE" />
259    <protected-broadcast android:name="com.android.bluetooth.gatt.REFRESH_BATCHED_SCAN" />
260    <protected-broadcast android:name="com.android.bluetooth.pbap.authchall" />
261    <protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" />
262    <protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" />
263    <protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" />
264    <protected-broadcast android:name="com.android.bluetooth.sap.USER_CONFIRM_TIMEOUT" />
265    <protected-broadcast android:name="com.android.bluetooth.sap.action.DISCONNECT_ACTION" />
266
267    <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" />
268
269    <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" />
270    <protected-broadcast android:name="android.hardware.usb.action.USB_PORT_CHANGED" />
271    <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" />
272    <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_DETACHED" />
273    <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" />
274    <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" />
275
276    <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" />
277    <protected-broadcast android:name="android.media.action.HDMI_AUDIO_PLUG" />
278    <protected-broadcast android:name="android.media.action.MICROPHONE_MUTE_CHANGED" />
279    <protected-broadcast android:name="android.media.action.SPEAKERPHONE_STATE_CHANGED" />
280
281    <protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" />
282    <protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" />
283    <protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" />
284    <protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" />
285    <protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" />
286    <protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" />
287    <protected-broadcast android:name="android.media.MASTER_MONO_CHANGED_ACTION" />
288    <protected-broadcast android:name="android.media.MASTER_BALANCE_CHANGED_ACTION" />
289    <protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" />
290    <protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" />
291
292    <protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" />
293    <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" />
294    <protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" />
295    <protected-broadcast android:name="android.intent.action.MEDIA_NOFS" />
296    <protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" />
297    <protected-broadcast android:name="android.intent.action.MEDIA_SHARED" />
298    <protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" />
299    <protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" />
300    <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" />
301    <protected-broadcast android:name="android.intent.action.MEDIA_EJECT" />
302
303    <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL" />
304    <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" />
305    <!-- @deprecated.  Only {@link android.net.ConnectivityManager.CONNECTIVITY_ACTION} is sent. -->
306    <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" />
307    <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" />
308    <protected-broadcast android:name="android.net.conn.RESTRICT_BACKGROUND_CHANGED" />
309    <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" />
310    <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" />
311
312    <protected-broadcast android:name="android.net.nsd.STATE_CHANGED" />
313
314    <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" />
315    <protected-broadcast android:name="android.nfc.action.PREFERRED_PAYMENT_CHANGED" />
316    <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" />
317    <protected-broadcast android:name="com.android.nfc.action.LLCP_UP" />
318    <protected-broadcast android:name="com.android.nfc.action.LLCP_DOWN" />
319    <protected-broadcast android:name="com.android.nfc.cardemulation.action.CLOSE_TAP_DIALOG" />
320    <protected-broadcast android:name="com.android.nfc.handover.action.ALLOW_CONNECT" />
321    <protected-broadcast android:name="com.android.nfc.handover.action.DENY_CONNECT" />
322    <protected-broadcast android:name="com.android.nfc.handover.action.TIMEOUT_CONNECT" />
323    <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" />
324    <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" />
325    <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" />
326    <!-- For NFC to BT handover -->
327    <protected-broadcast android:name="android.btopp.intent.action.WHITELIST_DEVICE" />
328    <protected-broadcast android:name="android.btopp.intent.action.STOP_HANDOVER_TRANSFER" />
329    <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND" />
330    <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND_MULTIPLE" />
331    <protected-broadcast android:name="com.android.nfc.handover.action.CANCEL_HANDOVER_TRANSFER" />
332
333    <protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" />
334    <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" />
335
336    <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" />
337
338    <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" />
339    <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" />
340    <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" />
341
342    <protected-broadcast android:name="com.android.server.stats.action.TRIGGER_COLLECTION" />
343
344    <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" />
345    <protected-broadcast android:name="com.android.server.WifiManager.action.START_PNO" />
346    <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" />
347    <protected-broadcast android:name="com.android.server.WifiManager.action.DEVICE_IDLE" />
348    <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_ACCEPTED" />
349    <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_DECLINED" />
350    <protected-broadcast android:name="com.android.internal.action.EUICC_FACTORY_RESET" />
351    <protected-broadcast android:name="com.android.server.usb.ACTION_OPEN_IN_APPS" />
352    <protected-broadcast android:name="com.android.server.am.DELETE_DUMPHEAP" />
353    <protected-broadcast android:name="com.android.server.net.action.SNOOZE_WARNING" />
354    <protected-broadcast android:name="com.android.server.net.action.SNOOZE_RAPID" />
355    <protected-broadcast android:name="com.android.server.wifi.ACTION_SHOW_SET_RANDOMIZATION_DETAILS" />
356    <protected-broadcast android:name="com.android.server.wifi.action.NetworkSuggestion.USER_ALLOWED_APP" />
357    <protected-broadcast android:name="com.android.server.wifi.action.NetworkSuggestion.USER_DISALLOWED_APP" />
358    <protected-broadcast android:name="com.android.server.wifi.action.NetworkSuggestion.USER_DISMISSED" />
359    <protected-broadcast android:name="com.android.server.wifi.action.CarrierNetwork.USER_ALLOWED_CARRIER" />
360    <protected-broadcast android:name="com.android.server.wifi.action.CarrierNetwork.USER_DISALLOWED_CARRIER" />
361    <protected-broadcast android:name="com.android.server.wifi.action.CarrierNetwork.USER_DISMISSED" />
362    <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.USER_DISMISSED_NOTIFICATION" />
363    <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.CONNECT_TO_NETWORK" />
364    <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.PICK_WIFI_NETWORK" />
365    <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.PICK_NETWORK_AFTER_FAILURE" />
366    <protected-broadcast android:name="com.android.server.wifi.wakeup.DISMISS_NOTIFICATION" />
367    <protected-broadcast android:name="com.android.server.wifi.wakeup.OPEN_WIFI_PREFERENCES" />
368    <protected-broadcast android:name="com.android.server.wifi.wakeup.OPEN_WIFI_SETTINGS" />
369    <protected-broadcast android:name="com.android.server.wifi.wakeup.TURN_OFF_WIFI_WAKE" />
370    <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" />
371    <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" />
372    <protected-broadcast android:name="android.net.wifi.WIFI_CREDENTIAL_CHANGED" />
373    <protected-broadcast android:name="android.net.wifi.aware.action.WIFI_AWARE_STATE_CHANGED" />
374    <protected-broadcast android:name="android.net.wifi.rtt.action.WIFI_RTT_STATE_CHANGED" />
375    <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" />
376    <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" />
377    <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" />
378    <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" />
379    <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" />
380    <protected-broadcast android:name="android.net.wifi.action.NETWORK_SETTINGS_RESET" />
381    <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_DEAUTH_IMMINENT" />
382    <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_ICON" />
383    <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_OSU_PROVIDERS_LIST" />
384    <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_SUBSCRIPTION_REMEDIATION" />
385    <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_LAUNCH_OSU_VIEW" />
386    <protected-broadcast android:name="android.net.wifi.action.REFRESH_USER_PROVISIONING" />
387    <protected-broadcast android:name="android.net.wifi.action.WIFI_NETWORK_SUGGESTION_POST_CONNECTION" />
388    <protected-broadcast android:name="android.net.wifi.action.WIFI_SCAN_AVAILABILITY_CHANGED" />
389    <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" />
390    <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" />
391    <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" />
392    <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" />
393    <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" />
394    <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" />
395    <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" />
396    <protected-broadcast android:name="android.net.wifi.p2p.action.WIFI_P2P_PERSISTENT_GROUPS_CHANGED" />
397    <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" />
398    <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" />
399    <!-- This broadcast is no longer sent in S but it should stay protected to avoid third party
400         apps broadcasting this and confusing old system apps that may not have been updated. -->
401    <protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" />
402    <protected-broadcast
403            android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" />
404    <protected-broadcast android:name="android.net.scoring.SCORE_NETWORKS" />
405    <protected-broadcast android:name="android.net.scoring.SCORER_CHANGED" />
406    <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" />
407    <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" />
408    <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" />
409    <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" />
410    <protected-broadcast android:name="android.intent.action.APPLICATION_RESTRICTIONS_CHANGED" />
411    <protected-broadcast android:name="com.android.server.adb.WIRELESS_DEBUG_PAIRED_DEVICES" />
412    <protected-broadcast android:name="com.android.server.adb.WIRELESS_DEBUG_PAIRING_RESULT" />
413    <protected-broadcast android:name="com.android.server.adb.WIRELESS_DEBUG_STATUS" />
414
415    <!-- Legacy -->
416    <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" />
417    <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" />
418
419    <protected-broadcast android:name="com.android.server.ACTION_TRIGGER_IDLE" />
420
421    <protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" />
422
423    <protected-broadcast android:name="android.intent.action.PHONE_STATE" />
424
425    <protected-broadcast android:name="android.intent.action.SUB_DEFAULT_CHANGED" />
426
427    <protected-broadcast android:name="android.location.PROVIDERS_CHANGED" />
428    <protected-broadcast android:name="android.location.MODE_CHANGED" />
429    <protected-broadcast android:name="android.net.proxy.PAC_REFRESH" />
430
431    <protected-broadcast android:name="android.telecom.action.DEFAULT_DIALER_CHANGED" />
432    <protected-broadcast android:name="android.provider.action.DEFAULT_SMS_PACKAGE_CHANGED" />
433    <protected-broadcast android:name="android.provider.action.SMS_MMS_DB_CREATED" />
434    <protected-broadcast android:name="android.provider.action.SMS_MMS_DB_LOST" />
435    <protected-broadcast android:name="android.intent.action.CONTENT_CHANGED" />
436    <protected-broadcast android:name="android.provider.Telephony.MMS_DOWNLOADED" />
437
438    <protected-broadcast
439        android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" />
440
441    <!-- Defined in RestrictionsManager -->
442    <protected-broadcast
443        android:name="android.intent.action.PERMISSION_RESPONSE_RECEIVED" />
444    <!-- Defined in RestrictionsManager -->
445
446    <protected-broadcast android:name="android.intent.action.REQUEST_PERMISSION" />
447    <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_STARTED" />
448    <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
449    <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_PROGRESS" />
450    <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
451
452    <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_DATA_SUBSCRIPTION_CHANGED" />
453    <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_VOICE_SUBSCRIPTION_CHANGED" />
454    <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_CONTENT_CHANGE" />
455    <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_RECORD_UPDATED" />
456
457    <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_DONE" />
458    <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_FAILED" />
459
460    <protected-broadcast android:name="android.internal.policy.action.BURN_IN_PROTECTION" />
461    <protected-broadcast android:name="android.app.action.SYSTEM_UPDATE_POLICY_CHANGED" />
462    <protected-broadcast android:name="android.app.action.RESET_PROTECTION_POLICY_CHANGED" />
463    <protected-broadcast android:name="android.app.action.DEVICE_OWNER_CHANGED" />
464    <protected-broadcast android:name="android.app.action.MANAGED_USER_CREATED" />
465
466    <!-- Added in N -->
467    <protected-broadcast android:name="android.intent.action.ANR" />
468    <protected-broadcast android:name="android.intent.action.CALL" />
469    <protected-broadcast android:name="android.intent.action.CALL_PRIVILEGED" />
470    <protected-broadcast android:name="android.intent.action.DROPBOX_ENTRY_ADDED" />
471    <protected-broadcast android:name="android.intent.action.INPUT_METHOD_CHANGED" />
472    <protected-broadcast android:name="android.intent.action.internal_sim_state_changed" />
473    <protected-broadcast android:name="android.intent.action.LOCKED_BOOT_COMPLETED" />
474    <protected-broadcast android:name="android.intent.action.PRECISE_CALL_STATE" />
475    <protected-broadcast android:name="android.intent.action.SUBSCRIPTION_PHONE_STATE" />
476    <protected-broadcast android:name="android.intent.action.USER_INFO_CHANGED" />
477    <protected-broadcast android:name="android.intent.action.USER_UNLOCKED" />
478    <protected-broadcast android:name="android.intent.action.WALLPAPER_CHANGED" />
479
480    <protected-broadcast android:name="android.app.action.DEVICE_POLICY_MANAGER_STATE_CHANGED" />
481    <protected-broadcast android:name="android.app.action.CHOOSE_PRIVATE_KEY_ALIAS" />
482    <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLED" />
483    <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLE_REQUESTED" />
484    <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_ENABLED" />
485    <protected-broadcast android:name="android.app.action.LOCK_TASK_ENTERING" />
486    <protected-broadcast android:name="android.app.action.LOCK_TASK_EXITING" />
487    <protected-broadcast android:name="android.app.action.NOTIFY_PENDING_SYSTEM_UPDATE" />
488    <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_CHANGED" />
489    <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_EXPIRING" />
490    <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_FAILED" />
491    <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_SUCCEEDED" />
492    <protected-broadcast android:name="com.android.server.ACTION_EXPIRED_PASSWORD_NOTIFICATION" />
493    <protected-broadcast android:name="com.android.server.ACTION_PROFILE_OFF_DEADLINE" />
494    <protected-broadcast android:name="com.android.server.ACTION_TURN_PROFILE_ON_NOTIFICATION" />
495
496    <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_ADDED" />
497    <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNLOCKED" />
498    <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_REMOVED" />
499
500    <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_STATE_CHANGED" />
501    <protected-broadcast android:name="com.android.bluetooth.map.USER_CONFIRM_TIMEOUT" />
502    <protected-broadcast android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_SENT" />
503    <protected-broadcast android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_DELIVERY" />
504    <protected-broadcast android:name="android.content.jobscheduler.JOB_DELAY_EXPIRED" />
505    <protected-broadcast android:name="android.content.syncmanager.SYNC_ALARM" />
506    <protected-broadcast android:name="android.media.INTERNAL_RINGER_MODE_CHANGED_ACTION" />
507    <protected-broadcast android:name="android.media.STREAM_DEVICES_CHANGED_ACTION" />
508    <protected-broadcast android:name="android.media.STREAM_MUTE_CHANGED_ACTION" />
509    <protected-broadcast android:name="android.net.sip.SIP_SERVICE_UP" />
510    <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" />
511    <protected-broadcast android:name="android.os.action.CHARGING" />
512    <protected-broadcast android:name="android.os.action.DISCHARGING" />
513    <protected-broadcast android:name="android.search.action.SEARCHABLES_CHANGED" />
514    <protected-broadcast android:name="android.security.STORAGE_CHANGED" />
515    <protected-broadcast android:name="android.security.action.TRUST_STORE_CHANGED" />
516    <protected-broadcast android:name="android.security.action.KEYCHAIN_CHANGED" />
517    <protected-broadcast android:name="android.security.action.KEY_ACCESS_CHANGED" />
518    <protected-broadcast android:name="android.telecom.action.NUISANCE_CALL_STATUS_CHANGED" />
519    <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_REGISTERED" />
520    <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_UNREGISTERED" />
521    <protected-broadcast android:name="android.telecom.action.SHOW_MISSED_CALLS_NOTIFICATION" />
522    <protected-broadcast android:name="android.telephony.action.CARRIER_CONFIG_CHANGED" />
523    <protected-broadcast android:name="android.telephony.action.DEFAULT_SUBSCRIPTION_CHANGED" />
524    <protected-broadcast android:name="android.telephony.action.DEFAULT_SMS_SUBSCRIPTION_CHANGED" />
525    <protected-broadcast android:name="android.telephony.action.SECRET_CODE" />
526    <protected-broadcast android:name="android.telephony.action.SHOW_VOICEMAIL_NOTIFICATION" />
527    <protected-broadcast android:name="android.telephony.action.SUBSCRIPTION_PLANS_CHANGED" />
528
529    <protected-broadcast android:name="com.android.bluetooth.btservice.action.ALARM_WAKEUP" />
530    <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_POLL" />
531    <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_UPDATED" />
532    <protected-broadcast android:name="com.android.server.NetworkTimeUpdateService.action.POLL" />
533    <protected-broadcast android:name="com.android.server.telecom.intent.action.CALLS_ADD_ENTRY" />
534    <protected-broadcast android:name="com.android.settings.location.MODE_CHANGING" />
535    <protected-broadcast android:name="com.android.settings.bluetooth.ACTION_DISMISS_PAIRING" />
536    <protected-broadcast android:name="com.android.settings.wifi.action.NETWORK_REQUEST" />
537
538    <protected-broadcast android:name="NotificationManagerService.TIMEOUT" />
539    <protected-broadcast android:name="NotificationHistoryDatabase.CLEANUP" />
540    <protected-broadcast android:name="ScheduleConditionProvider.EVALUATE" />
541    <protected-broadcast android:name="EventConditionProvider.EVALUATE" />
542    <protected-broadcast android:name="SnoozeHelper.EVALUATE" />
543    <protected-broadcast android:name="wifi_scan_available" />
544
545    <protected-broadcast android:name="action.cne.started" />
546    <protected-broadcast android:name="android.content.jobscheduler.JOB_DEADLINE_EXPIRED" />
547    <protected-broadcast android:name="android.intent.action.ACTION_UNSOL_RESPONSE_OEM_HOOK_RAW" />
548    <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_SUPL" />
549    <protected-broadcast android:name="android.os.action.LIGHT_DEVICE_IDLE_MODE_CHANGED" />
550    <protected-broadcast android:name="android.os.storage.action.VOLUME_STATE_CHANGED" />
551    <protected-broadcast android:name="android.os.storage.action.DISK_SCANNED" />
552    <protected-broadcast android:name="com.android.server.action.UPDATE_TWILIGHT_STATE" />
553    <protected-broadcast android:name="com.android.server.action.RESET_TWILIGHT_AUTO" />
554    <protected-broadcast android:name="com.android.server.device_idle.STEP_IDLE_STATE" />
555    <protected-broadcast android:name="com.android.server.device_idle.STEP_LIGHT_IDLE_STATE" />
556    <protected-broadcast android:name="com.android.server.Wifi.action.TOGGLE_PNO" />
557    <protected-broadcast android:name="intent.action.ACTION_RF_BAND_INFO" />
558    <protected-broadcast android:name="android.intent.action.MEDIA_RESOURCE_GRANTED" />
559    <protected-broadcast android:name="android.app.action.NETWORK_LOGS_AVAILABLE" />
560    <protected-broadcast android:name="android.app.action.SECURITY_LOGS_AVAILABLE" />
561
562    <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED" />
563    <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED_INTERNAL" />
564    <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_CHANGED" />
565    <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_ACCESS_GRANTED_CHANGED" />
566    <protected-broadcast android:name="android.app.action.AUTOMATIC_ZEN_RULE_STATUS_CHANGED" />
567    <protected-broadcast android:name="android.os.action.ACTION_EFFECTS_SUPPRESSOR_CHANGED" />
568    <protected-broadcast android:name="android.app.action.NOTIFICATION_CHANNEL_BLOCK_STATE_CHANGED" />
569    <protected-broadcast android:name="android.app.action.NOTIFICATION_CHANNEL_GROUP_BLOCK_STATE_CHANGED" />
570    <protected-broadcast android:name="android.app.action.APP_BLOCK_STATE_CHANGED" />
571
572    <protected-broadcast android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS" />
573    <protected-broadcast android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS" />
574
575    <protected-broadcast android:name="android.intent.action.DYNAMIC_SENSOR_CHANGED" />
576
577    <protected-broadcast android:name="android.intent.action.ACTION_RADIO_OFF" />
578
579    <protected-broadcast android:name="android.accounts.LOGIN_ACCOUNTS_CHANGED" />
580    <protected-broadcast android:name="android.accounts.action.ACCOUNT_REMOVED" />
581    <protected-broadcast android:name="android.accounts.action.VISIBLE_ACCOUNTS_CHANGED" />
582
583    <protected-broadcast android:name="com.android.sync.SYNC_CONN_STATUS_CHANGED" />
584
585    <protected-broadcast android:name="android.net.sip.action.SIP_INCOMING_CALL" />
586    <protected-broadcast android:name="com.android.phone.SIP_ADD_PHONE" />
587    <protected-broadcast android:name="android.net.sip.action.SIP_REMOVE_PROFILE" />
588    <protected-broadcast android:name="android.net.sip.action.SIP_SERVICE_UP" />
589    <protected-broadcast android:name="android.net.sip.action.SIP_CALL_OPTION_CHANGED" />
590    <protected-broadcast android:name="android.net.sip.action.START_SIP" />
591
592    <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_CONNECTED" />
593    <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_DISCONNECTED" />
594
595    <protected-broadcast android:name="android.bluetooth.input.profile.action.HANDSHAKE" />
596    <protected-broadcast android:name="android.bluetooth.input.profile.action.REPORT" />
597
598    <protected-broadcast android:name="android.intent.action.TWILIGHT_CHANGED" />
599
600    <protected-broadcast android:name="com.android.server.fingerprint.ACTION_LOCKOUT_RESET" />
601    <protected-broadcast android:name="android.net.wifi.PASSPOINT_ICON_RECEIVED" />
602    <protected-broadcast android:name="com.android.server.notification.CountdownConditionProvider" />
603
604    <protected-broadcast android:name="com.android.internal.location.ALARM_WAKEUP" />
605    <protected-broadcast android:name="com.android.internal.location.ALARM_TIMEOUT" />
606    <protected-broadcast android:name="android.intent.action.GLOBAL_BUTTON" />
607
608    <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_AVAILABLE" />
609    <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNAVAILABLE" />
610    <protected-broadcast android:name="com.android.server.pm.DISABLE_QUIET_MODE_AFTER_UNLOCK" />
611
612    <protected-broadcast android:name="com.android.server.retaildemo.ACTION_RESET_DEMO" />
613
614    <protected-broadcast android:name="android.intent.action.DEVICE_LOCKED_CHANGED" />
615
616    <!-- Added in O -->
617    <protected-broadcast android:name="android.app.action.APPLICATION_DELEGATION_SCOPES_CHANGED" />
618    <protected-broadcast android:name="com.android.server.wm.ACTION_REVOKE_SYSTEM_ALERT_WINDOW_PERMISSION" />
619    <protected-broadcast android:name="android.media.tv.action.PARENTAL_CONTROLS_ENABLED_CHANGED" />
620
621    <protected-broadcast android:name="android.content.pm.action.SESSION_COMMITTED" />
622    <protected-broadcast android:name="android.os.action.USER_RESTRICTIONS_CHANGED" />
623    <protected-broadcast android:name="android.media.tv.action.PREVIEW_PROGRAM_ADDED_TO_WATCH_NEXT" />
624    <protected-broadcast android:name="android.media.tv.action.PREVIEW_PROGRAM_BROWSABLE_DISABLED" />
625    <protected-broadcast android:name="android.media.tv.action.WATCH_NEXT_PROGRAM_BROWSABLE_DISABLED" />
626    <protected-broadcast android:name="android.media.tv.action.CHANNEL_BROWSABLE_REQUESTED" />
627    <protected-broadcast android:name="com.android.server.inputmethod.InputMethodManagerService.SHOW_INPUT_METHOD_PICKER" />
628
629    <!-- Time zone rules update intents fired by the system server -->
630    <protected-broadcast android:name="com.android.intent.action.timezone.RULES_UPDATE_OPERATION" />
631    <protected-broadcast android:name="com.android.intent.action.timezone.TRIGGER_RULES_UPDATE_CHECK" />
632
633    <!-- Made protected in P (was introduced in JB-MR2) -->
634    <protected-broadcast android:name="android.intent.action.GET_RESTRICTION_ENTRIES" />
635    <protected-broadcast android:name="android.telephony.euicc.action.OTA_STATUS_CHANGED" />
636
637    <!-- Added in P -->
638    <protected-broadcast android:name="android.app.action.PROFILE_OWNER_CHANGED" />
639    <protected-broadcast android:name="android.app.action.TRANSFER_OWNERSHIP_COMPLETE" />
640    <protected-broadcast android:name="android.app.action.AFFILIATED_PROFILE_TRANSFER_OWNERSHIP_COMPLETE" />
641    <protected-broadcast android:name="android.app.action.DATA_SHARING_RESTRICTION_CHANGED" />
642    <protected-broadcast android:name="android.app.action.STATSD_STARTED" />
643    <protected-broadcast android:name="com.android.server.biometrics.fingerprint.ACTION_LOCKOUT_RESET" />
644    <protected-broadcast android:name="com.android.server.biometrics.face.ACTION_LOCKOUT_RESET" />
645
646    <!-- For IdleController -->
647    <protected-broadcast android:name="android.intent.action.DOCK_IDLE" />
648    <protected-broadcast android:name="android.intent.action.DOCK_ACTIVE" />
649
650    <!-- Added in Q -->
651    <protected-broadcast android:name="android.content.pm.action.SESSION_UPDATED" />
652    <protected-broadcast android:name="android.settings.action.GRAYSCALE_CHANGED" />
653
654    <!-- For CarIdlenessTracker -->
655    <protected-broadcast android:name="com.android.server.jobscheduler.GARAGE_MODE_ON" />
656    <protected-broadcast android:name="com.android.server.jobscheduler.GARAGE_MODE_OFF" />
657    <protected-broadcast android:name="com.android.server.jobscheduler.FORCE_IDLE" />
658    <protected-broadcast android:name="com.android.server.jobscheduler.UNFORCE_IDLE" />
659
660    <protected-broadcast android:name="android.provider.action.DEFAULT_SMS_PACKAGE_CHANGED_INTERNAL" />
661
662    <protected-broadcast android:name="android.intent.action.DEVICE_CUSTOMIZATION_READY" />
663
664    <!-- Added in R -->
665    <protected-broadcast android:name="android.app.action.RESET_PROTECTION_POLICY_CHANGED" />
666
667    <!-- For tether entitlement recheck-->
668    <protected-broadcast
669        android:name="com.android.server.connectivity.tethering.PROVISIONING_RECHECK_ALARM" />
670    <!-- ====================================================================== -->
671    <!--                          RUNTIME PERMISSIONS                           -->
672    <!-- ====================================================================== -->
673    <eat-comment />
674
675    <!-- Grouping for platform runtime permissions is not accessible to apps
676         @hide
677         @SystemApi
678         @TestApi
679    -->
680    <permission-group android:name="android.permission-group.UNDEFINED"
681        android:priority="100" />
682
683    <!-- ====================================================================== -->
684    <!-- Permissions for accessing user's contacts including personal profile   -->
685    <!-- ====================================================================== -->
686    <eat-comment />
687
688    <!-- Used for runtime permissions related to contacts and profiles on this
689        device. -->
690    <permission-group android:name="android.permission-group.CONTACTS"
691        android:icon="@drawable/perm_group_contacts"
692        android:label="@string/permgrouplab_contacts"
693        android:description="@string/permgroupdesc_contacts"
694        android:priority="100" />
695
696    <!-- Allows an application to read the user's contacts data.
697        <p>Protection level: dangerous
698    -->
699    <permission android:name="android.permission.READ_CONTACTS"
700        android:permissionGroup="android.permission-group.UNDEFINED"
701        android:label="@string/permlab_readContacts"
702        android:description="@string/permdesc_readContacts"
703        android:protectionLevel="dangerous" />
704
705    <!-- Allows an application to write the user's contacts data.
706         <p>Protection level: dangerous
707    -->
708    <permission android:name="android.permission.WRITE_CONTACTS"
709        android:permissionGroup="android.permission-group.UNDEFINED"
710        android:label="@string/permlab_writeContacts"
711        android:description="@string/permdesc_writeContacts"
712        android:protectionLevel="dangerous" />
713
714    <!-- ====================================================================== -->
715    <!-- Permissions for accessing user's calendar                              -->
716    <!-- ====================================================================== -->
717    <eat-comment />
718
719    <!-- Used for runtime permissions related to user's calendar. -->
720    <permission-group android:name="android.permission-group.CALENDAR"
721        android:icon="@drawable/perm_group_calendar"
722        android:label="@string/permgrouplab_calendar"
723        android:description="@string/permgroupdesc_calendar"
724        android:priority="200" />
725
726    <!-- Allows an application to read the user's calendar data.
727         <p>Protection level: dangerous
728    -->
729    <permission android:name="android.permission.READ_CALENDAR"
730        android:permissionGroup="android.permission-group.UNDEFINED"
731        android:label="@string/permlab_readCalendar"
732        android:description="@string/permdesc_readCalendar"
733        android:protectionLevel="dangerous" />
734
735    <!-- Allows an application to write the user's calendar data.
736         <p>Protection level: dangerous
737    -->
738    <permission android:name="android.permission.WRITE_CALENDAR"
739        android:permissionGroup="android.permission-group.UNDEFINED"
740        android:label="@string/permlab_writeCalendar"
741        android:description="@string/permdesc_writeCalendar"
742        android:protectionLevel="dangerous" />
743
744    <!-- ====================================================================== -->
745    <!-- Permissions for accessing and modifying user's SMS messages            -->
746    <!-- ====================================================================== -->
747    <eat-comment />
748
749    <!-- Allows accessing the messages on ICC
750         @hide Used internally. -->
751    <permission android:name="android.permission.ACCESS_MESSAGES_ON_ICC"
752        android:protectionLevel="signature" />
753
754    <!-- Used for runtime permissions related to user's SMS messages. -->
755    <permission-group android:name="android.permission-group.SMS"
756        android:icon="@drawable/perm_group_sms"
757        android:label="@string/permgrouplab_sms"
758        android:description="@string/permgroupdesc_sms"
759        android:priority="300" />
760
761    <!-- Allows an application to send SMS messages.
762         <p>Protection level: dangerous
763
764         <p> This is a hard restricted permission which cannot be held by an app until
765         the installer on record whitelists the permission. For more details see
766         {@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}.
767    -->
768    <permission android:name="android.permission.SEND_SMS"
769        android:permissionGroup="android.permission-group.UNDEFINED"
770        android:label="@string/permlab_sendSms"
771        android:description="@string/permdesc_sendSms"
772        android:permissionFlags="costsMoney|hardRestricted"
773        android:protectionLevel="dangerous" />
774
775    <!-- Allows an application to receive SMS messages.
776         <p>Protection level: dangerous
777
778         <p> This is a hard restricted permission which cannot be held by an app until
779         the installer on record whitelists the permission. For more details see
780         {@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}.
781    -->
782    <permission android:name="android.permission.RECEIVE_SMS"
783        android:permissionGroup="android.permission-group.UNDEFINED"
784        android:label="@string/permlab_receiveSms"
785        android:description="@string/permdesc_receiveSms"
786        android:permissionFlags="hardRestricted"
787        android:protectionLevel="dangerous" />
788
789    <!-- Allows an application to read SMS messages.
790         <p>Protection level: dangerous
791
792         <p> This is a hard restricted permission which cannot be held by an app until
793         the installer on record whitelists the permission. For more details see
794         {@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}.
795    -->
796    <permission android:name="android.permission.READ_SMS"
797        android:permissionGroup="android.permission-group.UNDEFINED"
798        android:label="@string/permlab_readSms"
799        android:description="@string/permdesc_readSms"
800        android:permissionFlags="hardRestricted"
801        android:protectionLevel="dangerous" />
802
803    <!-- Allows an application to receive WAP push messages.
804         <p>Protection level: dangerous
805
806         <p> This is a hard restricted permission which cannot be held by an app until
807         the installer on record whitelists the permission. For more details see
808         {@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}.
809    -->
810    <permission android:name="android.permission.RECEIVE_WAP_PUSH"
811        android:permissionGroup="android.permission-group.UNDEFINED"
812        android:label="@string/permlab_receiveWapPush"
813        android:description="@string/permdesc_receiveWapPush"
814        android:permissionFlags="hardRestricted"
815        android:protectionLevel="dangerous" />
816
817    <!-- Allows an application to monitor incoming MMS messages.
818         <p>Protection level: dangerous
819
820         <p> This is a hard restricted permission which cannot be held by an app until
821         the installer on record whitelists the permission. For more details see
822         {@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}.
823    -->
824    <permission android:name="android.permission.RECEIVE_MMS"
825        android:permissionGroup="android.permission-group.UNDEFINED"
826        android:label="@string/permlab_receiveMms"
827        android:description="@string/permdesc_receiveMms"
828        android:permissionFlags="hardRestricted"
829        android:protectionLevel="dangerous" />
830
831    <!-- @SystemApi @TestApi Allows an application to forward cell broadcast messages to the cell
832         broadcast module. This is required in order to bind to the cell broadcast service, and
833         ensures that only the system can forward messages to it.
834
835         <p>Protection level: signature
836
837         @hide -->
838    <permission android:name="android.permission.BIND_CELL_BROADCAST_SERVICE"
839        android:label="@string/permlab_bindCellBroadcastService"
840        android:description="@string/permdesc_bindCellBroadcastService"
841        android:protectionLevel="signature" />
842
843    <!-- @SystemApi @TestApi Allows an application to read previously received cell broadcast
844         messages and to register a content observer to get notifications when
845         a cell broadcast has been received and added to the database. For
846         emergency alerts, the database is updated immediately after the
847         alert dialog and notification sound/vibration/speech are presented.
848         The "read" column is then updated after the user dismisses the alert.
849         This enables supplementary emergency assistance apps to start loading
850         additional emergency information (if Internet access is available)
851         when the alert is first received, and to delay presenting the info
852         to the user until after the initial alert dialog is dismissed.
853         <p>Protection level: dangerous
854
855         <p> This is a hard restricted permission which cannot be held by an app until
856         the installer on record whitelists the permission. For more details see
857         {@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}.
858
859         @hide Pending API council approval -->
860    <permission android:name="android.permission.READ_CELL_BROADCASTS"
861        android:permissionGroup="android.permission-group.UNDEFINED"
862        android:label="@string/permlab_readCellBroadcasts"
863        android:description="@string/permdesc_readCellBroadcasts"
864        android:permissionFlags="hardRestricted"
865        android:protectionLevel="dangerous" />
866
867    <!-- ====================================================================== -->
868    <!-- Permissions for accessing external storage                             -->
869    <!-- ====================================================================== -->
870    <eat-comment />
871
872    <!-- Used for runtime permissions related to the shared external storage. -->
873    <permission-group android:name="android.permission-group.STORAGE"
874        android:icon="@drawable/perm_group_storage"
875        android:label="@string/permgrouplab_storage"
876        android:description="@string/permgroupdesc_storage"
877        android:priority="900" />
878
879    <!-- Allows an application to read from external storage.
880      <p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly
881      granted this permission.</p>
882      <p>This permission is enforced starting in API level 19.  Before API level 19, this
883      permission is not enforced and all apps still have access to read from external storage.
884      You can test your app with the permission enforced by enabling <em>Protect USB
885      storage</em> under Developer options in the Settings app on a device running Android 4.1 or
886      higher.</p>
887      <p>Also starting in API level 19, this permission is <em>not</em> required to
888      read/write files in your application-specific directories returned by
889      {@link android.content.Context#getExternalFilesDir} and
890      {@link android.content.Context#getExternalCacheDir}.
891      <p class="note"><strong>Note:</strong> If <em>both</em> your <a
892      href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
893      minSdkVersion}</a> and <a
894      href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
895      targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
896      grants your app this permission. If you don't need this permission, be sure your <a
897      href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
898      targetSdkVersion}</a> is 4 or higher.
899
900      <p> This is a soft restricted permission which cannot be held by an app it its
901      full form until the installer on record whitelists the permission.
902      Specifically, if the permission is whitelisted the holder app can access
903      external storage and the visual and aural media collections while if the
904      permission is not whitelisted the holder app can only access to the visual
905      and aural medial collections. Also the permission is immutably restricted
906      meaning that the whitelist state can be specified only at install time and
907      cannot change until the app is installed. For more details see
908      {@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}.
909     <p>Protection level: dangerous -->
910    <permission android:name="android.permission.READ_EXTERNAL_STORAGE"
911        android:permissionGroup="android.permission-group.UNDEFINED"
912        android:label="@string/permlab_sdcardRead"
913        android:description="@string/permdesc_sdcardRead"
914        android:permissionFlags="softRestricted|immutablyRestricted"
915        android:protectionLevel="dangerous" />
916
917    <!-- Allows an application to write to external storage.
918         <p class="note"><strong>Note:</strong> If <em>both</em> your <a
919         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
920         minSdkVersion}</a> and <a
921         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
922         targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
923         grants your app this permission. If you don't need this permission, be sure your <a
924         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
925         targetSdkVersion}</a> is 4 or higher.
926         <p>Starting in API level 19, this permission is <em>not</em> required to
927         read/write files in your application-specific directories returned by
928         {@link android.content.Context#getExternalFilesDir} and
929         {@link android.content.Context#getExternalCacheDir}.
930         <p>If this permission is not whitelisted for an app that targets an API level before
931         {@link android.os.Build.VERSION_CODES#Q} this permission cannot be granted to apps.</p>
932         <p>Protection level: dangerous</p>
933    -->
934    <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE"
935        android:permissionGroup="android.permission-group.UNDEFINED"
936        android:label="@string/permlab_sdcardWrite"
937        android:description="@string/permdesc_sdcardWrite"
938        android:permissionFlags="softRestricted|immutablyRestricted"
939        android:protectionLevel="dangerous" />
940
941    <!-- Allows an application to access any geographic locations persisted in the
942         user's shared collection.
943         <p>Protection level: dangerous -->
944    <permission android:name="android.permission.ACCESS_MEDIA_LOCATION"
945        android:permissionGroup="android.permission-group.UNDEFINED"
946        android:label="@string/permlab_mediaLocation"
947        android:description="@string/permdesc_mediaLocation"
948        android:protectionLevel="dangerous" />
949
950    <!-- @hide @SystemApi @TestApi
951         Allows an application to modify OBB files visible to other apps. -->
952    <permission android:name="android.permission.WRITE_OBB"
953        android:protectionLevel="signature|privileged" />
954
955    <!-- Allows an application a broad access to external storage in scoped storage.
956         Intended to be used by few apps that need to manage files on behalf of the users.
957         <p>Protection level: signature|appop|preinstalled -->
958    <permission android:name="android.permission.MANAGE_EXTERNAL_STORAGE"
959        android:permissionGroup="android.permission-group.UNDEFINED"
960        android:protectionLevel="signature|appop|preinstalled" />
961
962    <!-- ====================================================================== -->
963    <!-- Permissions for accessing the device location                          -->
964    <!-- ====================================================================== -->
965    <eat-comment />
966
967    <!-- Used for permissions that allow accessing the device location. -->
968    <permission-group android:name="android.permission-group.LOCATION"
969        android:icon="@drawable/perm_group_location"
970        android:label="@string/permgrouplab_location"
971        android:description="@string/permgroupdesc_location"
972        android:priority="400" />
973
974    <!-- Allows an app to access precise location.
975         Alternatively, you might want {@link #ACCESS_COARSE_LOCATION}.
976         <p>Protection level: dangerous
977    -->
978    <permission android:name="android.permission.ACCESS_FINE_LOCATION"
979        android:permissionGroup="android.permission-group.UNDEFINED"
980        android:label="@string/permlab_accessFineLocation"
981        android:description="@string/permdesc_accessFineLocation"
982        android:backgroundPermission="android.permission.ACCESS_BACKGROUND_LOCATION"
983        android:protectionLevel="dangerous|instant" />
984
985    <!-- Allows an app to access approximate location.
986         Alternatively, you might want {@link #ACCESS_FINE_LOCATION}.
987         <p>Protection level: dangerous
988    -->
989    <permission android:name="android.permission.ACCESS_COARSE_LOCATION"
990        android:permissionGroup="android.permission-group.UNDEFINED"
991        android:label="@string/permlab_accessCoarseLocation"
992        android:description="@string/permdesc_accessCoarseLocation"
993        android:backgroundPermission="android.permission.ACCESS_BACKGROUND_LOCATION"
994        android:protectionLevel="dangerous|instant" />
995
996    <!-- Allows an app to access location in the background. If you're requesting this permission,
997         you must also request either {@link #ACCESS_COARSE_LOCATION} or
998         {@link #ACCESS_FINE_LOCATION}. Requesting this permission by itself doesn't give you
999         location access.
1000         <p>Protection level: dangerous
1001
1002         <p> This is a hard restricted permission which cannot be held by an app until
1003         the installer on record whitelists the permission. For more details see
1004         {@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}.
1005    -->
1006    <permission android:name="android.permission.ACCESS_BACKGROUND_LOCATION"
1007        android:permissionGroup="android.permission-group.UNDEFINED"
1008        android:label="@string/permlab_accessBackgroundLocation"
1009        android:permissionFlags="hardRestricted"
1010        android:description="@string/permdesc_accessBackgroundLocation"
1011        android:protectionLevel="dangerous|instant" />
1012
1013    <!-- ====================================================================== -->
1014    <!-- Permissions for accessing the call log                                 -->
1015    <!-- ====================================================================== -->
1016    <eat-comment />
1017
1018    <!-- Used for permissions that are associated telephony features. -->
1019    <permission-group android:name="android.permission-group.CALL_LOG"
1020        android:icon="@drawable/perm_group_call_log"
1021        android:label="@string/permgrouplab_calllog"
1022        android:description="@string/permgroupdesc_calllog"
1023        android:priority="450" />
1024
1025    <!-- Allows an application to access the IMS call service: making and
1026         modifying a call
1027        <p>Protection level: signature|privileged
1028        @hide
1029    -->
1030    <permission android:name="android.permission.ACCESS_IMS_CALL_SERVICE"
1031        android:label="@string/permlab_accessImsCallService"
1032        android:description="@string/permdesc_accessImsCallService"
1033        android:protectionLevel="signature|privileged" />
1034
1035    <!-- Allows an application to read the user's call log.
1036         <p class="note"><strong>Note:</strong> If your app uses the
1037         {@link #READ_CONTACTS} permission and <em>both</em> your <a
1038         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
1039         minSdkVersion}</a> and <a
1040         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1041         targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
1042         grants your app this permission. If you don't need this permission, be sure your <a
1043         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1044         targetSdkVersion}</a> is 16 or higher.</p>
1045         <p>Protection level: dangerous
1046
1047         <p> This is a hard restricted permission which cannot be held by an app until
1048         the installer on record whitelists the permission. For more details see
1049         {@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}.
1050    -->
1051    <permission android:name="android.permission.READ_CALL_LOG"
1052        android:permissionGroup="android.permission-group.UNDEFINED"
1053        android:label="@string/permlab_readCallLog"
1054        android:description="@string/permdesc_readCallLog"
1055        android:permissionFlags="hardRestricted"
1056        android:protectionLevel="dangerous" />
1057
1058    <!-- Allows an application to write (but not read) the user's
1059         call log data.
1060         <p class="note"><strong>Note:</strong> If your app uses the
1061         {@link #WRITE_CONTACTS} permission and <em>both</em> your <a
1062         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
1063         minSdkVersion}</a> and <a
1064         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1065         targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
1066         grants your app this permission. If you don't need this permission, be sure your <a
1067         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1068         targetSdkVersion}</a> is 16 or higher.</p>
1069         <p>Protection level: dangerous
1070
1071         <p> This is a hard restricted permission which cannot be held by an app until
1072         the installer on record whitelists the permission. For more details see
1073         {@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}.
1074    -->
1075    <permission android:name="android.permission.WRITE_CALL_LOG"
1076        android:permissionGroup="android.permission-group.UNDEFINED"
1077        android:label="@string/permlab_writeCallLog"
1078        android:description="@string/permdesc_writeCallLog"
1079        android:permissionFlags="hardRestricted"
1080        android:protectionLevel="dangerous" />
1081
1082    <!-- Allows an application to see the number being dialed during an outgoing
1083         call with the option to redirect the call to a different number or
1084         abort the call altogether.
1085         <p>Protection level: dangerous
1086
1087         <p> This is a hard restricted permission which cannot be held by an app until
1088         the installer on record whitelists the permission. For more details see
1089         {@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}.
1090
1091         @deprecated Applications should use {@link android.telecom.CallRedirectionService} instead
1092         of the {@link android.content.Intent#ACTION_NEW_OUTGOING_CALL} broadcast.
1093    -->
1094    <permission android:name="android.permission.PROCESS_OUTGOING_CALLS"
1095        android:permissionGroup="android.permission-group.UNDEFINED"
1096        android:label="@string/permlab_processOutgoingCalls"
1097        android:description="@string/permdesc_processOutgoingCalls"
1098        android:permissionFlags="hardRestricted"
1099        android:protectionLevel="dangerous" />
1100
1101    <!-- ====================================================================== -->
1102    <!-- Permissions for accessing the device telephony                         -->
1103    <!-- ====================================================================== -->
1104    <eat-comment />
1105
1106    <!-- Used for permissions that are associated telephony features. -->
1107    <permission-group android:name="android.permission-group.PHONE"
1108        android:icon="@drawable/perm_group_phone_calls"
1109        android:label="@string/permgrouplab_phone"
1110        android:description="@string/permgroupdesc_phone"
1111        android:priority="500" />
1112
1113    <!-- Allows read only access to phone state, including the current cellular network information,
1114         the status of any ongoing calls, and a list of any {@link android.telecom.PhoneAccount}s
1115         registered on the device.
1116         <p class="note"><strong>Note:</strong> If <em>both</em> your <a
1117         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
1118         minSdkVersion}</a> and <a
1119         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1120         targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
1121         grants your app this permission. If you don't need this permission, be sure your <a
1122         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1123         targetSdkVersion}</a> is 4 or higher.
1124         <p>Protection level: dangerous
1125    -->
1126    <permission android:name="android.permission.READ_PHONE_STATE"
1127        android:permissionGroup="android.permission-group.UNDEFINED"
1128        android:label="@string/permlab_readPhoneState"
1129        android:description="@string/permdesc_readPhoneState"
1130        android:protectionLevel="dangerous" />
1131
1132    <!-- Allows read access to the device's phone number(s). This is a subset of the capabilities
1133         granted by {@link #READ_PHONE_STATE} but is exposed to instant applications.
1134         <p>Protection level: dangerous-->
1135    <permission android:name="android.permission.READ_PHONE_NUMBERS"
1136        android:permissionGroup="android.permission-group.UNDEFINED"
1137        android:label="@string/permlab_readPhoneNumbers"
1138        android:description="@string/permdesc_readPhoneNumbers"
1139        android:protectionLevel="dangerous|instant" />
1140
1141    <!-- Allows an application to initiate a phone call without going through
1142        the Dialer user interface for the user to confirm the call.
1143        <p>Protection level: dangerous
1144    -->
1145    <permission android:name="android.permission.CALL_PHONE"
1146        android:permissionGroup="android.permission-group.UNDEFINED"
1147        android:permissionFlags="costsMoney"
1148        android:label="@string/permlab_callPhone"
1149        android:description="@string/permdesc_callPhone"
1150        android:protectionLevel="dangerous" />
1151
1152    <!-- Allows an application to add voicemails into the system.
1153         <p>Protection level: dangerous
1154    -->
1155    <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL"
1156        android:permissionGroup="android.permission-group.UNDEFINED"
1157        android:label="@string/permlab_addVoicemail"
1158        android:description="@string/permdesc_addVoicemail"
1159        android:protectionLevel="dangerous" />
1160
1161    <!-- Allows an application to use SIP service.
1162         <p>Protection level: dangerous
1163    -->
1164    <permission android:name="android.permission.USE_SIP"
1165        android:permissionGroup="android.permission-group.UNDEFINED"
1166        android:description="@string/permdesc_use_sip"
1167        android:label="@string/permlab_use_sip"
1168        android:protectionLevel="dangerous"/>
1169
1170    <!-- Allows the app to answer an incoming phone call.
1171         <p>Protection level: dangerous
1172    -->
1173    <permission android:name="android.permission.ANSWER_PHONE_CALLS"
1174        android:permissionGroup="android.permission-group.UNDEFINED"
1175        android:label="@string/permlab_answerPhoneCalls"
1176        android:description="@string/permdesc_answerPhoneCalls"
1177        android:protectionLevel="dangerous|runtime" />
1178
1179    <!-- Allows a calling application which manages it own calls through the self-managed
1180         {@link android.telecom.ConnectionService} APIs.  See
1181         {@link android.telecom.PhoneAccount#CAPABILITY_SELF_MANAGED} for more information on the
1182         self-managed ConnectionService APIs.
1183         <p>Protection level: normal
1184    -->
1185    <permission android:name="android.permission.MANAGE_OWN_CALLS"
1186                android:label="@string/permlab_manageOwnCalls"
1187                android:description="@string/permdesc_manageOwnCalls"
1188                android:protectionLevel="normal" />
1189
1190    <!--Allows an app which implements the
1191        {@link android.telecom.InCallService InCallService} API to be eligible to be enabled as a
1192        calling companion app. This means that the Telecom framework will bind to the app's
1193        InCallService implementation when there are calls active. The app can use the InCallService
1194        API to view information about calls on the system and control these calls.
1195        <p>Protection level: normal
1196    -->
1197    <permission android:name="android.permission.CALL_COMPANION_APP"
1198                android:label="@string/permlab_callCompanionApp"
1199                android:description="@string/permdesc_callCompanionApp"
1200                android:protectionLevel="normal" />
1201
1202    <!-- Exempt this uid from restrictions to background audio recoding
1203     <p>Protection level: signature|privileged
1204     @hide
1205     @SystemApi
1206    -->
1207    <permission android:name="android.permission.EXEMPT_FROM_AUDIO_RECORD_RESTRICTIONS"
1208                android:label="@string/permlab_exemptFromAudioRecordRestrictions"
1209                android:description="@string/permdesc_exemptFromAudioRecordRestrictions"
1210                android:protectionLevel="signature|privileged" />
1211
1212    <!-- Allows a calling app to continue a call which was started in another app.  An example is a
1213         video calling app that wants to continue a voice call on the user's mobile network.<p>
1214         When the handover of a call from one app to another takes place, there are two devices
1215         which are involved in the handover; the initiating and receiving devices.  The initiating
1216         device is where the request to handover the call was started, and the receiving device is
1217         where the handover request is confirmed by the other party.<p>
1218         This permission protects access to the
1219         {@link android.telecom.TelecomManager#acceptHandover(Uri, int, PhoneAccountHandle)} which
1220         the receiving side of the handover uses to accept a handover.
1221         <p>Protection level: dangerous
1222    -->
1223    <permission android:name="android.permission.ACCEPT_HANDOVER"
1224                android:permissionGroup="android.permission-group.UNDEFINED"
1225                android.label="@string/permlab_acceptHandover"
1226                android:description="@string/permdesc_acceptHandovers"
1227                android:protectionLevel="dangerous" />
1228
1229    <!-- ====================================================================== -->
1230    <!-- Permissions for accessing the device microphone                        -->
1231    <!-- ====================================================================== -->
1232    <eat-comment />
1233
1234    <!-- Used for permissions that are associated with accessing
1235         microphone audio from the device. Note that phone calls also capture audio
1236         but are in a separate (more visible) permission group. -->
1237    <permission-group android:name="android.permission-group.MICROPHONE"
1238        android:icon="@drawable/perm_group_microphone"
1239        android:label="@string/permgrouplab_microphone"
1240        android:description="@string/permgroupdesc_microphone"
1241        android:priority="600" />
1242
1243    <!-- Allows an application to record audio.
1244         <p>Protection level: dangerous
1245    -->
1246    <permission android:name="android.permission.RECORD_AUDIO"
1247        android:permissionGroup="android.permission-group.UNDEFINED"
1248        android:label="@string/permlab_recordAudio"
1249        android:description="@string/permdesc_recordAudio"
1250        android:protectionLevel="dangerous|instant" />
1251
1252    <!-- ====================================================================== -->
1253    <!-- Permissions for activity recognition                        -->
1254    <!-- ====================================================================== -->
1255    <eat-comment />
1256
1257    <!-- Used for permissions that are associated with activity recognition. -->
1258    <permission-group android:name="android.permission-group.ACTIVITY_RECOGNITION"
1259        android:icon="@drawable/perm_group_activity_recognition"
1260        android:label="@string/permgrouplab_activityRecognition"
1261        android:description="@string/permgroupdesc_activityRecognition"
1262        android:priority="1000" />
1263
1264    <!-- Allows an application to recognize physical activity.
1265         <p>Protection level: dangerous
1266    -->
1267    <permission android:name="android.permission.ACTIVITY_RECOGNITION"
1268        android:permissionGroup="android.permission-group.UNDEFINED"
1269        android:label="@string/permlab_activityRecognition"
1270        android:description="@string/permdesc_activityRecognition"
1271        android:protectionLevel="dangerous|instant" />
1272
1273    <!-- ====================================================================== -->
1274    <!-- Permissions for accessing the UCE Service                              -->
1275    <!-- ====================================================================== -->
1276
1277    <!-- @hide Allows an application to Access UCE-Presence.
1278         <p>Protection level: signature|privileged
1279    -->
1280    <permission android:name="android.permission.ACCESS_UCE_PRESENCE_SERVICE"
1281        android:permissionGroup="android.permission-group.PHONE"
1282        android:protectionLevel="signature|privileged"/>
1283
1284    <!-- @hide Allows an application to Access UCE-OPTIONS.
1285         <p>Protection level: signature|privileged
1286    -->
1287    <permission android:name="android.permission.ACCESS_UCE_OPTIONS_SERVICE"
1288        android:permissionGroup="android.permission-group.PHONE"
1289        android:protectionLevel="signature|privileged"/>
1290
1291
1292
1293    <!-- ====================================================================== -->
1294    <!-- Permissions for accessing the device camera                            -->
1295    <!-- ====================================================================== -->
1296    <eat-comment />
1297
1298    <!-- Used for permissions that are associated with accessing
1299     camera or capturing images/video from the device. -->
1300    <permission-group android:name="android.permission-group.CAMERA"
1301        android:icon="@drawable/perm_group_camera"
1302        android:label="@string/permgrouplab_camera"
1303        android:description="@string/permgroupdesc_camera"
1304        android:priority="700" />
1305
1306    <!-- Required to be able to access the camera device.
1307         <p>This will automatically enforce the
1308         <a href="{@docRoot}guide/topics/manifest/uses-feature-element.html">
1309         uses-feature</a> manifest element for <em>all</em> camera features.
1310         If you do not require all camera features or can properly operate if a camera
1311         is not available, then you must modify your manifest as appropriate in order to
1312         install on devices that don't support all camera features.</p>
1313         <p>Protection level: dangerous
1314    -->
1315    <permission android:name="android.permission.CAMERA"
1316        android:permissionGroup="android.permission-group.UNDEFINED"
1317        android:label="@string/permlab_camera"
1318        android:description="@string/permdesc_camera"
1319        android:protectionLevel="dangerous|instant" />
1320
1321    <!-- @SystemApi Required in addition to android.permission.CAMERA to be able to access
1322           system only camera devices.
1323           <p>Protection level: system|signature
1324           @hide -->
1325    <permission android:name="android.permission.SYSTEM_CAMERA"
1326        android:permissionGroup="android.permission-group.UNDEFINED"
1327        android:label="@string/permlab_systemCamera"
1328        android:description="@string/permdesc_systemCamera"
1329        android:protectionLevel="system|signature" />
1330
1331    <!-- Allows receiving the camera service notifications when a camera is opened
1332            (by a certain application package) or closed.
1333        @hide -->
1334    <permission android:name="android.permission.CAMERA_OPEN_CLOSE_LISTENER"
1335        android:permissionGroup="android.permission-group.UNDEFINED"
1336        android:label="@string/permlab_cameraOpenCloseListener"
1337        android:description="@string/permdesc_cameraOpenCloseListener"
1338        android:protectionLevel="signature" />
1339
1340    <!-- ====================================================================== -->
1341    <!-- Permissions for accessing the device sensors                           -->
1342    <!-- ====================================================================== -->
1343    <eat-comment />
1344
1345    <!-- Used for permissions that are associated with accessing
1346         body or environmental sensors. -->
1347    <permission-group android:name="android.permission-group.SENSORS"
1348        android:icon="@drawable/perm_group_sensors"
1349        android:label="@string/permgrouplab_sensors"
1350        android:description="@string/permgroupdesc_sensors"
1351        android:priority="800" />
1352
1353    <!-- Allows an application to access data from sensors that the user uses to
1354         measure what is happening inside their body, such as heart rate.
1355         <p>Protection level: dangerous -->
1356    <permission android:name="android.permission.BODY_SENSORS"
1357        android:permissionGroup="android.permission-group.UNDEFINED"
1358        android:label="@string/permlab_bodySensors"
1359        android:description="@string/permdesc_bodySensors"
1360        android:protectionLevel="dangerous" />
1361
1362    <!-- Allows an app to use fingerprint hardware.
1363         <p>Protection level: normal
1364         @deprecated Applications should request {@link
1365         android.Manifest.permission#USE_BIOMETRIC} instead
1366    -->
1367    <permission android:name="android.permission.USE_FINGERPRINT"
1368        android:permissionGroup="android.permission-group.SENSORS"
1369        android:label="@string/permlab_useFingerprint"
1370        android:description="@string/permdesc_useFingerprint"
1371        android:protectionLevel="normal" />
1372
1373    <!-- Allows an app to use device supported biometric modalities.
1374         <p>Protection level: normal
1375    -->
1376    <permission android:name="android.permission.USE_BIOMETRIC"
1377        android:permissionGroup="android.permission-group.SENSORS"
1378        android:label="@string/permlab_useBiometric"
1379        android:description="@string/permdesc_useBiometric"
1380        android:protectionLevel="normal" />
1381
1382    <!-- ====================================================================== -->
1383    <!-- REMOVED PERMISSIONS                                                    -->
1384    <!-- ====================================================================== -->
1385
1386    <!-- @hide We need to keep this around for backwards compatibility -->
1387    <permission android:name="android.permission.READ_PROFILE"
1388        android:protectionLevel="normal"
1389        android:permissionFlags="removed"/>
1390
1391    <!-- @hide We need to keep this around for backwards compatibility -->
1392    <permission android:name="android.permission.WRITE_PROFILE"
1393        android:protectionLevel="normal"
1394        android:permissionFlags="removed"/>
1395
1396    <!-- @hide We need to keep this around for backwards compatibility -->
1397    <permission android:name="android.permission.READ_SOCIAL_STREAM"
1398        android:protectionLevel="normal"
1399        android:permissionFlags="removed"/>
1400
1401    <!-- @hide We need to keep this around for backwards compatibility -->
1402    <permission android:name="android.permission.WRITE_SOCIAL_STREAM"
1403        android:protectionLevel="normal"
1404        android:permissionFlags="removed"/>
1405
1406    <!-- @hide We need to keep this around for backwards compatibility -->
1407    <permission android:name="android.permission.READ_USER_DICTIONARY"
1408        android:protectionLevel="normal"
1409        android:permissionFlags="removed"/>
1410
1411    <!-- @hide We need to keep this around for backwards compatibility -->
1412    <permission android:name="android.permission.WRITE_USER_DICTIONARY"
1413        android:protectionLevel="normal"
1414        android:permissionFlags="removed"/>
1415
1416    <!-- @hide We need to keep this around for backwards compatibility -->
1417    <permission android:name="android.permission.WRITE_SMS"
1418        android:protectionLevel="normal"
1419        android:permissionFlags="removed"/>
1420
1421    <!-- @hide We need to keep this around for backwards compatibility -->
1422    <permission android:name="com.android.browser.permission.READ_HISTORY_BOOKMARKS"
1423        android:protectionLevel="normal"
1424        android:permissionFlags="removed"/>
1425
1426    <!-- @hide We need to keep this around for backwards compatibility -->
1427    <permission android:name="com.android.browser.permission.WRITE_HISTORY_BOOKMARKS"
1428        android:protectionLevel="normal"
1429        android:permissionFlags="removed"/>
1430
1431    <!-- @hide We need to keep this around for backwards compatibility -->
1432    <permission android:name="android.permission.AUTHENTICATE_ACCOUNTS"
1433        android:protectionLevel="normal"
1434        android:permissionFlags="removed"/>
1435
1436    <!-- @hide We need to keep this around for backwards compatibility -->
1437    <permission android:name="android.permission.MANAGE_ACCOUNTS"
1438        android:protectionLevel="normal"
1439        android:permissionFlags="removed"/>
1440
1441    <!-- @hide We need to keep this around for backwards compatibility -->
1442    <permission android:name="android.permission.USE_CREDENTIALS"
1443        android:protectionLevel="normal"
1444        android:permissionFlags="removed"/>
1445
1446    <!-- @hide We need to keep this around for backwards compatibility -->
1447    <permission android:name="android.permission.SUBSCRIBED_FEEDS_READ"
1448        android:protectionLevel="normal"
1449        android:permissionFlags="removed"/>
1450
1451    <!-- @hide We need to keep this around for backwards compatibility -->
1452    <permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE"
1453        android:protectionLevel="normal"
1454        android:permissionFlags="removed"/>
1455
1456    <!-- @hide We need to keep this around for backwards compatibility -->
1457    <permission android:name="android.permission.FLASHLIGHT"
1458        android:protectionLevel="normal"
1459        android:permissionFlags="removed"/>
1460
1461    <!-- ====================================================================== -->
1462    <!-- INSTALL PERMISSIONS                                                    -->
1463    <!-- ====================================================================== -->
1464
1465    <!-- ================================== -->
1466    <!-- Permissions for accessing messages -->
1467    <!-- ================================== -->
1468    <eat-comment />
1469
1470    <!-- Allows an application (Phone) to send a request to other applications
1471         to handle the respond-via-message action during incoming calls.
1472         <p>Not for use by third-party applications. -->
1473    <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE"
1474        android:protectionLevel="signature|privileged" />
1475
1476    <!-- @SystemApi Allows an application to send SMS to premium shortcodes without user permission.
1477         <p>Not for use by third-party applications.
1478         @hide -->
1479    <permission android:name="android.permission.SEND_SMS_NO_CONFIRMATION"
1480        android:protectionLevel="signature|privileged" />
1481
1482    <!-- Allows an application to filter carrier specific sms.
1483         @hide -->
1484    <permission android:name="android.permission.CARRIER_FILTER_SMS"
1485        android:protectionLevel="signature|privileged" />
1486
1487    <!-- @SystemApi Allows an application to receive emergency cell broadcast messages,
1488         to record or display them to the user.
1489         <p>Not for use by third-party applications.
1490         @hide -->
1491    <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST"
1492        android:protectionLevel="signature|privileged" />
1493
1494    <!-- Allows an application to monitor incoming Bluetooth MAP messages, to record
1495         or perform processing on them. -->
1496    <!-- @hide -->
1497    <permission android:name="android.permission.RECEIVE_BLUETOOTH_MAP"
1498        android:protectionLevel="signature|privileged" />
1499
1500    <!-- @SystemApi @hide Allows an application to execute contacts directory search.
1501         This should only be used by ContactsProvider.
1502         <p>Not for use by third-party applications. -->
1503    <permission android:name="android.permission.BIND_DIRECTORY_SEARCH"
1504        android:protectionLevel="signature|privileged" />
1505
1506    <!-- @SystemApi @hide Allows an application to modify cell broadcasts through the content provider.
1507         <p>Not for use by third-party applications. -->
1508    <permission android:name="android.permission.MODIFY_CELL_BROADCASTS"
1509                android:protectionLevel="signature|privileged" />
1510
1511    <!-- =============================================================== -->
1512    <!-- Permissions for setting the device alarm                        -->
1513    <!-- =============================================================== -->
1514    <eat-comment />
1515
1516    <!-- Allows an application to broadcast an Intent to set an alarm for the user.
1517         <p>Protection level: normal
1518    -->
1519    <permission android:name="com.android.alarm.permission.SET_ALARM"
1520        android:label="@string/permlab_setAlarm"
1521        android:description="@string/permdesc_setAlarm"
1522        android:protectionLevel="normal" />
1523
1524    <!-- =============================================================== -->
1525    <!-- Permissions for accessing the user voicemail                    -->
1526    <!-- =============================================================== -->
1527    <eat-comment />
1528
1529    <!-- Allows an application to modify and remove existing voicemails in the system.
1530        <p>Protection level: signature|privileged
1531    -->
1532    <permission android:name="com.android.voicemail.permission.WRITE_VOICEMAIL"
1533        android:protectionLevel="signature|privileged" />
1534
1535    <!-- Allows an application to read voicemails in the system.
1536         <p>Protection level: signature|privileged
1537    -->
1538    <permission android:name="com.android.voicemail.permission.READ_VOICEMAIL"
1539        android:protectionLevel="signature|privileged" />
1540
1541    <!-- ======================================= -->
1542    <!-- Permissions for accessing location info -->
1543    <!-- ======================================= -->
1544    <eat-comment />
1545
1546    <!-- Allows an application to access extra location provider commands.
1547         <p>Protection level: normal
1548    -->
1549    <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS"
1550        android:label="@string/permlab_accessLocationExtraCommands"
1551        android:description="@string/permdesc_accessLocationExtraCommands"
1552        android:protectionLevel="normal" />
1553
1554    <!-- Allows an application to install a location provider into the Location Manager.
1555    <p>Not for use by third-party applications. -->
1556    <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER"
1557        android:protectionLevel="signature|privileged" />
1558
1559    <!-- @SystemApi @hide Allows HDMI-CEC service to access device and configuration files.
1560         This should only be used by HDMI-CEC service.
1561    -->
1562    <permission android:name="android.permission.HDMI_CEC"
1563        android:protectionLevel="signature|privileged|vendorPrivileged" />
1564
1565    <!-- Allows an application to use location features in hardware,
1566         such as the geofencing api.
1567         <p>Not for use by third-party applications. -->
1568    <permission android:name="android.permission.LOCATION_HARDWARE"
1569        android:protectionLevel="signature|privileged" />
1570    <uses-permission android:name="android.permission.LOCATION_HARDWARE"/>
1571
1572    <!-- @SystemApi Allows an application to use the Context Hub.
1573         <p>Not for use by third-party applications.
1574         @hide
1575    -->
1576    <permission android:name="android.permission.ACCESS_CONTEXT_HUB"
1577        android:protectionLevel="signature|privileged" />
1578    <uses-permission android:name="android.permission.ACCESS_CONTEXT_HUB"/>
1579
1580    <!-- @SystemApi Allows an application to create mock location providers for testing.
1581         <p>Protection level: signature
1582         @hide
1583    -->
1584    <permission android:name="android.permission.ACCESS_MOCK_LOCATION"
1585        android:protectionLevel="signature" />
1586
1587    <!-- ======================================= -->
1588    <!-- Permissions for accessing networks -->
1589    <!-- ======================================= -->
1590    <eat-comment />
1591
1592    <!-- Allows applications to open network sockets.
1593         <p>Protection level: normal
1594    -->
1595    <permission android:name="android.permission.INTERNET"
1596        android:description="@string/permdesc_createNetworkSockets"
1597        android:label="@string/permlab_createNetworkSockets"
1598        android:protectionLevel="normal|instant" />
1599
1600    <!-- Allows applications to access information about networks.
1601         <p>Protection level: normal
1602    -->
1603    <permission android:name="android.permission.ACCESS_NETWORK_STATE"
1604        android:description="@string/permdesc_accessNetworkState"
1605        android:label="@string/permlab_accessNetworkState"
1606        android:protectionLevel="normal|instant" />
1607
1608    <!-- Allows applications to access information about Wi-Fi networks.
1609         <p>Protection level: normal
1610    -->
1611    <permission android:name="android.permission.ACCESS_WIFI_STATE"
1612        android:description="@string/permdesc_accessWifiState"
1613        android:label="@string/permlab_accessWifiState"
1614        android:protectionLevel="normal" />
1615
1616    <!-- Allows applications to change Wi-Fi connectivity state.
1617         <p>Protection level: normal
1618    -->
1619    <permission android:name="android.permission.CHANGE_WIFI_STATE"
1620        android:description="@string/permdesc_changeWifiState"
1621        android:label="@string/permlab_changeWifiState"
1622        android:protectionLevel="normal" />
1623
1624    <!-- @SystemApi @hide Allows apps to create and manage IPsec tunnels.
1625         <p>Only granted to applications that are currently bound by the
1626         system for creating and managing IPsec-based interfaces.
1627    -->
1628    <permission android:name="android.permission.MANAGE_IPSEC_TUNNELS"
1629        android:protectionLevel="signature|appop" />
1630
1631    <!-- @hide Allows apps to create and manage Test Networks.
1632         <p>Granted only to shell. CTS tests will use
1633         UiAutomation.AdoptShellPermissionIdentity() to gain access.
1634    -->
1635    <permission android:name="android.permission.MANAGE_TEST_NETWORKS"
1636        android:protectionLevel="signature" />
1637
1638    <!-- @SystemApi @hide Allows applications to read Wi-Fi credential.
1639         <p>Not for use by third-party applications. -->
1640    <permission android:name="android.permission.READ_WIFI_CREDENTIAL"
1641        android:protectionLevel="signature|privileged" />
1642
1643    <!-- @SystemApi @hide Allows applications to change tether state and run
1644         tether carrier provisioning.
1645         <p>Not for use by third-party applications. -->
1646    <permission android:name="android.permission.TETHER_PRIVILEGED"
1647        android:protectionLevel="signature|privileged" />
1648
1649    <!-- @SystemApi @hide Allow system apps to receive broadcast
1650         when a wifi network credential is changed.
1651         <p>Not for use by third-party applications. -->
1652    <permission android:name="android.permission.RECEIVE_WIFI_CREDENTIAL_CHANGE"
1653        android:protectionLevel="signature|privileged" />
1654
1655    <!-- @SystemApi @hide Allows an application to modify any wifi configuration, even if created
1656     by another application. Once reconfigured the original creator cannot make any further
1657     modifications.
1658     <p>Not for use by third-party applications. -->
1659    <permission android:name="android.permission.OVERRIDE_WIFI_CONFIG"
1660        android:protectionLevel="signature|privileged" />
1661
1662    <!-- Allows applications to act as network scorers. @hide @SystemApi-->
1663    <permission android:name="android.permission.SCORE_NETWORKS"
1664        android:protectionLevel="signature|privileged" />
1665
1666    <!-- Allows applications to request network
1667         recommendations and scores from the NetworkScoreService.
1668         @SystemApi
1669         <p>Not for use by third-party applications. @hide -->
1670    <permission android:name="android.permission.REQUEST_NETWORK_SCORES"
1671        android:protectionLevel="signature|setup" />
1672
1673    <!-- @SystemApi @hide Allows applications to toggle airplane mode.
1674         <p>Not for use by third-party or privileged applications.
1675    -->
1676    <permission android:name="android.permission.NETWORK_AIRPLANE_MODE"
1677        android:protectionLevel="signature" />
1678
1679    <!-- Allows network stack services (Connectivity and Wifi) to coordinate
1680         <p>Not for use by third-party or privileged applications.
1681         @SystemApi @TestApi
1682         @hide This should only be used by Connectivity and Wifi Services.
1683    -->
1684    <permission android:name="android.permission.NETWORK_STACK"
1685        android:protectionLevel="signature" />
1686
1687    <!-- @SystemApi @hide Allows an application to observe network policy changes. -->
1688    <permission android:name="android.permission.OBSERVE_NETWORK_POLICY"
1689                android:protectionLevel="signature" />
1690
1691    <!-- @SystemApi @hide Allows applications to register network factory or agent -->
1692    <permission android:name="android.permission.NETWORK_FACTORY"
1693                android:protectionLevel="signature" />
1694
1695    <!-- @SystemApi @hide Allows applications to access network stats provider -->
1696    <permission android:name="android.permission.NETWORK_STATS_PROVIDER"
1697                android:protectionLevel="signature" />
1698
1699    <!-- Allows Settings and SystemUI to call methods in Networking services
1700         <p>Not for use by third-party or privileged applications.
1701         @SystemApi @TestApi
1702         @hide This should only be used by Settings and SystemUI.
1703    -->
1704    <permission android:name="android.permission.NETWORK_SETTINGS"
1705        android:protectionLevel="signature" />
1706
1707    <!-- Allows holder to request bluetooth/wifi scan bypassing global "use location" setting and
1708         location permissions.
1709         <p>Not for use by third-party or privileged applications.
1710         @SystemApi
1711         @hide
1712    -->
1713    <permission android:name="android.permission.RADIO_SCAN_WITHOUT_LOCATION"
1714                android:protectionLevel="signature|companion" />
1715
1716    <!-- Allows SetupWizard to call methods in Networking services
1717         <p>Not for use by any other third-party or privileged applications.
1718         @SystemApi
1719         @hide This should only be used by SetupWizard.
1720    -->
1721    <permission android:name="android.permission.NETWORK_SETUP_WIZARD"
1722        android:protectionLevel="signature|setup" />
1723
1724    <!-- Allows Managed Provisioning to call methods in Networking services
1725         <p>Not for use by any other third-party or privileged applications.
1726         @SystemApi
1727         @hide This should only be used by ManagedProvisioning app.
1728    -->
1729    <permission android:name="android.permission.NETWORK_MANAGED_PROVISIONING"
1730        android:protectionLevel="signature" />
1731
1732    <!-- Allows Carrier Provisioning to call methods in Networking services
1733         <p>Not for use by any other third-party or privileged applications.
1734         @SystemApi
1735         @hide This should only be used by CarrierProvisioning.
1736    -->
1737    <permission android:name="android.permission.NETWORK_CARRIER_PROVISIONING"
1738        android:protectionLevel="signature|privileged" />
1739
1740    <!-- #SystemApi @hide Allows applications to access information about LoWPAN interfaces.
1741         <p>Not for use by third-party applications. -->
1742    <permission android:name="android.permission.ACCESS_LOWPAN_STATE"
1743        android:protectionLevel="signature|privileged" />
1744
1745    <!-- #SystemApi @hide Allows applications to change LoWPAN connectivity state.
1746         <p>Not for use by third-party applications. -->
1747    <permission android:name="android.permission.CHANGE_LOWPAN_STATE"
1748        android:protectionLevel="signature|privileged" />
1749
1750    <!-- #SystemApi @hide Allows applications to read LoWPAN credential.
1751         <p>Not for use by third-party applications. -->
1752    <permission android:name="android.permission.READ_LOWPAN_CREDENTIAL"
1753        android:protectionLevel="signature|privileged" />
1754
1755    <!-- #SystemApi @hide Allows a service to register or unregister
1756         new LoWPAN interfaces.
1757         <p>Not for use by third-party applications. -->
1758    <permission android:name="android.permission.MANAGE_LOWPAN_INTERFACES"
1759        android:protectionLevel="signature|privileged" />
1760
1761    <!-- #SystemApi @hide Allows an app to bypass Private DNS.
1762         <p>Not for use by third-party applications.
1763         TODO: publish as system API in next API release. -->
1764    <permission android:name="android.permission.NETWORK_BYPASS_PRIVATE_DNS"
1765        android:protectionLevel="signature" />
1766
1767    <!-- @SystemApi @hide Allows device mobility state to be set so that Wifi scan interval can
1768         be increased when the device is stationary in order to save power.
1769         <p>Not for use by third-party applications. -->
1770    <permission android:name="android.permission.WIFI_SET_DEVICE_MOBILITY_STATE"
1771        android:protectionLevel="signature|privileged" />
1772
1773    <!-- @SystemApi @hide Allows privileged system APK to update Wifi usability stats and score.
1774         <p>Not for use by third-party applications. -->
1775    <permission android:name="android.permission.WIFI_UPDATE_USABILITY_STATS_SCORE"
1776        android:protectionLevel="signature|privileged" />
1777
1778    <!-- ======================================= -->
1779    <!-- Permissions for short range, peripheral networks -->
1780    <!-- ======================================= -->
1781    <eat-comment />
1782
1783    <!-- Allows applications to connect to paired bluetooth devices.
1784         <p>Protection level: normal
1785    -->
1786    <permission android:name="android.permission.BLUETOOTH"
1787        android:description="@string/permdesc_bluetooth"
1788        android:label="@string/permlab_bluetooth"
1789        android:protectionLevel="normal" />
1790
1791    <!-- @SystemApi @TestApi Allows an application to suspend other apps, which will prevent the
1792         user from using them until they are unsuspended.
1793         @hide
1794    -->
1795    <permission android:name="android.permission.SUSPEND_APPS"
1796        android:protectionLevel="signature|wellbeing" />
1797
1798    <!-- Allows applications to discover and pair bluetooth devices.
1799         <p>Protection level: normal
1800    -->
1801    <permission android:name="android.permission.BLUETOOTH_ADMIN"
1802        android:description="@string/permdesc_bluetoothAdmin"
1803        android:label="@string/permlab_bluetoothAdmin"
1804        android:protectionLevel="normal" />
1805
1806    <!-- Allows applications to pair bluetooth devices without user interaction, and to
1807         allow or disallow phonebook access or message access.
1808         <p>Not for use by third-party applications. -->
1809    <permission android:name="android.permission.BLUETOOTH_PRIVILEGED"
1810        android:protectionLevel="signature|privileged" />
1811
1812    <!-- Control access to email providers exclusively for Bluetooth
1813         @hide
1814    -->
1815    <permission android:name="android.permission.BLUETOOTH_MAP"
1816        android:protectionLevel="signature" />
1817
1818    <!-- Allows bluetooth stack to access files
1819         @hide This should only be used by Bluetooth apk.
1820    -->
1821    <permission android:name="android.permission.BLUETOOTH_STACK"
1822        android:protectionLevel="signature" />
1823
1824    <!-- Allows applications to perform I/O operations over NFC.
1825         <p>Protection level: normal
1826    -->
1827    <permission android:name="android.permission.NFC"
1828        android:description="@string/permdesc_nfc"
1829        android:label="@string/permlab_nfc"
1830        android:protectionLevel="normal" />
1831
1832    <!-- Allows applications to receive NFC transaction events.
1833         <p>Protection level: normal
1834    -->
1835    <permission android:name="android.permission.NFC_TRANSACTION_EVENT"
1836      android:protectionLevel="normal" />
1837
1838    <!-- Allows applications to receive NFC preferred payment service information.
1839         <p>Protection level: normal
1840    -->
1841    <permission android:name="android.permission.NFC_PREFERRED_PAYMENT_INFO"
1842        android:description="@string/permdesc_preferredPaymentInfo"
1843        android:label="@string/permlab_preferredPaymentInfo"
1844        android:protectionLevel="normal" />
1845
1846    <!-- @SystemApi Allows an internal user to use privileged SecureElement APIs.
1847         Applications holding this permission can access OMAPI reset system API
1848         and bypass OMAPI AccessControlEnforcer.
1849         <p>Not for use by third-party applications.
1850         @hide -->
1851    <permission android:name="android.permission.SECURE_ELEMENT_PRIVILEGED_OPERATION"
1852        android:protectionLevel="signature|privileged" />
1853
1854    <!-- @deprecated This permission used to allow too broad access to sensitive methods and all its
1855         uses have been replaced by a more appropriate permission. Most uses have been replaced with
1856         a NETWORK_STACK or NETWORK_SETTINGS check. Please look up the documentation of the
1857         individual functions to figure out what permission now protects the individual function.
1858         @SystemApi Allows an internal user to use privileged ConnectivityManager APIs.
1859         @hide -->
1860    <permission android:name="android.permission.CONNECTIVITY_INTERNAL"
1861        android:protectionLevel="signature|privileged" />
1862
1863    <!-- @SystemApi Allows an internal user to use restricted Networks.
1864         @hide -->
1865    <permission android:name="android.permission.CONNECTIVITY_USE_RESTRICTED_NETWORKS"
1866        android:protectionLevel="signature|privileged" />
1867    <uses-permission android:name="android.permission.CONNECTIVITY_USE_RESTRICTED_NETWORKS"/>
1868
1869    <!-- @SystemApi Allows an internal user to set signal strength in NetworkRequest. This kind of
1870         request will wake up device when signal strength meets the given value.
1871         @hide -->
1872    <permission android:name="android.permission.NETWORK_SIGNAL_STRENGTH_WAKEUP"
1873                android:protectionLevel="signature|privileged" />
1874
1875    <!-- @SystemApi Allows a system application to access hardware packet offload capabilities.
1876         @hide -->
1877    <permission android:name="android.permission.PACKET_KEEPALIVE_OFFLOAD"
1878        android:protectionLevel="signature|privileged" />
1879
1880    <!-- @SystemApi
1881         @hide -->
1882    <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE"
1883        android:protectionLevel="signature|privileged" />
1884
1885    <!-- @SystemApi Allows access to the loop radio (Android@Home mesh network) device.
1886         @hide -->
1887    <permission android:name="android.permission.LOOP_RADIO"
1888        android:protectionLevel="signature|privileged" />
1889
1890    <!-- Allows sending and receiving handover transfer status from Wifi and Bluetooth
1891         @hide -->
1892    <permission android:name="android.permission.NFC_HANDOVER_STATUS"
1893        android:protectionLevel="signature|privileged" />
1894
1895    <!-- @hide Allows internal management of Bluetooth state when on wireless consent mode.
1896         <p>Not for use by third-party applications. -->
1897    <permission android:name="android.permission.MANAGE_BLUETOOTH_WHEN_WIRELESS_CONSENT_REQUIRED"
1898        android:protectionLevel="signature" />
1899
1900    <!-- @hide Allows the device to be reset, clearing all data and enables Test Harness Mode. -->
1901    <permission android:name="android.permission.ENABLE_TEST_HARNESS_MODE"
1902        android:protectionLevel="signature" />
1903
1904    <!-- ================================== -->
1905    <!-- Permissions for accessing accounts -->
1906    <!-- ================================== -->
1907    <eat-comment />
1908
1909    <!-- Allows access to the list of accounts in the Accounts Service.
1910
1911    <p class="note"><strong>Note:</strong> Beginning with Android 6.0 (API level
1912    23), if an app shares the signature of the authenticator that manages an
1913    account, it does not need <code>"GET_ACCOUNTS"</code> permission to read
1914    information about that account. On Android 5.1 and lower, all apps need
1915    <code>"GET_ACCOUNTS"</code> permission to read information about any
1916    account.</p>
1917
1918    <p>Protection level: dangerous
1919    -->
1920    <permission android:name="android.permission.GET_ACCOUNTS"
1921        android:permissionGroup="android.permission-group.UNDEFINED"
1922        android:protectionLevel="dangerous"
1923        android:description="@string/permdesc_getAccounts"
1924        android:label="@string/permlab_getAccounts" />
1925    <uses-permission android:name="android.permission.GET_ACCOUNTS"/>
1926
1927    <!-- Allows applications to call into AccountAuthenticators.
1928    <p>Not for use by third-party applications. -->
1929    <permission android:name="android.permission.ACCOUNT_MANAGER"
1930        android:protectionLevel="signature" />
1931
1932    <!-- ================================== -->
1933    <!-- Permissions for accessing hardware that may effect battery life-->
1934    <!-- ================================== -->
1935    <eat-comment />
1936
1937    <!-- Allows applications to enter Wi-Fi Multicast mode.
1938         <p>Protection level: normal
1939    -->
1940    <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE"
1941        android:description="@string/permdesc_changeWifiMulticastState"
1942        android:label="@string/permlab_changeWifiMulticastState"
1943        android:protectionLevel="normal" />
1944
1945    <!-- Allows access to the vibrator.
1946         <p>Protection level: normal
1947    -->
1948    <permission android:name="android.permission.VIBRATE"
1949        android:label="@string/permlab_vibrate"
1950        android:description="@string/permdesc_vibrate"
1951        android:protectionLevel="normal|instant" />
1952
1953    <!-- Allows access to the vibrator always-on settings.
1954         <p>Protection level: signature
1955         @hide
1956    -->
1957    <permission android:name="android.permission.VIBRATE_ALWAYS_ON"
1958        android:protectionLevel="signature" />
1959
1960    <!-- @SystemApi Allows access to the vibrator state.
1961         <p>Protection level: signature
1962         @hide
1963    -->
1964    <permission android:name="android.permission.ACCESS_VIBRATOR_STATE"
1965        android:label="@string/permdesc_vibrator_state"
1966        android:description="@string/permdesc_vibrator_state"
1967        android:protectionLevel="signature|privileged" />
1968
1969    <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen
1970         from dimming.
1971         <p>Protection level: normal
1972    -->
1973    <permission android:name="android.permission.WAKE_LOCK"
1974        android:label="@string/permlab_wakeLock"
1975        android:description="@string/permdesc_wakeLock"
1976        android:protectionLevel="normal|instant" />
1977
1978    <!-- Allows using the device's IR transmitter, if available.
1979         <p>Protection level: normal
1980    -->
1981    <permission android:name="android.permission.TRANSMIT_IR"
1982        android:label="@string/permlab_transmitIr"
1983        android:description="@string/permdesc_transmitIr"
1984        android:protectionLevel="normal" />
1985
1986    <!-- ==================================================== -->
1987    <!-- Permissions related to changing audio settings   -->
1988    <!-- ==================================================== -->
1989    <eat-comment />
1990
1991    <!-- Allows an application to modify global audio settings.
1992         <p>Protection level: normal
1993    -->
1994    <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS"
1995        android:label="@string/permlab_modifyAudioSettings"
1996        android:description="@string/permdesc_modifyAudioSettings"
1997        android:protectionLevel="normal" />
1998
1999    <!-- ======================================== -->
2000    <!-- Permissions for factory reset protection -->
2001    <!-- ======================================== -->
2002    <eat-comment />
2003
2004    <!-- @SystemApi Allows an application to set a factory reset protection (FRP) policy.
2005         <p>Not for use by third-party applications.
2006         @hide
2007    -->
2008    <permission android:name="android.permission.MANAGE_FACTORY_RESET_PROTECTION"
2009        android:protectionLevel="signature|privileged"/>
2010
2011    <!-- ================================== -->
2012    <!-- Permissions for accessing hardware -->
2013    <!-- ================================== -->
2014    <eat-comment />
2015
2016    <!-- @SystemApi Allows an application to manage preferences and permissions for USB devices
2017         @hide -->
2018    <permission android:name="android.permission.MANAGE_USB"
2019        android:protectionLevel="signature|privileged" />
2020
2021    <!-- @SystemApi Allows an application to manage Android Debug Bridge settings.
2022         <p>Not for use by third-party applications.
2023         @hide -->
2024    <permission android:name="android.permission.MANAGE_DEBUGGING"
2025        android:protectionLevel="signature|privileged" />
2026
2027    <!-- @SystemApi Allows an application to access the MTP USB kernel driver.
2028         For use only by the device side MTP implementation.
2029         @hide -->
2030    <permission android:name="android.permission.ACCESS_MTP"
2031        android:protectionLevel="signature|privileged" />
2032
2033    <!-- @SystemApi Allows access to hardware peripherals.  Intended only for hardware testing.
2034         <p>Not for use by third-party applications.
2035         @hide
2036    -->
2037    <permission android:name="android.permission.HARDWARE_TEST"
2038        android:protectionLevel="signature" />
2039
2040    <!-- @hide Allows an application to manage DynamicSystem image -->
2041    <permission android:name="android.permission.MANAGE_DYNAMIC_SYSTEM"
2042        android:protectionLevel="signature" />
2043
2044    <!-- @SystemApi Allows an application to install a DynamicSystem image and get status updates.
2045         @hide -->
2046    <permission android:name="android.permission.INSTALL_DYNAMIC_SYSTEM"
2047        android:protectionLevel="signature|privileged" />
2048
2049    <!-- @SystemApi Allows access to Broadcast Radio
2050         @hide This is not a third-party API (intended for system apps).-->
2051    <permission android:name="android.permission.ACCESS_BROADCAST_RADIO"
2052        android:protectionLevel="signature|privileged" />
2053
2054    <!-- @deprecated @SystemApi Allows access to FM
2055         @hide This is not a third-party API (intended for system apps).-->
2056    <permission android:name="android.permission.ACCESS_FM_RADIO"
2057        android:protectionLevel="signature|privileged" />
2058
2059    <!-- Allows access to configure network interfaces, configure/use IPSec, etc.
2060         @hide -->
2061    <permission android:name="android.permission.NET_ADMIN"
2062        android:protectionLevel="signature" />
2063
2064    <!-- Allows registration for remote audio playback. @hide -->
2065    <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK"
2066        android:protectionLevel="signature" />
2067
2068    <!-- Allows TvInputService to access underlying TV input hardware such as
2069         built-in tuners and HDMI-in's.
2070         <p>This should only be used by OEM's TvInputService's.
2071         @hide @SystemApi -->
2072    <permission android:name="android.permission.TV_INPUT_HARDWARE"
2073        android:protectionLevel="signature|privileged|vendorPrivileged" />
2074
2075    <!-- Allows to capture a frame of TV input hardware such as
2076         built-in tuners and HDMI-in's.
2077         <p>Not for use by third-party applications.
2078         @hide @SystemApi -->
2079    <permission android:name="android.permission.CAPTURE_TV_INPUT"
2080        android:protectionLevel="signature|privileged" />
2081
2082    <!-- @hide Allows TvInputService to access DVB device.
2083   <p>Not for use by third-party applications. -->
2084    <permission android:name="android.permission.DVB_DEVICE"
2085        android:protectionLevel="signature|privileged" />
2086
2087    <!-- @SystemApi Allows reading and enabling/disabling the OEM unlock allowed by carrier state
2088         @hide <p>Not for use by third-party applications. -->
2089    <permission android:name="android.permission.MANAGE_CARRIER_OEM_UNLOCK_STATE"
2090        android:protectionLevel="signature|privileged" />
2091
2092    <!-- @SystemApi Allows reading and enabling/disabling the OEM unlock allowed by user state
2093         @hide <p>Not for use by third-party applications. -->
2094    <permission android:name="android.permission.MANAGE_USER_OEM_UNLOCK_STATE"
2095        android:protectionLevel="signature|privileged" />
2096
2097    <!-- @SystemApi Allows reading the OEM unlock state
2098         @hide <p>Not for use by third-party applications. -->
2099    <permission android:name="android.permission.READ_OEM_UNLOCK_STATE"
2100        android:protectionLevel="signature|privileged" />
2101
2102    <!-- @hide Allows enabling/disabling OEM unlock
2103   <p>Not for use by third-party applications. -->
2104    <permission android:name="android.permission.OEM_UNLOCK_STATE"
2105        android:protectionLevel="signature" />
2106
2107    <!-- @hide Allows querying state of PersistentDataBlock
2108   <p>Not for use by third-party applications. -->
2109    <permission android:name="android.permission.ACCESS_PDB_STATE"
2110        android:protectionLevel="signature" />
2111
2112    <!-- Allows testing if a passwords is forbidden by the admins.
2113         @hide <p>Not for use by third-party applications. -->
2114    <permission android:name="android.permission.TEST_BLACKLISTED_PASSWORD"
2115        android:protectionLevel="signature" />
2116
2117    <!-- @hide Allows system update service to notify device owner about pending updates.
2118   <p>Not for use by third-party applications. -->
2119    <permission android:name="android.permission.NOTIFY_PENDING_SYSTEM_UPDATE"
2120        android:protectionLevel="signature|privileged" />
2121
2122    <!-- =========================================== -->
2123    <!-- Permissions associated with camera and image capture -->
2124    <!-- =========================================== -->
2125    <eat-comment />
2126
2127    <!-- @SystemApi Allows disabling the transmit-indicator LED that is normally on when
2128         a camera is in use by an application.
2129         @hide -->
2130    <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED"
2131        android:protectionLevel="signature|privileged" />
2132
2133    <!-- Allows sending the camera service notifications about system-wide events.
2134        @hide -->
2135    <permission android:name="android.permission.CAMERA_SEND_SYSTEM_EVENTS"
2136        android:protectionLevel="signature|privileged" />
2137
2138    <!-- =========================================== -->
2139    <!-- Permissions associated with telephony state -->
2140    <!-- =========================================== -->
2141    <eat-comment />
2142
2143    <!-- @SystemApi Allows granting runtime permissions to telephony related components.
2144         @hide -->
2145    <permission android:name="android.permission.GRANT_RUNTIME_PERMISSIONS_TO_TELEPHONY_DEFAULTS"
2146        android:protectionLevel="signature" />
2147
2148    <!-- Allows modification of the telephony state - power on, mmi, etc.
2149         Does not include placing calls.
2150         <p>Not for use by third-party applications. -->
2151    <permission android:name="android.permission.MODIFY_PHONE_STATE"
2152        android:protectionLevel="signature|privileged" />
2153
2154    <!-- Allows read only access to precise phone state.
2155         Allows reading of detailed information about phone state for special-use applications
2156         such as dialers, carrier applications, or ims applications. -->
2157    <permission android:name="android.permission.READ_PRECISE_PHONE_STATE"
2158        android:protectionLevel="signature|privileged" />
2159
2160    <!-- @SystemApi Allows read access to privileged phone state.
2161         @hide Used internally. -->
2162    <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE"
2163        android:protectionLevel="signature|privileged" />
2164
2165    <!-- @SystemApi Allows read access to emergency number information for ongoing calls or SMS
2166         sessions.
2167         @hide Used internally. -->
2168    <permission android:name="android.permission.READ_ACTIVE_EMERGENCY_SESSION"
2169        android:protectionLevel="signature" />
2170
2171    <!-- Allows listen permission to always reported signal strength.
2172         @hide Used internally. -->
2173    <permission android:name="android.permission.LISTEN_ALWAYS_REPORTED_SIGNAL_STRENGTH"
2174        android:protectionLevel="signature" />
2175
2176    <!-- @SystemApi Protects the ability to register any PhoneAccount with
2177         PhoneAccount#CAPABILITY_SIM_SUBSCRIPTION. This capability indicates that the PhoneAccount
2178         corresponds to a device SIM.
2179         @hide -->
2180    <permission android:name="android.permission.REGISTER_SIM_SUBSCRIPTION"
2181        android:protectionLevel="signature|privileged" />
2182
2183    <!-- @SystemApi Protects the ability to register any PhoneAccount with
2184         PhoneAccount#CAPABILITY_CALL_PROVIDER.
2185         @hide -->
2186    <permission android:name="android.permission.REGISTER_CALL_PROVIDER"
2187        android:protectionLevel="signature|privileged" />
2188
2189    <!-- @SystemApi Protects the ability to register any PhoneAccount with
2190         PhoneAccount#CAPABILITY_CONNECTION_MANAGER
2191         @hide -->
2192    <permission android:name="android.permission.REGISTER_CONNECTION_MANAGER"
2193        android:protectionLevel="signature|privileged" />
2194
2195    <!-- Must be required by a {@link android.telecom.InCallService},
2196         to ensure that only the system can bind to it.
2197         <p>Protection level: signature|privileged
2198    -->
2199    <permission android:name="android.permission.BIND_INCALL_SERVICE"
2200        android:protectionLevel="signature|privileged" />
2201
2202    <!-- Allows the app to request network scans from telephony.
2203         <p>Not for use by third-party applications.
2204         @SystemApi @hide-->
2205    <permission android:name="android.permission.NETWORK_SCAN"
2206        android:protectionLevel="signature|privileged" />
2207
2208    <!-- Must be required by a link {@link android.telephony.VisualVoicemailService} to ensure that
2209         only the system can bind to it.
2210         <p>Protection level: signature|privileged
2211    -->
2212    <permission
2213      android:name="android.permission.BIND_VISUAL_VOICEMAIL_SERVICE"
2214      android:protectionLevel="signature|privileged"/>
2215
2216    <!-- Must be required by a {@link android.telecom.CallScreeningService},
2217         to ensure that only the system can bind to it.
2218         <p>Protection level: signature|privileged
2219    -->
2220    <permission android:name="android.permission.BIND_SCREENING_SERVICE"
2221        android:protectionLevel="signature|privileged" />
2222
2223    <!-- Must be required by a {@link android.telecom.PhoneAccountSuggestionService},
2224         to ensure that only the system can bind to it.
2225         <p>Protection level: signature
2226         @SystemApi
2227         @hide
2228    -->
2229    <permission android:name="android.permission.BIND_PHONE_ACCOUNT_SUGGESTION_SERVICE"
2230        android:protectionLevel="signature" />
2231
2232    <!-- Must be required by a {@link android.telecom.CallRedirectionService},
2233         to ensure that only the system can bind to it.
2234         <p>Protection level: signature|privileged
2235    -->
2236    <permission android:name="android.permission.BIND_CALL_REDIRECTION_SERVICE"
2237                android:protectionLevel="signature|privileged" />
2238
2239    <!-- Must be required by a {@link android.telecom.ConnectionService},
2240         to ensure that only the system can bind to it.
2241         @deprecated {@link android.telecom.ConnectionService}s should require
2242                 android.permission.BIND_TELECOM_CONNECTION_SERVICE instead.
2243         @SystemApi
2244         @hide -->
2245    <permission android:name="android.permission.BIND_CONNECTION_SERVICE"
2246        android:protectionLevel="signature|privileged" />
2247
2248    <!-- Must be required by a {@link android.telecom.ConnectionService},
2249         to ensure that only the system can bind to it.
2250         <p>Protection level: signature|privileged
2251    -->
2252    <permission android:name="android.permission.BIND_TELECOM_CONNECTION_SERVICE"
2253        android:protectionLevel="signature|privileged" />
2254
2255    <!-- @SystemApi Allows an application to control the in-call experience.
2256         @hide -->
2257    <permission android:name="android.permission.CONTROL_INCALL_EXPERIENCE"
2258        android:protectionLevel="signature|privileged" />
2259
2260    <!-- Allows an application to receive STK related commands.
2261         @hide -->
2262    <permission android:name="android.permission.RECEIVE_STK_COMMANDS"
2263        android:protectionLevel="signature|privileged" />
2264
2265      <!-- Allows an application to send EMBMS download intents to apps
2266           @hide -->
2267    <permission android:name="android.permission.SEND_EMBMS_INTENTS"
2268        android:protectionLevel="signature|privileged" />
2269
2270
2271    <!-- Allows internal management of the sensor framework
2272         @hide -->
2273    <permission android:name="android.permission.MANAGE_SENSORS"
2274        android:protectionLevel="signature" />
2275
2276    <!-- Must be required by an ImsService to ensure that only the
2277         system can bind to it.
2278         <p>Protection level: signature|privileged|vendorPrivileged
2279         @SystemApi
2280         @hide
2281    -->
2282    <permission android:name="android.permission.BIND_IMS_SERVICE"
2283        android:protectionLevel="signature|privileged|vendorPrivileged" />
2284
2285    <!-- Must be required by a telephony data service to ensure that only the
2286         system can bind to it.
2287         <p>Protection level: signature
2288         @SystemApi
2289         @hide
2290    -->
2291    <permission android:name="android.permission.BIND_TELEPHONY_DATA_SERVICE"
2292        android:protectionLevel="signature" />
2293
2294    <!-- Must be required by a NetworkService to ensure that only the
2295         system can bind to it.
2296         <p>Protection level: signature
2297         @SystemApi
2298         @hide
2299    -->
2300    <permission android:name="android.permission.BIND_TELEPHONY_NETWORK_SERVICE"
2301                android:protectionLevel="signature" />
2302
2303    <!-- @SystemApi Allows an application to manage embedded subscriptions (those on a eUICC)
2304         through EuiccManager APIs.
2305         <p>Protection level: signature|privileged|development
2306         @hide
2307    -->
2308    <permission android:name="android.permission.WRITE_EMBEDDED_SUBSCRIPTIONS"
2309                android:protectionLevel="signature|privileged|development" />
2310
2311    <!-- @SystemApi Must be required by an EuiccService to ensure that only the system can bind to
2312         it.
2313         <p>Protection level: signature
2314         @hide
2315    -->
2316    <permission android:name="android.permission.BIND_EUICC_SERVICE"
2317                android:protectionLevel="signature" />
2318
2319    <!-- Required for reading information about carrier apps from SystemConfigManager.
2320         <p>Protection level: signature
2321         @SystemApi
2322         @hide
2323    -->
2324    <permission android:name="android.permission.READ_CARRIER_APP_INFO"
2325        android:protectionLevel="signature" />
2326
2327    <!-- ================================== -->
2328    <!-- Permissions for sdcard interaction -->
2329    <!-- ================================== -->
2330    <eat-comment />
2331
2332    <!-- @SystemApi @TestApi Allows an application to write to internal media storage
2333         @deprecated This permission is no longer honored in the system and no longer adds
2334         the media_rw gid as a supplementary gid to the holder. Use the
2335         android.permission.MANAGE_EXTERNAL_STORAGE instead.
2336         @hide  -->
2337    <permission android:name="android.permission.WRITE_MEDIA_STORAGE"
2338        android:protectionLevel="signature|privileged" />
2339
2340    <!-- Allows an application to manage access to documents, usually as part
2341         of a document picker.
2342         <p>This permission should <em>only</em> be requested by the platform
2343         document management app.  This permission cannot be granted to
2344         third-party apps.
2345    -->
2346    <permission android:name="android.permission.MANAGE_DOCUMENTS"
2347        android:protectionLevel="signature|documenter" />
2348
2349    <!-- Allows an application to manage access to crates, usually as part
2350         of a crates picker.
2351         <p>This permission should <em>only</em> be requested by the platform
2352         management app.  This permission cannot be granted to
2353         third-party apps.
2354         @hide
2355         @TestApi
2356    -->
2357    <permission android:name="android.permission.MANAGE_CRATES"
2358                android:protectionLevel="signature" />
2359
2360    <!-- @hide Allows an application to cache content.
2361         <p>Not for use by third-party applications.
2362    -->
2363    <permission android:name="android.permission.CACHE_CONTENT"
2364        android:protectionLevel="signature|documenter" />
2365
2366    <!-- @SystemApi @hide
2367         Allows an application to aggressively allocate disk space.
2368         <p>Not for use by third-party applications.
2369    -->
2370    <permission android:name="android.permission.ALLOCATE_AGGRESSIVE"
2371        android:protectionLevel="signature|privileged" />
2372
2373    <!-- @SystemApi @hide
2374         Allows an application to use reserved disk space.
2375         <p>Not for use by third-party applications.  Should only be requested by
2376         apps that provide core system functionality, to ensure system stability
2377         when disk is otherwise completely full.
2378    -->
2379    <permission android:name="android.permission.USE_RESERVED_DISK"
2380        android:protectionLevel="signature|privileged" />
2381
2382    <!-- ================================== -->
2383    <!-- Permissions for screenlock         -->
2384    <!-- ================================== -->
2385    <eat-comment />
2386
2387    <!-- Allows applications to disable the keyguard if it is not secure.
2388         <p>Protection level: normal
2389    -->
2390    <permission android:name="android.permission.DISABLE_KEYGUARD"
2391        android:description="@string/permdesc_disableKeyguard"
2392        android:label="@string/permlab_disableKeyguard"
2393        android:protectionLevel="normal" />
2394
2395    <!-- Allows an application to request the screen lock complexity and prompt users to update the
2396     screen lock to a certain complexity level.
2397     <p>Protection level: normal
2398    -->
2399    <permission android:name="android.permission.REQUEST_PASSWORD_COMPLEXITY"
2400                android:label="@string/permlab_requestPasswordComplexity"
2401                android:description="@string/permdesc_requestPasswordComplexity"
2402                android:protectionLevel="normal" />
2403
2404    <!-- ================================== -->
2405    <!-- Permissions to access other installed applications  -->
2406    <!-- ================================== -->
2407    <eat-comment />
2408
2409    <!-- @deprecated No longer enforced. -->
2410    <permission android:name="android.permission.GET_TASKS"
2411        android:label="@string/permlab_getTasks"
2412        android:description="@string/permdesc_getTasks"
2413        android:protectionLevel="normal" />
2414
2415    <!-- New version of GET_TASKS that apps can request, since GET_TASKS doesn't really
2416         give access to task information.  We need this new one because there are
2417         many existing apps that use add libraries and such that have validation
2418         code to ensure the app has requested the GET_TASKS permission by seeing
2419         if it has been granted the permission...  if it hasn't, it kills the app
2420         with a message about being upset.  So we need to have it continue to look
2421         like the app is getting that permission, even though it will never be
2422         checked, and new privileged apps can now request this one for real access.
2423         @hide
2424         @SystemApi -->
2425    <permission android:name="android.permission.REAL_GET_TASKS"
2426        android:protectionLevel="signature|privileged" />
2427
2428    <!-- Allows an application to start a task from a ActivityManager#RecentTaskInfo.
2429         @hide -->
2430    <permission android:name="android.permission.START_TASKS_FROM_RECENTS"
2431        android:protectionLevel="signature|privileged" />
2432
2433    <!-- @SystemApi @hide Allows an application to call APIs that allow it to do interactions
2434         across the users on the device, using singleton services and
2435         user-targeted broadcasts.  This permission is not available to
2436         third party applications. -->
2437    <permission android:name="android.permission.INTERACT_ACROSS_USERS"
2438        android:protectionLevel="signature|privileged|development" />
2439
2440    <!-- @SystemApi Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS}
2441         that removes restrictions on where broadcasts can be sent and allows other
2442         types of interactions
2443         @hide -->
2444    <permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL"
2445        android:protectionLevel="signature|installer" />
2446    <uses-permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL" />
2447
2448    <!-- Allows interaction across profiles in the same profile group. -->
2449    <permission android:name="android.permission.INTERACT_ACROSS_PROFILES"
2450        android:protectionLevel="signature|appop" />
2451
2452    <!-- Allows configuring apps to have the INTERACT_ACROSS_PROFILES permission so that they can
2453         interact across profiles in the same profile group.
2454         @hide -->
2455    <permission android:name="android.permission.CONFIGURE_INTERACT_ACROSS_PROFILES"
2456        android:protectionLevel="signature" />
2457
2458    <!-- @SystemApi @hide Allows an application to call APIs that allow it to query and manage
2459         users on the device. This permission is not available to
2460         third party applications. -->
2461    <permission android:name="android.permission.MANAGE_USERS"
2462        android:protectionLevel="signature|privileged" />
2463
2464    <!-- @SystemApi @hide Allows an application to create, remove users and get the list of
2465         users on the device. Applications holding this permission can only create restricted,
2466         guest, managed, demo, and ephemeral users. For creating other kind of users,
2467         {@link android.Manifest.permission#MANAGE_USERS} is needed.
2468         This permission is not available to third party applications. -->
2469    <permission android:name="android.permission.CREATE_USERS"
2470        android:protectionLevel="signature" />
2471
2472    <!-- @hide Allows an application to set the profile owners and the device owner.
2473         This permission is not available to third party applications.-->
2474    <permission android:name="android.permission.MANAGE_PROFILE_AND_DEVICE_OWNERS"
2475        android:protectionLevel="signature"
2476        android:label="@string/permlab_manageProfileAndDeviceOwners"
2477        android:description="@string/permdesc_manageProfileAndDeviceOwners" />
2478
2479    <!-- Allows an application to get full detailed information about
2480         recently running tasks, with full fidelity to the real state.
2481         @hide -->
2482    <permission android:name="android.permission.GET_DETAILED_TASKS"
2483        android:protectionLevel="signature" />
2484
2485    <!-- Allows an application to change the Z-order of tasks.
2486         <p>Protection level: normal
2487    -->
2488    <permission android:name="android.permission.REORDER_TASKS"
2489        android:label="@string/permlab_reorderTasks"
2490        android:description="@string/permdesc_reorderTasks"
2491        android:protectionLevel="normal" />
2492
2493    <!-- @SystemApi @TestApi @hide Allows an application to change to remove/kill tasks -->
2494    <permission android:name="android.permission.REMOVE_TASKS"
2495        android:protectionLevel="signature|documenter" />
2496
2497    <!-- @SystemApi @TestApi @hide Allows an application to create/manage/remove stacks -->
2498    <permission android:name="android.permission.MANAGE_ACTIVITY_STACKS"
2499        android:protectionLevel="signature" />
2500
2501    <!-- @SystemApi @TestApi @hide Allows an application to embed other activities -->
2502    <permission android:name="android.permission.ACTIVITY_EMBEDDING"
2503                android:protectionLevel="signature|privileged" />
2504
2505    <!-- Allows an application to start any activity, regardless of permission
2506         protection or exported state.
2507         @hide -->
2508    <permission android:name="android.permission.START_ANY_ACTIVITY"
2509        android:protectionLevel="signature" />
2510
2511    <!-- Allows an application to start activities from background
2512         @hide -->
2513    <permission android:name="android.permission.START_ACTIVITIES_FROM_BACKGROUND"
2514        android:protectionLevel="signature|privileged|vendorPrivileged|oem|verifier" />
2515
2516    <!-- @SystemApi Must be required by activities that handle the intent action
2517         {@link Intent#ACTION_SEND_SHOW_SUSPENDED_APP_DETAILS}. This is for use by apps that
2518         hold {@link Manifest.permission#SUSPEND_APPS} to interact with the system.
2519         <p>Not for use by third-party applications.
2520         @hide -->
2521    <permission android:name="android.permission.SEND_SHOW_SUSPENDED_APP_DETAILS"
2522                android:protectionLevel="signature" />
2523    <uses-permission android:name="android.permission.SEND_SHOW_SUSPENDED_APP_DETAILS" />
2524
2525    <!-- Allows an application to start an activity as another app, provided that app has been
2526         granted a permissionToken from the ActivityManagerService.
2527         @hide -->
2528    <permission android:name="android.permission.START_ACTIVITY_AS_CALLER"
2529        android:protectionLevel="signature" />
2530
2531    <!-- @deprecated The {@link android.app.ActivityManager#restartPackage}
2532        API is no longer supported. -->
2533    <permission android:name="android.permission.RESTART_PACKAGES"
2534        android:label="@string/permlab_killBackgroundProcesses"
2535        android:description="@string/permdesc_killBackgroundProcesses"
2536        android:protectionLevel="normal" />
2537
2538    <!-- Allows an application to call
2539        {@link android.app.ActivityManager#killBackgroundProcesses}.
2540         <p>Protection level: normal
2541    -->
2542    <permission android:name="android.permission.KILL_BACKGROUND_PROCESSES"
2543        android:label="@string/permlab_killBackgroundProcesses"
2544        android:description="@string/permdesc_killBackgroundProcesses"
2545        android:protectionLevel="normal" />
2546
2547    <!-- @SystemApi @hide Allows an application to query process states and current
2548         OOM adjustment scores.
2549         <p>Not for use by third-party applications. -->
2550    <permission android:name="android.permission.GET_PROCESS_STATE_AND_OOM_SCORE"
2551        android:protectionLevel="signature|privileged|development" />
2552
2553    <!-- Allows use of PendingIntent.getIntent().
2554         @hide -->
2555    <permission android:name="android.permission.GET_INTENT_SENDER_INTENT"
2556        android:protectionLevel="signature" />
2557
2558    <!-- ================================== -->
2559    <!-- Permissions affecting the display of other applications  -->
2560    <!-- ================================== -->
2561    <eat-comment />
2562
2563    <!-- Allows an app to create windows using the type
2564         {@link android.view.WindowManager.LayoutParams#TYPE_APPLICATION_OVERLAY},
2565         shown on top of all other apps.  Very few apps
2566         should use this permission; these windows are intended for
2567         system-level interaction with the user.
2568
2569         <p class="note"><strong>Note:</strong> If the app
2570         targets API level 23 or higher, the app user must explicitly grant
2571         this permission to the app through a permission management screen. The app requests
2572         the user's approval by sending an intent with action
2573         {@link android.provider.Settings#ACTION_MANAGE_OVERLAY_PERMISSION}.
2574         The app can check whether it has this authorization by calling
2575         {@link android.provider.Settings#canDrawOverlays
2576         Settings.canDrawOverlays()}.
2577         <p>Protection level: signature|preinstalled|appop|pre23|development -->
2578    <permission android:name="android.permission.SYSTEM_ALERT_WINDOW"
2579        android:label="@string/permlab_systemAlertWindow"
2580        android:description="@string/permdesc_systemAlertWindow"
2581        android:protectionLevel="signature|preinstalled|appop|pre23|development" />
2582
2583    <!-- @deprecated Use {@link android.Manifest.permission#REQUEST_COMPANION_RUN_IN_BACKGROUND}
2584         @hide
2585    -->
2586    <permission android:name="android.permission.RUN_IN_BACKGROUND"
2587        android:label="@string/permlab_runInBackground"
2588        android:description="@string/permdesc_runInBackground"
2589        android:protectionLevel="signature" />
2590
2591    <!-- @deprecated Use
2592        {@link android.Manifest.permission#REQUEST_COMPANION_USE_DATA_IN_BACKGROUND}
2593         @hide
2594    -->
2595    <permission android:name="android.permission.USE_DATA_IN_BACKGROUND"
2596        android:label="@string/permlab_useDataInBackground"
2597        android:description="@string/permdesc_useDataInBackground"
2598        android:protectionLevel="signature" />
2599
2600    <!-- @hide Allows an application to set display offsets for the screen.
2601         This permission is not available to third party applications. -->
2602    <permission android:name="android.permission.SET_DISPLAY_OFFSET"
2603        android:protectionLevel="signature|privileged" />
2604
2605    <!-- Allows a companion app to run in the background.
2606         <p>Protection level: normal
2607    -->
2608    <permission android:name="android.permission.REQUEST_COMPANION_RUN_IN_BACKGROUND"
2609                android:label="@string/permlab_runInBackground"
2610                android:description="@string/permdesc_runInBackground"
2611                android:protectionLevel="normal" />
2612
2613    <!-- Allows a companion app to use data in the background.
2614         <p>Protection level: normal
2615    -->
2616    <permission android:name="android.permission.REQUEST_COMPANION_USE_DATA_IN_BACKGROUND"
2617                android:label="@string/permlab_useDataInBackground"
2618                android:description="@string/permdesc_useDataInBackground"
2619                android:protectionLevel="normal" />
2620
2621    <!-- Allows a companion app to associate to Wi-Fi.
2622         <p>Only for use by a single pre-approved app.
2623         @hide
2624         @SystemApi
2625    -->
2626    <permission android:name="android.permission.COMPANION_APPROVE_WIFI_CONNECTIONS"
2627                android:protectionLevel="signature|privileged" />
2628
2629
2630    <!-- ================================== -->
2631    <!-- Permissions affecting the system wallpaper -->
2632    <!-- ================================== -->
2633    <eat-comment />
2634
2635    <!-- Allows applications to set the wallpaper.
2636         <p>Protection level: normal
2637     -->
2638    <permission android:name="android.permission.SET_WALLPAPER"
2639        android:label="@string/permlab_setWallpaper"
2640        android:description="@string/permdesc_setWallpaper"
2641        android:protectionLevel="normal" />
2642
2643    <!-- Allows applications to set the wallpaper hints.
2644         <p>Protection level: normal
2645    -->
2646    <permission android:name="android.permission.SET_WALLPAPER_HINTS"
2647        android:label="@string/permlab_setWallpaperHints"
2648        android:description="@string/permdesc_setWallpaperHints"
2649        android:protectionLevel="normal" />
2650
2651    <!-- Allow the app to read the system wallpaper image without
2652        holding the READ_EXTERNAL_STORAGE permission.
2653        <p>Not for use by third-party applications.
2654        @hide
2655        @SystemApi
2656    -->
2657    <permission android:name="android.permission.READ_WALLPAPER_INTERNAL"
2658        android:protectionLevel="signature|privileged" />
2659
2660    <!-- ===================================================== -->
2661    <!-- Permissions for changing the system clock / time zone -->
2662    <!-- ===================================================== -->
2663    <eat-comment />
2664
2665    <!-- Allows applications to set the system time directly.
2666         <p>Not for use by third-party applications. -->
2667    <permission android:name="android.permission.SET_TIME"
2668        android:protectionLevel="signature|privileged" />
2669
2670    <!-- Allows applications to set the system time zone directly.
2671         <p>Not for use by third-party applications.
2672    -->
2673    <permission android:name="android.permission.SET_TIME_ZONE"
2674        android:label="@string/permlab_setTimeZone"
2675        android:description="@string/permdesc_setTimeZone"
2676        android:protectionLevel="signature|privileged" />
2677
2678    <!-- Allows telephony to suggest the time / time zone.
2679         <p>Not for use by third-party applications.
2680         @hide
2681     -->
2682    <permission android:name="android.permission.SUGGEST_TELEPHONY_TIME_AND_ZONE"
2683        android:protectionLevel="signature" />
2684
2685    <!-- Allows applications like settings to suggest the user's manually chosen time / time zone.
2686         <p>Not for use by third-party applications.
2687         @hide
2688    -->
2689    <permission android:name="android.permission.SUGGEST_MANUAL_TIME_AND_ZONE"
2690        android:protectionLevel="signature" />
2691
2692    <!-- ==================================================== -->
2693    <!-- Permissions related to changing status bar   -->
2694    <!-- ==================================================== -->
2695    <eat-comment />
2696
2697    <!-- Allows an application to expand or collapse the status bar.
2698         <p>Protection level: normal
2699    -->
2700    <permission android:name="android.permission.EXPAND_STATUS_BAR"
2701        android:label="@string/permlab_expandStatusBar"
2702        android:description="@string/permdesc_expandStatusBar"
2703        android:protectionLevel="normal" />
2704
2705    <!-- ============================================================== -->
2706    <!-- Permissions related to adding/removing shortcuts from Launcher -->
2707    <!-- ============================================================== -->
2708    <eat-comment />
2709
2710    <!-- Allows an application to install a shortcut in Launcher.
2711         <p>In Android O (API level 26) and higher, the <code>INSTALL_SHORTCUT</code> broadcast no
2712         longer has any effect on your app because it's a private, implicit
2713         broadcast. Instead, you should create an app shortcut by using the
2714         {@link android.content.pm.ShortcutManager#requestPinShortcut requestPinShortcut()}
2715         method from the {@link android.content.pm.ShortcutManager} class.
2716         <p>Protection level: normal
2717    -->
2718    <permission android:name="com.android.launcher.permission.INSTALL_SHORTCUT"
2719        android:label="@string/permlab_install_shortcut"
2720        android:description="@string/permdesc_install_shortcut"
2721        android:protectionLevel="normal"/>
2722
2723    <!-- <p class="caution"><strong>Don't use this permission in your app.</strong><br>This
2724         permission is no longer supported.
2725    -->
2726    <permission android:name="com.android.launcher.permission.UNINSTALL_SHORTCUT"
2727        android:label="@string/permlab_uninstall_shortcut"
2728        android:description="@string/permdesc_uninstall_shortcut"
2729        android:protectionLevel="normal"/>
2730
2731    <!-- ==================================================== -->
2732    <!-- Permissions related to accessing sync settings   -->
2733    <!-- ==================================================== -->
2734    <eat-comment />
2735
2736    <!-- Allows applications to read the sync settings.
2737         <p>Protection level: normal
2738    -->
2739    <permission android:name="android.permission.READ_SYNC_SETTINGS"
2740        android:description="@string/permdesc_readSyncSettings"
2741        android:label="@string/permlab_readSyncSettings"
2742        android:protectionLevel="normal" />
2743
2744    <!-- Allows applications to write the sync settings.
2745         <p>Protection level: normal
2746    -->
2747    <permission android:name="android.permission.WRITE_SYNC_SETTINGS"
2748        android:description="@string/permdesc_writeSyncSettings"
2749        android:label="@string/permlab_writeSyncSettings"
2750        android:protectionLevel="normal" />
2751
2752    <!-- Allows applications to read the sync stats.
2753         <p>Protection level: normal
2754    -->
2755    <permission android:name="android.permission.READ_SYNC_STATS"
2756        android:description="@string/permdesc_readSyncStats"
2757        android:label="@string/permlab_readSyncStats"
2758        android:protectionLevel="normal" />
2759
2760    <!-- ============================================ -->
2761    <!-- Permissions for low-level system interaction -->
2762    <!-- ============================================ -->
2763    <eat-comment />
2764
2765    <!-- @SystemApi @hide Change the screen compatibility mode of applications -->
2766    <permission android:name="android.permission.SET_SCREEN_COMPATIBILITY"
2767        android:protectionLevel="signature" />
2768
2769    <!-- Allows an application to modify the current configuration, such
2770         as locale.
2771         <p>Protection level: signature|privileged|development -->
2772    <permission android:name="android.permission.CHANGE_CONFIGURATION"
2773        android:protectionLevel="signature|privileged|development" />
2774
2775    <!-- Allows an application to read or write the system settings.
2776
2777        <p class="note"><strong>Note:</strong> If the app targets API level 23
2778        or higher, the app user
2779        must explicitly grant this permission to the app through a permission management screen.
2780        The app requests the user's approval by sending an intent with action
2781        {@link android.provider.Settings#ACTION_MANAGE_WRITE_SETTINGS}. The app
2782        can check whether it has this authorization by calling {@link
2783        android.provider.Settings.System#canWrite Settings.System.canWrite()}.
2784
2785        <p>Protection level: signature|preinstalled|appop|pre23
2786    -->
2787    <permission android:name="android.permission.WRITE_SETTINGS"
2788        android:label="@string/permlab_writeSettings"
2789        android:description="@string/permdesc_writeSettings"
2790        android:protectionLevel="signature|preinstalled|appop|pre23" />
2791
2792    <!-- Allows an application to modify the Google service map.
2793    <p>Not for use by third-party applications. -->
2794    <permission android:name="android.permission.WRITE_GSERVICES"
2795        android:protectionLevel="signature|privileged" />
2796
2797    <!-- @SystemApi @TestApi @hide Allows an application to modify config settings.
2798    <p>Not for use by third-party applications. -->
2799    <permission android:name="android.permission.WRITE_DEVICE_CONFIG"
2800        android:protectionLevel="signature|verifier|configurator"/>
2801
2802    <!-- @SystemApi @hide Allows an application to read config settings.
2803    <p>Not for use by third-party applications. -->
2804    <permission android:name="android.permission.READ_DEVICE_CONFIG"
2805        android:protectionLevel="signature|preinstalled" />
2806
2807    <!-- @hide Allows an application to monitor {@link android.provider.Settings.Config} access.
2808    <p>Not for use by third-party applications. -->
2809    <permission android:name="android.permission.MONITOR_DEVICE_CONFIG_ACCESS"
2810        android:protectionLevel="signature"/>
2811
2812    <!-- @SystemApi @TestApi Allows an application to call
2813        {@link android.app.ActivityManager#forceStopPackage}.
2814        @hide -->
2815    <permission android:name="android.permission.FORCE_STOP_PACKAGES"
2816        android:protectionLevel="signature|privileged" />
2817
2818    <!-- @SystemApi @hide Allows an application to retrieve the content of the active window
2819         An active window is the window that has fired an accessibility event. -->
2820    <permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT"
2821        android:protectionLevel="signature|privileged" />
2822
2823    <!-- Modify the global animation scaling factor.
2824    <p>Not for use by third-party applications. -->
2825    <permission android:name="android.permission.SET_ANIMATION_SCALE"
2826        android:protectionLevel="signature|privileged|development" />
2827
2828    <!-- @deprecated This functionality will be removed in the future; please do
2829         not use. Allow an application to make its activities persistent. -->
2830    <permission android:name="android.permission.PERSISTENT_ACTIVITY"
2831        android:label="@string/permlab_persistentActivity"
2832        android:description="@string/permdesc_persistentActivity"
2833        android:protectionLevel="normal" />
2834
2835    <!-- Allows an application to find out the space used by any package.
2836         <p>Protection level: normal
2837    -->
2838    <permission android:name="android.permission.GET_PACKAGE_SIZE"
2839        android:label="@string/permlab_getPackageSize"
2840        android:description="@string/permdesc_getPackageSize"
2841        android:protectionLevel="normal" />
2842
2843    <!-- @deprecated No longer useful, see
2844         {@link android.content.pm.PackageManager#addPackageToPreferred}
2845         for details. -->
2846    <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS"
2847        android:protectionLevel="signature|installer|verifier" />
2848
2849    <!-- Allows an application to receive the
2850         {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is
2851         broadcast after the system finishes booting.  If you don't
2852         request this permission, you will not receive the broadcast at
2853         that time.  Though holding this permission does not have any
2854         security implications, it can have a negative impact on the
2855         user experience by increasing the amount of time it takes the
2856         system to start and allowing applications to have themselves
2857         running without the user being aware of them.  As such, you must
2858         explicitly declare your use of this facility to make that visible
2859         to the user.
2860         <p>Protection level: normal
2861    -->
2862    <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED"
2863        android:label="@string/permlab_receiveBootCompleted"
2864        android:description="@string/permdesc_receiveBootCompleted"
2865        android:protectionLevel="normal" />
2866
2867    <!-- Allows an application to broadcast sticky intents.  These are
2868         broadcasts whose data is held by the system after being finished,
2869         so that clients can quickly retrieve that data without having
2870         to wait for the next broadcast.
2871         <p>Protection level: normal
2872    -->
2873    <permission android:name="android.permission.BROADCAST_STICKY"
2874        android:label="@string/permlab_broadcastSticky"
2875        android:description="@string/permdesc_broadcastSticky"
2876        android:protectionLevel="normal" />
2877
2878    <!-- Allows mounting and unmounting file systems for removable storage.
2879    <p>Not for use by third-party applications.-->
2880    <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS"
2881        android:protectionLevel="signature|privileged" />
2882
2883    <!-- Allows formatting file systems for removable storage.
2884    <p>Not for use by third-party applications. -->
2885    <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS"
2886        android:protectionLevel="signature|privileged" />
2887
2888    <!-- @hide -->
2889    <permission android:name="android.permission.STORAGE_INTERNAL"
2890        android:protectionLevel="signature" />
2891
2892    <!-- Allows access to ASEC non-destructive API calls
2893         @hide  -->
2894    <permission android:name="android.permission.ASEC_ACCESS"
2895        android:protectionLevel="signature" />
2896
2897    <!-- Allows creation of ASEC volumes
2898         @hide  -->
2899    <permission android:name="android.permission.ASEC_CREATE"
2900        android:protectionLevel="signature" />
2901
2902    <!-- Allows destruction of ASEC volumes
2903         @hide  -->
2904    <permission android:name="android.permission.ASEC_DESTROY"
2905        android:protectionLevel="signature" />
2906
2907    <!-- Allows mount / unmount of ASEC volumes
2908         @hide  -->
2909    <permission android:name="android.permission.ASEC_MOUNT_UNMOUNT"
2910        android:protectionLevel="signature" />
2911
2912    <!-- Allows rename of ASEC volumes
2913         @hide  -->
2914    <permission android:name="android.permission.ASEC_RENAME"
2915        android:protectionLevel="signature" />
2916
2917    <!-- Allows applications to write the apn settings and read sensitive fields of
2918         an existing apn settings like user and password.
2919    <p>Not for use by third-party applications. -->
2920    <permission android:name="android.permission.WRITE_APN_SETTINGS"
2921        android:protectionLevel="signature|privileged" />
2922
2923    <!-- Allows applications to change network connectivity state.
2924         <p>Protection level: normal
2925    -->
2926    <permission android:name="android.permission.CHANGE_NETWORK_STATE"
2927        android:description="@string/permdesc_changeNetworkState"
2928        android:label="@string/permlab_changeNetworkState"
2929        android:protectionLevel="normal" />
2930
2931    <!-- Allows an application to clear the caches of all installed
2932         applications on the device.
2933         <p>Protection level: signature|privileged
2934    -->
2935    <permission android:name="android.permission.CLEAR_APP_CACHE"
2936        android:protectionLevel="signature|privileged" />
2937
2938    <!-- @SystemApi Allows an application to use any media decoder when decoding for playback
2939         @hide -->
2940    <permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK"
2941        android:protectionLevel="signature|privileged" />
2942
2943    <!-- @SystemApi Allows an application to install and/or uninstall CA certificates on
2944         behalf of the user.
2945         @hide -->
2946    <permission android:name="android.permission.MANAGE_CA_CERTIFICATES"
2947        android:protectionLevel="signature|privileged" />
2948
2949    <!-- @SystemApi Allows an application to do certain operations needed for
2950         interacting with the recovery (system update) system.
2951         @hide -->
2952    <permission android:name="android.permission.RECOVERY"
2953        android:protectionLevel="signature|privileged" />
2954
2955    <!-- @SystemApi Allows an application to read system update info.
2956         @hide -->
2957    <permission android:name="android.permission.READ_SYSTEM_UPDATE_INFO"
2958        android:protectionLevel="signature" />
2959
2960    <!-- Allows the system to bind to an application's task services
2961         @hide -->
2962    <permission android:name="android.permission.BIND_JOB_SERVICE"
2963        android:protectionLevel="signature" />
2964    <uses-permission android:name="android.permission.BIND_JOB_SERVICE"/>
2965
2966    <!-- Allows an application to initiate configuration updates
2967         <p>An application requesting this permission is responsible for
2968         verifying the source and integrity of any update before passing
2969         it off to the various individual installer components
2970         @hide -->
2971    <permission android:name="android.permission.UPDATE_CONFIG"
2972        android:protectionLevel="signature|privileged" />
2973
2974    <!-- Allows an application to query the current time zone rules state
2975         on device.
2976         @SystemApi @hide -->
2977    <permission android:name="android.permission.QUERY_TIME_ZONE_RULES"
2978                android:protectionLevel="signature|privileged" />
2979
2980    <!-- Allows a time zone rule updater application to request
2981         the system installs / uninstalls timezone rules.
2982         <p>An application requesting this permission is responsible for
2983         verifying the source and integrity of the update before passing
2984         it off to the installer components.
2985         @SystemApi @hide -->
2986    <permission android:name="android.permission.UPDATE_TIME_ZONE_RULES"
2987        android:protectionLevel="signature|privileged" />
2988
2989    <!-- Must be required by a time zone rule updater application,
2990         to ensure that only the system can trigger it.
2991         @hide -->
2992    <permission android:name="android.permission.TRIGGER_TIME_ZONE_RULES_CHECK"
2993        android:protectionLevel="signature" />
2994    <uses-permission android:name="android.permission.TRIGGER_TIME_ZONE_RULES_CHECK"/>
2995
2996    <!-- Allows the system to reset throttling in shortcut manager.
2997         @hide -->
2998    <permission android:name="android.permission.RESET_SHORTCUT_MANAGER_THROTTLING"
2999        android:protectionLevel="signature" />
3000
3001    <!-- Allows the system to bind to the discovered Network Recommendation Service.
3002         @SystemApi @hide -->
3003    <permission android:name="android.permission.BIND_NETWORK_RECOMMENDATION_SERVICE"
3004        android:protectionLevel="signature" />
3005    <uses-permission android:name="android.permission.BIND_NETWORK_RECOMMENDATION_SERVICE"/>
3006
3007    <!-- Allows an application to enable, disable and change priority of
3008         runtime resource overlays.
3009         @hide -->
3010    <permission android:name="android.permission.CHANGE_OVERLAY_PACKAGES"
3011        android:protectionLevel="signature|privileged" />
3012
3013    <!-- ========================================= -->
3014    <!-- Permissions for special development tools -->
3015    <!-- ========================================= -->
3016    <eat-comment />
3017
3018    <!-- Allows an application to read or write the secure system settings.
3019    <p>Not for use by third-party applications. -->
3020    <permission android:name="android.permission.WRITE_SECURE_SETTINGS"
3021        android:protectionLevel="signature|privileged|development" />
3022
3023    <!-- Allows an application to retrieve state dump information from system services.
3024    <p>Not for use by third-party applications. -->
3025    <permission android:name="android.permission.DUMP"
3026        android:protectionLevel="signature|privileged|development" />
3027
3028    <!-- Allows an application to read the low-level system log files.
3029    <p>Not for use by third-party applications, because
3030    Log entries can contain the user's private information. -->
3031    <permission android:name="android.permission.READ_LOGS"
3032        android:protectionLevel="signature|privileged|development" />
3033
3034    <!-- Configure an application for debugging.
3035    <p>Not for use by third-party applications. -->
3036    <permission android:name="android.permission.SET_DEBUG_APP"
3037        android:protectionLevel="signature|privileged|development" />
3038
3039    <!-- Allows an application to set the maximum number of (not needed)
3040         application processes that can be running.
3041         <p>Not for use by third-party applications. -->
3042    <permission android:name="android.permission.SET_PROCESS_LIMIT"
3043        android:protectionLevel="signature|privileged|development" />
3044
3045    <!-- Allows an application to control whether activities are immediately
3046         finished when put in the background.
3047         <p>Not for use by third-party applications. -->
3048    <permission android:name="android.permission.SET_ALWAYS_FINISH"
3049        android:protectionLevel="signature|privileged|development" />
3050
3051    <!-- Allow an application to request that a signal be sent to all persistent processes.
3052    <p>Not for use by third-party applications. -->
3053    <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES"
3054        android:protectionLevel="signature|privileged|development" />
3055
3056    <!-- @hide @SystemApi @TestApi
3057         Allow an application to approve incident and bug reports to be
3058         shared off-device.  There can be only one application installed on the
3059         device with this permission, and since this is a privileged permission, it
3060         must be in priv-app.
3061        <p>Not for use by third-party applications. -->
3062    <permission android:name="android.permission.APPROVE_INCIDENT_REPORTS"
3063        android:protectionLevel="signature|incidentReportApprover" />
3064
3065    <!-- @hide Allow an application to approve an incident or bug report approval from
3066        the system. -->
3067    <permission android:name="android.permission.REQUEST_INCIDENT_REPORT_APPROVAL"
3068        android:protectionLevel="signature|privileged" />
3069
3070    <!-- ==================================== -->
3071    <!-- Private permissions                  -->
3072    <!-- ==================================== -->
3073    <eat-comment />
3074
3075    <!-- Allows access to the list of accounts in the Accounts Service.
3076         <p>Protection level: signature|privileged -->
3077    <permission android:name="android.permission.GET_ACCOUNTS_PRIVILEGED"
3078        android:protectionLevel="signature|privileged" />
3079
3080    <!-- Allows but does not guarantee access to user passwords at the conclusion of add account
3081    @hide -->
3082    <permission android:name="android.permission.GET_PASSWORD"
3083        android:protectionLevel="signature" />
3084
3085    <!-- Allows applications to RW to diagnostic resources.
3086    <p>Not for use by third-party applications. -->
3087    <permission android:name="android.permission.DIAGNOSTIC"
3088        android:protectionLevel="signature" />
3089
3090    <!-- Allows an application to open, close, or disable the status bar
3091         and its icons.
3092         <p>Not for use by third-party applications. -->
3093    <permission android:name="android.permission.STATUS_BAR"
3094        android:protectionLevel="signature|privileged" />
3095
3096    <!-- Allows an application to trigger bugreport via shell using the bugreport API.
3097        <p>Not for use by third-party applications.
3098        @hide
3099    -->
3100    <permission android:name="android.permission.TRIGGER_SHELL_BUGREPORT"
3101        android:protectionLevel="signature" />
3102
3103    <!-- Allows an application to be the status bar.  Currently used only by SystemUI.apk
3104    @hide -->
3105    <permission android:name="android.permission.STATUS_BAR_SERVICE"
3106        android:protectionLevel="signature" />
3107
3108    <!-- Allows an application to bind to third party quick settings tiles.
3109         <p>Should only be requested by the System, should be required by
3110         TileService declarations.-->
3111    <permission android:name="android.permission.BIND_QUICK_SETTINGS_TILE"
3112        android:protectionLevel="signature" />
3113
3114    <!-- Allows SystemUI to request third party controls.
3115         <p>Should only be requested by the System and required by
3116         {@link android.service.controls.ControlsProviderService} declarations.
3117    -->
3118    <permission android:name="android.permission.BIND_CONTROLS"
3119        android:protectionLevel="signature" />
3120
3121    <!-- @SystemApi Allows an application to force a BACK operation on whatever is the
3122         top activity.
3123         <p>Not for use by third-party applications.
3124         @hide
3125    -->
3126    <permission android:name="android.permission.FORCE_BACK"
3127        android:protectionLevel="signature" />
3128
3129    <!-- Allows an application to update device statistics.
3130    <p>Not for use by third-party applications. -->
3131    <permission android:name="android.permission.UPDATE_DEVICE_STATS"
3132        android:protectionLevel="signature|privileged" />
3133
3134    <!-- @SystemApi @hide Allows an application to collect application operation statistics.
3135         Not for use by third party apps. -->
3136    <permission android:name="android.permission.GET_APP_OPS_STATS"
3137        android:protectionLevel="signature|privileged|development" />
3138
3139    <!-- @SystemApi Allows an application to update application operation statistics. Not for
3140         use by third party apps.
3141         @hide -->
3142    <permission android:name="android.permission.UPDATE_APP_OPS_STATS"
3143        android:protectionLevel="signature|privileged|installer" />
3144
3145    <!-- @SystemApi Allows an application to update the user app op restrictions.
3146         Not for use by third party apps.
3147         @hide -->
3148    <permission android:name="android.permission.MANAGE_APP_OPS_RESTRICTIONS"
3149        android:protectionLevel="signature|installer" />
3150
3151    <!-- Allows an application to update the user app op modes.
3152         Not for use by third party apps.
3153         @hide -->
3154    <permission android:name="android.permission.MANAGE_APP_OPS_MODES"
3155        android:protectionLevel="signature|installer|verifier" />
3156
3157    <!-- @SystemApi Allows an application to open windows that are for use by parts
3158         of the system user interface.
3159         <p>Not for use by third-party applications.
3160         @hide
3161    -->
3162    <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW"
3163        android:protectionLevel="signature" />
3164
3165    <!-- @SystemApi Allows an application to use
3166         {@link android.view.WindowManager.LayoutsParams#SYSTEM_FLAG_HIDE_NON_SYSTEM_OVERLAY_WINDOWS}
3167         to hide non-system-overlay windows.
3168         <p>Not for use by third-party applications.
3169         @hide
3170    -->
3171    <permission android:name="android.permission.HIDE_NON_SYSTEM_OVERLAY_WINDOWS"
3172                android:protectionLevel="signature|preinstalled" />
3173
3174    <!-- @SystemApi Allows an application to manage (create, destroy,
3175         Z-order) application tokens in the window manager.
3176         <p>Not for use by third-party applications.
3177         @hide
3178    -->
3179    <permission android:name="android.permission.MANAGE_APP_TOKENS"
3180        android:protectionLevel="signature" />
3181
3182    <!-- Allows System UI to register listeners for events from Window Manager.
3183         @hide -->
3184    <permission android:name="android.permission.REGISTER_WINDOW_MANAGER_LISTENERS"
3185        android:protectionLevel="signature" />
3186
3187    <!-- @hide Allows the application to temporarily freeze the screen for a
3188         full-screen transition. -->
3189    <permission android:name="android.permission.FREEZE_SCREEN"
3190        android:protectionLevel="signature" />
3191
3192    <!-- @SystemApi Allows an application to inject user events (keys, touch, trackball)
3193         into the event stream and deliver them to ANY window.  Without this
3194         permission, you can only deliver events to windows in your own process.
3195         <p>Not for use by third-party applications.
3196         @hide
3197    -->
3198    <permission android:name="android.permission.INJECT_EVENTS"
3199        android:protectionLevel="signature" />
3200
3201    <!-- @hide Allows an application to register an input filter which filters the stream
3202         of user events (keys, touch, trackball) before they are dispatched to any window. -->
3203    <permission android:name="android.permission.FILTER_EVENTS"
3204        android:protectionLevel="signature" />
3205
3206    <!-- @hide Allows an application to retrieve the window token from the accessibility manager. -->
3207    <permission android:name="android.permission.RETRIEVE_WINDOW_TOKEN"
3208        android:protectionLevel="signature" />
3209
3210    <!-- @hide Allows an application to modify accessibility information from another app. -->
3211    <permission android:name="android.permission.MODIFY_ACCESSIBILITY_DATA"
3212                android:protectionLevel="signature" />
3213
3214    <!-- @hide Allows an application to perform accessibility operations (e.g. send events) on
3215         behalf of another package. -->
3216    <permission android:name="android.permission.ACT_AS_PACKAGE_FOR_ACCESSIBILITY"
3217                android:protectionLevel="signature" />
3218
3219    <!-- @hide Allows an application to change the accessibility volume. -->
3220    <permission android:name="android.permission.CHANGE_ACCESSIBILITY_VOLUME"
3221                android:protectionLevel="signature" />
3222
3223    <!-- @hide Allows an application to collect frame statistics -->
3224    <permission android:name="android.permission.FRAME_STATS"
3225         android:protectionLevel="signature" />
3226
3227    <!-- @hide Allows an application to temporary enable accessibility on the device. -->
3228    <permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY"
3229        android:protectionLevel="signature" />
3230
3231    <!-- @SystemApi Allows an application to launch detail settings activity of a particular
3232         accessibility service.
3233         <p>Not for use by third-party applications.
3234         @hide -->
3235    <permission android:name="android.permission.OPEN_ACCESSIBILITY_DETAILS_SETTINGS"
3236        android:protectionLevel="signature|installer" />
3237
3238    <!-- @SystemApi Allows an application to watch and control how activities are
3239         started globally in the system.  Only for is in debugging
3240         (usually the monkey command).
3241         <p>Not for use by third-party applications.
3242         @hide
3243    -->
3244    <permission android:name="android.permission.SET_ACTIVITY_WATCHER"
3245        android:protectionLevel="signature" />
3246
3247    <!-- @SystemApi Allows an application to call the activity manager shutdown() API
3248         to put the higher-level system there into a shutdown state.
3249         @hide -->
3250    <permission android:name="android.permission.SHUTDOWN"
3251        android:protectionLevel="signature|privileged" />
3252
3253    <!-- @SystemApi Allows an application to tell the activity manager to temporarily
3254         stop application switches, putting it into a special mode that
3255         prevents applications from immediately switching away from some
3256         critical UI such as the home screen.
3257         @hide -->
3258    <permission android:name="android.permission.STOP_APP_SWITCHES"
3259        android:protectionLevel="signature|privileged" />
3260
3261    <!-- @SystemApi Allows an application to retrieve private information about
3262         the current top activity, such as any assist context it can provide.
3263         <p>Not for use by third-party applications.
3264         @hide
3265    -->
3266    <permission android:name="android.permission.GET_TOP_ACTIVITY_INFO"
3267        android:protectionLevel="signature" />
3268
3269    <!-- Allows an application to retrieve the current state of keys and
3270         switches.
3271         <p>Not for use by third-party applications.
3272         @deprecated The API that used this permission has been removed. -->
3273    <permission android:name="android.permission.READ_INPUT_STATE"
3274        android:protectionLevel="signature" />
3275
3276    <!-- Must be required by an {@link android.inputmethodservice.InputMethodService},
3277         to ensure that only the system can bind to it.
3278         <p>Protection level: signature
3279    -->
3280    <permission android:name="android.permission.BIND_INPUT_METHOD"
3281        android:protectionLevel="signature" />
3282
3283    <!-- Must be required by an {@link android.media.midi.MidiDeviceService},
3284         to ensure that only the system can bind to it.
3285         <p>Protection level: signature
3286    -->
3287    <permission android:name="android.permission.BIND_MIDI_DEVICE_SERVICE"
3288        android:protectionLevel="signature" />
3289
3290    <!-- Must be required by an {@link android.accessibilityservice.AccessibilityService},
3291         to ensure that only the system can bind to it.
3292         <p>Protection level: signature
3293    -->
3294    <permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE"
3295        android:protectionLevel="signature" />
3296
3297    <!-- Must be required by a {@link android.printservice.PrintService},
3298         to ensure that only the system can bind to it.
3299         <p>Protection level: signature
3300    -->
3301    <permission android:name="android.permission.BIND_PRINT_SERVICE"
3302        android:protectionLevel="signature" />
3303
3304    <!-- Must be required by a {@link android.printservice.recommendation.RecommendationService},
3305     to ensure that only the system can bind to it.
3306     @hide
3307     @SystemApi
3308     <p>Protection level: signature
3309    -->
3310    <permission android:name="android.permission.BIND_PRINT_RECOMMENDATION_SERVICE"
3311            android:protectionLevel="signature" />
3312
3313    <!-- Allows applications to get the installed and enabled print services.
3314         @hide
3315         @SystemApi
3316         <p>Protection level: signature|preinstalled
3317    -->
3318    <permission android:name="android.permission.READ_PRINT_SERVICES"
3319        android:protectionLevel="signature|preinstalled" />
3320
3321    <!-- Allows applications to get the currently recommended print services for printers.
3322         @hide
3323         @SystemApi
3324         <p>Protection level: signature|preinstalled
3325    -->
3326    <permission android:name="android.permission.READ_PRINT_SERVICE_RECOMMENDATIONS"
3327        android:protectionLevel="signature|preinstalled" />
3328
3329    <!-- Must be required by a {@link android.nfc.cardemulation.HostApduService}
3330         or {@link android.nfc.cardemulation.OffHostApduService} to ensure that only
3331         the system can bind to it.
3332         <p>Protection level: signature
3333    -->
3334    <permission android:name="android.permission.BIND_NFC_SERVICE"
3335        android:protectionLevel="signature" />
3336
3337    <!-- Must be required by a {@link android.service.quickaccesswallet.QuickAccessWalletService}
3338         to ensure that only the system can bind to it.
3339         <p>Protection level: signature
3340    -->
3341    <permission android:name="android.permission.BIND_QUICK_ACCESS_WALLET_SERVICE"
3342                android:protectionLevel="signature" />
3343
3344    <!-- Must be required by the PrintSpooler to ensure that only the system can bind to it.
3345         @hide -->
3346    <permission android:name="android.permission.BIND_PRINT_SPOOLER_SERVICE"
3347        android:protectionLevel="signature" />
3348
3349    <!-- Must be required by the CompanionDeviceManager to ensure that only the system can bind to it.
3350         @hide -->
3351    <permission android:name="android.permission.BIND_COMPANION_DEVICE_MANAGER_SERVICE"
3352        android:protectionLevel="signature" />
3353
3354    <!-- @SystemApi Must be required by the RuntimePermissionPresenterService to ensure
3355         that only the system can bind to it.
3356         @hide -->
3357    <permission android:name="android.permission.BIND_RUNTIME_PERMISSION_PRESENTER_SERVICE"
3358        android:protectionLevel="signature" />
3359
3360    <!-- Must be required by a TextService (e.g. SpellCheckerService)
3361         to ensure that only the system can bind to it.
3362         <p>Protection level: signature
3363    -->
3364    <permission android:name="android.permission.BIND_TEXT_SERVICE"
3365        android:protectionLevel="signature" />
3366
3367    <!-- @SystemApi Must be required by a AttentionService
3368         to ensure that only the system can bind to it.
3369         <p>Protection level: signature
3370         @hide
3371    -->
3372    <permission android:name="android.permission.BIND_ATTENTION_SERVICE"
3373                android:protectionLevel="signature" />
3374    <uses-permission android:name="android.permission.BIND_ATTENTION_SERVICE" />
3375
3376    <!-- Must be required by a {@link android.net.VpnService},
3377         to ensure that only the system can bind to it.
3378         <p>Protection level: signature
3379    -->
3380    <permission android:name="android.permission.BIND_VPN_SERVICE"
3381        android:protectionLevel="signature" />
3382
3383    <!-- Must be required by a {@link android.service.wallpaper.WallpaperService},
3384         to ensure that only the system can bind to it.
3385         <p>Protection level: signature|privileged
3386    -->
3387    <permission android:name="android.permission.BIND_WALLPAPER"
3388        android:protectionLevel="signature|privileged" />
3389
3390    <!-- Must be required by a {@link android.service.voice.VoiceInteractionService},
3391         to ensure that only the system can bind to it.
3392         <p>Protection level: signature
3393    -->
3394    <permission android:name="android.permission.BIND_VOICE_INTERACTION"
3395        android:protectionLevel="signature" />
3396
3397    <!-- Must be required by a {@link android.service.autofill.AutofillService},
3398         to ensure that only the system can bind to it.
3399         <p>Protection level: signature
3400    -->
3401    <permission android:name="android.permission.BIND_AUTOFILL_SERVICE"
3402        android:protectionLevel="signature" />
3403
3404   <!-- Alternative version of android.permission.BIND_AUTOFILL_FIELD_CLASSIFICATION_SERVICE.
3405        This permission was renamed during the O previews but it was supported on the final O
3406        release, so we need to carry it over.
3407        <p>Protection level: signature
3408        @hide
3409    -->
3410    <permission android:name="android.permission.BIND_AUTOFILL"
3411        android:protectionLevel="signature" />
3412
3413    <!-- Must be required by an {@link android.service.autofill.AutofillFieldClassificationService}
3414         to ensure that only the system can bind to it.
3415         @hide This is not a third-party API (intended for OEMs and system apps).
3416    -->
3417    <permission android:name="android.permission.BIND_AUTOFILL_FIELD_CLASSIFICATION_SERVICE"
3418                android:protectionLevel="signature" />
3419
3420    <!-- Must be required by an {@link android.service.autofill.InlineSuggestionRenderService}
3421         to ensure that only the system can bind to it.
3422         @hide This is not a third-party API (intended for OEMs and system apps).
3423    -->
3424    <permission android:name="android.permission.BIND_INLINE_SUGGESTION_RENDER_SERVICE"
3425                android:protectionLevel="signature" />
3426
3427    <!-- Must be required by a android.service.textclassifier.TextClassifierService,
3428         to ensure that only the system can bind to it.
3429         @SystemApi @hide This is not a third-party API (intended for OEMs and system apps).
3430         <p>Protection level: signature
3431    -->
3432    <permission android:name="android.permission.BIND_TEXTCLASSIFIER_SERVICE"
3433                android:protectionLevel="signature" />
3434
3435    <!-- Must be required by a android.service.contentcapture.ContentCaptureService,
3436         to ensure that only the system can bind to it.
3437         @SystemApi @hide This is not a third-party API (intended for OEMs and system apps).
3438         <p>Protection level: signature
3439    -->
3440    <permission android:name="android.permission.BIND_CONTENT_CAPTURE_SERVICE"
3441                android:protectionLevel="signature" />
3442
3443    <!-- Must be required by a android.service.contentsuggestions.ContentSuggestionsService,
3444         to ensure that only the system can bind to it.
3445         @SystemApi @hide This is not a third-party API (intended for OEMs and system apps).
3446         <p>Protection level: signature
3447    -->
3448    <permission android:name="android.permission.BIND_CONTENT_SUGGESTIONS_SERVICE"
3449                android:protectionLevel="signature" />
3450
3451    <!-- Must be required by a android.service.autofill.augmented.AugmentedAutofillService,
3452         to ensure that only the system can bind to it.
3453         @SystemApi @hide This is not a third-party API (intended for OEMs and system apps).
3454         <p>Protection level: signature
3455    -->
3456    <permission android:name="android.permission.BIND_AUGMENTED_AUTOFILL_SERVICE"
3457                android:protectionLevel="signature" />
3458
3459    <!-- Must be required by a {@link android.service.voice.VoiceInteractionService} implementation
3460         to enroll its own sound models. This is a more restrictive permission than the higher-level
3461         permission KEYPHRASE_ENROLLMENT_APPLICATION. For the caller to enroll sound models with
3462         this permission, it must hold the permission and be the active VoiceInteractionService in
3463         the system.
3464         {@see Settings.Secure.VOICE_INTERACTION_SERVICE}
3465         @hide -->
3466    <permission android:name="android.permission.MANAGE_VOICE_KEYPHRASES"
3467        android:protectionLevel="signature|privileged" />
3468
3469    <!-- Must be required by a keyphrase enrollment application, to enroll sound models. This is
3470         treated as a higher-level permission to MANAGE_VOICE_KEYPHRASES as a caller can enroll
3471         sound models at any time. This permission should be reserved for system enrollment
3472         applications detected by {@link android.hardware.soundtrigger.KeyphraseEnrollmentInfo}
3473         only.
3474         @hide <p>Not for use by third-party applications.</p> -->
3475    <permission android:name="android.permission.KEYPHRASE_ENROLLMENT_APPLICATION"
3476        android:protectionLevel="signature|privileged" />
3477
3478    <!-- Must be required by a {@link com.android.media.remotedisplay.RemoteDisplayProvider},
3479         to ensure that only the system can bind to it.
3480         @hide -->
3481    <permission android:name="android.permission.BIND_REMOTE_DISPLAY"
3482        android:protectionLevel="signature" />
3483
3484    <!-- Must be required by a {@link android.media.tv.TvInputService}
3485         to ensure that only the system can bind to it.
3486         <p>Protection level: signature|privileged
3487    -->
3488    <permission android:name="android.permission.BIND_TV_INPUT"
3489        android:protectionLevel="signature|privileged" />
3490
3491    <!-- @SystemApi
3492         Must be required by a {@link com.android.media.tv.remoteprovider.TvRemoteProvider}
3493         to ensure that only the system can bind to it.
3494         <p>Protection level: signature|privileged
3495         <p>Not for use by third-party applications. </p>
3496         @hide  -->
3497    <permission android:name="android.permission.BIND_TV_REMOTE_SERVICE"
3498        android:protectionLevel="signature|privileged" />
3499
3500    <!-- @SystemApi
3501         Must be required for a virtual remote controller for TV.
3502         <p>Protection level: signature|privileged
3503         <p>Not for use by third-party applications. </p>
3504         @hide  -->
3505    <permission android:name="android.permission.TV_VIRTUAL_REMOTE_CONTROLLER"
3506        android:protectionLevel="signature|privileged" />
3507
3508    <!-- Allows an application to change HDMI CEC active source.
3509         <p>Not for use by third-party applications.
3510         @hide -->
3511    <permission android:name="android.permission.CHANGE_HDMI_CEC_ACTIVE_SOURCE"
3512        android:protectionLevel="signature|privileged" />
3513
3514    <!-- @SystemApi Allows an application to modify parental controls
3515         <p>Not for use by third-party applications.
3516         @hide -->
3517    <permission android:name="android.permission.MODIFY_PARENTAL_CONTROLS"
3518        android:protectionLevel="signature|privileged" />
3519
3520    <!-- @SystemApi Allows an application to read TvContentRatingSystemInfo
3521         <p>Not for use by third-party applications.
3522         @hide -->
3523    <permission android:name="android.permission.READ_CONTENT_RATING_SYSTEMS"
3524        android:protectionLevel="signature|privileged" />
3525
3526    <!-- Allows an application to notify TV inputs by sending broadcasts.
3527         <p>Protection level: signature|privileged
3528         <p>Not for use by third-party applications.
3529         @hide @SystemApi -->
3530    <permission android:name="android.permission.NOTIFY_TV_INPUTS"
3531         android:protectionLevel="signature|privileged" />
3532
3533    <!-- This permission is required among systems services when accessing
3534         tuner resource management related APIs or information.
3535         <p>Protection level: signature|privileged
3536         <p>Not for use by third-party applications.
3537         @hide -->
3538    <permission android:name="android.permission.TUNER_RESOURCE_ACCESS"
3539         android:protectionLevel="signature|privileged" />
3540
3541    <!-- This permission is required by Media Resource Manager Service when
3542         accessing its overridePid Api.
3543         <p>Protection level: signature
3544         <p>Not for use by third-party applications.
3545         @hide -->
3546    <permission android:name="android.permission.MEDIA_RESOURCE_OVERRIDE_PID"
3547         android:protectionLevel="signature" />
3548    <uses-permission android:name="android.permission.MEDIA_RESOURCE_OVERRIDE_PID" />
3549
3550
3551    <!-- Must be required by a {@link android.media.routing.MediaRouteService}
3552         to ensure that only the system can interact with it.
3553         @hide -->
3554    <permission android:name="android.permission.BIND_ROUTE_PROVIDER"
3555        android:protectionLevel="signature" />
3556
3557    <!-- Must be required by device administration receiver, to ensure that only the
3558         system can interact with it.
3559         <p>Protection level: signature
3560    -->
3561    <permission android:name="android.permission.BIND_DEVICE_ADMIN"
3562        android:protectionLevel="signature" />
3563
3564    <!-- @SystemApi Required to add or remove another application as a device admin.
3565         <p>Not for use by third-party applications.
3566         @hide
3567         @removed -->
3568    <permission android:name="android.permission.MANAGE_DEVICE_ADMINS"
3569        android:protectionLevel="signature" />
3570
3571    <!-- @SystemApi Allows an app to reset the device password.
3572         <p>Not for use by third-party applications.
3573         @hide -->
3574    <permission android:name="android.permission.RESET_PASSWORD"
3575        android:protectionLevel="signature|privileged" />
3576
3577    <!-- @SystemApi Allows an app to lock the device.
3578         <p>Not for use by third-party applications.
3579         @hide -->
3580    <permission android:name="android.permission.LOCK_DEVICE"
3581        android:protectionLevel="signature|privileged" />
3582
3583    <!-- @SystemApi Allows low-level access to setting the orientation (actually
3584         rotation) of the screen.
3585         <p>Not for use by third-party applications.
3586         @hide
3587    -->
3588    <permission android:name="android.permission.SET_ORIENTATION"
3589        android:protectionLevel="signature" />
3590
3591    <!-- @SystemApi Allows low-level access to setting the pointer speed.
3592         <p>Not for use by third-party applications.
3593         @hide
3594    -->
3595    <permission android:name="android.permission.SET_POINTER_SPEED"
3596        android:protectionLevel="signature" />
3597
3598    <!-- Allows low-level access to setting input device calibration.
3599         <p>Not for use by normal applications.
3600         @hide -->
3601    <permission android:name="android.permission.SET_INPUT_CALIBRATION"
3602        android:protectionLevel="signature" />
3603
3604    <!-- Allows low-level access to setting the keyboard layout.
3605         <p>Not for use by third-party applications.
3606         @hide -->
3607    <permission android:name="android.permission.SET_KEYBOARD_LAYOUT"
3608        android:protectionLevel="signature" />
3609
3610    <!-- Allows an application to query tablet mode state and monitor changes
3611         in it.
3612         <p>Not for use by third-party applications.
3613         @hide -->
3614    <permission android:name="android.permission.TABLET_MODE"
3615        android:protectionLevel="signature" />
3616
3617    <!-- Allows an application to request installing packages. Apps
3618         targeting APIs greater than 25 must hold this permission in
3619         order to use {@link android.content.Intent#ACTION_INSTALL_PACKAGE}.
3620         <p>Protection level: signature
3621    -->
3622    <permission android:name="android.permission.REQUEST_INSTALL_PACKAGES"
3623        android:label="@string/permlab_requestInstallPackages"
3624        android:description="@string/permdesc_requestInstallPackages"
3625        android:protectionLevel="signature|appop" />
3626
3627    <!-- Allows an application to request deleting packages. Apps
3628         targeting APIs {@link android.os.Build.VERSION_CODES#P} or greater must hold this
3629         permission in order to use {@link android.content.Intent#ACTION_UNINSTALL_PACKAGE} or
3630         {@link android.content.pm.PackageInstaller#uninstall}.
3631         <p>Protection level: normal
3632    -->
3633    <permission android:name="android.permission.REQUEST_DELETE_PACKAGES"
3634        android:label="@string/permlab_requestDeletePackages"
3635        android:description="@string/permdesc_requestDeletePackages"
3636        android:protectionLevel="normal" />
3637
3638    <!-- Allows an application to install packages.
3639    <p>Not for use by third-party applications. -->
3640    <permission android:name="android.permission.INSTALL_PACKAGES"
3641      android:protectionLevel="signature|privileged" />
3642
3643    <!-- @SystemApi Allows an application to install self updates. This is a limited version
3644         of {@link android.Manifest.permission#INSTALL_PACKAGES}.
3645        <p>Not for use by third-party applications.
3646        @hide
3647    -->
3648    <permission android:name="android.permission.INSTALL_SELF_UPDATES"
3649        android:protectionLevel="signature|privileged" />
3650
3651    <!-- @SystemApi Allows an application to install updates. This is a limited version
3652         of {@link android.Manifest.permission#INSTALL_PACKAGES}.
3653        <p>Not for use by third-party applications.
3654        @hide
3655    -->
3656    <permission android:name="android.permission.INSTALL_PACKAGE_UPDATES"
3657        android:protectionLevel="signature|privileged" />
3658
3659    <!-- Allows an application to install existing system packages. This is a limited
3660         version of {@link android.Manifest.permission#INSTALL_PACKAGES}.
3661         <p>Not for use by third-party applications.
3662         TODO(b/80204953): remove this permission once we have a long-term solution.
3663         @hide
3664    -->
3665    <permission android:name="com.android.permission.INSTALL_EXISTING_PACKAGES"
3666        android:protectionLevel="signature|privileged" />
3667
3668    <!-- Allows an application to use the package installer v2 APIs.
3669         <p>The package installer v2 APIs are still a work in progress and we're
3670         currently validating they work in all scenarios.
3671         <p>Not for use by third-party applications.
3672         TODO(b/152310230): use this permission to protect only Incremental installations
3673         once the APIs are confirmed to be sufficient.
3674         @hide
3675    -->
3676    <permission android:name="com.android.permission.USE_INSTALLER_V2"
3677        android:protectionLevel="signature|verifier" />
3678
3679    <!-- @SystemApi @TestApi Allows an application to clear user data.
3680         <p>Not for use by third-party applications
3681         @hide
3682    -->
3683    <permission android:name="android.permission.CLEAR_APP_USER_DATA"
3684        android:protectionLevel="signature|installer" />
3685
3686    <!-- @hide Allows an application to get the URI permissions
3687         granted to another application.
3688         <p>Not for use by third-party applications
3689    -->
3690    <permission android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS"
3691        android:protectionLevel="signature" />
3692
3693    <!-- @hide Allows an application to clear the URI permissions
3694         granted to another application.
3695         <p>Not for use by third-party applications
3696    -->
3697    <permission
3698        android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS"
3699        android:protectionLevel="signature" />
3700
3701    <!-- @hide
3702         Allows an application to change the status of Scoped Access Directory requests granted or
3703         rejected by the user.
3704         <p>This permission should <em>only</em> be requested by the platform
3705         settings app.  This permission cannot be granted to third-party apps.
3706         <p>Protection level: signature
3707    -->
3708    <permission
3709         android:name="android.permission.MANAGE_SCOPED_ACCESS_DIRECTORY_PERMISSIONS"
3710         android:protectionLevel="signature" />
3711
3712    <!-- @hide
3713         Allows an application to change the status of a persistable URI permission granted
3714         to another application.
3715         <p>This permission should <em>only</em> be requested by the platform
3716         settings app.  This permission cannot be granted to third-party apps.
3717         <p>Protection level: signature
3718    -->
3719    <permission android:name="android.permission.FORCE_PERSISTABLE_URI_PERMISSIONS"
3720        android:protectionLevel="signature" />
3721
3722    <!-- Old permission for deleting an app's cache files, no longer used,
3723         but signals for us to quietly ignore calls instead of throwing an exception.
3724         <p>Protection level: signature|privileged -->
3725    <permission android:name="android.permission.DELETE_CACHE_FILES"
3726        android:protectionLevel="signature|privileged" />
3727
3728    <!-- Allows an application to delete cache files.
3729         @hide -->
3730    <permission android:name="android.permission.INTERNAL_DELETE_CACHE_FILES"
3731        android:protectionLevel="signature" />
3732
3733    <!-- Allows an application to delete packages.
3734         <p>Not for use by third-party applications.
3735         <p>Starting in {@link android.os.Build.VERSION_CODES#N}, user confirmation is requested
3736         when the application deleting the package is not the same application that installed the
3737         package. -->
3738    <permission android:name="android.permission.DELETE_PACKAGES"
3739        android:protectionLevel="signature|privileged" />
3740
3741    <!-- @SystemApi Allows an application to move location of installed package.
3742         @hide -->
3743    <permission android:name="android.permission.MOVE_PACKAGE"
3744        android:protectionLevel="signature|privileged" />
3745
3746    <!-- Allows an application to change whether an application component (other than its own) is
3747         enabled or not.
3748         <p>Not for use by third-party applications. -->
3749    <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE"
3750        android:protectionLevel="signature|privileged" />
3751
3752    <!-- @SystemApi Allows an application to grant specific permissions.
3753         @hide -->
3754    <permission android:name="android.permission.GRANT_RUNTIME_PERMISSIONS"
3755        android:protectionLevel="signature|installer|verifier" />
3756
3757    <!-- @SystemApi Allows an app that has this permission and the permissions to install packages
3758         to request certain runtime permissions to be granted at installation.
3759         @hide -->
3760    <permission android:name="android.permission.INSTALL_GRANT_RUNTIME_PERMISSIONS"
3761        android:protectionLevel="signature|installer|verifier" />
3762
3763    <!-- @SystemApi Allows an application to revoke specific permissions.
3764        @hide -->
3765    <permission android:name="android.permission.REVOKE_RUNTIME_PERMISSIONS"
3766         android:protectionLevel="signature|installer|verifier" />
3767
3768    <!-- @SystemApi Allows the system to read runtime permission state.
3769        @hide -->
3770    <permission android:name="android.permission.GET_RUNTIME_PERMISSIONS"
3771                android:protectionLevel="signature" />
3772
3773    <!-- @SystemApi Allows the system to restore runtime permission state. This might grant
3774    permissions, hence this is a more scoped, less powerful variant of GRANT_RUNTIME_PERMISSIONS.
3775    Among other restrictions this cannot override user choices.
3776    @hide -->
3777    <permission android:name="android.permission.RESTORE_RUNTIME_PERMISSIONS"
3778                android:protectionLevel="signature" />
3779
3780    <!-- @SystemApi Allows an application to change policy_fixed permissions.
3781    @hide -->
3782    <permission android:name="android.permission.ADJUST_RUNTIME_PERMISSIONS_POLICY"
3783                android:protectionLevel="signature|installer" />
3784
3785    <!-- @SystemApi @TestApi Allows an application to upgrade runtime permissions.
3786    @hide -->
3787    <permission android:name="android.permission.UPGRADE_RUNTIME_PERMISSIONS"
3788                android:protectionLevel="signature" />
3789
3790    <!-- @SystemApi Allows an application to whitelist restricted permissions
3791         on any of the whitelists.
3792    @hide -->
3793    <permission android:name="android.permission.WHITELIST_RESTRICTED_PERMISSIONS"
3794                android:protectionLevel="signature|installer" />
3795
3796    <!-- @SystemApi Allows an application to an exempt an app from having its permission be
3797        auto-revoked when unused for an extended period of time.
3798        @hide -->
3799    <permission android:name="android.permission.WHITELIST_AUTO_REVOKE_PERMISSIONS"
3800        android:protectionLevel="signature|installer" />
3801
3802    <!-- @hide Allows an application to observe permission changes. -->
3803    <permission android:name="android.permission.OBSERVE_GRANT_REVOKE_PERMISSIONS"
3804        android:protectionLevel="signature|privileged" />
3805
3806    <!-- @SystemApi Allows an application to start and stop one time permission sessions
3807    @hide -->
3808    <permission android:name="android.permission.MANAGE_ONE_TIME_PERMISSION_SESSIONS"
3809                android:protectionLevel="signature|installer" />
3810
3811    <!-- @SystemApi Allows an application to manage the holders of a role.
3812         @hide -->
3813    <permission android:name="android.permission.MANAGE_ROLE_HOLDERS"
3814                android:protectionLevel="signature|installer" />
3815
3816    <!-- @SystemApi Allows an application to observe role holder changes.
3817         @hide -->
3818    <permission android:name="android.permission.OBSERVE_ROLE_HOLDERS"
3819                android:protectionLevel="signature|installer" />
3820
3821    <!-- Allows an application to manage the companion devices.
3822         @hide -->
3823    <permission android:name="android.permission.MANAGE_COMPANION_DEVICES"
3824                android:protectionLevel="signature" />
3825
3826    <!-- @SystemApi Allows an application to use SurfaceFlinger's low level features.
3827         <p>Not for use by third-party applications.
3828         @hide
3829    -->
3830    <permission android:name="android.permission.ACCESS_SURFACE_FLINGER"
3831        android:protectionLevel="signature" />
3832
3833    <!-- Allows an application to take screen shots and more generally
3834         get access to the frame buffer data.
3835         <p>Not for use by third-party applications.
3836          @hide
3837          @removed -->
3838    <permission android:name="android.permission.READ_FRAME_BUFFER"
3839        android:protectionLevel="signature" />
3840
3841    <!-- Allows an application to use InputFlinger's low level features.
3842         @hide -->
3843    <permission android:name="android.permission.ACCESS_INPUT_FLINGER"
3844        android:protectionLevel="signature" />
3845
3846    <!-- Allows an application to disable/enable input devices.
3847         Could be used to prevent unwanted touch events
3848         on a touchscreen, for example during swimming or rain.
3849         @hide -->
3850    <permission android:name="android.permission.DISABLE_INPUT_DEVICE"
3851        android:protectionLevel="signature" />
3852
3853    <!-- Allows an application to configure and connect to Wifi displays
3854         @hide
3855         @SystemApi -->
3856    <permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY"
3857        android:protectionLevel="signature" />
3858
3859    <!-- Allows an application to control low-level features of Wifi displays
3860         such as opening an RTSP socket.  This permission should only be used
3861         by the display manager.
3862         @hide -->
3863    <permission android:name="android.permission.CONTROL_WIFI_DISPLAY"
3864        android:protectionLevel="signature" />
3865
3866    <!-- Allows an application to control the color modes set for displays system-wide.
3867         <p>Not for use by third-party applications.</p>
3868         @hide -->
3869    <permission android:name="android.permission.CONFIGURE_DISPLAY_COLOR_MODE"
3870        android:protectionLevel="signature" />
3871
3872    <!-- Allows an application to control the lights on the device.
3873         @hide
3874         @SystemApi
3875         @TestApi -->
3876    <permission android:name="android.permission.CONTROL_DEVICE_LIGHTS"
3877        android:protectionLevel="signature|privileged" />
3878
3879    <!-- Allows an application to control the color saturation of the display.
3880         @hide
3881         @SystemApi -->
3882    <permission android:name="android.permission.CONTROL_DISPLAY_SATURATION"
3883        android:protectionLevel="signature|privileged" />
3884
3885    <!-- Allows an application to control display color transformations.
3886         <p>Not for use by third-party applications.</p>
3887         @hide
3888         @SystemApi -->
3889    <permission android:name="android.permission.CONTROL_DISPLAY_COLOR_TRANSFORMS"
3890        android:protectionLevel="signature|privileged" />
3891
3892    <!-- Allows an application to collect usage infomation about brightness slider changes.
3893         <p>Not for use by third-party applications.</p>
3894         @hide
3895         @SystemApi
3896         @TestApi -->
3897    <permission android:name="android.permission.BRIGHTNESS_SLIDER_USAGE"
3898        android:protectionLevel="signature|privileged|development" />
3899
3900    <!-- Allows an application to collect ambient light stats.
3901         <p>Not for use by third party applications.</p>
3902         @hide
3903         @SystemApi -->
3904    <permission android:name="android.permission.ACCESS_AMBIENT_LIGHT_STATS"
3905        android:protectionLevel="signature|privileged|development" />
3906
3907    <!-- Allows an application to modify the display brightness configuration
3908         @hide
3909         @SystemApi
3910         @TestApi -->
3911    <permission android:name="android.permission.CONFIGURE_DISPLAY_BRIGHTNESS"
3912        android:protectionLevel="signature|privileged|development" />
3913
3914    <!-- Allows an application to control the system's display brightness
3915         @hide -->
3916    <permission android:name="android.permission.CONTROL_DISPLAY_BRIGHTNESS"
3917        android:protectionLevel="signature" />
3918
3919    <!-- @SystemApi Allows an application to control VPN.
3920         <p>Not for use by third-party applications.</p>
3921         @hide -->
3922    <permission android:name="android.permission.CONTROL_VPN"
3923        android:protectionLevel="signature|privileged" />
3924    <uses-permission android:name="android.permission.CONTROL_VPN" />
3925
3926    <!-- Allows an application to access and modify always-on VPN configuration.
3927         <p>Not for use by third-party or privileged applications.
3928         @hide -->
3929    <permission android:name="android.permission.CONTROL_ALWAYS_ON_VPN"
3930        android:protectionLevel="signature" />
3931
3932    <!-- Allows an application to capture audio output.
3933         Use the {@code CAPTURE_MEDIA_OUTPUT} permission if only the {@code USAGE_UNKNOWN}),
3934         {@code USAGE_MEDIA}) or {@code USAGE_GAME}) usages are intended to be captured.
3935         <p>Not for use by third-party applications.</p> -->
3936    <permission android:name="android.permission.CAPTURE_AUDIO_OUTPUT"
3937        android:protectionLevel="signature|privileged" />
3938
3939    <!-- @SystemApi Allows an application to capture the audio played by other apps
3940         that have set an allow capture policy of
3941         {@link android.media.AudioAttributes#ALLOW_CAPTURE_BY_SYSTEM}.
3942
3943         Without this permission, only audio with an allow capture policy of
3944         {@link android.media.AudioAttributes#ALLOW_CAPTURE_BY_ALL} can be used.
3945
3946         There are strong restriction listed at
3947         {@link android.media.AudioAttributes#ALLOW_CAPTURE_BY_SYSTEM}
3948         on what an app can do with the captured audio.
3949
3950         See {@code CAPTURE_AUDIO_OUTPUT} for capturing audio use cases other than media playback.
3951
3952         <p>Not for use by third-party applications.</p>
3953         @hide -->
3954    <permission android:name="android.permission.CAPTURE_MEDIA_OUTPUT"
3955        android:protectionLevel="signature|privileged" />
3956
3957    <!-- @SystemApi Allows an application to capture the audio played by other apps
3958        with the {@code USAGE_VOICE_COMMUNICATION} usage.
3959
3960        The application may opt out of capturing by setting an allow capture policy of
3961        {@link android.media.AudioAttributes#ALLOW_CAPTURE_BY_NONE}.
3962
3963        There are strong restriction listed at
3964        {@link android.media.AudioAttributes#ALLOW_CAPTURE_BY_SYSTEM}
3965        on what an app can do with the captured audio.
3966
3967        See {@code CAPTURE_AUDIO_OUTPUT} and {@code CAPTURE_MEDIA_OUTPUT} for capturing
3968        audio use cases other than voice communication playback.
3969
3970        <p>Not for use by third-party applications.</p>
3971        @hide -->
3972    <permission android:name="android.permission.CAPTURE_VOICE_COMMUNICATION_OUTPUT"
3973        android:protectionLevel="signature|privileged" />
3974
3975    <!-- @SystemApi Allows an application to capture audio for hotword detection.
3976         <p>Not for use by third-party applications.</p>
3977         @hide -->
3978    <permission android:name="android.permission.CAPTURE_AUDIO_HOTWORD"
3979        android:protectionLevel="signature|privileged" />
3980
3981    <!-- @SystemApi Allows an application to modify audio routing and override policy decisions.
3982         <p>Not for use by third-party applications.</p>
3983         @hide -->
3984    <permission android:name="android.permission.MODIFY_AUDIO_ROUTING"
3985        android:protectionLevel="signature|privileged" />
3986
3987    <!-- Allows an application to modify what effects are applied to all audio
3988         (matching certain criteria) from any application.
3989         <p>Not for use by third-party applications.</p>
3990         @hide -->
3991    <permission android:name="android.permission.MODIFY_DEFAULT_AUDIO_EFFECTS"
3992        android:protectionLevel="signature|privileged" />
3993
3994    <!-- @SystemApi Allows an application to provide remote displays.
3995         <p>Not for use by third-party applications.</p>
3996         @hide -->
3997    <permission android:name="android.permission.REMOTE_DISPLAY_PROVIDER"
3998        android:protectionLevel="signature|privileged" />
3999
4000    <!-- Allows an application to capture video output.
4001         <p>Not for use by third-party applications.</p>
4002          @hide
4003          @removed -->
4004    <permission android:name="android.permission.CAPTURE_VIDEO_OUTPUT"
4005        android:protectionLevel="signature" />
4006
4007    <!-- Allows an application to capture secure video output.
4008         <p>Not for use by third-party applications.</p>
4009          @hide
4010          @removed -->
4011    <permission android:name="android.permission.CAPTURE_SECURE_VIDEO_OUTPUT"
4012        android:protectionLevel="signature" />
4013
4014    <!-- Allows an application to know what content is playing and control its playback.
4015         <p>Not for use by third-party applications due to privacy of media consumption</p>  -->
4016    <permission android:name="android.permission.MEDIA_CONTENT_CONTROL"
4017        android:protectionLevel="signature|privileged" />
4018
4019    <!-- @SystemApi @hide Allows an application to set the volume key long-press listener.
4020         <p>When it's set, the application will receive the volume key long-press event
4021         instead of changing volume.</p>
4022         <p>Not for use by third-party applications</p> -->
4023    <permission android:name="android.permission.SET_VOLUME_KEY_LONG_PRESS_LISTENER"
4024        android:protectionLevel="signature|privileged|development" />
4025
4026    <!-- @SystemApi @hide Allows an application to set media key event listener.
4027         <p>When it's set, the application will receive the media key event before
4028         any other media sessions. If the event is handled by the listener, other sessions
4029         cannot get the event.</p>
4030         <p>Not for use by third-party applications</p> -->
4031    <permission android:name="android.permission.SET_MEDIA_KEY_LISTENER"
4032        android:protectionLevel="signature|privileged|development" />
4033
4034    <!-- @SystemApi Required to be able to disable the device (very dangerous!).
4035         <p>Not for use by third-party applications.
4036         @hide
4037    -->
4038    <permission android:name="android.permission.BRICK"
4039        android:protectionLevel="signature" />
4040
4041    <!-- Required to be able to reboot the device.
4042    <p>Not for use by third-party applications. -->
4043    <permission android:name="android.permission.REBOOT"
4044        android:protectionLevel="signature|privileged" />
4045
4046   <!-- @SystemApi Allows low-level access to power management.
4047        <p>Not for use by third-party applications.
4048        @hide
4049    -->
4050   <permission android:name="android.permission.DEVICE_POWER"
4051        android:protectionLevel="signature" />
4052
4053    <!-- Allows toggling battery saver on the system.
4054         Superseded by DEVICE_POWER permission. @hide @SystemApi
4055    -->
4056    <permission android:name="android.permission.POWER_SAVER"
4057        android:protectionLevel="signature|privileged" />
4058
4059   <!-- Allows access to the PowerManager.userActivity function.
4060   <p>Not for use by third-party applications. @hide @SystemApi -->
4061    <permission android:name="android.permission.USER_ACTIVITY"
4062        android:protectionLevel="signature|privileged" />
4063
4064   <!-- @hide Allows low-level access to tun tap driver -->
4065    <permission android:name="android.permission.NET_TUNNELING"
4066        android:protectionLevel="signature" />
4067
4068    <!-- Run as a manufacturer test application, running as the root user.
4069         Only available when the device is running in manufacturer test mode.
4070         <p>Not for use by third-party applications.
4071    -->
4072    <permission android:name="android.permission.FACTORY_TEST"
4073        android:protectionLevel="signature" />
4074
4075    <!-- Allows an application to broadcast a notification that an application
4076         package has been removed.
4077         <p>Not for use by third-party applications.
4078    -->
4079    <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED"
4080        android:protectionLevel="signature" />
4081
4082    <!-- Allows an application to broadcast an SMS receipt notification.
4083         <p>Not for use by third-party applications.
4084    -->
4085    <permission android:name="android.permission.BROADCAST_SMS"
4086        android:protectionLevel="signature" />
4087
4088    <!-- Allows an application to broadcast a WAP PUSH receipt notification.
4089         <p>Not for use by third-party applications.
4090    -->
4091    <permission android:name="android.permission.BROADCAST_WAP_PUSH"
4092        android:protectionLevel="signature" />
4093
4094    <!-- @SystemApi Allows an application to broadcast privileged networking requests.
4095         <p>Not for use by third-party applications.
4096         @hide
4097         @deprecated Use {@link android.Manifest.permission#REQUEST_NETWORK_SCORES} instead
4098    -->
4099    <permission android:name="android.permission.BROADCAST_NETWORK_PRIVILEGED"
4100        android:protectionLevel="signature|privileged" />
4101
4102    <!-- Not for use by third-party applications. -->
4103    <permission android:name="android.permission.MASTER_CLEAR"
4104        android:protectionLevel="signature|privileged" />
4105
4106    <!-- Allows an application to call any phone number, including emergency
4107         numbers, without going through the Dialer user interface for the user
4108         to confirm the call being placed.
4109         <p>Not for use by third-party applications. -->
4110    <permission android:name="android.permission.CALL_PRIVILEGED"
4111        android:protectionLevel="signature|privileged" />
4112
4113    <!-- @SystemApi Allows an application to perform CDMA OTA provisioning @hide -->
4114    <permission android:name="android.permission.PERFORM_CDMA_PROVISIONING"
4115        android:protectionLevel="signature|privileged" />
4116
4117    <!-- @SystemApi Allows an application to perform SIM Activation @hide -->
4118    <permission android:name="android.permission.PERFORM_SIM_ACTIVATION"
4119        android:protectionLevel="signature|privileged" />
4120
4121    <!-- Allows enabling/disabling location update notifications from
4122         the radio.
4123         <p>Not for use by third-party applications. -->
4124    <permission android:name="android.permission.CONTROL_LOCATION_UPDATES"
4125        android:protectionLevel="signature|privileged" />
4126
4127    <!-- Allows read/write access to the "properties" table in the checkin
4128         database, to change values that get uploaded.
4129         <p>Not for use by third-party applications. -->
4130    <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES"
4131        android:protectionLevel="signature|privileged" />
4132
4133    <!-- Allows an application to collect component usage
4134         statistics
4135         <p>Declaring the permission implies intention to use the API and the user of the
4136         device can grant permission through the Settings application.
4137         <p>Protection level: signature|privileged|development|appop|retailDemo -->
4138    <permission android:name="android.permission.PACKAGE_USAGE_STATS"
4139        android:protectionLevel="signature|privileged|development|appop|retailDemo" />
4140    <uses-permission android:name="android.permission.PACKAGE_USAGE_STATS" />
4141
4142    <!-- Allows a data loader to read a package's access logs. The access logs contain the
4143         set of pages referenced over time.
4144         <p>Declaring the permission implies intention to use the API and the user of the
4145         device can grant permission through the Settings application.
4146         <p>Protection level: signature|privileged|appop
4147         <p>A data loader has to be the one which provides data to install an app.
4148         <p>A data loader has to have both permission:LOADER_USAGE_STATS AND
4149         appop:LOADER_USAGE_STATS allowed to be able to access the read logs. -->
4150    <permission android:name="android.permission.LOADER_USAGE_STATS"
4151        android:protectionLevel="signature|privileged|appop" />
4152    <uses-permission android:name="android.permission.LOADER_USAGE_STATS" />
4153
4154    <!-- @hide @SystemApi Allows an application to observe usage time of apps. The app can register
4155         for callbacks when apps reach a certain usage time limit, etc. -->
4156    <permission android:name="android.permission.OBSERVE_APP_USAGE"
4157        android:protectionLevel="signature|privileged" />
4158
4159    <!-- @hide @TestApi @SystemApi Allows an application to change the app idle state of an app.
4160         <p>Not for use by third-party applications. -->
4161    <permission android:name="android.permission.CHANGE_APP_IDLE_STATE"
4162        android:protectionLevel="signature|privileged" />
4163
4164    <!-- @hide @SystemApi Allows an application to temporarily whitelist an inactive app to
4165         access the network and acquire wakelocks.
4166         <p>Not for use by third-party applications. -->
4167    <permission android:name="android.permission.CHANGE_DEVICE_IDLE_TEMP_WHITELIST"
4168        android:protectionLevel="signature|privileged" />
4169
4170    <!-- Permission an application must hold in order to use
4171         {@link android.provider.Settings#ACTION_REQUEST_IGNORE_BATTERY_OPTIMIZATIONS}.
4172         <p>Protection level: normal -->
4173    <permission android:name="android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS"
4174        android:label="@string/permlab_requestIgnoreBatteryOptimizations"
4175        android:description="@string/permdesc_requestIgnoreBatteryOptimizations"
4176        android:protectionLevel="normal" />
4177
4178    <!-- Allows an application to collect battery statistics
4179         <p>Protection level: signature|privileged|development -->
4180    <permission android:name="android.permission.BATTERY_STATS"
4181        android:protectionLevel="signature|privileged|development" />
4182
4183    <!--Allows an application to manage statscompanion.
4184    <p>Not for use by third-party applications.
4185         @hide -->
4186    <permission android:name="android.permission.STATSCOMPANION"
4187        android:protectionLevel="signature" />
4188
4189    <!--@SystemApi @hide Allows an application to register stats pull atom callbacks.
4190    <p>Not for use by third-party applications.-->
4191    <permission android:name="android.permission.REGISTER_STATS_PULL_ATOM"
4192                android:protectionLevel="signature|privileged" />
4193
4194    <!-- @SystemApi Allows an application to control the backup and restore process.
4195    <p>Not for use by third-party applications.
4196         @hide pending API council -->
4197    <permission android:name="android.permission.BACKUP"
4198        android:protectionLevel="signature|privileged" />
4199
4200    <!-- @SystemApi Allows an application to make modifications to device settings such that these
4201         modifications will be overridden by settings restore..
4202    <p>Not for use by third-party applications.
4203         @hide -->
4204    <permission android:name="android.permission.MODIFY_SETTINGS_OVERRIDEABLE_BY_RESTORE"
4205                android:protectionLevel="signature|setup" />
4206
4207    <!-- @SystemApi Allows application to manage
4208         {@link android.security.keystore.recovery.RecoveryController}.
4209         <p>Not for use by third-party applications.
4210         @hide -->
4211    <permission android:name="android.permission.RECOVER_KEYSTORE"
4212        android:protectionLevel="signature|privileged" />
4213
4214    <!-- Allows a package to launch the secure full-backup confirmation UI.
4215         ONLY the system process may hold this permission.
4216         @hide -->
4217    <permission android:name="android.permission.CONFIRM_FULL_BACKUP"
4218        android:protectionLevel="signature" />
4219
4220    <!-- Must be required by a {@link android.widget.RemoteViewsService},
4221         to ensure that only the system can bind to it.
4222         <p>Protection level: signature|privileged -->
4223    <permission android:name="android.permission.BIND_REMOTEVIEWS"
4224        android:protectionLevel="signature|privileged" />
4225
4226    <!-- Allows an application to tell the AppWidget service which application
4227         can access AppWidget's data.  The normal user flow is that a user
4228         picks an AppWidget to go into a particular host, thereby giving that
4229         host application access to the private data from the AppWidget app.
4230         An application that has this permission should honor that contract.
4231         <p>Not for use by third-party applications. -->
4232    <permission android:name="android.permission.BIND_APPWIDGET"
4233        android:protectionLevel="signature|privileged" />
4234
4235    <!-- @hide Allows sysui to manage user grants of slice permissions. -->
4236    <permission android:name="android.permission.MANAGE_SLICE_PERMISSIONS"
4237        android:protectionLevel="signature" />
4238
4239    <!-- @SystemApi Private permission, to restrict who can bring up a dialog to add a new
4240         keyguard widget
4241         @hide -->
4242    <permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET"
4243        android:protectionLevel="signature|privileged" />
4244
4245    <!-- @SystemApi Internal permission allowing an application to query/set which
4246         applications can bind AppWidgets.
4247         @hide -->
4248    <permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS"
4249        android:protectionLevel="signature|privileged" />
4250
4251    <!-- Allows applications to change the background data setting.
4252    <p>Not for use by third-party applications.
4253         @hide pending API council -->
4254    <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING"
4255        android:protectionLevel="signature" />
4256
4257    <!-- This permission can be used on content providers to allow the global
4258         search system to access their data.  Typically it used when the
4259         provider has some permissions protecting it (which global search
4260         would not be expected to hold), and added as a read-only permission
4261         to the path in the provider where global search queries are
4262         performed.  This permission can not be held by regular applications;
4263         it is used by applications to protect themselves from everyone else
4264         besides global search.
4265         <p>Protection level: signature|privileged -->
4266    <permission android:name="android.permission.GLOBAL_SEARCH"
4267        android:protectionLevel="signature|privileged" />
4268
4269    <!-- Internal permission protecting access to the global search
4270         system: ensures that only the system can access the provider
4271         to perform queries (since this otherwise provides unrestricted
4272         access to a variety of content providers), and to write the
4273         search statistics (to keep applications from gaming the source
4274         ranking).
4275         @hide -->
4276    <permission android:name="android.permission.GLOBAL_SEARCH_CONTROL"
4277        android:protectionLevel="signature" />
4278
4279    <!-- @SystemApi Internal permission to allows an application to read indexable data.
4280        @hide -->
4281    <permission android:name="android.permission.READ_SEARCH_INDEXABLES"
4282        android:protectionLevel="signature|privileged" />
4283
4284    <!-- @SystemApi Internal permission to allows an application to bind to suggestion service.
4285        @hide -->
4286    <permission android:name="android.permission.BIND_SETTINGS_SUGGESTIONS_SERVICE"
4287                android:protectionLevel="signature" />
4288
4289    <!-- @hide Internal permission to allows an application to access card content provider. -->
4290    <permission android:name="android.permission.WRITE_SETTINGS_HOMEPAGE_DATA"
4291                android:protectionLevel="signature|privileged" />
4292
4293    <!-- @SystemApi Allows applications to set a live wallpaper.
4294         @hide XXX Change to signature once the picker is moved to its
4295         own apk as Ghod Intended. -->
4296    <permission android:name="android.permission.SET_WALLPAPER_COMPONENT"
4297        android:protectionLevel="signature|privileged" />
4298
4299    <!-- @SystemApi Allows applications to read dream settings and dream state.
4300         @hide -->
4301    <permission android:name="android.permission.READ_DREAM_STATE"
4302        android:protectionLevel="signature|privileged" />
4303
4304    <!-- @SystemApi Allows applications to write dream settings, and start or stop dreaming.
4305         @hide -->
4306    <permission android:name="android.permission.WRITE_DREAM_STATE"
4307        android:protectionLevel="signature|privileged" />
4308
4309    <!-- @hide Allows applications to read whether ambient display is suppressed. -->
4310    <permission android:name="android.permission.READ_DREAM_SUPPRESSION"
4311        android:protectionLevel="signature" />
4312
4313    <!-- @SystemApi Allow an application to read and write the cache partition.
4314         @hide -->
4315    <permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM"
4316        android:protectionLevel="signature|privileged" />
4317
4318    <!-- Must be required by default container service so that only
4319         the system can bind to it and use it to copy
4320         protected data to secure containers or files
4321         accessible to the system.
4322         @hide -->
4323    <permission android:name="android.permission.COPY_PROTECTED_DATA"
4324        android:protectionLevel="signature" />
4325
4326    <!-- @SystemApi Internal permission protecting access to the encryption methods
4327        @hide
4328    -->
4329    <permission android:name="android.permission.CRYPT_KEEPER"
4330        android:protectionLevel="signature|privileged" />
4331
4332    <!-- @SystemApi Allows an application to read historical network usage for
4333         specific networks and applications. @hide -->
4334    <permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY"
4335        android:protectionLevel="signature|privileged" />
4336
4337    <!-- Allows an application to manage network policies (such as warning and disable
4338         limits) and to define application-specific rules. @hide -->
4339    <permission android:name="android.permission.MANAGE_NETWORK_POLICY"
4340        android:protectionLevel="signature" />
4341
4342    <!-- @SystemApi @hide @deprecated use UPDATE_DEVICE_STATS instead -->
4343    <permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING"
4344        android:protectionLevel="signature|privileged" />
4345
4346    <!-- @SystemApi @hide Allows an application to manage carrier subscription plans. -->
4347    <permission android:name="android.permission.MANAGE_SUBSCRIPTION_PLANS"
4348        android:protectionLevel="signature|privileged" />
4349
4350    <!-- C2DM permission.
4351         @hide Used internally.
4352     -->
4353    <permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"
4354          android:protectionLevel="signature" />
4355    <uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/>
4356
4357    <!-- @SystemApi @hide Package verifier needs to have this permission before the PackageManager will
4358         trust it to verify packages.
4359    -->
4360    <permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT"
4361        android:protectionLevel="signature|privileged" />
4362
4363    <!-- Must be required by package verifier receiver, to ensure that only the
4364         system can interact with it.
4365         @hide
4366    -->
4367    <permission android:name="android.permission.BIND_PACKAGE_VERIFIER"
4368        android:protectionLevel="signature" />
4369
4370    <!-- @hide Rollback manager needs to have this permission before the PackageManager will
4371         trust it to enable rollback.
4372    -->
4373    <permission android:name="android.permission.PACKAGE_ROLLBACK_AGENT"
4374        android:protectionLevel="signature" />
4375
4376    <!-- @SystemApi @TestApi @hide Allows managing apk level rollbacks. -->
4377    <permission android:name="android.permission.MANAGE_ROLLBACKS"
4378        android:protectionLevel="signature|privileged" />
4379
4380    <!-- @TestApi @hide Allows testing apk level rollbacks. -->
4381    <permission android:name="android.permission.TEST_MANAGE_ROLLBACKS"
4382        android:protectionLevel="signature" />
4383
4384    <!-- @SystemApi @hide Allows an application to mark other applications as harmful -->
4385    <permission android:name="android.permission.SET_HARMFUL_APP_WARNINGS"
4386        android:protectionLevel="signature|verifier" />
4387
4388    <!-- @SystemApi @hide Intent filter verifier needs to have this permission before the
4389         PackageManager will trust it to verify intent filters.
4390    -->
4391    <permission android:name="android.permission.INTENT_FILTER_VERIFICATION_AGENT"
4392        android:protectionLevel="signature|privileged" />
4393
4394    <!-- Must be required by intent filter verifier rintent-filtereceiver, to ensure that only the
4395         system can interact with it.
4396         @hide
4397    -->
4398    <permission android:name="android.permission.BIND_INTENT_FILTER_VERIFIER"
4399        android:protectionLevel="signature" />
4400
4401    <!-- @SystemApi Allows applications to access serial ports via the SerialManager.
4402         @hide -->
4403    <permission android:name="android.permission.SERIAL_PORT"
4404        android:protectionLevel="signature|privileged" />
4405
4406    <!-- Allows the holder to access content providers from outside an ApplicationThread.
4407         This permission is enforced by the ActivityManagerService on the corresponding APIs,
4408         in particular ActivityManagerService#getContentProviderExternal(String) and
4409         ActivityManagerService#removeContentProviderExternal(String).
4410         @hide
4411    -->
4412    <permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY"
4413        android:protectionLevel="signature" />
4414
4415    <!-- @SystemApi Allows an application to hold an UpdateLock, recommending that a headless
4416         OTA reboot *not* occur while the lock is held.
4417         @hide -->
4418    <permission android:name="android.permission.UPDATE_LOCK"
4419        android:protectionLevel="signature|privileged" />
4420
4421    <!-- @SystemApi Allows an application the opportunity to become a
4422         {@link android.service.notification.NotificationAssistantService}.
4423         User permission is still required before access is granted.
4424         @hide -->
4425    <permission android:name="android.permission.REQUEST_NOTIFICATION_ASSISTANT_SERVICE"
4426                android:protectionLevel="signature|privileged" />
4427
4428    <!-- @SystemApi @TestApi Allows an application to read the current set of notifications, including
4429         any metadata and intents attached.
4430         @hide -->
4431    <permission android:name="android.permission.ACCESS_NOTIFICATIONS"
4432        android:protectionLevel="signature|privileged|appop" />
4433
4434    <!-- Marker permission for applications that wish to access notification policy. This permission
4435        is not supported on managed profiles.
4436         <p>Protection level: normal
4437    -->
4438    <permission android:name="android.permission.ACCESS_NOTIFICATION_POLICY"
4439        android:description="@string/permdesc_access_notification_policy"
4440        android:label="@string/permlab_access_notification_policy"
4441        android:protectionLevel="normal" />
4442
4443    <!-- Allows modification of do not disturb rules and policies. Only allowed for system
4444        processes.
4445        @hide -->
4446    <permission android:name="android.permission.MANAGE_NOTIFICATIONS"
4447                android:protectionLevel="signature" />
4448
4449    <!-- Allows notifications to be colorized
4450         <p>Not for use by third-party applications. @hide -->
4451    <permission android:name="android.permission.USE_COLORIZED_NOTIFICATIONS"
4452                android:protectionLevel="signature|setup" />
4453
4454    <!-- Allows access to keyguard secure storage.  Only allowed for system processes.
4455        @hide -->
4456    <permission android:name="android.permission.ACCESS_KEYGUARD_SECURE_STORAGE"
4457        android:protectionLevel="signature" />
4458
4459    <!-- Allows applications to set the initial lockscreen state.
4460         <p>Not for use by third-party applications. @hide -->
4461    <permission android:name="android.permission.SET_INITIAL_LOCK"
4462        android:protectionLevel="signature|setup"/>
4463
4464    <!-- Allows managing (adding, removing) fingerprint templates. Reserved for the system. @hide -->
4465    <permission android:name="android.permission.MANAGE_FINGERPRINT"
4466        android:protectionLevel="signature|privileged" />
4467
4468    <!-- Allows an app to reset fingerprint attempt counter. Reserved for the system. @hide -->
4469    <permission android:name="android.permission.RESET_FINGERPRINT_LOCKOUT"
4470        android:protectionLevel="signature" />
4471
4472    <!-- Allows direct access to the <Biometric>Service interfaces. Reserved for the system. @hide -->
4473    <permission android:name="android.permission.MANAGE_BIOMETRIC"
4474        android:protectionLevel="signature" />
4475
4476    <!-- Allows direct access to the <Biometric>Service authentication methods. Reserved for the system. @hide -->
4477    <permission android:name="android.permission.USE_BIOMETRIC_INTERNAL"
4478        android:protectionLevel="signature" />
4479
4480    <!-- Allows the system to control the BiometricDialog (SystemUI). Reserved for the system. @hide -->
4481    <permission android:name="android.permission.MANAGE_BIOMETRIC_DIALOG"
4482        android:protectionLevel="signature" />
4483
4484    <!-- Allows an app to reset face authentication attempt counter. Reserved for the system. @hide -->
4485    <permission android:name="android.permission.RESET_FACE_LOCKOUT"
4486        android:protectionLevel="signature" />
4487
4488    <!-- Allows an application to control keyguard.  Only allowed for system processes.
4489        @hide -->
4490    <permission android:name="android.permission.CONTROL_KEYGUARD"
4491        android:protectionLevel="signature" />
4492
4493    <!-- @SystemApi Allows an application to control keyguard features like secure notifications.
4494         @hide -->
4495    <permission android:name="android.permission.CONTROL_KEYGUARD_SECURE_NOTIFICATIONS"
4496        android:protectionLevel="signature|privileged" />
4497
4498    <!-- Allows an application to listen to trust changes.  Only allowed for system processes.
4499        @hide -->
4500    <permission android:name="android.permission.TRUST_LISTENER"
4501        android:protectionLevel="signature" />
4502
4503    <!-- @SystemApi Allows an application to provide a trust agent.
4504         @hide For security reasons, this is a platform-only permission. -->
4505    <permission android:name="android.permission.PROVIDE_TRUST_AGENT"
4506        android:protectionLevel="signature|privileged" />
4507
4508    <!-- @SystemApi Allows an application to show a message
4509         on the keyguard when asking to dismiss it.
4510         @hide For security reasons, this is a platform-only permission. -->
4511    <permission android:name="android.permission.SHOW_KEYGUARD_MESSAGE"
4512        android:protectionLevel="signature|privileged" />
4513
4514    <!-- Allows an application to launch the trust agent settings activity.
4515        @hide -->
4516    <permission android:name="android.permission.LAUNCH_TRUST_AGENT_SETTINGS"
4517        android:protectionLevel="signature|privileged" />
4518
4519    <!-- @SystemApi Must be required by an {@link
4520        android.service.trust.TrustAgentService},
4521        to ensure that only the system can bind to it.
4522        @hide -->
4523    <permission android:name="android.permission.BIND_TRUST_AGENT"
4524        android:protectionLevel="signature" />
4525
4526    <!-- Must be required by an {@link
4527         android.service.notification.NotificationListenerService},
4528         to ensure that only the system can bind to it.
4529         <p>Protection level: signature
4530    -->
4531    <permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE"
4532        android:protectionLevel="signature" />
4533
4534    <!-- @SystemApi Must be required by an {@link
4535         android.service.notification.NotificationAssistantService} to ensure that only the system
4536         can bind to it.
4537         <p>Protection level: signature
4538         @hide
4539    -->
4540    <permission android:name="android.permission.BIND_NOTIFICATION_ASSISTANT_SERVICE"
4541        android:protectionLevel="signature" />
4542
4543    <!-- Must be required by a {@link
4544         android.service.chooser.ChooserTargetService}, to ensure that
4545         only the system can bind to it.
4546         <p>Protection level: signature
4547
4548         @deprecated For publishing direct share targets, please follow the instructions in
4549         https://developer.android.com/training/sharing/receive.html#providing-direct-share-targets
4550         instead.
4551    -->
4552    <permission android:name="android.permission.BIND_CHOOSER_TARGET_SERVICE"
4553        android:protectionLevel="signature" />
4554
4555    <!-- @SystemApi Must be held by services that extend
4556         {@link android.service.resolver.ResolverRankerService}.
4557         <p>Protection level: signature|privileged
4558         @hide
4559    -->
4560    <permission android:name="android.permission.PROVIDE_RESOLVER_RANKER_SERVICE"
4561                android:protectionLevel="signature|privileged" />
4562
4563    <!-- @SystemApi Must be required by services that extend
4564         {@link android.service.resolver.ResolverRankerService}, to ensure that only the system can
4565         bind to them.
4566         <p>Protection level: signature
4567         @hide
4568    -->
4569    <permission android:name="android.permission.BIND_RESOLVER_RANKER_SERVICE"
4570        android:protectionLevel="signature" />
4571
4572    <!-- Must be required by a {@link
4573         android.service.notification.ConditionProviderService},
4574         to ensure that only the system can bind to it.
4575         <p>Protection level: signature
4576         -->
4577    <permission android:name="android.permission.BIND_CONDITION_PROVIDER_SERVICE"
4578        android:protectionLevel="signature" />
4579
4580    <!-- Must be required by an {@link android.service.dreams.DreamService},
4581         to ensure that only the system can bind to it.
4582         <p>Protection level: signature
4583    -->
4584    <permission android:name="android.permission.BIND_DREAM_SERVICE"
4585        android:protectionLevel="signature" />
4586
4587    <!-- Must be required by an {@link android.app.usage.CacheQuotaService} to ensure that only the
4588         system can bind to it.
4589         @hide This is not a third-party API (intended for OEMs and system apps).
4590    -->
4591    <permission android:name="android.permission.BIND_CACHE_QUOTA_SERVICE"
4592                android:protectionLevel="signature" />
4593
4594    <!-- @SystemApi Allows an application to call into a carrier setup flow. It is up to the
4595         carrier setup application to enforce that this permission is required
4596         @hide This is not a third-party API (intended for OEMs and system apps). -->
4597    <permission android:name="android.permission.INVOKE_CARRIER_SETUP"
4598        android:protectionLevel="signature|privileged" />
4599
4600    <!-- @SystemApi Allows an application to listen for network condition observations.
4601         @hide This is not a third-party API (intended for system apps). -->
4602    <permission android:name="android.permission.ACCESS_NETWORK_CONDITIONS"
4603        android:protectionLevel="signature|privileged" />
4604
4605    <!-- @SystemApi Allows an application to provision and access DRM certificates
4606         @hide This is not a third-party API (intended for system apps). -->
4607    <permission android:name="android.permission.ACCESS_DRM_CERTIFICATES"
4608        android:protectionLevel="signature|privileged" />
4609
4610    <!-- Api Allows an application to manage media projection sessions.
4611         @hide This is not a third-party API (intended for system apps). -->
4612    <permission android:name="android.permission.MANAGE_MEDIA_PROJECTION"
4613        android:protectionLevel="signature" />
4614
4615    <!-- @SystemApi Allows an application to read install sessions
4616         @hide This is not a third-party API (intended for system apps). -->
4617    <permission android:name="android.permission.READ_INSTALL_SESSIONS"
4618        android:label="@string/permlab_readInstallSessions"
4619        android:description="@string/permdesc_readInstallSessions"
4620        android:protectionLevel="normal"/>
4621
4622    <!-- @SystemApi Allows an application to remove DRM certificates
4623         @hide This is not a third-party API (intended for system apps). -->
4624    <permission android:name="android.permission.REMOVE_DRM_CERTIFICATES"
4625        android:protectionLevel="signature|privileged" />
4626
4627    <!-- @deprecated Use {@link android.Manifest.permission#BIND_CARRIER_SERVICES} instead -->
4628    <permission android:name="android.permission.BIND_CARRIER_MESSAGING_SERVICE"
4629        android:protectionLevel="signature|privileged" />
4630
4631    <!-- Allows an application to interact with the currently active
4632         {@link android.service.voice.VoiceInteractionService}.
4633         @hide -->
4634    <permission android:name="android.permission.ACCESS_VOICE_INTERACTION_SERVICE"
4635        android:protectionLevel="signature" />
4636
4637    <!-- The system process that is allowed to bind to services in carrier apps will
4638         have this permission. Carrier apps should use this permission to protect
4639         their services that only the system is allowed to bind to.
4640         <p>Protection level: signature|privileged
4641    -->
4642    <permission android:name="android.permission.BIND_CARRIER_SERVICES"
4643        android:label="@string/permlab_bindCarrierServices"
4644        android:description="@string/permdesc_bindCarrierServices"
4645        android:protectionLevel="signature|privileged" />
4646
4647    <!--
4648        Allows the holder to start the permission usage screen for an app.
4649        <p>Protection level: signature|installer
4650    -->
4651    <permission android:name="android.permission.START_VIEW_PERMISSION_USAGE"
4652        android:label="@string/permlab_startViewPermissionUsage"
4653        android:description="@string/permdesc_startViewPermissionUsage"
4654        android:protectionLevel="signature|installer" />
4655
4656    <!-- Allows an application to query whether DO_NOT_ASK_CREDENTIALS_ON_BOOT
4657         flag is set.
4658         @hide -->
4659    <permission android:name="android.permission.QUERY_DO_NOT_ASK_CREDENTIALS_ON_BOOT"
4660                android:protectionLevel="signature" />
4661
4662    <!-- @SystemApi Allows applications to kill UIDs.
4663        <p>Not for use by third-party applications.
4664         @hide -->
4665    <permission android:name="android.permission.KILL_UID"
4666                android:protectionLevel="signature|installer" />
4667
4668    <!-- @SystemApi Allows applications to read the local WiFi and Bluetooth MAC address.
4669        @hide -->
4670    <permission android:name="android.permission.LOCAL_MAC_ADDRESS"
4671                android:protectionLevel="signature|privileged" />
4672    <uses-permission android:name="android.permission.LOCAL_MAC_ADDRESS"/>
4673
4674    <!-- @SystemApi Allows access to MAC addresses of WiFi and Bluetooth peer devices.
4675        @hide -->
4676    <permission android:name="android.permission.PEERS_MAC_ADDRESS"
4677                android:protectionLevel="signature|setup" />
4678
4679    <!-- Allows the Nfc stack to dispatch Nfc messages to applications. Applications
4680        can use this permission to ensure incoming Nfc messages are from the Nfc stack
4681        and not simulated by another application.
4682        @hide -->
4683    <permission android:name="android.permission.DISPATCH_NFC_MESSAGE"
4684                android:protectionLevel="signature|privileged" />
4685
4686    <!-- @SystemApi Allows changing day / night mode when system is configured with
4687         config_lockDayNightMode set to true. If requesting app does not have permission,
4688         it will be ignored.
4689        @hide -->
4690    <permission android:name="android.permission.MODIFY_DAY_NIGHT_MODE"
4691      android:protectionLevel="signature|privileged" />
4692
4693    <!-- @SystemApi Allows entering or exiting car mode using a specified priority.
4694        This permission is required to use UiModeManager while specifying a priority for the calling
4695        app.  A device manufacturer uses this permission to prioritize the apps which can
4696        potentially request to enter car-mode on a device to help establish the correct behavior
4697        where multiple such apps are active at the same time.
4698        @hide -->
4699    <permission android:name="android.permission.ENTER_CAR_MODE_PRIORITIZED"
4700                android:protectionLevel="signature|privileged" />
4701
4702    <!-- @SystemApi Required to receive ACTION_ENTER_CAR_MODE_PRIVILEGED or
4703        ACTION_EXIT_CAR_MODE_PRIVILEGED.
4704        @hide -->
4705    <permission android:name="android.permission.HANDLE_CAR_MODE_CHANGES"
4706                android:protectionLevel="signature|privileged" />
4707
4708    <!-- The system process is explicitly the only one allowed to launch the
4709         confirmation UI for full backup/restore -->
4710    <uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/>
4711
4712    <!-- @SystemApi Allows the holder to access and manage instant applications on the device.
4713         @hide -->
4714    <permission android:name="android.permission.ACCESS_INSTANT_APPS"
4715            android:protectionLevel="signature|installer|verifier|wellbeing" />
4716    <uses-permission android:name="android.permission.ACCESS_INSTANT_APPS"/>
4717
4718    <!-- Allows the holder to view the instant applications on the device.
4719    @hide -->
4720    <permission android:name="android.permission.VIEW_INSTANT_APPS"
4721                android:protectionLevel="signature|preinstalled" />
4722
4723    <!-- Allows the holder to manage whether the system can bind to services
4724         provided by instant apps. This permission is intended to protect
4725         test/development fucntionality and should be used only in such cases.
4726    @hide -->
4727    <permission android:name="android.permission.MANAGE_BIND_INSTANT_SERVICE"
4728                android:protectionLevel="signature" />
4729
4730    <!-- Allows receiving the usage of media resource e.g. video/audio codec and
4731         graphic memory.
4732         @hide -->
4733    <permission android:name="android.permission.RECEIVE_MEDIA_RESOURCE_USAGE"
4734                android:protectionLevel="signature|privileged" />
4735
4736    <!-- Must be required by system/priv apps when accessing the sound trigger
4737         APIs given by {@link SoundTriggerManager}.
4738         @hide
4739         @SystemApi -->
4740    <permission android:name="android.permission.MANAGE_SOUND_TRIGGER"
4741        android:protectionLevel="signature|privileged" />
4742
4743    <!-- Must be required by system/priv apps implementing sound trigger detection services
4744         @hide
4745         @SystemApi -->
4746    <permission android:name="android.permission.BIND_SOUND_TRIGGER_DETECTION_SERVICE"
4747        android:protectionLevel="signature" />
4748
4749    <!-- @SystemApi Allows trusted applications to dispatch managed provisioning message to Managed
4750         Provisioning app. If requesting app does not have permission, it will be ignored.
4751         @hide -->
4752    <permission android:name="android.permission.DISPATCH_PROVISIONING_MESSAGE"
4753                android:protectionLevel="signature|privileged" />
4754
4755    <!-- Allows the holder to read blocked numbers. See
4756         {@link android.provider.BlockedNumberContract}.
4757         @hide -->
4758    <permission android:name="android.permission.READ_BLOCKED_NUMBERS"
4759                android:protectionLevel="signature" />
4760
4761    <!-- Allows the holder to write blocked numbers. See
4762         {@link android.provider.BlockedNumberContract}.
4763         @hide -->
4764    <permission android:name="android.permission.WRITE_BLOCKED_NUMBERS"
4765                android:protectionLevel="signature" />
4766
4767    <!-- Must be required by an {@link android.service.vr.VrListenerService}, to ensure that only
4768         the system can bind to it.
4769         <p>Protection level: signature -->
4770    <permission android:name="android.permission.BIND_VR_LISTENER_SERVICE"
4771        android:protectionLevel="signature" />
4772
4773    <!-- Must be required by system apps when accessing restricted VR APIs.
4774         @hide
4775         @SystemApi
4776         <p>Protection level: signature -->
4777    <permission android:name="android.permission.RESTRICTED_VR_ACCESS"
4778        android:protectionLevel="signature|preinstalled" />
4779
4780    <!-- Required to make calls to {@link android.service.vr.IVrManager}.
4781         @hide -->
4782    <permission android:name="android.permission.ACCESS_VR_MANAGER"
4783            android:protectionLevel="signature" />
4784
4785    <!-- Required to access VR-Mode state and state change events via {android.app.VrStateCallback}
4786         @hide -->
4787    <permission android:name="android.permission.ACCESS_VR_STATE"
4788        android:protectionLevel="signature|preinstalled" />
4789
4790    <!-- Allows an application to whitelist tasks during lock task mode
4791         @hide <p>Not for use by third-party applications.</p> -->
4792    <permission android:name="android.permission.UPDATE_LOCK_TASK_PACKAGES"
4793        android:protectionLevel="signature|setup" />
4794
4795    <!-- @SystemApi Allows an application to replace the app name displayed alongside notifications
4796         in the N-release and later.
4797         @hide  <p>Not for use by third-party applications.</p> -->
4798    <permission android:name="android.permission.SUBSTITUTE_NOTIFICATION_APP_NAME"
4799                android:protectionLevel="signature|privileged" />
4800
4801    <!-- @SystemApi Allows an application to show notifications before the device is provisioned.
4802         @hide  <p>Not for use by third-party applications.</p> -->
4803    <permission android:name="android.permission.NOTIFICATION_DURING_SETUP"
4804                android:protectionLevel="signature|privileged" />
4805
4806    <!-- @SystemApi Allows an application to manage auto-fill sessions.
4807         @hide  <p>Not for use by third-party applications.</p> -->
4808    <permission android:name="android.permission.MANAGE_AUTO_FILL"
4809        android:protectionLevel="signature" />
4810
4811    <!-- @SystemApi Allows an application to manage the content capture service.
4812         @hide  <p>Not for use by third-party applications.</p> -->
4813    <permission android:name="android.permission.MANAGE_CONTENT_CAPTURE"
4814        android:protectionLevel="signature" />
4815
4816    <!-- @SystemApi Allows an application to manage the content suggestions service.
4817         @hide  <p>Not for use by third-party applications.</p> -->
4818    <permission android:name="android.permission.MANAGE_CONTENT_SUGGESTIONS"
4819         android:protectionLevel="signature" />
4820
4821    <!-- @SystemApi Allows an application to manage the app predictions service.
4822         @hide  <p>Not for use by third-party applications.</p> -->
4823    <permission android:name="android.permission.MANAGE_APP_PREDICTIONS"
4824         android:protectionLevel="signature|appPredictor" />
4825
4826    <!-- Allows an app to set the theme overlay in /vendor/overlay
4827         being used.
4828         @hide  <p>Not for use by third-party applications.</p> -->
4829    <permission android:name="android.permission.MODIFY_THEME_OVERLAY"
4830                android:protectionLevel="signature" />
4831
4832    <!-- Allows an instant app to create foreground services.
4833         <p>Protection level: signature|development|instant|appop -->
4834    <permission android:name="android.permission.INSTANT_APP_FOREGROUND_SERVICE"
4835        android:protectionLevel="signature|development|instant|appop" />
4836
4837    <!-- Allows a regular application to use {@link android.app.Service#startForeground
4838         Service.startForeground}.
4839         <p>Protection level: normal
4840    -->
4841    <permission android:name="android.permission.FOREGROUND_SERVICE"
4842        android:description="@string/permdesc_foregroundService"
4843        android:label="@string/permlab_foregroundService"
4844        android:protectionLevel="normal|instant" />
4845
4846    <!-- @SystemApi Allows to access all app shortcuts.
4847         @hide -->
4848    <permission android:name="android.permission.ACCESS_SHORTCUTS"
4849        android:protectionLevel="signature|appPredictor" />
4850
4851    <!-- @SystemApi Allows unlimited calls to shortcut mutation APIs.
4852         @hide -->
4853    <permission android:name="android.permission.UNLIMITED_SHORTCUTS_API_CALLS"
4854        android:protectionLevel="signature|appPredictor" />
4855
4856    <!-- @SystemApi Allows an application to read the runtime profiles of other apps.
4857         @hide <p>Not for use by third-party applications. -->
4858    <permission android:name="android.permission.READ_RUNTIME_PROFILES"
4859                android:protectionLevel="signature|privileged" />
4860
4861    <!-- @hide Allows audio policy management. -->
4862    <permission android:name="android.permission.MANAGE_AUDIO_POLICY"
4863        android:protectionLevel="signature" />
4864
4865    <!-- @SystemApi Allows an application to turn on / off quiet mode.
4866         @hide -->
4867    <permission android:name="android.permission.MODIFY_QUIET_MODE"
4868                android:protectionLevel="signature|privileged|wellbeing|development" />
4869
4870    <!-- Allows internal management of the camera framework
4871         @hide -->
4872    <permission android:name="android.permission.MANAGE_CAMERA"
4873        android:protectionLevel="signature" />
4874
4875    <!-- Allows an application to control remote animations. See
4876         {@link ActivityOptions#makeRemoteAnimation}
4877         @hide <p>Not for use by third-party applications. -->
4878    <permission android:name="android.permission.CONTROL_REMOTE_APP_TRANSITION_ANIMATIONS"
4879        android:protectionLevel="signature|privileged" />
4880
4881    <!-- Allows an application to watch changes and/or active state of app ops.
4882         @hide <p>Not for use by third-party applications. -->
4883    <permission android:name="android.permission.WATCH_APPOPS"
4884        android:protectionLevel="signature|privileged" />
4885
4886    <!-- Allows an application to directly open the "Open by default" page inside a package's
4887         Details screen.
4888         @hide <p>Not for use by third-party applications. -->
4889    <permission android:name="android.permission.OPEN_APP_OPEN_BY_DEFAULT_SETTINGS"
4890                android:protectionLevel="signature" />
4891
4892    <!-- Allows hidden API checks to be disabled when starting a process.
4893         @hide <p>Not for use by third-party applications. -->
4894    <permission android:name="android.permission.DISABLE_HIDDEN_API_CHECKS"
4895                android:protectionLevel="signature" />
4896
4897    <!-- @hide Permission that protects the
4898        {@link android.provider.Telephony.Intents#ACTION_DEFAULT_SMS_PACKAGE_CHANGED_INTERNAL}
4899        broadcast -->
4900    <permission android:name="android.permission.MONITOR_DEFAULT_SMS_PACKAGE"
4901        android:protectionLevel="signature|privileged" />
4902
4903    <!-- A subclass of {@link android.service.carrier.CarrierMessagingClientService} must be protected with this permission.
4904           <p>Protection level: signature -->
4905    <permission android:name="android.permission.BIND_CARRIER_MESSAGING_CLIENT_SERVICE"
4906        android:protectionLevel="signature" />
4907
4908    <!-- Must be required by an {@link android.service.watchdog.ExplicitHealthCheckService} to
4909         ensure that only the system can bind to it.
4910         @hide This is not a third-party API (intended for OEMs and system apps).
4911    -->
4912    <permission android:name="android.permission.BIND_EXPLICIT_HEALTH_CHECK_SERVICE"
4913        android:protectionLevel="signature|privileged" />
4914
4915    <!-- @SystemApi Must be required by an {@link android.service.storage.ExternalStorageService} to
4916         ensure that only the system can bind to it.
4917         @hide This is not a third-party API (intended for OEMs and system apps).
4918    -->
4919    <permission android:name="android.permission.BIND_EXTERNAL_STORAGE_SERVICE"
4920        android:protectionLevel="signature" />
4921
4922    <!-- @hide Permission that allows configuring appops.
4923     <p>Not for use by third-party applications. -->
4924    <permission android:name="android.permission.MANAGE_APPOPS"
4925                android:protectionLevel="signature" />
4926
4927    <!-- @hide Permission that allows background clipboard access.
4928         <p>Not for use by third-party applications. -->
4929    <permission android:name="android.permission.READ_CLIPBOARD_IN_BACKGROUND"
4930        android:protectionLevel="signature" />
4931
4932    <!-- @SystemApi Allows modifying accessibility state.
4933         @hide -->
4934    <permission android:name="android.permission.MANAGE_ACCESSIBILITY"
4935        android:protectionLevel="signature|setup" />
4936
4937    <!-- @SystemApi Allows an app to grant a profile owner access to device identifiers.
4938         <p>Not for use by third-party applications.
4939         @deprecated
4940         @hide -->
4941    <permission android:name="android.permission.GRANT_PROFILE_OWNER_DEVICE_IDS_ACCESS"
4942        android:protectionLevel="signature" />
4943
4944    <!-- Allows an app to mark a profile owner as managing an organization-owned device.
4945         <p>Not for use by third-party applications.
4946         @hide -->
4947    <permission android:name="android.permission.MARK_DEVICE_ORGANIZATION_OWNED"
4948                android:protectionLevel="signature" />
4949
4950    <!-- Allows financial apps to read filtered sms messages.
4951         Protection level: signature|appop  -->
4952    <permission android:name="android.permission.SMS_FINANCIAL_TRANSACTIONS"
4953        android:protectionLevel="signature|appop" />
4954
4955    <!-- Required for apps targeting {@link android.os.Build.VERSION_CODES#Q} that want to use
4956         {@link android.app.Notification.Builder#setFullScreenIntent notification full screen
4957         intents}.
4958         <p>Protection level: normal -->
4959    <permission android:name="android.permission.USE_FULL_SCREEN_INTENT"
4960                android:protectionLevel="normal" />
4961
4962    <!-- @SystemApi Allows requesting the framework broadcast the
4963         {@link Intent#ACTION_DEVICE_CUSTOMIZATION_READY} intent.
4964         @hide -->
4965    <permission android:name="android.permission.SEND_DEVICE_CUSTOMIZATION_READY"
4966        android:protectionLevel="signature|privileged" />
4967
4968    <!-- @SystemApi Permission that protects the {@link Intent#ACTION_DEVICE_CUSTOMIZATION_READY}
4969         intent.
4970         @hide -->
4971    <permission android:name="android.permission.RECEIVE_DEVICE_CUSTOMIZATION_READY"
4972        android:protectionLevel="signature|preinstalled" />
4973
4974    <!-- @SystemApi Allows wallpaper to be rendered in ambient mode.
4975         @hide -->
4976    <permission android:name="android.permission.AMBIENT_WALLPAPER"
4977                android:protectionLevel="signature|preinstalled" />
4978
4979    <!-- @SystemApi Allows sensor privacy to be modified.
4980         @hide -->
4981    <permission android:name="android.permission.MANAGE_SENSOR_PRIVACY"
4982                android:protectionLevel="signature" />
4983    <!-- @SystemApi Permission that protects the {@link Intent#ACTION_REVIEW_ACCESSIBILITY_SERVICES}
4984         intent.
4985         @hide -->
4986    <permission android:name="android.permission.REVIEW_ACCESSIBILITY_SERVICES"
4987                android:protectionLevel="signature" />
4988
4989    <!-- @SystemApi Allows an activity to replace the app name and icon displayed in share targets
4990         in the sharesheet for the Q-release and later.
4991         @hide  <p>Not for use by third-party applications.</p> -->
4992    <permission android:name="android.permission.SUBSTITUTE_SHARE_TARGET_APP_NAME_AND_ICON"
4993                android:protectionLevel="signature|privileged" />
4994
4995    <!-- @SystemApi Allows an application to access shared libraries.
4996         @hide -->
4997    <permission android:name="android.permission.ACCESS_SHARED_LIBRARIES"
4998                android:protectionLevel="signature|installer" />
4999
5000    <!-- Allows an app to log compat change usage.
5001         @hide  <p>Not for use by third-party applications.</p> -->
5002    <permission android:name="android.permission.LOG_COMPAT_CHANGE"
5003                android:protectionLevel="signature|privileged" />
5004    <!-- Allows an app to read compat change config.
5005         @hide  <p>Not for use by third-party applications.</p> -->
5006    <permission android:name="android.permission.READ_COMPAT_CHANGE_CONFIG"
5007                android:protectionLevel="signature|privileged" />
5008    <!-- Allows an app to override compat change config.
5009         @hide  <p>Not for use by third-party applications.</p> -->
5010    <permission android:name="android.permission.OVERRIDE_COMPAT_CHANGE_CONFIG"
5011                android:protectionLevel="signature|privileged" />
5012
5013    <!-- Allows input events to be monitored. Very dangerous!  @hide -->
5014    <permission android:name="android.permission.MONITOR_INPUT"
5015                android:protectionLevel="signature" />
5016    <!--  Allows the caller to change the associations between input devices and displays.
5017        Very dangerous! @hide -->
5018    <permission android:name="android.permission.ASSOCIATE_INPUT_DEVICE_TO_DISPLAY_BY_PORT"
5019                android:protectionLevel="signature" />
5020
5021    <!-- Allows query of any normal app on the device, regardless of manifest declarations.
5022        <p>Protection level: normal -->
5023    <permission android:name="android.permission.QUERY_ALL_PACKAGES"
5024                android:protectionLevel="normal" />
5025    <uses-permission android:name="android.permission.QUERY_ALL_PACKAGES"/>
5026
5027    <!-- @hide Allow the caller to collect debugging data from processes that otherwise
5028        would require USAGE_STATS. Before sharing this data with other apps, holders
5029        of this permission are REQUIRED to themselves check that the caller has
5030        PACKAGE_USAGE_STATS and OP_GET_USAGE_STATS. -->
5031    <permission android:name="android.permission.PEEK_DROPBOX_DATA"
5032        android:protectionLevel="signature" />
5033
5034    <!-- @SystemApi Allows an application to access TV tuner HAL
5035         <p>Not for use by third-party applications.
5036         @hide -->
5037    <permission android:name="android.permission.ACCESS_TV_TUNER"
5038        android:protectionLevel="signature|privileged|vendorPrivileged" />
5039
5040    <!-- @SystemApi Allows an application to access descrambler of TV tuner HAL
5041         <p>Not for use by third-party applications.
5042         @hide -->
5043    <permission android:name="android.permission.ACCESS_TV_DESCRAMBLER"
5044        android:protectionLevel="signature|privileged|vendorPrivileged" />
5045
5046    <!-- Allows an application to create trusted displays. @hide -->
5047    <permission android:name="android.permission.ADD_TRUSTED_DISPLAY"
5048                android:protectionLevel="signature" />
5049
5050    <!-- @hide @SystemApi Allows an application to access locusId events in the usage stats. -->
5051    <permission android:name="android.permission.ACCESS_LOCUS_ID_USAGE_STATS"
5052                android:protectionLevel="signature|appPredictor" />
5053
5054    <!-- @hide Allows an application to create/destroy input consumer. -->
5055    <permission android:name="android.permission.INPUT_CONSUMER"
5056                android:protectionLevel="signature" />
5057
5058    <!-- Attribution for Country Detector. -->
5059    <attribution android:tag="CountryDetector" android:label="@string/country_detector"/>
5060    <!-- Attribution for Location service. -->
5061    <attribution android:tag="LocationService" android:label="@string/location_service"/>
5062    <!-- Attribution for Sensor Notification service. -->
5063    <attribution android:tag="SensorNotificationService"
5064             android:label="@string/sensor_notification_service"/>
5065    <!-- Feature Id for Twilight service. -->
5066    <attribution android:tag="TwilightService" android:label="@string/twilight_service"/>
5067
5068    <application android:process="system"
5069                 android:persistent="true"
5070                 android:hasCode="false"
5071                 android:label="@string/android_system_label"
5072                 android:allowClearUserData="false"
5073                 android:backupAgent="com.android.server.backup.SystemBackupAgent"
5074                 android:killAfterRestore="false"
5075                 android:icon="@drawable/ic_launcher_android"
5076                 android:supportsRtl="true"
5077                 android:theme="@style/Theme.DeviceDefault.Light.DarkActionBar"
5078                 android:defaultToDeviceProtectedStorage="true"
5079                 android:forceQueryable="true"
5080                 android:directBootAware="true">
5081        <activity android:name="com.android.internal.app.ChooserActivity"
5082                android:theme="@style/Theme.DeviceDefault.Chooser"
5083                android:finishOnCloseSystemDialogs="true"
5084                android:excludeFromRecents="true"
5085                android:documentLaunchMode="never"
5086                android:relinquishTaskIdentity="true"
5087                android:configChanges="screenSize|smallestScreenSize|screenLayout|orientation|keyboard|keyboardHidden"
5088                android:process=":ui"
5089                android:visibleToInstantApps="true">
5090            <intent-filter>
5091                <action android:name="android.intent.action.CHOOSER" />
5092                <category android:name="android.intent.category.DEFAULT" />
5093                <category android:name="android.intent.category.VOICE" />
5094            </intent-filter>
5095        </activity>
5096        <activity android:name="com.android.internal.accessibility.dialog.AccessibilityShortcutChooserActivity"
5097                  android:exported="false"
5098                  android:theme="@style/Theme.DeviceDefault.Dialog.Alert.DayNight"
5099                  android:finishOnCloseSystemDialogs="true"
5100                  android:excludeFromRecents="true"
5101                  android:documentLaunchMode="never"
5102                  android:relinquishTaskIdentity="true"
5103                  android:configChanges="screenSize|smallestScreenSize|screenLayout|orientation|keyboard|keyboardHidden"
5104                  android:process=":ui"
5105                  android:visibleToInstantApps="true">
5106            <intent-filter>
5107                <action android:name="com.android.internal.intent.action.CHOOSE_ACCESSIBILITY_BUTTON" />
5108                <category android:name="android.intent.category.DEFAULT" />
5109            </intent-filter>
5110        </activity>
5111        <activity android:name="com.android.internal.accessibility.dialog.AccessibilityButtonChooserActivity"
5112                  android:exported="false"
5113                  android:theme="@style/Theme.DeviceDefault.Resolver"
5114                  android:finishOnCloseSystemDialogs="true"
5115                  android:excludeFromRecents="true"
5116                  android:documentLaunchMode="never"
5117                  android:relinquishTaskIdentity="true"
5118                  android:configChanges="screenSize|smallestScreenSize|screenLayout|orientation|keyboard|keyboardHidden"
5119                  android:process=":ui"
5120                  android:visibleToInstantApps="true">
5121            <intent-filter>
5122                <action android:name="com.android.internal.intent.action.CHOOSE_ACCESSIBILITY_BUTTON" />
5123                <category android:name="android.intent.category.DEFAULT" />
5124            </intent-filter>
5125        </activity>
5126        <activity android:name="com.android.internal.app.IntentForwarderActivity"
5127                android:finishOnCloseSystemDialogs="true"
5128                android:theme="@style/Theme.Translucent.NoTitleBar"
5129                android:excludeFromRecents="true"
5130                android:label="@string/user_owner_label"
5131                android:exported="true"
5132                android:visibleToInstantApps="true"
5133                >
5134        </activity>
5135        <activity-alias android:name="com.android.internal.app.ForwardIntentToParent"
5136                android:targetActivity="com.android.internal.app.IntentForwarderActivity"
5137                android:exported="true"
5138                android:label="@string/user_owner_label">
5139        </activity-alias>
5140        <activity-alias android:name="com.android.internal.app.ForwardIntentToManagedProfile"
5141                android:targetActivity="com.android.internal.app.IntentForwarderActivity"
5142                android:icon="@drawable/ic_corp_badge"
5143                android:exported="true"
5144                android:label="@string/managed_profile_label">
5145        </activity-alias>
5146        <activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity"
5147                android:theme="@style/Theme.DeviceDefault.System.Dialog.Alert"
5148                android:label="@string/heavy_weight_switcher_title"
5149                android:finishOnCloseSystemDialogs="true"
5150                android:excludeFromRecents="true"
5151                android:process=":ui">
5152        </activity>
5153        <activity android:name="com.android.internal.app.PlatLogoActivity"
5154                android:theme="@style/Theme.DeviceDefault.DayNight"
5155                android:configChanges="orientation|keyboardHidden"
5156                android:icon="@drawable/platlogo"
5157                android:process=":ui">
5158        </activity>
5159        <activity android:name="com.android.internal.app.DisableCarModeActivity"
5160                android:theme="@style/Theme.NoDisplay"
5161                android:excludeFromRecents="true"
5162                android:process=":ui">
5163        </activity>
5164
5165        <activity android:name="android.accounts.ChooseAccountActivity"
5166                android:excludeFromRecents="true"
5167                android:exported="true"
5168                android:theme="@style/Theme.DeviceDefault.Light.Dialog"
5169                android:label="@string/choose_account_label"
5170                android:process=":ui"
5171                android:visibleToInstantApps="true">
5172        </activity>
5173
5174        <activity android:name="android.accounts.ChooseTypeAndAccountActivity"
5175                android:excludeFromRecents="true"
5176                android:exported="true"
5177                android:theme="@style/Theme.DeviceDefault.Light.Dialog"
5178                android:label="@string/choose_account_label"
5179                android:process=":ui"
5180                android:visibleToInstantApps="true">
5181        </activity>
5182
5183        <activity android:name="android.accounts.ChooseAccountTypeActivity"
5184                android:excludeFromRecents="true"
5185                android:theme="@style/Theme.DeviceDefault.Light.Dialog"
5186                android:label="@string/choose_account_label"
5187                android:process=":ui"
5188                android:visibleToInstantApps="true">
5189        </activity>
5190
5191        <activity android:name="android.accounts.CantAddAccountActivity"
5192                android:excludeFromRecents="true"
5193                android:exported="true"
5194                android:theme="@style/Theme.DeviceDefault.Light.Dialog.NoActionBar"
5195                android:process=":ui">
5196        </activity>
5197
5198        <activity android:name="android.accounts.GrantCredentialsPermissionActivity"
5199                android:excludeFromRecents="true"
5200                android:exported="true"
5201                android:theme="@style/Theme.DeviceDefault.Light.DialogWhenLarge"
5202                android:process=":ui"
5203                android:visibleToInstantApps="true">
5204        </activity>
5205
5206        <activity android:name="android.content.SyncActivityTooManyDeletes"
5207               android:theme="@style/Theme.DeviceDefault.Light.Dialog"
5208               android:label="@string/sync_too_many_deletes"
5209               android:process=":ui">
5210        </activity>
5211
5212        <activity android:name="com.android.internal.app.ShutdownActivity"
5213            android:permission="android.permission.SHUTDOWN"
5214            android:theme="@style/Theme.NoDisplay"
5215            android:excludeFromRecents="true">
5216            <intent-filter>
5217                <action android:name="com.android.internal.intent.action.REQUEST_SHUTDOWN" />
5218                <category android:name="android.intent.category.DEFAULT" />
5219            </intent-filter>
5220            <intent-filter>
5221                <action android:name="android.intent.action.REBOOT" />
5222                <category android:name="android.intent.category.DEFAULT" />
5223            </intent-filter>
5224        </activity>
5225
5226        <activity android:name="com.android.internal.app.NetInitiatedActivity"
5227                android:theme="@style/Theme.Dialog.Confirmation"
5228                android:excludeFromRecents="true"
5229                android:process=":ui">
5230        </activity>
5231
5232        <activity android:name="com.android.internal.app.SystemUserHomeActivity"
5233                  android:enabled="false"
5234                  android:process=":ui"
5235                  android:systemUserOnly="true"
5236                  android:theme="@style/Theme.Translucent.NoTitleBar">
5237            <intent-filter android:priority="-100">
5238                <action android:name="android.intent.action.MAIN" />
5239                <category android:name="android.intent.category.HOME" />
5240            </intent-filter>
5241        </activity>
5242
5243        <!-- Activity to prompt user if it's ok to create a new user sandbox for a
5244             specified account. -->
5245        <activity android:name="com.android.internal.app.ConfirmUserCreationActivity"
5246                android:excludeFromRecents="true"
5247                android:process=":ui"
5248                android:theme="@style/Theme.Dialog.Confirmation">
5249            <intent-filter android:priority="1000">
5250                <action android:name="android.os.action.CREATE_USER" />
5251                <category android:name="android.intent.category.DEFAULT" />
5252            </intent-filter>
5253        </activity>
5254
5255        <activity android:name="com.android.internal.app.SuspendedAppActivity"
5256                  android:theme="@style/Theme.DeviceDefault.Dialog.Alert.DayNight"
5257                  android:excludeFromRecents="true"
5258                  android:process=":ui">
5259        </activity>
5260
5261        <activity android:name="com.android.internal.app.UnlaunchableAppActivity"
5262                android:theme="@style/Theme.Dialog.Confirmation"
5263                android:excludeFromRecents="true"
5264                android:process=":ui">
5265        </activity>
5266
5267        <activity android:name="com.android.internal.app.BlockedAppActivity"
5268                android:theme="@style/Theme.Dialog.Confirmation"
5269                android:excludeFromRecents="true"
5270                android:lockTaskMode="always"
5271                android:process=":ui">
5272        </activity>
5273
5274        <activity android:name="com.android.settings.notification.NotificationAccessConfirmationActivity"
5275                  android:theme="@style/Theme.Dialog.Confirmation"
5276                  android:excludeFromRecents="true">
5277        </activity>
5278
5279        <activity android:name="com.android.internal.app.HarmfulAppWarningActivity"
5280                  android:theme="@style/Theme.Dialog.Confirmation"
5281                  android:excludeFromRecents="true"
5282                  android:process=":ui"
5283                  android:label="@string/harmful_app_warning_title"
5284                  android:exported="false">
5285        </activity>
5286
5287        <receiver android:name="com.android.server.BootReceiver"
5288                android:systemUserOnly="true">
5289            <intent-filter android:priority="1000">
5290                <action android:name="android.intent.action.BOOT_COMPLETED" />
5291            </intent-filter>
5292        </receiver>
5293
5294        <receiver android:name="com.android.server.updates.CertPinInstallReceiver"
5295                android:permission="android.permission.UPDATE_CONFIG">
5296            <intent-filter>
5297                <action android:name="android.intent.action.UPDATE_PINS" />
5298                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
5299            </intent-filter>
5300        </receiver>
5301
5302        <receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver"
5303                android:permission="android.permission.UPDATE_CONFIG">
5304            <intent-filter>
5305                <action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" />
5306                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
5307            </intent-filter>
5308        </receiver>
5309
5310        <receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver"
5311                android:permission="android.permission.UPDATE_CONFIG">
5312            <intent-filter>
5313                <action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" />
5314                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
5315            </intent-filter>
5316        </receiver>
5317
5318        <receiver android:name="com.android.server.updates.NetworkWatchlistInstallReceiver"
5319                  android:permission="android.permission.UPDATE_CONFIG">
5320            <intent-filter>
5321                <action android:name="android.intent.action.UPDATE_NETWORK_WATCHLIST" />
5322                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
5323            </intent-filter>
5324        </receiver>
5325
5326        <receiver android:name="com.android.server.updates.ApnDbInstallReceiver"
5327                android:permission="android.permission.UPDATE_CONFIG">
5328            <intent-filter>
5329                <action android:name="com.android.internal.intent.action.UPDATE_APN_DB" />
5330                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
5331            </intent-filter>
5332        </receiver>
5333
5334        <receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver"
5335                android:permission="android.permission.UPDATE_CONFIG">
5336            <intent-filter>
5337                <action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" />
5338                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
5339            </intent-filter>
5340        </receiver>
5341
5342        <receiver android:name="com.android.server.updates.CertificateTransparencyLogInstallReceiver"
5343                android:permission="android.permission.UPDATE_CONFIG">
5344            <intent-filter>
5345                <action android:name="android.intent.action.UPDATE_CT_LOGS" />
5346                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
5347            </intent-filter>
5348        </receiver>
5349
5350        <receiver android:name="com.android.server.updates.LangIdInstallReceiver"
5351                android:permission="android.permission.UPDATE_CONFIG">
5352            <intent-filter>
5353                <action android:name="android.intent.action.UPDATE_LANG_ID" />
5354                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
5355            </intent-filter>
5356        </receiver>
5357
5358        <receiver android:name="com.android.server.updates.SmartSelectionInstallReceiver"
5359                android:permission="android.permission.UPDATE_CONFIG">
5360            <intent-filter>
5361                <action android:name="android.intent.action.UPDATE_SMART_SELECTION" />
5362                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
5363            </intent-filter>
5364        </receiver>
5365
5366        <receiver android:name="com.android.server.updates.ConversationActionsInstallReceiver"
5367                  android:permission="android.permission.UPDATE_CONFIG">
5368            <intent-filter>
5369                <action android:name="android.intent.action.UPDATE_CONVERSATION_ACTIONS" />
5370                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
5371            </intent-filter>
5372        </receiver>
5373
5374        <receiver android:name="com.android.server.updates.CarrierIdInstallReceiver"
5375                  android:permission="android.permission.UPDATE_CONFIG">
5376            <intent-filter>
5377                <action android:name="android.os.action.UPDATE_CARRIER_ID_DB" />
5378                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
5379            </intent-filter>
5380        </receiver>
5381
5382        <receiver android:name="com.android.server.updates.EmergencyNumberDbInstallReceiver"
5383                  android:permission="android.permission.UPDATE_CONFIG">
5384            <intent-filter>
5385                <action android:name="android.os.action.UPDATE_EMERGENCY_NUMBER_DB" />
5386                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
5387            </intent-filter>
5388        </receiver>
5389
5390        <receiver android:name="com.android.server.MasterClearReceiver"
5391            android:permission="android.permission.MASTER_CLEAR">
5392            <intent-filter
5393                    android:priority="100" >
5394                <!-- For Checkin, Settings, etc.: action=FACTORY_RESET -->
5395                <action android:name="android.intent.action.FACTORY_RESET" />
5396                <!-- As above until all the references to the deprecated MASTER_CLEAR get updated to
5397                     FACTORY_RESET. -->
5398                <action android:name="android.intent.action.MASTER_CLEAR" />
5399
5400                <!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR -->
5401                <action android:name="com.google.android.c2dm.intent.RECEIVE" />
5402                <category android:name="android.intent.category.MASTER_CLEAR" />
5403            </intent-filter>
5404        </receiver>
5405
5406        <receiver android:name="com.android.server.WallpaperUpdateReceiver"
5407                  android:permission="android.permission.RECEIVE_DEVICE_CUSTOMIZATION_READY">
5408            <intent-filter>
5409                <action android:name="android.intent.action.DEVICE_CUSTOMIZATION_READY"/>
5410            </intent-filter>
5411        </receiver>
5412
5413        <service android:name="android.hardware.location.GeofenceHardwareService"
5414            android:permission="android.permission.LOCATION_HARDWARE"
5415            android:exported="false" />
5416
5417        <service android:name="com.android.server.MountServiceIdler"
5418                 android:exported="true"
5419                 android:permission="android.permission.BIND_JOB_SERVICE" >
5420        </service>
5421
5422        <service android:name="com.android.server.ZramWriteback"
5423                 android:exported="false"
5424                 android:permission="android.permission.BIND_JOB_SERVICE" >
5425        </service>
5426
5427        <service android:name="com.android.server.backup.FullBackupJob"
5428                 android:exported="true"
5429                 android:permission="android.permission.BIND_JOB_SERVICE" >
5430        </service>
5431
5432        <service android:name="com.android.server.backup.KeyValueBackupJob"
5433                 android:permission="android.permission.BIND_JOB_SERVICE" >
5434        </service>
5435
5436        <service android:name="com.android.server.content.SyncJobService"
5437                 android:permission="android.permission.BIND_JOB_SERVICE" >
5438        </service>
5439
5440        <service android:name="com.android.server.pm.BackgroundDexOptService"
5441                 android:exported="true"
5442                 android:permission="android.permission.BIND_JOB_SERVICE">
5443        </service>
5444
5445        <service android:name="com.android.server.pm.DynamicCodeLoggingService"
5446                 android:permission="android.permission.BIND_JOB_SERVICE">
5447        </service>
5448
5449        <service android:name="com.android.server.PruneInstantAppsJobService"
5450                 android:permission="android.permission.BIND_JOB_SERVICE" >
5451        </service>
5452
5453        <service android:name="com.android.server.storage.DiskStatsLoggingService"
5454                 android:permission="android.permission.BIND_JOB_SERVICE" >
5455        </service>
5456
5457        <service android:name="com.android.server.PreloadsFileCacheExpirationJobService"
5458                 android:permission="android.permission.BIND_JOB_SERVICE" >
5459        </service>
5460
5461        <service android:name="com.android.server.camera.CameraStatsJobService"
5462                 android:permission="android.permission.BIND_JOB_SERVICE" >
5463        </service>
5464
5465        <service android:name="com.android.server.timezone.TimeZoneUpdateIdler"
5466                 android:permission="android.permission.BIND_JOB_SERVICE" >
5467        </service>
5468
5469        <service android:name="com.android.server.usage.UsageStatsIdleService"
5470                 android:permission="android.permission.BIND_JOB_SERVICE" >
5471        </service>
5472
5473        <service android:name="com.android.server.net.watchlist.ReportWatchlistJobService"
5474                 android:permission="android.permission.BIND_JOB_SERVICE" >
5475        </service>
5476
5477        <service android:name="com.android.server.display.BrightnessIdleJob"
5478                 android:permission="android.permission.BIND_JOB_SERVICE" >
5479        </service>
5480
5481        <service android:name="com.android.server.people.data.DataMaintenanceService"
5482                 android:permission="android.permission.BIND_JOB_SERVICE" >
5483        </service>
5484
5485        <service
5486                android:name="com.android.server.autofill.AutofillCompatAccessibilityService"
5487                android:permission="android.permission.BIND_ACCESSIBILITY_SERVICE"
5488                android:visibleToInstantApps="true"
5489                android:exported="true">
5490            <meta-data
5491                    android:name="android.accessibilityservice"
5492                    android:resource="@xml/autofill_compat_accessibility_service" />
5493        </service>
5494
5495        <service android:name="com.google.android.startop.iorap.IorapForwardingService$IorapdJobServiceProxy"
5496                 android:permission="android.permission.BIND_JOB_SERVICE" >
5497        </service>
5498
5499        <service android:name="com.android.server.blob.BlobStoreIdleJobService"
5500                 android:permission="android.permission.BIND_JOB_SERVICE">
5501        </service>
5502
5503        <service android:name="com.android.server.pm.PackageManagerShellCommandDataLoader"
5504            android:exported="false">
5505            <intent-filter>
5506                <action android:name="android.intent.action.LOAD_DATA"/>
5507            </intent-filter>
5508        </service>
5509
5510        <provider
5511            android:name="com.android.server.textclassifier.IconsContentProvider"
5512            android:authorities="com.android.textclassifier.icons"
5513            android:singleUser="true"
5514            android:enabled="true"
5515            android:exported="true">
5516        </provider>
5517
5518    </application>
5519
5520</manifest>
5521