1<?xml version="1.0" encoding="utf-8"?> 2<!-- 3/* 4 * Copyright (C) 2019 The Android Open Source Project 5 * 6 * Licensed under the Apache License, Version 2.0 (the "License"); 7 * you may not use this file except in compliance with the License. 8 * You may obtain a copy of the License at 9 * 10 * http://www.apache.org/licenses/LICENSE-2.0 11 * 12 * Unless required by applicable law or agreed to in writing, software 13 * distributed under the License is distributed on an "AS IS" BASIS, 14 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 15 * See the License for the specific language governing permissions and 16 * limitations under the License. 17 */ 18--> 19<manifest xmlns:android="http://schemas.android.com/apk/res/android" 20 package="com.android.networkstack" 21 android:sharedUserId="android.uid.networkstack" 22 android:versionCode="330400000" 23 android:versionName="330400000" 24 coreApp="true" 25> 26 <!--- Defines the MAINLINE_NETWORK_STACK permission used by the networkstack process. --> 27 <permission android:name="android.permission.MAINLINE_NETWORK_STACK" 28 android:protectionLevel="signature"/> 29 <!-- Permissions must be defined here, and not in the base manifest, as the network stack 30 running in the system server process does not need any permission, and having privileged 31 permissions added would cause crashes on startup unless they are also added to the 32 privileged permissions allowlist for that package. --> 33 <uses-permission android:name="android.permission.INTERNET" /> 34 <uses-permission android:name="android.permission.ACCESS_FINE_LOCATION" /> 35 <uses-permission android:name="android.permission.ACCESS_COARSE_LOCATION" /> 36 <uses-permission android:name="android.permission.ACCESS_NETWORK_STATE" /> 37 <uses-permission android:name="android.permission.ACCESS_WIFI_STATE" /> 38 <uses-permission android:name="android.permission.CONNECTIVITY_INTERNAL" /> 39 <!-- Send latency broadcast as current user --> 40 <uses-permission android:name="android.permission.INTERACT_ACROSS_USERS" /> 41 <uses-permission android:name="android.permission.WAKE_LOCK" /> 42 <uses-permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE" /> 43 <uses-permission android:name="android.permission.READ_DEVICE_CONFIG" /> 44 <!-- Signature permission defined in NetworkStackStub --> 45 <uses-permission android:name="android.permission.MAINLINE_NETWORK_STACK" /> 46 <application 47 android:extractNativeLibs="false" 48 android:persistent="true" 49 android:process="com.android.networkstack.process"> 50 <service android:name="com.android.server.NetworkStackService" 51 android:exported="true" 52 android:permission="android.permission.MAINLINE_NETWORK_STACK"> 53 <intent-filter> 54 <action android:name="android.net.INetworkStackConnector"/> 55 </intent-filter> 56 </service> 57 <!-- Test instrumentation service, only usable on debuggable builds. 58 The service is protected by NETWORK_SETTINGS permissions as there is no better 59 networking-related permission that exists on Q, is sufficiently protected (signature), 60 and can be obtained via shell permissions. --> 61 <service android:name="com.android.server.TestNetworkStackService" 62 android:permission="android.permission.NETWORK_SETTINGS" 63 android:exported="true"> 64 <intent-filter> 65 <action android:name="android.net.INetworkStackConnector.Test"/> 66 </intent-filter> 67 </service> 68 <service android:name="com.android.server.connectivity.ipmemorystore.RegularMaintenanceJobService" 69 android:permission="android.permission.BIND_JOB_SERVICE" > 70 </service> 71 </application> 72</manifest> 73