1<?xml version="1.0" encoding="utf-8"?> 2<!-- 3/* //device/apps/common/AndroidManifest.xml 4** 5** Copyright 2006, The Android Open Source Project 6** 7** Licensed under the Apache License, Version 2.0 (the "License"); 8** you may not use this file except in compliance with the License. 9** You may obtain a copy of the License at 10** 11** http://www.apache.org/licenses/LICENSE-2.0 12** 13** Unless required by applicable law or agreed to in writing, software 14** distributed under the License is distributed on an "AS IS" BASIS, 15** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 16** See the License for the specific language governing permissions and 17** limitations under the License. 18*/ 19--> 20<manifest xmlns:android="http://schemas.android.com/apk/res/android" 21 package="android" coreApp="true" android:sharedUserId="android.uid.system" 22 android:sharedUserLabel="@string/android_system_label"> 23 24 <!-- ================================================ --> 25 <!-- Special broadcasts that only the system can send --> 26 <!-- ================================================ --> 27 <eat-comment /> 28 29 <protected-broadcast android:name="android.intent.action.SCREEN_OFF" /> 30 <protected-broadcast android:name="android.intent.action.SCREEN_ON" /> 31 <protected-broadcast android:name="android.intent.action.USER_PRESENT" /> 32 <protected-broadcast android:name="android.intent.action.TIME_SET" /> 33 <protected-broadcast android:name="android.intent.action.TIME_TICK" /> 34 <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" /> 35 <protected-broadcast android:name="android.intent.action.DATE_CHANGED" /> 36 <protected-broadcast android:name="android.intent.action.PRE_BOOT_COMPLETED" /> 37 <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" /> 38 <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" /> 39 <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" /> 40 <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" /> 41 <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" /> 42 <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" /> 43 <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" /> 44 <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" /> 45 <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" /> 46 <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" /> 47 <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" /> 48 <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" /> 49 <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" /> 50 <protected-broadcast android:name="android.intent.action.PACKAGES_SUSPENDED" /> 51 <protected-broadcast android:name="android.intent.action.PACKAGES_UNSUSPENDED" /> 52 <protected-broadcast android:name="android.intent.action.ACTION_PREFERRED_ACTIVITY_CHANGED" /> 53 <protected-broadcast android:name="android.intent.action.UID_REMOVED" /> 54 <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" /> 55 <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" /> 56 <protected-broadcast android:name="android.intent.action.SPLIT_CONFIGURATION_CHANGED" /> 57 <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" /> 58 <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" /> 59 <protected-broadcast android:name="android.intent.action.BATTERY_LEVEL_CHANGED" /> 60 <protected-broadcast android:name="android.intent.action.BATTERY_LOW" /> 61 <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" /> 62 <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" /> 63 <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" /> 64 <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" /> 65 <protected-broadcast android:name="android.intent.action.CHARGING" /> 66 <protected-broadcast android:name="android.intent.action.DISCHARGING" /> 67 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" /> 68 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" /> 69 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" /> 70 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" /> 71 <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" /> 72 <protected-broadcast android:name="android.intent.action.REBOOT" /> 73 <protected-broadcast android:name="android.intent.action.DOCK_EVENT" /> 74 <protected-broadcast android:name="android.intent.action.THERMAL_EVENT" /> 75 <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" /> 76 <protected-broadcast android:name="android.intent.action.USER_ADDED" /> 77 <protected-broadcast android:name="android.intent.action.USER_REMOVED" /> 78 <protected-broadcast android:name="android.intent.action.USER_STARTING" /> 79 <protected-broadcast android:name="android.intent.action.USER_STARTED" /> 80 <protected-broadcast android:name="android.intent.action.USER_STOPPING" /> 81 <protected-broadcast android:name="android.intent.action.USER_STOPPED" /> 82 <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" /> 83 <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" /> 84 <protected-broadcast android:name="android.intent.action.USER_SWITCHED" /> 85 <protected-broadcast android:name="android.intent.action.USER_INITIALIZE" /> 86 <protected-broadcast android:name="android.intent.action.INTENT_FILTER_NEEDS_VERIFICATION" /> 87 <protected-broadcast android:name="android.intent.action.OVERLAY_ADDED" /> 88 <protected-broadcast android:name="android.intent.action.OVERLAY_CHANGED" /> 89 <protected-broadcast android:name="android.intent.action.OVERLAY_REMOVED" /> 90 <protected-broadcast android:name="android.intent.action.OVERLAY_PRIORITY_CHANGED" /> 91 <protected-broadcast android:name="android.intent.action.USER_ACTIVITY_NOTIFICATION" /> 92 <protected-broadcast android:name="android.intent.action.MY_PACKAGE_SUSPENDED" /> 93 <protected-broadcast android:name="android.intent.action.MY_PACKAGE_UNSUSPENDED" /> 94 95 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED" /> 96 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGING" /> 97 <protected-broadcast android:name="android.os.action.DEVICE_IDLE_MODE_CHANGED" /> 98 <protected-broadcast android:name="android.os.action.POWER_SAVE_WHITELIST_CHANGED" /> 99 <protected-broadcast android:name="android.os.action.POWER_SAVE_TEMP_WHITELIST_CHANGED" /> 100 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED_INTERNAL" /> 101 102 <!-- @deprecated This is rarely used and will be phased out soon. --> 103 <protected-broadcast android:name="android.os.action.SCREEN_BRIGHTNESS_BOOST_CHANGED" /> 104 105 <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" /> 106 <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" /> 107 <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" /> 108 <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" /> 109 <protected-broadcast android:name="android.app.action.NEXT_ALARM_CLOCK_CHANGED" /> 110 111 <protected-broadcast android:name="android.app.action.BUGREPORT_SHARING_DECLINED" /> 112 <protected-broadcast android:name="android.app.action.BUGREPORT_FAILED" /> 113 <protected-broadcast android:name="android.app.action.BUGREPORT_SHARE" /> 114 <protected-broadcast android:name="android.app.action.SHOW_DEVICE_MONITORING_DIALOG" /> 115 116 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" /> 117 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" /> 118 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" /> 119 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" /> 120 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_HOST_RESTORED" /> 121 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_RESTORED" /> 122 123 <protected-broadcast android:name="android.os.action.SETTING_RESTORED" /> 124 125 <protected-broadcast android:name="android.app.backup.intent.RUN" /> 126 <protected-broadcast android:name="android.app.backup.intent.CLEAR" /> 127 <protected-broadcast android:name="android.app.backup.intent.INIT" /> 128 129 <protected-broadcast android:name="android.bluetooth.intent.DISCOVERABLE_TIMEOUT" /> 130 <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" /> 131 <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" /> 132 <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" /> 133 <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" /> 134 <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" /> 135 <protected-broadcast android:name="android.bluetooth.adapter.action.BLUETOOTH_ADDRESS_CHANGED" /> 136 <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" /> 137 <protected-broadcast android:name="android.bluetooth.device.action.UUID" /> 138 <protected-broadcast android:name="android.bluetooth.device.action.MAS_INSTANCE" /> 139 <protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" /> 140 <protected-broadcast android:name="android.bluetooth.device.action.FOUND" /> 141 <protected-broadcast android:name="android.bluetooth.device.action.DISAPPEARED" /> 142 <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" /> 143 <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" /> 144 <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" /> 145 <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" /> 146 <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" /> 147 <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" /> 148 <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" /> 149 <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" /> 150 <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" /> 151 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" /> 152 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" /> 153 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" /> 154 <protected-broadcast android:name="android.bluetooth.device.action.SDP_RECORD" /> 155 <protected-broadcast android:name="android.bluetooth.device.action.BATTERY_LEVEL_CHANGED" /> 156 <protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" /> 157 <protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" /> 158 <protected-broadcast 159 android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" /> 160 <protected-broadcast 161 android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" /> 162 <protected-broadcast 163 android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" /> 164 <protected-broadcast 165 android:name="android.bluetooth.headset.action.HF_INDICATORS_VALUE_CHANGED" /> 166 <protected-broadcast 167 android:name="android.bluetooth.headset.profile.action.ACTIVE_DEVICE_CHANGED" /> 168 <protected-broadcast 169 android:name="android.bluetooth.headsetclient.profile.action.CONNECTION_STATE_CHANGED" /> 170 <protected-broadcast 171 android:name="android.bluetooth.headsetclient.profile.action.AUDIO_STATE_CHANGED" /> 172 <protected-broadcast 173 android:name="android.bluetooth.headsetclient.profile.action.AG_EVENT" /> 174 <protected-broadcast 175 android:name="android.bluetooth.headsetclient.profile.action.AG_CALL_CHANGED" /> 176 <protected-broadcast 177 android:name="android.bluetooth.headsetclient.profile.action.RESULT" /> 178 <protected-broadcast 179 android:name="android.bluetooth.headsetclient.profile.action.LAST_VTAG" /> 180 <protected-broadcast 181 android:name="android.bluetooth.hearingaid.profile.action.CONNECTION_STATE_CHANGED" /> 182 <protected-broadcast 183 android:name="android.bluetooth.hearingaid.profile.action.PLAYING_STATE_CHANGED" /> 184 <protected-broadcast 185 android:name="android.bluetooth.hearingaid.profile.action.ACTIVE_DEVICE_CHANGED" /> 186 <protected-broadcast 187 android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" /> 188 <protected-broadcast 189 android:name="android.bluetooth.a2dp.profile.action.ACTIVE_DEVICE_CHANGED" /> 190 <protected-broadcast 191 android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" /> 192 <protected-broadcast 193 android:name="android.bluetooth.a2dp.profile.action.CODEC_CONFIG_CHANGED" /> 194 <protected-broadcast 195 android:name="android.bluetooth.a2dp-sink.profile.action.CONNECTION_STATE_CHANGED" /> 196 <protected-broadcast 197 android:name="android.bluetooth.a2dp-sink.profile.action.PLAYING_STATE_CHANGED" /> 198 <protected-broadcast 199 android:name="android.bluetooth.a2dp-sink.profile.action.AUDIO_CONFIG_CHANGED" /> 200 <protected-broadcast 201 android:name="android.bluetooth.avrcp-controller.profile.action.BROWSE_CONNECTION_STATE_CHANGED" /> 202 <protected-broadcast 203 android:name="android.bluetooth.avrcp-controller.profile.action.CONNECTION_STATE_CHANGED" /> 204 <protected-broadcast 205 android:name="android.bluetooth.avrcp-controller.profile.action.FOLDER_LIST" /> 206 <protected-broadcast 207 android:name="android.bluetooth.avrcp-controller.profile.action.TRACK_EVENT" /> 208 <protected-broadcast 209 android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" /> 210 <protected-broadcast 211 android:name="android.bluetooth.input.profile.action.IDLE_TIME_CHANGED" /> 212 <protected-broadcast 213 android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" /> 214 <protected-broadcast 215 android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" /> 216 <protected-broadcast 217 android:name="android.bluetooth.hiddevice.profile.action.CONNECTION_STATE_CHANGED" /> 218 <protected-broadcast 219 android:name="android.bluetooth.map.profile.action.CONNECTION_STATE_CHANGED" /> 220 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.CONNECTION_STATE_CHANGED" /> 221 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_RECEIVED" /> 222 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_SENT_SUCCESSFULLY" /> 223 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_DELIVERED_SUCCESSFULLY" /> 224 <protected-broadcast 225 android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_SENT" /> 226 <protected-broadcast 227 android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_DELIVERY" /> 228 <protected-broadcast 229 android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" /> 230 <protected-broadcast android:name="android.bluetooth.pbap.profile.action.CONNECTION_STATE_CHANGED" /> 231 <protected-broadcast android:name="android.bluetooth.pbapclient.profile.action.CONNECTION_STATE_CHANGED" /> 232 <protected-broadcast android:name="android.bluetooth.sap.profile.action.CONNECTION_STATE_CHANGED" /> 233 <protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" /> 234 <protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" /> 235 <protected-broadcast android:name="android.btopp.intent.action.LIST" /> 236 <protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" /> 237 <protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" /> 238 <protected-broadcast android:name="android.btopp.intent.action.CONFIRM" /> 239 <protected-broadcast android:name="android.btopp.intent.action.HIDE" /> 240 <protected-broadcast android:name="android.btopp.intent.action.RETRY" /> 241 <protected-broadcast android:name="android.btopp.intent.action.OPEN" /> 242 <protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" /> 243 <protected-broadcast android:name="android.btopp.intent.action.TRANSFER_COMPLETE" /> 244 <protected-broadcast android:name="android.btopp.intent.action.ACCEPT" /> 245 <protected-broadcast android:name="android.btopp.intent.action.DECLINE" /> 246 <protected-broadcast android:name="com.android.bluetooth.gatt.REFRESH_BATCHED_SCAN" /> 247 <protected-broadcast android:name="com.android.bluetooth.pbap.authchall" /> 248 <protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" /> 249 <protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" /> 250 <protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" /> 251 <protected-broadcast android:name="com.android.bluetooth.sap.USER_CONFIRM_TIMEOUT" /> 252 <protected-broadcast android:name="com.android.bluetooth.sap.action.DISCONNECT_ACTION" /> 253 254 <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" /> 255 256 <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" /> 257 <protected-broadcast android:name="android.hardware.usb.action.USB_PORT_CHANGED" /> 258 <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" /> 259 <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_DETACHED" /> 260 <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" /> 261 <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" /> 262 263 <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" /> 264 <protected-broadcast android:name="android.media.action.HDMI_AUDIO_PLUG" /> 265 266 <protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" /> 267 <protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" /> 268 <protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" /> 269 <protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" /> 270 <protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" /> 271 <protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" /> 272 <protected-broadcast android:name="android.media.MASTER_MONO_CHANGED_ACTION" /> 273 <protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" /> 274 <protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" /> 275 276 <protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" /> 277 <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" /> 278 <protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" /> 279 <protected-broadcast android:name="android.intent.action.MEDIA_NOFS" /> 280 <protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" /> 281 <protected-broadcast android:name="android.intent.action.MEDIA_SHARED" /> 282 <protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" /> 283 <protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" /> 284 <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" /> 285 <protected-broadcast android:name="android.intent.action.MEDIA_EJECT" /> 286 287 <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL" /> 288 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" /> 289 <!-- @deprecated. Only {@link android.net.ConnectivityManager.CONNECTIVITY_ACTION} is sent. --> 290 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" /> 291 <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" /> 292 <protected-broadcast android:name="android.net.conn.RESTRICT_BACKGROUND_CHANGED" /> 293 <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" /> 294 <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" /> 295 296 <protected-broadcast android:name="android.net.nsd.STATE_CHANGED" /> 297 298 <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" /> 299 <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" /> 300 <protected-broadcast android:name="com.android.nfc.action.LLCP_UP" /> 301 <protected-broadcast android:name="com.android.nfc.action.LLCP_DOWN" /> 302 <protected-broadcast android:name="com.android.nfc.cardemulation.action.CLOSE_TAP_DIALOG" /> 303 <protected-broadcast android:name="com.android.nfc.handover.action.ALLOW_CONNECT" /> 304 <protected-broadcast android:name="com.android.nfc.handover.action.DENY_CONNECT" /> 305 <protected-broadcast android:name="com.android.nfc.handover.action.TIMEOUT_CONNECT" /> 306 <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" /> 307 <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" /> 308 <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" /> 309 <!-- For NFC to BT handover --> 310 <protected-broadcast android:name="android.btopp.intent.action.WHITELIST_DEVICE" /> 311 <protected-broadcast android:name="android.btopp.intent.action.STOP_HANDOVER_TRANSFER" /> 312 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND" /> 313 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND_MULTIPLE" /> 314 <protected-broadcast android:name="com.android.nfc.handover.action.CANCEL_HANDOVER_TRANSFER" /> 315 316 <protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" /> 317 <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" /> 318 319 <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" /> 320 321 <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" /> 322 <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" /> 323 <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" /> 324 325 <protected-broadcast android:name="com.android.server.stats.action.TRIGGER_COLLECTION" /> 326 327 <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" /> 328 <protected-broadcast android:name="com.android.server.WifiManager.action.START_PNO" /> 329 <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" /> 330 <protected-broadcast android:name="com.android.server.WifiManager.action.DEVICE_IDLE" /> 331 <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_ACCEPTED" /> 332 <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_DECLINED" /> 333 <protected-broadcast android:name="com.android.internal.action.EUICC_FACTORY_RESET" /> 334 <protected-broadcast android:name="com.android.server.usb.ACTION_OPEN_IN_APPS" /> 335 <protected-broadcast android:name="com.android.server.am.DELETE_DUMPHEAP" /> 336 <protected-broadcast android:name="com.android.server.net.action.SNOOZE_WARNING" /> 337 <protected-broadcast android:name="com.android.server.net.action.SNOOZE_RAPID" /> 338 <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.USER_DISMISSED_NOTIFICATION" /> 339 <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.CONNECT_TO_NETWORK" /> 340 <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.PICK_WIFI_NETWORK" /> 341 <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.PICK_NETWORK_AFTER_FAILURE" /> 342 <protected-broadcast android:name="com.android.server.wifi.wakeup.DISMISS_NOTIFICATION" /> 343 <protected-broadcast android:name="com.android.server.wifi.wakeup.OPEN_WIFI_PREFERENCES" /> 344 <protected-broadcast android:name="com.android.server.wifi.wakeup.OPEN_WIFI_SETTINGS" /> 345 <protected-broadcast android:name="com.android.server.wifi.wakeup.TURN_OFF_WIFI_WAKE" /> 346 <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" /> 347 <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" /> 348 <protected-broadcast android:name="android.net.wifi.WIFI_CREDENTIAL_CHANGED" /> 349 <protected-broadcast android:name="android.net.wifi.WIFI_SCAN_AVAILABLE" /> 350 <protected-broadcast android:name="android.net.wifi.aware.action.WIFI_AWARE_STATE_CHANGED" /> 351 <protected-broadcast android:name="android.net.wifi.rtt.action.WIFI_RTT_STATE_CHANGED" /> 352 <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" /> 353 <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" /> 354 <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" /> 355 <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" /> 356 <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" /> 357 <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_DEAUTH_IMMINENT" /> 358 <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_ICON" /> 359 <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_OSU_PROVIDERS_LIST" /> 360 <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_SUBSCRIPTION_REMEDIATION" /> 361 <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" /> 362 <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" /> 363 <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" /> 364 <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" /> 365 <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" /> 366 <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" /> 367 <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" /> 368 <protected-broadcast android:name="android.net.wifi.p2p.PERSISTENT_GROUPS_CHANGED" /> 369 <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" /> 370 <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" /> 371 <protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" /> 372 <protected-broadcast 373 android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" /> 374 <protected-broadcast android:name="android.net.scoring.SCORE_NETWORKS" /> 375 <protected-broadcast android:name="android.net.scoring.SCORER_CHANGED" /> 376 <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" /> 377 <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" /> 378 <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" /> 379 <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" /> 380 <protected-broadcast android:name="android.intent.action.APPLICATION_RESTRICTIONS_CHANGED" /> 381 382 <!-- Legacy --> 383 <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" /> 384 <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" /> 385 386 <protected-broadcast android:name="com.android.server.ACTION_TRIGGER_IDLE" /> 387 388 <protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" /> 389 390 <protected-broadcast android:name="android.intent.action.PHONE_STATE" /> 391 392 <protected-broadcast android:name="android.intent.action.SUB_DEFAULT_CHANGED" /> 393 394 <protected-broadcast android:name="android.location.GPS_ENABLED_CHANGE" /> 395 <protected-broadcast android:name="android.location.PROVIDERS_CHANGED" /> 396 <protected-broadcast android:name="android.location.MODE_CHANGED" /> 397 <protected-broadcast android:name="android.location.GPS_FIX_CHANGE" /> 398 <protected-broadcast android:name="android.net.proxy.PAC_REFRESH" /> 399 400 <protected-broadcast android:name="android.telecom.action.DEFAULT_DIALER_CHANGED" /> 401 <protected-broadcast android:name="android.provider.action.DEFAULT_SMS_PACKAGE_CHANGED" /> 402 <protected-broadcast android:name="android.intent.action.CONTENT_CHANGED" /> 403 <protected-broadcast android:name="android.provider.Telephony.MMS_DOWNLOADED" /> 404 405 <protected-broadcast 406 android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" /> 407 408 <!-- Defined in RestrictionsManager --> 409 <protected-broadcast 410 android:name="android.intent.action.PERMISSION_RESPONSE_RECEIVED" /> 411 <!-- Defined in RestrictionsManager --> 412 413 <protected-broadcast android:name="android.intent.action.REQUEST_PERMISSION" /> 414 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_STARTED" /> 415 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" /> 416 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_PROGRESS" /> 417 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" /> 418 419 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_DATA_SUBSCRIPTION_CHANGED" /> 420 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_VOICE_SUBSCRIPTION_CHANGED" /> 421 <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_CONTENT_CHANGE" /> 422 <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_RECORD_UPDATED" /> 423 424 <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_DONE" /> 425 <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_FAILED" /> 426 427 <protected-broadcast android:name="android.internal.policy.action.BURN_IN_PROTECTION" /> 428 <protected-broadcast android:name="android.app.action.SYSTEM_UPDATE_POLICY_CHANGED" /> 429 <protected-broadcast android:name="android.app.action.DEVICE_OWNER_CHANGED" /> 430 <protected-broadcast android:name="android.app.action.MANAGED_USER_CREATED" /> 431 432 <!-- Added in N --> 433 <protected-broadcast android:name="android.intent.action.ANR" /> 434 <protected-broadcast android:name="android.intent.action.CALL" /> 435 <protected-broadcast android:name="android.intent.action.CALL_PRIVILEGED" /> 436 <protected-broadcast android:name="android.intent.action.DROPBOX_ENTRY_ADDED" /> 437 <protected-broadcast android:name="android.intent.action.INPUT_METHOD_CHANGED" /> 438 <protected-broadcast android:name="android.intent.action.internal_sim_state_changed" /> 439 <protected-broadcast android:name="android.intent.action.LOCKED_BOOT_COMPLETED" /> 440 <protected-broadcast android:name="android.intent.action.PRECISE_CALL_STATE" /> 441 <protected-broadcast android:name="android.intent.action.PRECISE_DATA_CONNECTION_STATE_CHANGED" /> 442 <protected-broadcast android:name="android.intent.action.SUBSCRIPTION_PHONE_STATE" /> 443 <protected-broadcast android:name="android.intent.action.USER_INFO_CHANGED" /> 444 <protected-broadcast android:name="android.intent.action.USER_UNLOCKED" /> 445 <protected-broadcast android:name="android.intent.action.WALLPAPER_CHANGED" /> 446 447 <protected-broadcast android:name="android.app.action.DEVICE_POLICY_MANAGER_STATE_CHANGED" /> 448 <protected-broadcast android:name="android.app.action.CHOOSE_PRIVATE_KEY_ALIAS" /> 449 <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLED" /> 450 <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLE_REQUESTED" /> 451 <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_ENABLED" /> 452 <protected-broadcast android:name="android.app.action.LOCK_TASK_ENTERING" /> 453 <protected-broadcast android:name="android.app.action.LOCK_TASK_EXITING" /> 454 <protected-broadcast android:name="android.app.action.NOTIFY_PENDING_SYSTEM_UPDATE" /> 455 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_CHANGED" /> 456 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_EXPIRING" /> 457 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_FAILED" /> 458 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_SUCCEEDED" /> 459 <protected-broadcast android:name="com.android.server.ACTION_EXPIRED_PASSWORD_NOTIFICATION" /> 460 461 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_ADDED" /> 462 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNLOCKED" /> 463 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_REMOVED" /> 464 465 <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_STATE_CHANGED" /> 466 <protected-broadcast android:name="com.android.bluetooth.map.USER_CONFIRM_TIMEOUT" /> 467 <protected-broadcast android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_SENT" /> 468 <protected-broadcast android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_DELIVERY" /> 469 <protected-broadcast android:name="android.content.jobscheduler.JOB_DELAY_EXPIRED" /> 470 <protected-broadcast android:name="android.content.syncmanager.SYNC_ALARM" /> 471 <protected-broadcast android:name="android.media.INTERNAL_RINGER_MODE_CHANGED_ACTION" /> 472 <protected-broadcast android:name="android.media.STREAM_DEVICES_CHANGED_ACTION" /> 473 <protected-broadcast android:name="android.media.STREAM_MUTE_CHANGED_ACTION" /> 474 <protected-broadcast android:name="android.net.sip.SIP_SERVICE_UP" /> 475 <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" /> 476 <protected-broadcast android:name="android.os.action.CHARGING" /> 477 <protected-broadcast android:name="android.os.action.DISCHARGING" /> 478 <protected-broadcast android:name="android.search.action.SEARCHABLES_CHANGED" /> 479 <protected-broadcast android:name="android.security.STORAGE_CHANGED" /> 480 <protected-broadcast android:name="android.security.action.TRUST_STORE_CHANGED" /> 481 <protected-broadcast android:name="android.security.action.KEYCHAIN_CHANGED" /> 482 <protected-broadcast android:name="android.security.action.KEY_ACCESS_CHANGED" /> 483 <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_REGISTERED" /> 484 <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_UNREGISTERED" /> 485 <protected-broadcast android:name="android.telecom.action.SHOW_MISSED_CALLS_NOTIFICATION" /> 486 <protected-broadcast android:name="android.telephony.action.CARRIER_CONFIG_CHANGED" /> 487 <protected-broadcast android:name="android.telephony.action.DEFAULT_SUBSCRIPTION_CHANGED" /> 488 <protected-broadcast android:name="android.telephony.action.DEFAULT_SMS_SUBSCRIPTION_CHANGED" /> 489 <protected-broadcast android:name="android.telephony.action.SHOW_VOICEMAIL_NOTIFICATION" /> 490 <protected-broadcast android:name="android.telephony.action.SUBSCRIPTION_PLANS_CHANGED" /> 491 492 <protected-broadcast android:name="com.android.bluetooth.btservice.action.ALARM_WAKEUP" /> 493 <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_POLL" /> 494 <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_UPDATED" /> 495 <protected-broadcast android:name="com.android.server.NetworkTimeUpdateService.action.POLL" /> 496 <protected-broadcast android:name="com.android.server.telecom.intent.action.CALLS_ADD_ENTRY" /> 497 <protected-broadcast android:name="com.android.settings.location.MODE_CHANGING" /> 498 <protected-broadcast android:name="com.android.settings.bluetooth.ACTION_DISMISS_PAIRING" /> 499 500 <protected-broadcast android:name="NotificationManagerService.TIMEOUT" /> 501 <protected-broadcast android:name="ScheduleConditionProvider.EVALUATE" /> 502 <protected-broadcast android:name="EventConditionProvider.EVALUATE" /> 503 <protected-broadcast android:name="SnoozeHelper.EVALUATE" /> 504 <protected-broadcast android:name="wifi_scan_available" /> 505 506 <protected-broadcast android:name="action.cne.started" /> 507 <protected-broadcast android:name="android.content.jobscheduler.JOB_DEADLINE_EXPIRED" /> 508 <protected-broadcast android:name="android.intent.action.ACTION_UNSOL_RESPONSE_OEM_HOOK_RAW" /> 509 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_SUPL" /> 510 <protected-broadcast android:name="android.os.action.LIGHT_DEVICE_IDLE_MODE_CHANGED" /> 511 <protected-broadcast android:name="android.os.storage.action.VOLUME_STATE_CHANGED" /> 512 <protected-broadcast android:name="android.os.storage.action.DISK_SCANNED" /> 513 <protected-broadcast android:name="com.android.server.action.UPDATE_TWILIGHT_STATE" /> 514 <protected-broadcast android:name="com.android.server.action.RESET_TWILIGHT_AUTO" /> 515 <protected-broadcast android:name="com.android.server.device_idle.STEP_IDLE_STATE" /> 516 <protected-broadcast android:name="com.android.server.device_idle.STEP_LIGHT_IDLE_STATE" /> 517 <protected-broadcast android:name="com.android.server.Wifi.action.TOGGLE_PNO" /> 518 <protected-broadcast android:name="intent.action.ACTION_RF_BAND_INFO" /> 519 <protected-broadcast android:name="android.intent.action.MEDIA_RESOURCE_GRANTED" /> 520 <protected-broadcast android:name="android.app.action.NETWORK_LOGS_AVAILABLE" /> 521 <protected-broadcast android:name="android.app.action.SECURITY_LOGS_AVAILABLE" /> 522 523 <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED" /> 524 <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED_INTERNAL" /> 525 <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_CHANGED" /> 526 <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_ACCESS_GRANTED_CHANGED" /> 527 <protected-broadcast android:name="android.os.action.ACTION_EFFECTS_SUPPRESSOR_CHANGED" /> 528 <protected-broadcast android:name="android.app.action.NOTIFICATION_CHANNEL_BLOCK_STATE_CHANGED" /> 529 <protected-broadcast android:name="android.app.action.NOTIFICATION_CHANNEL_GROUP_BLOCK_STATE_CHANGED" /> 530 <protected-broadcast android:name="android.app.action.APP_BLOCK_STATE_CHANGED" /> 531 532 <protected-broadcast android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS" /> 533 <protected-broadcast android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS" /> 534 535 <protected-broadcast android:name="android.intent.action.DYNAMIC_SENSOR_CHANGED" /> 536 537 <protected-broadcast android:name="android.intent.action.ACTION_RADIO_OFF" /> 538 539 <protected-broadcast android:name="android.accounts.LOGIN_ACCOUNTS_CHANGED" /> 540 <protected-broadcast android:name="android.accounts.action.ACCOUNT_REMOVED" /> 541 <protected-broadcast android:name="android.accounts.action.VISIBLE_ACCOUNTS_CHANGED" /> 542 543 <protected-broadcast android:name="com.android.sync.SYNC_CONN_STATUS_CHANGED" /> 544 545 <protected-broadcast android:name="com.android.phone.SIP_INCOMING_CALL" /> 546 <protected-broadcast android:name="com.android.phone.SIP_ADD_PHONE" /> 547 <protected-broadcast android:name="com.android.phone.SIP_REMOVE_PHONE" /> 548 <protected-broadcast android:name="com.android.phone.SIP_CALL_OPTION_CHANGED" /> 549 550 <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_CONNECTED" /> 551 <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_DISCONNECTED" /> 552 553 <protected-broadcast android:name="android.bluetooth.input.profile.action.HANDSHAKE" /> 554 <protected-broadcast android:name="android.bluetooth.input.profile.action.REPORT" /> 555 556 <protected-broadcast android:name="android.intent.action.TWILIGHT_CHANGED" /> 557 558 <protected-broadcast android:name="com.android.server.fingerprint.ACTION_LOCKOUT_RESET" /> 559 <protected-broadcast android:name="android.net.wifi.PASSPOINT_ICON_RECEIVED" /> 560 <protected-broadcast android:name="com.android.server.notification.CountdownConditionProvider" /> 561 562 <protected-broadcast android:name="com.android.internal.location.ALARM_WAKEUP" /> 563 <protected-broadcast android:name="com.android.internal.location.ALARM_TIMEOUT" /> 564 <protected-broadcast android:name="android.intent.action.GLOBAL_BUTTON" /> 565 566 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_AVAILABLE" /> 567 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNAVAILABLE" /> 568 <protected-broadcast android:name="com.android.server.pm.DISABLE_QUIET_MODE_AFTER_UNLOCK" /> 569 570 <protected-broadcast android:name="com.android.server.retaildemo.ACTION_RESET_DEMO" /> 571 572 <protected-broadcast android:name="android.intent.action.DEVICE_LOCKED_CHANGED" /> 573 574 <!-- Added in O --> 575 <protected-broadcast android:name="android.app.action.APPLICATION_DELEGATION_SCOPES_CHANGED" /> 576 <protected-broadcast android:name="com.android.server.wm.ACTION_REVOKE_SYSTEM_ALERT_WINDOW_PERMISSION" /> 577 <protected-broadcast android:name="android.media.tv.action.PARENTAL_CONTROLS_ENABLED_CHANGED" /> 578 579 <protected-broadcast android:name="android.content.pm.action.SESSION_COMMITTED" /> 580 <protected-broadcast android:name="android.os.action.USER_RESTRICTIONS_CHANGED" /> 581 <protected-broadcast android:name="android.media.tv.action.PREVIEW_PROGRAM_ADDED_TO_WATCH_NEXT" /> 582 <protected-broadcast android:name="android.media.tv.action.PREVIEW_PROGRAM_BROWSABLE_DISABLED" /> 583 <protected-broadcast android:name="android.media.tv.action.WATCH_NEXT_PROGRAM_BROWSABLE_DISABLED" /> 584 <protected-broadcast android:name="android.media.tv.action.CHANNEL_BROWSABLE_REQUESTED" /> 585 <protected-broadcast android:name="com.android.server.InputMethodManagerService.SHOW_INPUT_METHOD_PICKER" /> 586 587 <!-- Time zone rules update intents fired by the system server --> 588 <protected-broadcast android:name="com.android.intent.action.timezone.RULES_UPDATE_OPERATION" /> 589 <protected-broadcast android:name="com.android.intent.action.timezone.TRIGGER_RULES_UPDATE_CHECK" /> 590 591 <!-- Made protected in P (was introduced in JB-MR2) --> 592 <protected-broadcast android:name="android.intent.action.GET_RESTRICTION_ENTRIES" /> 593 <protected-broadcast android:name="android.telephony.euicc.action.OTA_STATUS_CHANGED" /> 594 595 <!-- Added in P --> 596 <protected-broadcast android:name="android.app.action.PROFILE_OWNER_CHANGED" /> 597 <protected-broadcast android:name="android.app.action.TRANSFER_OWNERSHIP_COMPLETE" /> 598 <protected-broadcast android:name="android.app.action.AFFILIATED_PROFILE_TRANSFER_OWNERSHIP_COMPLETE" /> 599 <protected-broadcast android:name="android.app.action.DATA_SHARING_RESTRICTION_CHANGED" /> 600 <protected-broadcast android:name="android.app.action.STATSD_STARTED" /> 601 602 <!-- For IdleController --> 603 <protected-broadcast android:name="android.intent.action.DOCK_IDLE" /> 604 <protected-broadcast android:name="android.intent.action.DOCK_ACTIVE" /> 605 606 <!-- ====================================================================== --> 607 <!-- RUNTIME PERMISSIONS --> 608 <!-- ====================================================================== --> 609 <eat-comment /> 610 611 <!-- ====================================================================== --> 612 <!-- Permissions for accessing user's contacts including personal profile --> 613 <!-- ====================================================================== --> 614 <eat-comment /> 615 616 <!-- Used for runtime permissions related to contacts and profiles on this 617 device. --> 618 <permission-group android:name="android.permission-group.CONTACTS" 619 android:icon="@drawable/perm_group_contacts" 620 android:label="@string/permgrouplab_contacts" 621 android:description="@string/permgroupdesc_contacts" 622 android:request="@string/permgrouprequest_contacts" 623 android:priority="100" /> 624 625 <!-- Allows an application to read the user's contacts data. 626 <p>Protection level: dangerous 627 --> 628 <permission android:name="android.permission.READ_CONTACTS" 629 android:permissionGroup="android.permission-group.CONTACTS" 630 android:label="@string/permlab_readContacts" 631 android:description="@string/permdesc_readContacts" 632 android:protectionLevel="dangerous" /> 633 634 <!-- Allows an application to write the user's contacts data. 635 <p>Protection level: dangerous 636 --> 637 <permission android:name="android.permission.WRITE_CONTACTS" 638 android:permissionGroup="android.permission-group.CONTACTS" 639 android:label="@string/permlab_writeContacts" 640 android:description="@string/permdesc_writeContacts" 641 android:protectionLevel="dangerous" /> 642 643 <!-- ====================================================================== --> 644 <!-- Permissions for accessing user's calendar --> 645 <!-- ====================================================================== --> 646 <eat-comment /> 647 648 <!-- Used for runtime permissions related to user's calendar. --> 649 <permission-group android:name="android.permission-group.CALENDAR" 650 android:icon="@drawable/perm_group_calendar" 651 android:label="@string/permgrouplab_calendar" 652 android:description="@string/permgroupdesc_calendar" 653 android:request="@string/permgrouprequest_calendar" 654 android:priority="200" /> 655 656 <!-- Allows an application to read the user's calendar data. 657 <p>Protection level: dangerous 658 --> 659 <permission android:name="android.permission.READ_CALENDAR" 660 android:permissionGroup="android.permission-group.CALENDAR" 661 android:label="@string/permlab_readCalendar" 662 android:description="@string/permdesc_readCalendar" 663 android:protectionLevel="dangerous" /> 664 665 <!-- Allows an application to write the user's calendar data. 666 <p>Protection level: dangerous 667 --> 668 <permission android:name="android.permission.WRITE_CALENDAR" 669 android:permissionGroup="android.permission-group.CALENDAR" 670 android:label="@string/permlab_writeCalendar" 671 android:description="@string/permdesc_writeCalendar" 672 android:protectionLevel="dangerous" /> 673 674 <!-- ====================================================================== --> 675 <!-- Permissions for accessing and modifying user's SMS messages --> 676 <!-- ====================================================================== --> 677 <eat-comment /> 678 679 <!-- Used for runtime permissions related to user's SMS messages. --> 680 <permission-group android:name="android.permission-group.SMS" 681 android:icon="@drawable/perm_group_sms" 682 android:label="@string/permgrouplab_sms" 683 android:description="@string/permgroupdesc_sms" 684 android:request="@string/permgrouprequest_sms" 685 android:priority="300" /> 686 687 <!-- Allows an application to send SMS messages. 688 <p>Protection level: dangerous 689 --> 690 <permission android:name="android.permission.SEND_SMS" 691 android:permissionGroup="android.permission-group.SMS" 692 android:label="@string/permlab_sendSms" 693 android:description="@string/permdesc_sendSms" 694 android:permissionFlags="costsMoney" 695 android:protectionLevel="dangerous" /> 696 697 <!-- Allows an application to receive SMS messages. 698 <p>Protection level: dangerous 699 --> 700 <permission android:name="android.permission.RECEIVE_SMS" 701 android:permissionGroup="android.permission-group.SMS" 702 android:label="@string/permlab_receiveSms" 703 android:description="@string/permdesc_receiveSms" 704 android:protectionLevel="dangerous"/> 705 706 <!-- Allows an application to read SMS messages. 707 <p>Protection level: dangerous 708 --> 709 <permission android:name="android.permission.READ_SMS" 710 android:permissionGroup="android.permission-group.SMS" 711 android:label="@string/permlab_readSms" 712 android:description="@string/permdesc_readSms" 713 android:protectionLevel="dangerous" /> 714 715 <!-- Allows an application to receive WAP push messages. 716 <p>Protection level: dangerous 717 --> 718 <permission android:name="android.permission.RECEIVE_WAP_PUSH" 719 android:permissionGroup="android.permission-group.SMS" 720 android:label="@string/permlab_receiveWapPush" 721 android:description="@string/permdesc_receiveWapPush" 722 android:protectionLevel="dangerous" /> 723 724 <!-- Allows an application to monitor incoming MMS messages. 725 <p>Protection level: dangerous 726 --> 727 <permission android:name="android.permission.RECEIVE_MMS" 728 android:permissionGroup="android.permission-group.SMS" 729 android:label="@string/permlab_receiveMms" 730 android:description="@string/permdesc_receiveMms" 731 android:protectionLevel="dangerous" /> 732 733 <!-- Allows an application to read previously received cell broadcast 734 messages and to register a content observer to get notifications when 735 a cell broadcast has been received and added to the database. For 736 emergency alerts, the database is updated immediately after the 737 alert dialog and notification sound/vibration/speech are presented. 738 The "read" column is then updated after the user dismisses the alert. 739 This enables supplementary emergency assistance apps to start loading 740 additional emergency information (if Internet access is available) 741 when the alert is first received, and to delay presenting the info 742 to the user until after the initial alert dialog is dismissed. 743 <p>Protection level: dangerous 744 @hide Pending API council approval --> 745 <permission android:name="android.permission.READ_CELL_BROADCASTS" 746 android:permissionGroup="android.permission-group.SMS" 747 android:label="@string/permlab_readCellBroadcasts" 748 android:description="@string/permdesc_readCellBroadcasts" 749 android:protectionLevel="dangerous" /> 750 751 <!-- ====================================================================== --> 752 <!-- Permissions for accessing external storage --> 753 <!-- ====================================================================== --> 754 <eat-comment /> 755 756 <!-- Used for runtime permissions related to the shared external storage. --> 757 <permission-group android:name="android.permission-group.STORAGE" 758 android:icon="@drawable/perm_group_storage" 759 android:label="@string/permgrouplab_storage" 760 android:description="@string/permgroupdesc_storage" 761 android:request="@string/permgrouprequest_storage" 762 android:priority="900" /> 763 764 <!-- Allows an application to read from external storage. 765 <p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly 766 granted this permission.</p> 767 <p>This permission is enforced starting in API level 19. Before API level 19, this 768 permission is not enforced and all apps still have access to read from external storage. 769 You can test your app with the permission enforced by enabling <em>Protect USB 770 storage</em> under Developer options in the Settings app on a device running Android 4.1 or 771 higher.</p> 772 <p>Also starting in API level 19, this permission is <em>not</em> required to 773 read/write files in your application-specific directories returned by 774 {@link android.content.Context#getExternalFilesDir} and 775 {@link android.content.Context#getExternalCacheDir}. 776 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 777 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 778 minSdkVersion}</a> and <a 779 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 780 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 781 grants your app this permission. If you don't need this permission, be sure your <a 782 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 783 targetSdkVersion}</a> is 4 or higher. 784 <p>Protection level: dangerous 785 --> 786 <permission android:name="android.permission.READ_EXTERNAL_STORAGE" 787 android:permissionGroup="android.permission-group.STORAGE" 788 android:label="@string/permlab_sdcardRead" 789 android:description="@string/permdesc_sdcardRead" 790 android:protectionLevel="dangerous" /> 791 792 <!-- Allows an application to write to external storage. 793 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 794 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 795 minSdkVersion}</a> and <a 796 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 797 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 798 grants your app this permission. If you don't need this permission, be sure your <a 799 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 800 targetSdkVersion}</a> is 4 or higher. 801 <p>Starting in API level 19, this permission is <em>not</em> required to 802 read/write files in your application-specific directories returned by 803 {@link android.content.Context#getExternalFilesDir} and 804 {@link android.content.Context#getExternalCacheDir}. 805 <p>Protection level: dangerous 806 --> 807 <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE" 808 android:permissionGroup="android.permission-group.STORAGE" 809 android:label="@string/permlab_sdcardWrite" 810 android:description="@string/permdesc_sdcardWrite" 811 android:protectionLevel="dangerous" /> 812 813 <!-- ====================================================================== --> 814 <!-- Permissions for accessing the device location --> 815 <!-- ====================================================================== --> 816 <eat-comment /> 817 818 <!-- Used for permissions that allow accessing the device location. --> 819 <permission-group android:name="android.permission-group.LOCATION" 820 android:icon="@drawable/perm_group_location" 821 android:label="@string/permgrouplab_location" 822 android:description="@string/permgroupdesc_location" 823 android:request="@string/permgrouprequest_location" 824 android:priority="400" /> 825 826 <!-- Allows an app to access precise location. 827 Alternatively, you might want {@link #ACCESS_COARSE_LOCATION}. 828 <p>Protection level: dangerous 829 --> 830 <permission android:name="android.permission.ACCESS_FINE_LOCATION" 831 android:permissionGroup="android.permission-group.LOCATION" 832 android:label="@string/permlab_accessFineLocation" 833 android:description="@string/permdesc_accessFineLocation" 834 android:protectionLevel="dangerous|instant" /> 835 836 <!-- Allows an app to access approximate location. 837 Alternatively, you might want {@link #ACCESS_FINE_LOCATION}. 838 <p>Protection level: dangerous 839 --> 840 <permission android:name="android.permission.ACCESS_COARSE_LOCATION" 841 android:permissionGroup="android.permission-group.LOCATION" 842 android:label="@string/permlab_accessCoarseLocation" 843 android:description="@string/permdesc_accessCoarseLocation" 844 android:protectionLevel="dangerous|instant" /> 845 846 <!-- ====================================================================== --> 847 <!-- Permissions for accessing the call log --> 848 <!-- ====================================================================== --> 849 <eat-comment /> 850 851 <!-- Used for permissions that are associated telephony features. --> 852 <permission-group android:name="android.permission-group.CALL_LOG" 853 android:icon="@drawable/perm_group_call_log" 854 android:label="@string/permgrouplab_calllog" 855 android:description="@string/permgroupdesc_calllog" 856 android:request="@string/permgrouprequest_calllog" 857 android:priority="450" /> 858 859 <!-- Allows an application to access the IMS call service: making and 860 modifying a call 861 <p>Protection level: signature|privileged 862 @hide 863 --> 864 <permission android:name="android.permission.ACCESS_IMS_CALL_SERVICE" 865 android:label="@string/permlab_accessImsCallService" 866 android:description="@string/permdesc_accessImsCallService" 867 android:protectionLevel="signature|privileged" /> 868 869 <!-- Allows an application to read the user's call log. 870 <p class="note"><strong>Note:</strong> If your app uses the 871 {@link #READ_CONTACTS} permission and <em>both</em> your <a 872 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 873 minSdkVersion}</a> and <a 874 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 875 targetSdkVersion}</a> values are set to 15 or lower, the system implicitly 876 grants your app this permission. If you don't need this permission, be sure your <a 877 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 878 targetSdkVersion}</a> is 16 or higher.</p> 879 <p>Protection level: dangerous 880 --> 881 <permission android:name="android.permission.READ_CALL_LOG" 882 android:permissionGroup="android.permission-group.CALL_LOG" 883 android:label="@string/permlab_readCallLog" 884 android:description="@string/permdesc_readCallLog" 885 android:protectionLevel="dangerous" /> 886 887 <!-- Allows an application to write (but not read) the user's 888 call log data. 889 <p class="note"><strong>Note:</strong> If your app uses the 890 {@link #WRITE_CONTACTS} permission and <em>both</em> your <a 891 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 892 minSdkVersion}</a> and <a 893 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 894 targetSdkVersion}</a> values are set to 15 or lower, the system implicitly 895 grants your app this permission. If you don't need this permission, be sure your <a 896 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 897 targetSdkVersion}</a> is 16 or higher.</p> 898 <p>Protection level: dangerous 899 --> 900 <permission android:name="android.permission.WRITE_CALL_LOG" 901 android:permissionGroup="android.permission-group.CALL_LOG" 902 android:label="@string/permlab_writeCallLog" 903 android:description="@string/permdesc_writeCallLog" 904 android:protectionLevel="dangerous" /> 905 906 <!-- Allows an application to see the number being dialed during an outgoing 907 call with the option to redirect the call to a different number or 908 abort the call altogether. 909 <p>Protection level: dangerous 910 --> 911 <permission android:name="android.permission.PROCESS_OUTGOING_CALLS" 912 android:permissionGroup="android.permission-group.CALL_LOG" 913 android:label="@string/permlab_processOutgoingCalls" 914 android:description="@string/permdesc_processOutgoingCalls" 915 android:protectionLevel="dangerous" /> 916 917 <!-- ====================================================================== --> 918 <!-- Permissions for accessing the device telephony --> 919 <!-- ====================================================================== --> 920 <eat-comment /> 921 922 <!-- Used for permissions that are associated telephony features. --> 923 <permission-group android:name="android.permission-group.PHONE" 924 android:icon="@drawable/perm_group_phone_calls" 925 android:label="@string/permgrouplab_phone" 926 android:description="@string/permgroupdesc_phone" 927 android:request="@string/permgrouprequest_phone" 928 android:priority="500" /> 929 930 <!-- Allows read only access to phone state, including the phone number of the device, 931 current cellular network information, the status of any ongoing calls, and a list of any 932 {@link android.telecom.PhoneAccount}s registered on the device. 933 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 934 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 935 minSdkVersion}</a> and <a 936 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 937 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 938 grants your app this permission. If you don't need this permission, be sure your <a 939 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 940 targetSdkVersion}</a> is 4 or higher. 941 <p>Protection level: dangerous 942 --> 943 <permission android:name="android.permission.READ_PHONE_STATE" 944 android:permissionGroup="android.permission-group.PHONE" 945 android:label="@string/permlab_readPhoneState" 946 android:description="@string/permdesc_readPhoneState" 947 android:protectionLevel="dangerous" /> 948 949 <!-- Allows read access to the device's phone number(s). This is a subset of the capabilities 950 granted by {@link #READ_PHONE_STATE} but is exposed to instant applications. 951 <p>Protection level: dangerous--> 952 <permission android:name="android.permission.READ_PHONE_NUMBERS" 953 android:permissionGroup="android.permission-group.PHONE" 954 android:label="@string/permlab_readPhoneNumbers" 955 android:description="@string/permdesc_readPhoneNumbers" 956 android:protectionLevel="dangerous|instant" /> 957 958 <!-- Allows an application to initiate a phone call without going through 959 the Dialer user interface for the user to confirm the call. 960 <p>Protection level: dangerous 961 --> 962 <permission android:name="android.permission.CALL_PHONE" 963 android:permissionGroup="android.permission-group.PHONE" 964 android:permissionFlags="costsMoney" 965 android:label="@string/permlab_callPhone" 966 android:description="@string/permdesc_callPhone" 967 android:protectionLevel="dangerous" /> 968 969 <!-- Allows an application to add voicemails into the system. 970 <p>Protection level: dangerous 971 --> 972 <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL" 973 android:permissionGroup="android.permission-group.PHONE" 974 android:label="@string/permlab_addVoicemail" 975 android:description="@string/permdesc_addVoicemail" 976 android:protectionLevel="dangerous" /> 977 978 <!-- Allows an application to use SIP service. 979 <p>Protection level: dangerous 980 --> 981 <permission android:name="android.permission.USE_SIP" 982 android:permissionGroup="android.permission-group.PHONE" 983 android:description="@string/permdesc_use_sip" 984 android:label="@string/permlab_use_sip" 985 android:protectionLevel="dangerous"/> 986 987 <!-- Allows the app to answer an incoming phone call. 988 <p>Protection level: dangerous 989 --> 990 <permission android:name="android.permission.ANSWER_PHONE_CALLS" 991 android:permissionGroup="android.permission-group.PHONE" 992 android:label="@string/permlab_answerPhoneCalls" 993 android:description="@string/permdesc_answerPhoneCalls" 994 android:protectionLevel="dangerous|runtime" /> 995 996 <!-- Allows a calling application which manages it own calls through the self-managed 997 {@link android.telecom.ConnectionService} APIs. See 998 {@link android.telecom.PhoneAccount#CAPABILITY_SELF_MANAGED for more information on the 999 self-managed ConnectionService APIs. 1000 <p>Protection level: normal 1001 --> 1002 <permission android:name="android.permission.MANAGE_OWN_CALLS" 1003 android:label="@string/permlab_manageOwnCalls" 1004 android:description="@string/permdesc_manageOwnCalls" 1005 android:protectionLevel="normal" /> 1006 1007 <!-- Allows a calling app to continue a call which was started in another app. An example is a 1008 video calling app that wants to continue a voice call on the user's mobile network.<p> 1009 When the handover of a call from one app to another takes place, there are two devices 1010 which are involved in the handover; the initiating and receiving devices. The initiating 1011 device is where the request to handover the call was started, and the receiving device is 1012 where the handover request is confirmed by the other party.<p> 1013 This permission protects access to the 1014 {@link android.telecom.TelecomManager#acceptHandover(Uri, int, PhoneAccountHandle)} which 1015 the receiving side of the handover uses to accept a handover. 1016 <p>Protection level: dangerous 1017 --> 1018 <permission android:name="android.permission.ACCEPT_HANDOVER" 1019 android:permissionGroup="android.permission-group.PHONE" 1020 android.label="@string/permlab_acceptHandover" 1021 android:description="@string/permdesc_acceptHandovers" 1022 android:protectionLevel="dangerous" /> 1023 1024 <!-- ====================================================================== --> 1025 <!-- Permissions for accessing the device microphone --> 1026 <!-- ====================================================================== --> 1027 <eat-comment /> 1028 1029 <!-- Used for permissions that are associated with accessing 1030 microphone audio from the device. Note that phone calls also capture audio 1031 but are in a separate (more visible) permission group. --> 1032 <permission-group android:name="android.permission-group.MICROPHONE" 1033 android:icon="@drawable/perm_group_microphone" 1034 android:label="@string/permgrouplab_microphone" 1035 android:description="@string/permgroupdesc_microphone" 1036 android:request="@string/permgrouprequest_microphone" 1037 android:priority="600" /> 1038 1039 <!-- Allows an application to record audio. 1040 <p>Protection level: dangerous 1041 --> 1042 <permission android:name="android.permission.RECORD_AUDIO" 1043 android:permissionGroup="android.permission-group.MICROPHONE" 1044 android:label="@string/permlab_recordAudio" 1045 android:description="@string/permdesc_recordAudio" 1046 android:protectionLevel="dangerous|instant"/> 1047 1048 <!-- ====================================================================== --> 1049 <!-- Permissions for accessing the UCE Service --> 1050 <!-- ====================================================================== --> 1051 1052 <!-- @hide Allows an application to Access UCE-Presence. 1053 <p>Protection level: signature|privileged 1054 --> 1055 <permission android:name="android.permission.ACCESS_UCE_PRESENCE_SERVICE" 1056 android:permissionGroup="android.permission-group.PHONE" 1057 android:protectionLevel="signature|privileged"/> 1058 1059 <!-- @hide Allows an application to Access UCE-OPTIONS. 1060 <p>Protection level: signature|privileged 1061 --> 1062 <permission android:name="android.permission.ACCESS_UCE_OPTIONS_SERVICE" 1063 android:permissionGroup="android.permission-group.PHONE" 1064 android:protectionLevel="signature|privileged"/> 1065 1066 1067 1068 <!-- ====================================================================== --> 1069 <!-- Permissions for accessing the device camera --> 1070 <!-- ====================================================================== --> 1071 <eat-comment /> 1072 1073 <!-- Used for permissions that are associated with accessing 1074 camera or capturing images/video from the device. --> 1075 <permission-group android:name="android.permission-group.CAMERA" 1076 android:icon="@drawable/perm_group_camera" 1077 android:label="@string/permgrouplab_camera" 1078 android:description="@string/permgroupdesc_camera" 1079 android:request="@string/permgrouprequest_camera" 1080 android:priority="700" /> 1081 1082 <!-- Required to be able to access the camera device. 1083 <p>This will automatically enforce the <a 1084 href="{@docRoot}guide/topics/manifest/uses-feature-element.html"> 1085 <uses-feature>}</a> manifest element for <em>all</em> camera features. 1086 If you do not require all camera features or can properly operate if a camera 1087 is not available, then you must modify your manifest as appropriate in order to 1088 install on devices that don't support all camera features.</p> 1089 <p>Protection level: dangerous 1090 --> 1091 <permission android:name="android.permission.CAMERA" 1092 android:permissionGroup="android.permission-group.CAMERA" 1093 android:label="@string/permlab_camera" 1094 android:description="@string/permdesc_camera" 1095 android:protectionLevel="dangerous|instant" /> 1096 1097 1098 <!-- ====================================================================== --> 1099 <!-- Permissions for accessing the device sensors --> 1100 <!-- ====================================================================== --> 1101 <eat-comment /> 1102 1103 <!-- Used for permissions that are associated with accessing 1104 body or environmental sensors. --> 1105 <permission-group android:name="android.permission-group.SENSORS" 1106 android:icon="@drawable/perm_group_sensors" 1107 android:label="@string/permgrouplab_sensors" 1108 android:description="@string/permgroupdesc_sensors" 1109 android:request="@string/permgrouprequest_sensors" 1110 android:priority="800" /> 1111 1112 <!-- Allows an application to access data from sensors that the user uses to 1113 measure what is happening inside his/her body, such as heart rate. 1114 <p>Protection level: dangerous --> 1115 <permission android:name="android.permission.BODY_SENSORS" 1116 android:permissionGroup="android.permission-group.SENSORS" 1117 android:label="@string/permlab_bodySensors" 1118 android:description="@string/permdesc_bodySensors" 1119 android:protectionLevel="dangerous" /> 1120 1121 <!-- Allows an app to use fingerprint hardware. 1122 <p>Protection level: normal 1123 @deprecated Applications should request {@link 1124 android.Manifest.permission#USE_BIOMETRIC} instead 1125 --> 1126 <permission android:name="android.permission.USE_FINGERPRINT" 1127 android:permissionGroup="android.permission-group.SENSORS" 1128 android:label="@string/permlab_useFingerprint" 1129 android:description="@string/permdesc_useFingerprint" 1130 android:protectionLevel="normal" /> 1131 1132 <!-- Allows an app to use device supported biometric modalities. 1133 <p>Protection level: normal 1134 --> 1135 <permission android:name="android.permission.USE_BIOMETRIC" 1136 android:permissionGroup="android.permission-group.SENSORS" 1137 android:label="@string/permlab_useBiometric" 1138 android:description="@string/permdesc_useBiometric" 1139 android:protectionLevel="normal" /> 1140 1141 <!-- ====================================================================== --> 1142 <!-- REMOVED PERMISSIONS --> 1143 <!-- ====================================================================== --> 1144 1145 <!-- @hide We need to keep this around for backwards compatibility --> 1146 <permission android:name="android.permission.READ_PROFILE" 1147 android:protectionLevel="normal" 1148 android:permissionFlags="removed"/> 1149 1150 <!-- @hide We need to keep this around for backwards compatibility --> 1151 <permission android:name="android.permission.WRITE_PROFILE" 1152 android:protectionLevel="normal" 1153 android:permissionFlags="removed"/> 1154 1155 <!-- @hide We need to keep this around for backwards compatibility --> 1156 <permission android:name="android.permission.READ_SOCIAL_STREAM" 1157 android:protectionLevel="normal" 1158 android:permissionFlags="removed"/> 1159 1160 <!-- @hide We need to keep this around for backwards compatibility --> 1161 <permission android:name="android.permission.WRITE_SOCIAL_STREAM" 1162 android:protectionLevel="normal" 1163 android:permissionFlags="removed"/> 1164 1165 <!-- @hide We need to keep this around for backwards compatibility --> 1166 <permission android:name="android.permission.READ_USER_DICTIONARY" 1167 android:protectionLevel="normal" 1168 android:permissionFlags="removed"/> 1169 1170 <!-- @hide We need to keep this around for backwards compatibility --> 1171 <permission android:name="android.permission.WRITE_USER_DICTIONARY" 1172 android:protectionLevel="normal" 1173 android:permissionFlags="removed"/> 1174 1175 <!-- @hide We need to keep this around for backwards compatibility --> 1176 <permission android:name="android.permission.WRITE_SMS" 1177 android:protectionLevel="normal" 1178 android:permissionFlags="removed"/> 1179 1180 <!-- @hide We need to keep this around for backwards compatibility --> 1181 <permission android:name="com.android.browser.permission.READ_HISTORY_BOOKMARKS" 1182 android:protectionLevel="normal" 1183 android:permissionFlags="removed"/> 1184 1185 <!-- @hide We need to keep this around for backwards compatibility --> 1186 <permission android:name="com.android.browser.permission.WRITE_HISTORY_BOOKMARKS" 1187 android:protectionLevel="normal" 1188 android:permissionFlags="removed"/> 1189 1190 <!-- @hide We need to keep this around for backwards compatibility --> 1191 <permission android:name="android.permission.AUTHENTICATE_ACCOUNTS" 1192 android:protectionLevel="normal" 1193 android:permissionFlags="removed"/> 1194 1195 <!-- @hide We need to keep this around for backwards compatibility --> 1196 <permission android:name="android.permission.MANAGE_ACCOUNTS" 1197 android:protectionLevel="normal" 1198 android:permissionFlags="removed"/> 1199 1200 <!-- @hide We need to keep this around for backwards compatibility --> 1201 <permission android:name="android.permission.USE_CREDENTIALS" 1202 android:protectionLevel="normal" 1203 android:permissionFlags="removed"/> 1204 1205 <!-- @hide We need to keep this around for backwards compatibility --> 1206 <permission android:name="android.permission.SUBSCRIBED_FEEDS_READ" 1207 android:protectionLevel="normal" 1208 android:permissionFlags="removed"/> 1209 1210 <!-- @hide We need to keep this around for backwards compatibility --> 1211 <permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE" 1212 android:protectionLevel="normal" 1213 android:permissionFlags="removed"/> 1214 1215 <!-- @hide We need to keep this around for backwards compatibility --> 1216 <permission android:name="android.permission.FLASHLIGHT" 1217 android:protectionLevel="normal" 1218 android:permissionFlags="removed"/> 1219 1220 <!-- ====================================================================== --> 1221 <!-- INSTALL PERMISSIONS --> 1222 <!-- ====================================================================== --> 1223 1224 <!-- ================================== --> 1225 <!-- Permissions for accessing messages --> 1226 <!-- ================================== --> 1227 <eat-comment /> 1228 1229 <!-- @SystemApi Allows an application (Phone) to send a request to other applications 1230 to handle the respond-via-message action during incoming calls. 1231 <p>Not for use by third-party applications. --> 1232 <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE" 1233 android:protectionLevel="signature|privileged" /> 1234 1235 <!-- @SystemApi Allows an application to send SMS to premium shortcodes without user permission. 1236 <p>Not for use by third-party applications. 1237 @hide --> 1238 <permission android:name="android.permission.SEND_SMS_NO_CONFIRMATION" 1239 android:protectionLevel="signature|privileged" /> 1240 1241 <!-- Allows an application to filter carrier specific sms. 1242 @hide --> 1243 <permission android:name="android.permission.CARRIER_FILTER_SMS" 1244 android:protectionLevel="signature|privileged" /> 1245 1246 <!-- @SystemApi Allows an application to receive emergency cell broadcast messages, 1247 to record or display them to the user. 1248 <p>Not for use by third-party applications. 1249 @hide --> 1250 <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST" 1251 android:protectionLevel="signature|privileged" /> 1252 1253 <!-- Allows an application to monitor incoming Bluetooth MAP messages, to record 1254 or perform processing on them. --> 1255 <!-- @hide --> 1256 <permission android:name="android.permission.RECEIVE_BLUETOOTH_MAP" 1257 android:protectionLevel="signature|privileged" /> 1258 1259 <!-- @SystemApi @hide Allows an application to execute contacts directory search. 1260 This should only be used by ContactsProvider. 1261 <p>Not for use by third-party applications. --> 1262 <permission android:name="android.permission.BIND_DIRECTORY_SEARCH" 1263 android:protectionLevel="signature|privileged" /> 1264 1265 <!-- @SystemApi @hide Allows an application to modify cell broadcasts through the content provider. 1266 <p>Not for use by third-party applications. --> 1267 <permission android:name="android.permission.MODIFY_CELL_BROADCASTS" 1268 android:protectionLevel="signature|privileged" /> 1269 1270 <!-- =============================================================== --> 1271 <!-- Permissions for setting the device alarm --> 1272 <!-- =============================================================== --> 1273 <eat-comment /> 1274 1275 <!-- Allows an application to broadcast an Intent to set an alarm for the user. 1276 <p>Protection level: normal 1277 --> 1278 <permission android:name="com.android.alarm.permission.SET_ALARM" 1279 android:label="@string/permlab_setAlarm" 1280 android:description="@string/permdesc_setAlarm" 1281 android:protectionLevel="normal" /> 1282 1283 <!-- =============================================================== --> 1284 <!-- Permissions for accessing the user voicemail --> 1285 <!-- =============================================================== --> 1286 <eat-comment /> 1287 1288 <!-- Allows an application to modify and remove existing voicemails in the system. 1289 <p>Protection level: signature|privileged 1290 --> 1291 <permission android:name="com.android.voicemail.permission.WRITE_VOICEMAIL" 1292 android:protectionLevel="signature|privileged" /> 1293 1294 <!-- Allows an application to read voicemails in the system. 1295 <p>Protection level: signature|privileged 1296 --> 1297 <permission android:name="com.android.voicemail.permission.READ_VOICEMAIL" 1298 android:protectionLevel="signature|privileged" /> 1299 1300 <!-- ======================================= --> 1301 <!-- Permissions for accessing location info --> 1302 <!-- ======================================= --> 1303 <eat-comment /> 1304 1305 <!-- Allows an application to access extra location provider commands. 1306 <p>Protection level: normal 1307 --> 1308 <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS" 1309 android:label="@string/permlab_accessLocationExtraCommands" 1310 android:description="@string/permdesc_accessLocationExtraCommands" 1311 android:protectionLevel="normal" /> 1312 1313 <!-- @SystemApi Allows an application to install a location provider into the Location Manager. 1314 <p>Not for use by third-party applications. --> 1315 <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER" 1316 android:protectionLevel="signature|privileged" /> 1317 1318 <!-- @SystemApi @hide Allows HDMI-CEC service to access device and configuration files. 1319 This should only be used by HDMI-CEC service. 1320 --> 1321 <permission android:name="android.permission.HDMI_CEC" 1322 android:protectionLevel="signature|privileged" /> 1323 1324 <!-- @SystemApi Allows an application to use location features in hardware, 1325 such as the geofencing api. 1326 <p>Not for use by third-party applications. --> 1327 <permission android:name="android.permission.LOCATION_HARDWARE" 1328 android:protectionLevel="signature|privileged" /> 1329 <uses-permission android:name="android.permission.LOCATION_HARDWARE"/> 1330 1331 <!-- @SystemApi Allows an application to create mock location providers for testing. 1332 <p>Protection level: signature 1333 @hide 1334 --> 1335 <permission android:name="android.permission.ACCESS_MOCK_LOCATION" 1336 android:protectionLevel="signature" /> 1337 1338 <!-- ======================================= --> 1339 <!-- Permissions for accessing networks --> 1340 <!-- ======================================= --> 1341 <eat-comment /> 1342 1343 <!-- Allows applications to open network sockets. 1344 <p>Protection level: normal 1345 --> 1346 <permission android:name="android.permission.INTERNET" 1347 android:description="@string/permdesc_createNetworkSockets" 1348 android:label="@string/permlab_createNetworkSockets" 1349 android:protectionLevel="normal|instant" /> 1350 1351 <!-- Allows applications to access information about networks. 1352 <p>Protection level: normal 1353 --> 1354 <permission android:name="android.permission.ACCESS_NETWORK_STATE" 1355 android:description="@string/permdesc_accessNetworkState" 1356 android:label="@string/permlab_accessNetworkState" 1357 android:protectionLevel="normal|instant" /> 1358 1359 <!-- Allows applications to access information about Wi-Fi networks. 1360 <p>Protection level: normal 1361 --> 1362 <permission android:name="android.permission.ACCESS_WIFI_STATE" 1363 android:description="@string/permdesc_accessWifiState" 1364 android:label="@string/permlab_accessWifiState" 1365 android:protectionLevel="normal" /> 1366 1367 <!-- Allows applications to change Wi-Fi connectivity state. 1368 <p>Protection level: normal 1369 --> 1370 <permission android:name="android.permission.CHANGE_WIFI_STATE" 1371 android:description="@string/permdesc_changeWifiState" 1372 android:label="@string/permlab_changeWifiState" 1373 android:protectionLevel="normal" /> 1374 1375 <!-- @SystemApi @hide Allows apps to create and manage IPsec tunnels. 1376 <p>Only granted to applications that are currently bound by the 1377 system for creating and managing IPsec-based interfaces. 1378 --> 1379 <permission android:name="android.permission.MANAGE_IPSEC_TUNNELS" 1380 android:protectionLevel="signature|appop" /> 1381 1382 <!-- @SystemApi @hide Allows applications to read Wi-Fi credential. 1383 <p>Not for use by third-party applications. --> 1384 <permission android:name="android.permission.READ_WIFI_CREDENTIAL" 1385 android:protectionLevel="signature|privileged" /> 1386 1387 <!-- @SystemApi @hide Allows applications to change tether state and run 1388 tether carrier provisioning. 1389 <p>Not for use by third-party applications. --> 1390 <permission android:name="android.permission.TETHER_PRIVILEGED" 1391 android:protectionLevel="signature|privileged" /> 1392 1393 <!-- @SystemApi @hide Allow system apps to receive broadcast 1394 when a wifi network credential is changed. 1395 <p>Not for use by third-party applications. --> 1396 <permission android:name="android.permission.RECEIVE_WIFI_CREDENTIAL_CHANGE" 1397 android:protectionLevel="signature|privileged" /> 1398 1399 <!-- @SystemApi @hide Allows an application to modify any wifi configuration, even if created 1400 by another application. Once reconfigured the original creator cannot make any further 1401 modifications. 1402 <p>Not for use by third-party applications. --> 1403 <permission android:name="android.permission.OVERRIDE_WIFI_CONFIG" 1404 android:protectionLevel="signature|privileged" /> 1405 1406 <!-- @hide --> 1407 <permission android:name="android.permission.ACCESS_WIMAX_STATE" 1408 android:description="@string/permdesc_accessWimaxState" 1409 android:label="@string/permlab_accessWimaxState" 1410 android:protectionLevel="normal" /> 1411 1412 <!-- @hide --> 1413 <permission android:name="android.permission.CHANGE_WIMAX_STATE" 1414 android:description="@string/permdesc_changeWimaxState" 1415 android:label="@string/permlab_changeWimaxState" 1416 android:protectionLevel="normal" /> 1417 1418 <!-- Allows applications to act as network scorers. @hide @SystemApi--> 1419 <permission android:name="android.permission.SCORE_NETWORKS" 1420 android:protectionLevel="signature|privileged" /> 1421 1422 <!-- Allows applications to request network 1423 recommendations and scores from the NetworkScoreService. 1424 <p>Not for use by third-party applications. @hide --> 1425 <permission android:name="android.permission.REQUEST_NETWORK_SCORES" 1426 android:protectionLevel="signature|setup" /> 1427 1428 <!-- Allows network stack services (Connectivity and Wifi) to coordinate 1429 <p>Not for use by third-party or privileged applications. 1430 @hide This should only be used by Connectivity and Wifi Services. 1431 --> 1432 <permission android:name="android.permission.NETWORK_STACK" 1433 android:protectionLevel="signature" /> 1434 1435 <!-- Allows Settings and SystemUI to call methods in Networking services 1436 <p>Not for use by third-party or privileged applications. 1437 @hide This should only be used by Settings and SystemUI. 1438 --> 1439 <permission android:name="android.permission.NETWORK_SETTINGS" 1440 android:protectionLevel="signature" /> 1441 1442 <!-- Allows SetupWizard to call methods in Networking services 1443 <p>Not for use by any other third-party or privileged applications. 1444 @hide This should only be used by SetupWizard. 1445 --> 1446 <permission android:name="android.permission.NETWORK_SETUP_WIZARD" 1447 android:protectionLevel="signature|setup" /> 1448 1449 <!-- #SystemApi @hide Allows applications to access information about LoWPAN interfaces. 1450 <p>Not for use by third-party applications. --> 1451 <permission android:name="android.permission.ACCESS_LOWPAN_STATE" 1452 android:protectionLevel="signature|privileged" /> 1453 1454 <!-- #SystemApi @hide Allows applications to change LoWPAN connectivity state. 1455 <p>Not for use by third-party applications. --> 1456 <permission android:name="android.permission.CHANGE_LOWPAN_STATE" 1457 android:protectionLevel="signature|privileged" /> 1458 1459 <!-- #SystemApi @hide Allows applications to read LoWPAN credential. 1460 <p>Not for use by third-party applications. --> 1461 <permission android:name="android.permission.READ_LOWPAN_CREDENTIAL" 1462 android:protectionLevel="signature|privileged" /> 1463 1464 <!-- #SystemApi @hide Allows a service to register or unregister 1465 new LoWPAN interfaces. 1466 <p>Not for use by third-party applications. --> 1467 <permission android:name="android.permission.MANAGE_LOWPAN_INTERFACES" 1468 android:protectionLevel="signature|privileged" /> 1469 1470 <!-- @hide Allows internal management of Wi-Fi connectivity state when on 1471 permission review mode. 1472 <p>Not for use by third-party applications. --> 1473 <permission android:name="android.permission.MANAGE_WIFI_WHEN_PERMISSION_REVIEW_REQUIRED" 1474 android:protectionLevel="signature" /> 1475 1476 <!-- #SystemApi @hide Allows an app to bypass Private DNS. 1477 <p>Not for use by third-party applications. 1478 TODO: publish as system API in next API release. --> 1479 <permission android:name="android.permission.NETWORK_BYPASS_PRIVATE_DNS" 1480 android:protectionLevel="signature" /> 1481 1482 <!-- ======================================= --> 1483 <!-- Permissions for short range, peripheral networks --> 1484 <!-- ======================================= --> 1485 <eat-comment /> 1486 1487 <!-- Allows applications to connect to paired bluetooth devices. 1488 <p>Protection level: normal 1489 --> 1490 <permission android:name="android.permission.BLUETOOTH" 1491 android:description="@string/permdesc_bluetooth" 1492 android:label="@string/permlab_bluetooth" 1493 android:protectionLevel="normal" /> 1494 1495 <!-- @SystemApi Allows an application to suspend other apps, which will prevent the user 1496 from using them until they are unsuspended. 1497 @hide 1498 --> 1499 <permission android:name="android.permission.SUSPEND_APPS" 1500 android:protectionLevel="signature|privileged" /> 1501 1502 <!-- Allows applications to discover and pair bluetooth devices. 1503 <p>Protection level: normal 1504 --> 1505 <permission android:name="android.permission.BLUETOOTH_ADMIN" 1506 android:description="@string/permdesc_bluetoothAdmin" 1507 android:label="@string/permlab_bluetoothAdmin" 1508 android:protectionLevel="normal" /> 1509 1510 <!-- @SystemApi Allows applications to pair bluetooth devices without user interaction, and to 1511 allow or disallow phonebook access or message access. 1512 This is not available to third party applications. --> 1513 <permission android:name="android.permission.BLUETOOTH_PRIVILEGED" 1514 android:protectionLevel="signature|privileged" /> 1515 1516 <!-- Control access to email providers exclusively for Bluetooth 1517 @hide 1518 --> 1519 <permission android:name="android.permission.BLUETOOTH_MAP" 1520 android:protectionLevel="signature" /> 1521 1522 <!-- Allows bluetooth stack to access files 1523 @hide This should only be used by Bluetooth apk. 1524 --> 1525 <permission android:name="android.permission.BLUETOOTH_STACK" 1526 android:protectionLevel="signature" /> 1527 1528 <!-- Allows applications to perform I/O operations over NFC. 1529 <p>Protection level: normal 1530 --> 1531 <permission android:name="android.permission.NFC" 1532 android:description="@string/permdesc_nfc" 1533 android:label="@string/permlab_nfc" 1534 android:protectionLevel="normal" /> 1535 1536 <!-- Allows applications to receive NFC transaction events. 1537 <p>Protection level: normal 1538 --> 1539 <permission android:name="android.permission.NFC_TRANSACTION_EVENT" 1540 android:protectionLevel="normal" /> 1541 1542 <!-- @SystemApi Allows an internal user to use privileged ConnectivityManager APIs. 1543 @hide --> 1544 <permission android:name="android.permission.CONNECTIVITY_INTERNAL" 1545 android:protectionLevel="signature|privileged" /> 1546 1547 <!-- @SystemApi Allows an internal user to use restricted Networks. 1548 @hide --> 1549 <permission android:name="android.permission.CONNECTIVITY_USE_RESTRICTED_NETWORKS" 1550 android:protectionLevel="signature|privileged" /> 1551 1552 <!-- Allows a system application to access hardware packet offload capabilities. 1553 @hide --> 1554 <permission android:name="android.permission.PACKET_KEEPALIVE_OFFLOAD" 1555 android:protectionLevel="signature|privileged" /> 1556 1557 <!-- @SystemApi 1558 @hide --> 1559 <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE" 1560 android:protectionLevel="signature|privileged" /> 1561 1562 <!-- @SystemApi Allows access to the loop radio (Android@Home mesh network) device. 1563 @hide --> 1564 <permission android:name="android.permission.LOOP_RADIO" 1565 android:protectionLevel="signature|privileged" /> 1566 1567 <!-- Allows sending and receiving handover transfer status from Wifi and Bluetooth 1568 @hide --> 1569 <permission android:name="android.permission.NFC_HANDOVER_STATUS" 1570 android:protectionLevel="signature|privileged" /> 1571 1572 <!-- @hide Allows internal management of Bluetooth state when on permission review mode. 1573 <p>Not for use by third-party applications. --> 1574 <permission android:name="android.permission.MANAGE_BLUETOOTH_WHEN_PERMISSION_REVIEW_REQUIRED" 1575 android:protectionLevel="signature" /> 1576 1577 <!-- ================================== --> 1578 <!-- Permissions for accessing accounts --> 1579 <!-- ================================== --> 1580 <eat-comment /> 1581 1582 <!-- Allows access to the list of accounts in the Accounts Service. 1583 1584 <p class="note"><strong>Note:</strong> Beginning with Android 6.0 (API level 1585 23), if an app shares the signature of the authenticator that manages an 1586 account, it does not need <code>"GET_ACCOUNTS"</code> permission to read 1587 information about that account. On Android 5.1 and lower, all apps need 1588 <code>"GET_ACCOUNTS"</code> permission to read information about any 1589 account.</p> 1590 1591 <p>Protection level: dangerous 1592 --> 1593 <permission android:name="android.permission.GET_ACCOUNTS" 1594 android:permissionGroup="android.permission-group.CONTACTS" 1595 android:protectionLevel="dangerous" 1596 android:description="@string/permdesc_getAccounts" 1597 android:label="@string/permlab_getAccounts" /> 1598 <uses-permission android:name="android.permission.GET_ACCOUNTS"/> 1599 1600 <!-- @SystemApi Allows applications to call into AccountAuthenticators. 1601 <p>Not for use by third-party applications. --> 1602 <permission android:name="android.permission.ACCOUNT_MANAGER" 1603 android:protectionLevel="signature" /> 1604 1605 <!-- ================================== --> 1606 <!-- Permissions for accessing hardware that may effect battery life--> 1607 <!-- ================================== --> 1608 <eat-comment /> 1609 1610 <!-- Allows applications to enter Wi-Fi Multicast mode. 1611 <p>Protection level: normal 1612 --> 1613 <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE" 1614 android:description="@string/permdesc_changeWifiMulticastState" 1615 android:label="@string/permlab_changeWifiMulticastState" 1616 android:protectionLevel="normal" /> 1617 1618 <!-- Allows access to the vibrator. 1619 <p>Protection level: normal 1620 --> 1621 <permission android:name="android.permission.VIBRATE" 1622 android:label="@string/permlab_vibrate" 1623 android:description="@string/permdesc_vibrate" 1624 android:protectionLevel="normal|instant" /> 1625 1626 <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen 1627 from dimming. 1628 <p>Protection level: normal 1629 --> 1630 <permission android:name="android.permission.WAKE_LOCK" 1631 android:label="@string/permlab_wakeLock" 1632 android:description="@string/permdesc_wakeLock" 1633 android:protectionLevel="normal|instant" /> 1634 1635 <!-- Allows using the device's IR transmitter, if available. 1636 <p>Protection level: normal 1637 --> 1638 <permission android:name="android.permission.TRANSMIT_IR" 1639 android:label="@string/permlab_transmitIr" 1640 android:description="@string/permdesc_transmitIr" 1641 android:protectionLevel="normal" /> 1642 1643 <!-- ==================================================== --> 1644 <!-- Permissions related to changing audio settings --> 1645 <!-- ==================================================== --> 1646 <eat-comment /> 1647 1648 <!-- Allows an application to modify global audio settings. 1649 <p>Protection level: normal 1650 --> 1651 <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS" 1652 android:label="@string/permlab_modifyAudioSettings" 1653 android:description="@string/permdesc_modifyAudioSettings" 1654 android:protectionLevel="normal" /> 1655 1656 <!-- ================================== --> 1657 <!-- Permissions for accessing hardware --> 1658 <!-- ================================== --> 1659 <eat-comment /> 1660 1661 <!-- @SystemApi Allows an application to manage preferences and permissions for USB devices 1662 @hide --> 1663 <permission android:name="android.permission.MANAGE_USB" 1664 android:protectionLevel="signature|privileged" /> 1665 1666 <!-- @SystemApi Allows an application to access the MTP USB kernel driver. 1667 For use only by the device side MTP implementation. 1668 @hide --> 1669 <permission android:name="android.permission.ACCESS_MTP" 1670 android:protectionLevel="signature|privileged" /> 1671 1672 <!-- @SystemApi Allows access to hardware peripherals. Intended only for hardware testing. 1673 <p>Not for use by third-party applications. 1674 @hide 1675 --> 1676 <permission android:name="android.permission.HARDWARE_TEST" 1677 android:protectionLevel="signature" /> 1678 1679 <!-- @SystemApi Allows access to Broadcast Radio 1680 @hide This is not a third-party API (intended for system apps).--> 1681 <permission android:name="android.permission.ACCESS_BROADCAST_RADIO" 1682 android:protectionLevel="signature|privileged" /> 1683 1684 <!-- @deprecated @SystemApi Allows access to FM 1685 @hide This is not a third-party API (intended for system apps).--> 1686 <permission android:name="android.permission.ACCESS_FM_RADIO" 1687 android:protectionLevel="signature|privileged" /> 1688 1689 <!-- Allows access to configure network interfaces, configure/use IPSec, etc. 1690 @hide --> 1691 <permission android:name="android.permission.NET_ADMIN" 1692 android:protectionLevel="signature" /> 1693 1694 <!-- Allows registration for remote audio playback. @hide --> 1695 <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK" 1696 android:protectionLevel="signature" /> 1697 1698 <!-- @SystemApi Allows TvInputService to access underlying TV input hardware such as 1699 built-in tuners and HDMI-in's. 1700 @hide This should only be used by OEM's TvInputService's. 1701 --> 1702 <permission android:name="android.permission.TV_INPUT_HARDWARE" 1703 android:protectionLevel="signature|privileged" /> 1704 1705 <!-- @SystemApi Allows to capture a frame of TV input hardware such as 1706 built-in tuners and HDMI-in's. 1707 @hide <p>Not for use by third-party applications. 1708 --> 1709 <permission android:name="android.permission.CAPTURE_TV_INPUT" 1710 android:protectionLevel="signature|privileged" /> 1711 1712 <!-- @hide Allows TvInputService to access DVB device. 1713 <p>Not for use by third-party applications. --> 1714 <permission android:name="android.permission.DVB_DEVICE" 1715 android:protectionLevel="signature|privileged" /> 1716 1717 <!-- @SystemApi Allows reading and enabling/disabling the OEM unlock allowed by carrier state 1718 @hide <p>Not for use by third-party applications. --> 1719 <permission android:name="android.permission.MANAGE_CARRIER_OEM_UNLOCK_STATE" 1720 android:protectionLevel="signature|privileged" /> 1721 1722 <!-- @SystemApi Allows reading and enabling/disabling the OEM unlock allowed by user state 1723 @hide <p>Not for use by third-party applications. --> 1724 <permission android:name="android.permission.MANAGE_USER_OEM_UNLOCK_STATE" 1725 android:protectionLevel="signature|privileged" /> 1726 1727 <!-- @SystemApi Allows reading the OEM unlock state 1728 @hide <p>Not for use by third-party applications. --> 1729 <permission android:name="android.permission.READ_OEM_UNLOCK_STATE" 1730 android:protectionLevel="signature|privileged" /> 1731 1732 <!-- @hide Allows enabling/disabling OEM unlock 1733 <p>Not for use by third-party applications. --> 1734 <permission android:name="android.permission.OEM_UNLOCK_STATE" 1735 android:protectionLevel="signature" /> 1736 1737 <!-- @hide Allows querying state of PersistentDataBlock 1738 <p>Not for use by third-party applications. --> 1739 <permission android:name="android.permission.ACCESS_PDB_STATE" 1740 android:protectionLevel="signature" /> 1741 1742 <!-- Allows testing if a passwords is forbidden by the admins. 1743 @hide <p>Not for use by third-party applications. --> 1744 <permission android:name="android.permission.TEST_BLACKLISTED_PASSWORD" 1745 android:protectionLevel="signature" /> 1746 1747 <!-- @hide Allows system update service to notify device owner about pending updates. 1748 <p>Not for use by third-party applications. --> 1749 <permission android:name="android.permission.NOTIFY_PENDING_SYSTEM_UPDATE" 1750 android:protectionLevel="signature|privileged" /> 1751 1752 <!-- =========================================== --> 1753 <!-- Permissions associated with camera and image capture --> 1754 <!-- =========================================== --> 1755 <eat-comment /> 1756 1757 <!-- @SystemApi Allows disabling the transmit-indicator LED that is normally on when 1758 a camera is in use by an application. 1759 @hide --> 1760 <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED" 1761 android:protectionLevel="signature|privileged" /> 1762 1763 <!-- Allows sending the camera service notifications about system-wide events. 1764 @hide --> 1765 <permission android:name="android.permission.CAMERA_SEND_SYSTEM_EVENTS" 1766 android:protectionLevel="signature|privileged" /> 1767 1768 <!-- =========================================== --> 1769 <!-- Permissions associated with telephony state --> 1770 <!-- =========================================== --> 1771 <eat-comment /> 1772 1773 <!-- @SystemApi Allows modification of the telephony state - power on, mmi, etc. 1774 Does not include placing calls. 1775 <p>Not for use by third-party applications. --> 1776 <permission android:name="android.permission.MODIFY_PHONE_STATE" 1777 android:protectionLevel="signature|privileged" /> 1778 1779 <!-- Allows read only access to precise phone state. 1780 @hide Pending API council approval --> 1781 <permission android:name="android.permission.READ_PRECISE_PHONE_STATE" 1782 android:protectionLevel="signature|privileged" /> 1783 1784 <!-- @SystemApi Allows read access to privileged phone state. 1785 @hide Used internally. --> 1786 <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE" 1787 android:protectionLevel="signature|privileged" /> 1788 1789 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1790 PhoneAccount#CAPABILITY_SIM_SUBSCRIPTION. This capability indicates that the PhoneAccount 1791 corresponds to a device SIM. 1792 @hide --> 1793 <permission android:name="android.permission.REGISTER_SIM_SUBSCRIPTION" 1794 android:protectionLevel="signature|privileged" /> 1795 1796 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1797 PhoneAccount#CAPABILITY_CALL_PROVIDER. 1798 @hide --> 1799 <permission android:name="android.permission.REGISTER_CALL_PROVIDER" 1800 android:protectionLevel="signature|privileged" /> 1801 1802 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1803 PhoneAccount#CAPABILITY_CONNECTION_MANAGER 1804 @hide --> 1805 <permission android:name="android.permission.REGISTER_CONNECTION_MANAGER" 1806 android:protectionLevel="signature|privileged" /> 1807 1808 <!-- Must be required by a {@link android.telecom.InCallService}, 1809 to ensure that only the system can bind to it. 1810 <p>Protection level: signature|privileged 1811 --> 1812 <permission android:name="android.permission.BIND_INCALL_SERVICE" 1813 android:protectionLevel="signature|privileged" /> 1814 1815 <!-- Must be required by a link {@link android.telephony.VisualVoicemailService} to ensure that 1816 only the system can bind to it. 1817 <p>Protection level: signature|privileged 1818 --> 1819 <permission 1820 android:name="android.permission.BIND_VISUAL_VOICEMAIL_SERVICE" 1821 android:protectionLevel="signature|privileged"/> 1822 1823 <!-- Must be required by a {@link android.telecom.CallScreeningService}, 1824 to ensure that only the system can bind to it. 1825 <p>Protection level: signature|privileged 1826 --> 1827 <permission android:name="android.permission.BIND_SCREENING_SERVICE" 1828 android:protectionLevel="signature|privileged" /> 1829 1830 <!-- Must be required by a {@link android.telecom.ConnectionService}, 1831 to ensure that only the system can bind to it. 1832 @deprecated {@link android.telecom.ConnectionService}s should require 1833 android.permission.BIND_TELECOM_CONNECTION_SERVICE instead. 1834 @SystemApi 1835 @hide --> 1836 <permission android:name="android.permission.BIND_CONNECTION_SERVICE" 1837 android:protectionLevel="signature|privileged" /> 1838 1839 <!-- Must be required by a {@link android.telecom.ConnectionService}, 1840 to ensure that only the system can bind to it. 1841 <p>Protection level: signature|privileged 1842 --> 1843 <permission android:name="android.permission.BIND_TELECOM_CONNECTION_SERVICE" 1844 android:protectionLevel="signature|privileged" /> 1845 1846 <!-- @SystemApi Allows an application to control the in-call experience. 1847 @hide --> 1848 <permission android:name="android.permission.CONTROL_INCALL_EXPERIENCE" 1849 android:protectionLevel="signature|privileged" /> 1850 1851 <!-- Allows an application to receive STK related commands. 1852 @hide --> 1853 <permission android:name="android.permission.RECEIVE_STK_COMMANDS" 1854 android:protectionLevel="signature|privileged" /> 1855 1856 <!-- Allows an application to send EMBMS download intents to apps 1857 @hide --> 1858 <permission android:name="android.permission.SEND_EMBMS_INTENTS" 1859 android:protectionLevel="signature|privileged" /> 1860 1861 1862 <!-- Allows internal management of the sensor framework 1863 @hide --> 1864 <permission android:name="android.permission.MANAGE_SENSORS" 1865 android:protectionLevel="signature" /> 1866 1867 <!-- Must be required by an ImsService to ensure that only the 1868 system can bind to it. 1869 <p>Protection level: signature|privileged|vendorPrivileged 1870 @SystemApi 1871 @hide 1872 --> 1873 <permission android:name="android.permission.BIND_IMS_SERVICE" 1874 android:protectionLevel="signature|privileged|vendorPrivileged" /> 1875 1876 <!-- Must be required by a telephony data service to ensure that only the 1877 system can bind to it. 1878 <p>Protection level: signature 1879 @SystemApi 1880 @hide 1881 --> 1882 <permission android:name="android.permission.BIND_TELEPHONY_DATA_SERVICE" 1883 android:protectionLevel="signature" /> 1884 1885 <!-- Must be required by a NetworkService to ensure that only the 1886 system can bind to it. 1887 <p>Protection level: signature 1888 @SystemApi 1889 @hide 1890 --> 1891 <permission android:name="android.permission.BIND_TELEPHONY_NETWORK_SERVICE" 1892 android:protectionLevel="signature" /> 1893 1894 <!-- @SystemApi Allows an application to manage embedded subscriptions (those on a eUICC) 1895 through EuiccManager APIs. 1896 <p>Protection level: signature|privileged|development 1897 @hide 1898 --> 1899 <permission android:name="android.permission.WRITE_EMBEDDED_SUBSCRIPTIONS" 1900 android:protectionLevel="signature|privileged|development" /> 1901 1902 <!-- @SystemApi Must be required by an EuiccService to ensure that only the system can bind to 1903 it. 1904 <p>Protection level: signature 1905 @hide 1906 --> 1907 <permission android:name="android.permission.BIND_EUICC_SERVICE" 1908 android:protectionLevel="signature" /> 1909 1910 <!-- ================================== --> 1911 <!-- Permissions for sdcard interaction --> 1912 <!-- ================================== --> 1913 <eat-comment /> 1914 1915 <!-- @SystemApi Allows an application to write to internal media storage 1916 @hide --> 1917 <permission android:name="android.permission.WRITE_MEDIA_STORAGE" 1918 android:protectionLevel="signature|privileged" /> 1919 1920 <!-- Allows an application to manage access to documents, usually as part 1921 of a document picker. 1922 <p>This permission should <em>only</em> be requested by the platform 1923 document management app. This permission cannot be granted to 1924 third-party apps. 1925 <p>Protection level: signature 1926 --> 1927 <permission android:name="android.permission.MANAGE_DOCUMENTS" 1928 android:protectionLevel="signature" /> 1929 1930 <!-- @hide Allows an application to cache content. 1931 <p>Not for use by third-party applications. 1932 <p>Protection level: signature 1933 --> 1934 <permission android:name="android.permission.CACHE_CONTENT" 1935 android:protectionLevel="signature" /> 1936 1937 <!-- @SystemApi @hide 1938 Allows an application to aggressively allocate disk space. 1939 <p>Not for use by third-party applications. 1940 --> 1941 <permission android:name="android.permission.ALLOCATE_AGGRESSIVE" 1942 android:protectionLevel="signature|privileged" /> 1943 1944 <!-- @SystemApi @hide 1945 Allows an application to use reserved disk space. 1946 <p>Not for use by third-party applications. Should only be requested by 1947 apps that provide core system functionality, to ensure system stability 1948 when disk is otherwise completely full. 1949 --> 1950 <permission android:name="android.permission.USE_RESERVED_DISK" 1951 android:protectionLevel="signature|privileged" /> 1952 1953 <!-- ================================== --> 1954 <!-- Permissions for screenlock --> 1955 <!-- ================================== --> 1956 <eat-comment /> 1957 1958 <!-- Allows applications to disable the keyguard if it is not secure. 1959 <p>Protection level: normal 1960 --> 1961 <permission android:name="android.permission.DISABLE_KEYGUARD" 1962 android:description="@string/permdesc_disableKeyguard" 1963 android:label="@string/permlab_disableKeyguard" 1964 android:protectionLevel="normal" /> 1965 1966 <!-- ================================== --> 1967 <!-- Permissions to access other installed applications --> 1968 <!-- ================================== --> 1969 <eat-comment /> 1970 1971 <!-- @deprecated No longer enforced. --> 1972 <permission android:name="android.permission.GET_TASKS" 1973 android:label="@string/permlab_getTasks" 1974 android:description="@string/permdesc_getTasks" 1975 android:protectionLevel="normal" /> 1976 1977 <!-- New version of GET_TASKS that apps can request, since GET_TASKS doesn't really 1978 give access to task information. We need this new one because there are 1979 many existing apps that use add libraries and such that have validation 1980 code to ensure the app has requested the GET_TASKS permission by seeing 1981 if it has been granted the permission... if it hasn't, it kills the app 1982 with a message about being upset. So we need to have it continue to look 1983 like the app is getting that permission, even though it will never be 1984 checked, and new privileged apps can now request this one for real access. 1985 @hide 1986 @SystemApi --> 1987 <permission android:name="android.permission.REAL_GET_TASKS" 1988 android:protectionLevel="signature|privileged" /> 1989 1990 <!-- Allows an application to start a task from a ActivityManager#RecentTaskInfo. 1991 @hide --> 1992 <permission android:name="android.permission.START_TASKS_FROM_RECENTS" 1993 android:protectionLevel="signature|privileged" /> 1994 1995 <!-- @SystemApi @hide Allows an application to call APIs that allow it to do interactions 1996 across the users on the device, using singleton services and 1997 user-targeted broadcasts. This permission is not available to 1998 third party applications. --> 1999 <permission android:name="android.permission.INTERACT_ACROSS_USERS" 2000 android:protectionLevel="signature|privileged|development" /> 2001 2002 <!-- @SystemApi Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS} 2003 that removes restrictions on where broadcasts can be sent and allows other 2004 types of interactions 2005 @hide --> 2006 <permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL" 2007 android:protectionLevel="signature|installer" /> 2008 2009 <!-- @SystemApi @hide Allows an application to call APIs that allow it to query and manage 2010 users on the device. This permission is not available to 2011 third party applications. --> 2012 <permission android:name="android.permission.MANAGE_USERS" 2013 android:protectionLevel="signature|privileged" /> 2014 2015 <!-- @hide Allows an application to create, remove users and get the list of 2016 users on the device. Applications holding this permission can only create restricted, 2017 guest, managed, demo, and ephemeral users. For creating other kind of users, 2018 {@link android.Manifest.permission#MANAGE_USERS} is needed. 2019 This permission is not available to third party applications. --> 2020 <permission android:name="android.permission.CREATE_USERS" 2021 android:protectionLevel="signature" /> 2022 2023 <!-- @hide Allows an application to set the profile owners and the device owner. 2024 This permission is not available to third party applications.--> 2025 <permission android:name="android.permission.MANAGE_PROFILE_AND_DEVICE_OWNERS" 2026 android:protectionLevel="signature" 2027 android:label="@string/permlab_manageProfileAndDeviceOwners" 2028 android:description="@string/permdesc_manageProfileAndDeviceOwners" /> 2029 2030 <!-- Allows an application to get full detailed information about 2031 recently running tasks, with full fidelity to the real state. 2032 @hide --> 2033 <permission android:name="android.permission.GET_DETAILED_TASKS" 2034 android:protectionLevel="signature" /> 2035 2036 <!-- Allows an application to change the Z-order of tasks. 2037 <p>Protection level: normal 2038 --> 2039 <permission android:name="android.permission.REORDER_TASKS" 2040 android:label="@string/permlab_reorderTasks" 2041 android:description="@string/permdesc_reorderTasks" 2042 android:protectionLevel="normal" /> 2043 2044 <!-- @hide Allows an application to change to remove/kill tasks --> 2045 <permission android:name="android.permission.REMOVE_TASKS" 2046 android:protectionLevel="signature" /> 2047 2048 <!-- @SystemApi @TestApi @hide Allows an application to create/manage/remove stacks --> 2049 <permission android:name="android.permission.MANAGE_ACTIVITY_STACKS" 2050 android:protectionLevel="signature|privileged|development" /> 2051 2052 <!-- @SystemApi @TestApi @hide Allows an application to embed other activities --> 2053 <permission android:name="android.permission.ACTIVITY_EMBEDDING" 2054 android:protectionLevel="signature|privileged|development" /> 2055 2056 <!-- Allows an application to start any activity, regardless of permission 2057 protection or exported state. 2058 @hide --> 2059 <permission android:name="android.permission.START_ANY_ACTIVITY" 2060 android:protectionLevel="signature" /> 2061 2062 <!-- @SystemApi Must be required by activities that handle the intent action 2063 {@link Intent#ACTION_SEND_SHOW_SUSPENDED_APP_DETAILS}. This is for use by apps that 2064 hold {@link Manifest.permission#SUSPEND_APPS} to interact with the system. 2065 <p>Not for use by third-party applications. 2066 @hide --> 2067 <permission android:name="android.permission.SEND_SHOW_SUSPENDED_APP_DETAILS" 2068 android:protectionLevel="signature" /> 2069 <uses-permission android:name="android.permission.SEND_SHOW_SUSPENDED_APP_DETAILS" /> 2070 2071 <!-- @deprecated The {@link android.app.ActivityManager#restartPackage} 2072 API is no longer supported. --> 2073 <permission android:name="android.permission.RESTART_PACKAGES" 2074 android:label="@string/permlab_killBackgroundProcesses" 2075 android:description="@string/permdesc_killBackgroundProcesses" 2076 android:protectionLevel="normal" /> 2077 2078 <!-- Allows an application to call 2079 {@link android.app.ActivityManager#killBackgroundProcesses}. 2080 <p>Protection level: normal 2081 --> 2082 <permission android:name="android.permission.KILL_BACKGROUND_PROCESSES" 2083 android:label="@string/permlab_killBackgroundProcesses" 2084 android:description="@string/permdesc_killBackgroundProcesses" 2085 android:protectionLevel="normal" /> 2086 2087 <!-- @SystemApi @hide Allows an application to query process states and current 2088 OOM adjustment scores. 2089 <p>Not for use by third-party applications. --> 2090 <permission android:name="android.permission.GET_PROCESS_STATE_AND_OOM_SCORE" 2091 android:protectionLevel="signature|privileged|development" /> 2092 2093 <!-- Allows use of PendingIntent.getIntent(). 2094 @hide --> 2095 <permission android:name="android.permission.GET_INTENT_SENDER_INTENT" 2096 android:protectionLevel="signature" /> 2097 2098 <!-- ================================== --> 2099 <!-- Permissions affecting the display of other applications --> 2100 <!-- ================================== --> 2101 <eat-comment /> 2102 2103 <!-- Allows an app to create windows using the type 2104 {@link android.view.WindowManager.LayoutParams#TYPE_APPLICATION_OVERLAY}, 2105 shown on top of all other apps. Very few apps 2106 should use this permission; these windows are intended for 2107 system-level interaction with the user. 2108 2109 <p class="note"><strong>Note:</strong> If the app 2110 targets API level 23 or higher, the app user must explicitly grant 2111 this permission to the app through a permission management screen. The app requests 2112 the user's approval by sending an intent with action 2113 {@link android.provider.Settings#ACTION_MANAGE_OVERLAY_PERMISSION}. 2114 The app can check whether it has this authorization by calling 2115 {@link android.provider.Settings#canDrawOverlays 2116 Settings.canDrawOverlays()}. 2117 <p>Protection level: signature --> 2118 <permission android:name="android.permission.SYSTEM_ALERT_WINDOW" 2119 android:label="@string/permlab_systemAlertWindow" 2120 android:description="@string/permdesc_systemAlertWindow" 2121 android:protectionLevel="signature|preinstalled|appop|pre23|development" /> 2122 2123 <!-- @deprecated Use {@link android.Manifest.permission#REQUEST_COMPANION_RUN_IN_BACKGROUND} 2124 @hide 2125 --> 2126 <permission android:name="android.permission.RUN_IN_BACKGROUND" 2127 android:label="@string/permlab_runInBackground" 2128 android:description="@string/permdesc_runInBackground" 2129 android:protectionLevel="signature" /> 2130 2131 <!-- @deprecated Use 2132 {@link android.Manifest.permission#REQUEST_COMPANION_USE_DATA_IN_BACKGROUND} 2133 @hide 2134 --> 2135 <permission android:name="android.permission.USE_DATA_IN_BACKGROUND" 2136 android:label="@string/permlab_useDataInBackground" 2137 android:description="@string/permdesc_useDataInBackground" 2138 android:protectionLevel="signature" /> 2139 2140 <!-- @hide Allows an application to set display offsets for the screen. 2141 This permission is not available to third party applications. --> 2142 <permission android:name="android.permission.SET_DISPLAY_OFFSET" 2143 android:protectionLevel="signature|privileged" /> 2144 2145 <!-- Allows a companion app to run in the background. 2146 <p>Protection level: normal 2147 --> 2148 <permission android:name="android.permission.REQUEST_COMPANION_RUN_IN_BACKGROUND" 2149 android:label="@string/permlab_runInBackground" 2150 android:description="@string/permdesc_runInBackground" 2151 android:protectionLevel="normal" /> 2152 2153 <!-- Allows a companion app to use data in the background. 2154 <p>Protection level: normal 2155 --> 2156 <permission android:name="android.permission.REQUEST_COMPANION_USE_DATA_IN_BACKGROUND" 2157 android:label="@string/permlab_useDataInBackground" 2158 android:description="@string/permdesc_useDataInBackground" 2159 android:protectionLevel="normal" /> 2160 2161 2162 <!-- ================================== --> 2163 <!-- Permissions affecting the system wallpaper --> 2164 <!-- ================================== --> 2165 <eat-comment /> 2166 2167 <!-- Allows applications to set the wallpaper. 2168 <p>Protection level: normal 2169 --> 2170 <permission android:name="android.permission.SET_WALLPAPER" 2171 android:label="@string/permlab_setWallpaper" 2172 android:description="@string/permdesc_setWallpaper" 2173 android:protectionLevel="normal" /> 2174 2175 <!-- Allows applications to set the wallpaper hints. 2176 <p>Protection level: normal 2177 --> 2178 <permission android:name="android.permission.SET_WALLPAPER_HINTS" 2179 android:label="@string/permlab_setWallpaperHints" 2180 android:description="@string/permdesc_setWallpaperHints" 2181 android:protectionLevel="normal" /> 2182 2183 <!-- Allow the app to read the system wallpaper image without 2184 holding the READ_EXTERNAL_STORAGE permission. 2185 <p>Not for use by third-party applications. 2186 @hide 2187 @SystemApi 2188 --> 2189 <permission android:name="android.permission.READ_WALLPAPER_INTERNAL" 2190 android:protectionLevel="signature|privileged" /> 2191 2192 <!-- ============================================ --> 2193 <!-- Permissions for changing the system clock --> 2194 <!-- ============================================ --> 2195 <eat-comment /> 2196 2197 <!-- @SystemApi Allows applications to set the system time. 2198 <p>Not for use by third-party applications. --> 2199 <permission android:name="android.permission.SET_TIME" 2200 android:protectionLevel="signature|privileged" /> 2201 2202 <!-- Allows applications to set the system time zone. 2203 <p>Not for use by third-party applications. 2204 --> 2205 <permission android:name="android.permission.SET_TIME_ZONE" 2206 android:label="@string/permlab_setTimeZone" 2207 android:description="@string/permdesc_setTimeZone" 2208 android:protectionLevel="signature|privileged" /> 2209 2210 <!-- ==================================================== --> 2211 <!-- Permissions related to changing status bar --> 2212 <!-- ==================================================== --> 2213 <eat-comment /> 2214 2215 <!-- Allows an application to expand or collapse the status bar. 2216 <p>Protection level: normal 2217 --> 2218 <permission android:name="android.permission.EXPAND_STATUS_BAR" 2219 android:label="@string/permlab_expandStatusBar" 2220 android:description="@string/permdesc_expandStatusBar" 2221 android:protectionLevel="normal" /> 2222 2223 <!-- ============================================================== --> 2224 <!-- Permissions related to adding/removing shortcuts from Launcher --> 2225 <!-- ============================================================== --> 2226 <eat-comment /> 2227 2228 <!-- Allows an application to install a shortcut in Launcher. 2229 <p>In Android O (API level 26) and higher, the <code>INSTALL_SHORTCUT</code> broadcast no 2230 longer has any effect on your app because it's a private, implicit 2231 broadcast. Instead, you should create an app shortcut by using the 2232 {@link android.content.pm.ShortcutManager#requestPinShortcut requestPinShortcut()} 2233 method from the {@link android.content.pm.ShortcutManager} class. 2234 <p>Protection level: normal 2235 --> 2236 <permission android:name="com.android.launcher.permission.INSTALL_SHORTCUT" 2237 android:label="@string/permlab_install_shortcut" 2238 android:description="@string/permdesc_install_shortcut" 2239 android:protectionLevel="normal"/> 2240 2241 <!--This permission is no longer supported. 2242 --> 2243 <permission android:name="com.android.launcher.permission.UNINSTALL_SHORTCUT" 2244 android:label="@string/permlab_uninstall_shortcut" 2245 android:description="@string/permdesc_uninstall_shortcut" 2246 android:protectionLevel="normal"/> 2247 2248 <!-- ==================================================== --> 2249 <!-- Permissions related to accessing sync settings --> 2250 <!-- ==================================================== --> 2251 <eat-comment /> 2252 2253 <!-- Allows applications to read the sync settings. 2254 <p>Protection level: normal 2255 --> 2256 <permission android:name="android.permission.READ_SYNC_SETTINGS" 2257 android:description="@string/permdesc_readSyncSettings" 2258 android:label="@string/permlab_readSyncSettings" 2259 android:protectionLevel="normal" /> 2260 2261 <!-- Allows applications to write the sync settings. 2262 <p>Protection level: normal 2263 --> 2264 <permission android:name="android.permission.WRITE_SYNC_SETTINGS" 2265 android:description="@string/permdesc_writeSyncSettings" 2266 android:label="@string/permlab_writeSyncSettings" 2267 android:protectionLevel="normal" /> 2268 2269 <!-- Allows applications to read the sync stats. 2270 <p>Protection level: normal 2271 --> 2272 <permission android:name="android.permission.READ_SYNC_STATS" 2273 android:description="@string/permdesc_readSyncStats" 2274 android:label="@string/permlab_readSyncStats" 2275 android:protectionLevel="normal" /> 2276 2277 <!-- ============================================ --> 2278 <!-- Permissions for low-level system interaction --> 2279 <!-- ============================================ --> 2280 <eat-comment /> 2281 2282 <!-- @SystemApi @hide Change the screen compatibility mode of applications --> 2283 <permission android:name="android.permission.SET_SCREEN_COMPATIBILITY" 2284 android:protectionLevel="signature" /> 2285 2286 <!-- @SystemApi Allows an application to modify the current configuration, such 2287 as locale. --> 2288 <permission android:name="android.permission.CHANGE_CONFIGURATION" 2289 android:protectionLevel="signature|privileged|development" /> 2290 2291 <!-- Allows an application to read or write the system settings. 2292 2293 <p class="note"><strong>Note:</strong> If the app targets API level 23 2294 or higher, the app user 2295 must explicitly grant this permission to the app through a permission management screen. 2296 The app requests the user's approval by sending an intent with action 2297 {@link android.provider.Settings#ACTION_MANAGE_WRITE_SETTINGS}. The app 2298 can check whether it has this authorization by calling {@link 2299 android.provider.Settings.System#canWrite Settings.System.canWrite()}. 2300 2301 <p>Protection level: signature 2302 --> 2303 <permission android:name="android.permission.WRITE_SETTINGS" 2304 android:label="@string/permlab_writeSettings" 2305 android:description="@string/permdesc_writeSettings" 2306 android:protectionLevel="signature|preinstalled|appop|pre23" /> 2307 2308 <!-- @SystemApi Allows an application to modify the Google service map. 2309 <p>Not for use by third-party applications. --> 2310 <permission android:name="android.permission.WRITE_GSERVICES" 2311 android:protectionLevel="signature|privileged" /> 2312 2313 <!-- @SystemApi Allows an application to call 2314 {@link android.app.ActivityManager#forceStopPackage}. 2315 @hide --> 2316 <permission android:name="android.permission.FORCE_STOP_PACKAGES" 2317 android:protectionLevel="signature|privileged" /> 2318 2319 <!-- @SystemApi @hide Allows an application to retrieve the content of the active window 2320 An active window is the window that has fired an accessibility event. --> 2321 <permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT" 2322 android:protectionLevel="signature|privileged" /> 2323 2324 <!-- @SystemApi Modify the global animation scaling factor. 2325 <p>Not for use by third-party applications. --> 2326 <permission android:name="android.permission.SET_ANIMATION_SCALE" 2327 android:protectionLevel="signature|privileged|development" /> 2328 2329 <!-- @deprecated This functionality will be removed in the future; please do 2330 not use. Allow an application to make its activities persistent. --> 2331 <permission android:name="android.permission.PERSISTENT_ACTIVITY" 2332 android:label="@string/permlab_persistentActivity" 2333 android:description="@string/permdesc_persistentActivity" 2334 android:protectionLevel="normal" /> 2335 2336 <!-- Allows an application to find out the space used by any package. 2337 <p>Protection level: normal 2338 --> 2339 <permission android:name="android.permission.GET_PACKAGE_SIZE" 2340 android:label="@string/permlab_getPackageSize" 2341 android:description="@string/permdesc_getPackageSize" 2342 android:protectionLevel="normal" /> 2343 2344 <!-- @deprecated No longer useful, see 2345 {@link android.content.pm.PackageManager#addPackageToPreferred} 2346 for details. --> 2347 <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS" 2348 android:protectionLevel="signature|verifier" /> 2349 2350 <!-- Allows an application to receive the 2351 {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is 2352 broadcast after the system finishes booting. If you don't 2353 request this permission, you will not receive the broadcast at 2354 that time. Though holding this permission does not have any 2355 security implications, it can have a negative impact on the 2356 user experience by increasing the amount of time it takes the 2357 system to start and allowing applications to have themselves 2358 running without the user being aware of them. As such, you must 2359 explicitly declare your use of this facility to make that visible 2360 to the user. 2361 <p>Protection level: normal 2362 --> 2363 <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED" 2364 android:label="@string/permlab_receiveBootCompleted" 2365 android:description="@string/permdesc_receiveBootCompleted" 2366 android:protectionLevel="normal" /> 2367 2368 <!-- Allows an application to broadcast sticky intents. These are 2369 broadcasts whose data is held by the system after being finished, 2370 so that clients can quickly retrieve that data without having 2371 to wait for the next broadcast. 2372 <p>Protection level: normal 2373 --> 2374 <permission android:name="android.permission.BROADCAST_STICKY" 2375 android:label="@string/permlab_broadcastSticky" 2376 android:description="@string/permdesc_broadcastSticky" 2377 android:protectionLevel="normal" /> 2378 2379 <!-- @SystemApi Allows mounting and unmounting file systems for removable storage. 2380 <p>Not for use by third-party applications.--> 2381 <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS" 2382 android:protectionLevel="signature|privileged" /> 2383 2384 <!-- @SystemApi Allows formatting file systems for removable storage. 2385 <p>Not for use by third-party applications. --> 2386 <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS" 2387 android:protectionLevel="signature|privileged" /> 2388 2389 <!-- @hide --> 2390 <permission android:name="android.permission.STORAGE_INTERNAL" 2391 android:protectionLevel="signature" /> 2392 2393 <!-- Allows access to ASEC non-destructive API calls 2394 @hide --> 2395 <permission android:name="android.permission.ASEC_ACCESS" 2396 android:protectionLevel="signature" /> 2397 2398 <!-- Allows creation of ASEC volumes 2399 @hide --> 2400 <permission android:name="android.permission.ASEC_CREATE" 2401 android:protectionLevel="signature" /> 2402 2403 <!-- Allows destruction of ASEC volumes 2404 @hide --> 2405 <permission android:name="android.permission.ASEC_DESTROY" 2406 android:protectionLevel="signature" /> 2407 2408 <!-- Allows mount / unmount of ASEC volumes 2409 @hide --> 2410 <permission android:name="android.permission.ASEC_MOUNT_UNMOUNT" 2411 android:protectionLevel="signature" /> 2412 2413 <!-- Allows rename of ASEC volumes 2414 @hide --> 2415 <permission android:name="android.permission.ASEC_RENAME" 2416 android:protectionLevel="signature" /> 2417 2418 <!-- @SystemApi Allows applications to write the apn settings. 2419 <p>Not for use by third-party applications. --> 2420 <permission android:name="android.permission.WRITE_APN_SETTINGS" 2421 android:protectionLevel="signature|privileged" /> 2422 2423 <!-- Allows applications to change network connectivity state. 2424 <p>Protection level: normal 2425 --> 2426 <permission android:name="android.permission.CHANGE_NETWORK_STATE" 2427 android:description="@string/permdesc_changeNetworkState" 2428 android:label="@string/permlab_changeNetworkState" 2429 android:protectionLevel="normal" /> 2430 2431 <!-- Allows an application to clear the caches of all installed 2432 applications on the device. 2433 <p>Protection level: signature|privileged 2434 --> 2435 <permission android:name="android.permission.CLEAR_APP_CACHE" 2436 android:protectionLevel="signature|privileged" /> 2437 2438 <!-- @SystemApi Allows an application to use any media decoder when decoding for playback 2439 @hide --> 2440 <permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK" 2441 android:protectionLevel="signature|privileged" /> 2442 2443 <!-- @SystemApi Allows an application to install and/or uninstall CA certificates on 2444 behalf of the user. 2445 @hide --> 2446 <permission android:name="android.permission.MANAGE_CA_CERTIFICATES" 2447 android:protectionLevel="signature|privileged" /> 2448 2449 <!-- @SystemApi Allows an application to do certain operations needed for 2450 interacting with the recovery (system update) system. 2451 @hide --> 2452 <permission android:name="android.permission.RECOVERY" 2453 android:protectionLevel="signature|privileged" /> 2454 2455 <!-- @SystemApi Allows an application to read system update info. 2456 @hide --> 2457 <permission android:name="android.permission.READ_SYSTEM_UPDATE_INFO" 2458 android:protectionLevel="signature" /> 2459 2460 <!-- Allows the system to bind to an application's task services 2461 @hide --> 2462 <permission android:name="android.permission.BIND_JOB_SERVICE" 2463 android:protectionLevel="signature" /> 2464 <uses-permission android:name="android.permission.BIND_JOB_SERVICE"/> 2465 2466 <!-- Allows an application to initiate configuration updates 2467 <p>An application requesting this permission is responsible for 2468 verifying the source and integrity of any update before passing 2469 it off to the various individual installer components 2470 @hide --> 2471 <permission android:name="android.permission.UPDATE_CONFIG" 2472 android:protectionLevel="signature|privileged" /> 2473 2474 <!-- Allows an application to query the current time zone rules state 2475 on device. 2476 @SystemApi @hide --> 2477 <permission android:name="android.permission.QUERY_TIME_ZONE_RULES" 2478 android:protectionLevel="signature|privileged" /> 2479 2480 <!-- Allows a time zone rule updater application to request 2481 the system installs / uninstalls timezone rules. 2482 <p>An application requesting this permission is responsible for 2483 verifying the source and integrity of the update before passing 2484 it off to the installer components. 2485 @SystemApi @hide --> 2486 <permission android:name="android.permission.UPDATE_TIME_ZONE_RULES" 2487 android:protectionLevel="signature|privileged" /> 2488 2489 <!-- Must be required by a time zone rule updater application, 2490 to ensure that only the system can trigger it. 2491 @hide --> 2492 <permission android:name="android.permission.TRIGGER_TIME_ZONE_RULES_CHECK" 2493 android:protectionLevel="signature" /> 2494 <uses-permission android:name="android.permission.TRIGGER_TIME_ZONE_RULES_CHECK"/> 2495 2496 <!-- Allows the system to reset throttling in shortcut manager. 2497 @hide --> 2498 <permission android:name="android.permission.RESET_SHORTCUT_MANAGER_THROTTLING" 2499 android:protectionLevel="signature" /> 2500 2501 <!-- Allows the system to bind to the discovered Network Recommendation Service. 2502 @SystemApi @hide --> 2503 <permission android:name="android.permission.BIND_NETWORK_RECOMMENDATION_SERVICE" 2504 android:protectionLevel="signature" /> 2505 <uses-permission android:name="android.permission.BIND_NETWORK_RECOMMENDATION_SERVICE"/> 2506 2507 <!-- Allows an application to enable, disable and change priority of 2508 runtime resource overlays. 2509 @hide --> 2510 <permission android:name="android.permission.CHANGE_OVERLAY_PACKAGES" 2511 android:protectionLevel="signature|privileged" /> 2512 2513 <!-- ========================================= --> 2514 <!-- Permissions for special development tools --> 2515 <!-- ========================================= --> 2516 <eat-comment /> 2517 2518 <!-- @SystemApi Allows an application to read or write the secure system settings. 2519 <p>Not for use by third-party applications. --> 2520 <permission android:name="android.permission.WRITE_SECURE_SETTINGS" 2521 android:protectionLevel="signature|privileged|development" /> 2522 2523 <!-- @SystemApi Allows an application to retrieve state dump information from system services. 2524 <p>Not for use by third-party applications. --> 2525 <permission android:name="android.permission.DUMP" 2526 android:protectionLevel="signature|privileged|development" /> 2527 2528 <!-- @SystemApi Allows an application to read the low-level system log files. 2529 <p>Not for use by third-party applications, because 2530 Log entries can contain the user's private information. --> 2531 <permission android:name="android.permission.READ_LOGS" 2532 android:protectionLevel="signature|privileged|development" /> 2533 2534 <!-- @SystemApi Configure an application for debugging. 2535 <p>Not for use by third-party applications. --> 2536 <permission android:name="android.permission.SET_DEBUG_APP" 2537 android:protectionLevel="signature|privileged|development" /> 2538 2539 <!-- @SystemApi Allows an application to set the maximum number of (not needed) 2540 application processes that can be running. 2541 <p>Not for use by third-party applications. --> 2542 <permission android:name="android.permission.SET_PROCESS_LIMIT" 2543 android:protectionLevel="signature|privileged|development" /> 2544 2545 <!-- @SystemApi Allows an application to control whether activities are immediately 2546 finished when put in the background. 2547 <p>Not for use by third-party applications. --> 2548 <permission android:name="android.permission.SET_ALWAYS_FINISH" 2549 android:protectionLevel="signature|privileged|development" /> 2550 2551 <!-- @SystemApi Allow an application to request that a signal be sent to all persistent processes. 2552 <p>Not for use by third-party applications. --> 2553 <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES" 2554 android:protectionLevel="signature|privileged|development" /> 2555 2556 <!-- ==================================== --> 2557 <!-- Private permissions --> 2558 <!-- ==================================== --> 2559 <eat-comment /> 2560 2561 <!-- @SystemApi Allows access to the list of accounts in the Accounts Service. --> 2562 <permission android:name="android.permission.GET_ACCOUNTS_PRIVILEGED" 2563 android:protectionLevel="signature|privileged" /> 2564 2565 <!-- Allows but does not guarantee access to user passwords at the conclusion of add account 2566 @hide --> 2567 <permission android:name="android.permission.GET_PASSWORD" 2568 android:protectionLevel="signature" /> 2569 2570 <!-- @SystemApi Allows applications to RW to diagnostic resources. 2571 <p>Not for use by third-party applications. --> 2572 <permission android:name="android.permission.DIAGNOSTIC" 2573 android:protectionLevel="signature" /> 2574 2575 <!-- @SystemApi Allows an application to open, close, or disable the status bar 2576 and its icons. 2577 <p>Not for use by third-party applications. --> 2578 <permission android:name="android.permission.STATUS_BAR" 2579 android:protectionLevel="signature|privileged" /> 2580 2581 <!-- Allows an application to be the status bar. Currently used only by SystemUI.apk 2582 @hide --> 2583 <permission android:name="android.permission.STATUS_BAR_SERVICE" 2584 android:protectionLevel="signature" /> 2585 2586 <!-- Allows an application to bind to third party quick settings tiles. 2587 <p>Should only be requested by the System, should be required by 2588 TileService declarations.--> 2589 <permission android:name="android.permission.BIND_QUICK_SETTINGS_TILE" 2590 android:protectionLevel="signature" /> 2591 2592 <!-- @SystemApi Allows an application to force a BACK operation on whatever is the 2593 top activity. 2594 <p>Not for use by third-party applications. 2595 @hide 2596 --> 2597 <permission android:name="android.permission.FORCE_BACK" 2598 android:protectionLevel="signature" /> 2599 2600 <!-- @SystemApi Allows an application to update device statistics. 2601 <p>Not for use by third-party applications. --> 2602 <permission android:name="android.permission.UPDATE_DEVICE_STATS" 2603 android:protectionLevel="signature|privileged" /> 2604 2605 <!-- @SystemApi @hide Allows an application to collect application operation statistics. 2606 Not for use by third party apps. --> 2607 <permission android:name="android.permission.GET_APP_OPS_STATS" 2608 android:protectionLevel="signature|privileged|development" /> 2609 2610 <!-- @SystemApi Allows an application to update application operation statistics. Not for 2611 use by third party apps. 2612 @hide --> 2613 <permission android:name="android.permission.UPDATE_APP_OPS_STATS" 2614 android:protectionLevel="signature|privileged|installer" /> 2615 2616 <!-- @SystemApi Allows an application to update the user app op restrictions. 2617 Not for use by third party apps. 2618 @hide --> 2619 <permission android:name="android.permission.MANAGE_APP_OPS_RESTRICTIONS" 2620 android:protectionLevel="signature|installer" /> 2621 2622 <!-- Allows an application to update the user app op modes. 2623 Not for use by third party apps. 2624 @hide --> 2625 <permission android:name="android.permission.MANAGE_APP_OPS_MODES" 2626 android:protectionLevel="signature|installer|verifier" /> 2627 2628 <!-- @SystemApi Allows an application to open windows that are for use by parts 2629 of the system user interface. 2630 <p>Not for use by third-party applications. 2631 @hide 2632 --> 2633 <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW" 2634 android:protectionLevel="signature" /> 2635 2636 <!-- @SystemApi Allows an application to use 2637 {@link android.view.WindowManager.LayoutsParams#PRIVATE_FLAG_HIDE_NON_SYSTEM_OVERLAY_WINDOWS} 2638 to hide non-system-overlay windows. 2639 <p>Not for use by third-party applications. 2640 @hide 2641 --> 2642 <permission android:name="android.permission.HIDE_NON_SYSTEM_OVERLAY_WINDOWS" 2643 android:protectionLevel="signature|installer" /> 2644 2645 <!-- @SystemApi Allows an application to manage (create, destroy, 2646 Z-order) application tokens in the window manager. 2647 <p>Not for use by third-party applications. 2648 @hide 2649 --> 2650 <permission android:name="android.permission.MANAGE_APP_TOKENS" 2651 android:protectionLevel="signature" /> 2652 2653 <!-- Allows System UI to register listeners for events from Window Manager. 2654 @hide --> 2655 <permission android:name="android.permission.REGISTER_WINDOW_MANAGER_LISTENERS" 2656 android:protectionLevel="signature" /> 2657 2658 <!-- @hide Allows the application to temporarily freeze the screen for a 2659 full-screen transition. --> 2660 <permission android:name="android.permission.FREEZE_SCREEN" 2661 android:protectionLevel="signature" /> 2662 2663 <!-- @SystemApi Allows an application to inject user events (keys, touch, trackball) 2664 into the event stream and deliver them to ANY window. Without this 2665 permission, you can only deliver events to windows in your own process. 2666 <p>Not for use by third-party applications. 2667 @hide 2668 --> 2669 <permission android:name="android.permission.INJECT_EVENTS" 2670 android:protectionLevel="signature" /> 2671 2672 <!-- @hide Allows an application to register an input filter which filters the stream 2673 of user events (keys, touch, trackball) before they are dispatched to any window. --> 2674 <permission android:name="android.permission.FILTER_EVENTS" 2675 android:protectionLevel="signature" /> 2676 2677 <!-- @hide Allows an application to retrieve the window token from the accessibility manager. --> 2678 <permission android:name="android.permission.RETRIEVE_WINDOW_TOKEN" 2679 android:protectionLevel="signature" /> 2680 2681 <!-- @hide Allows an application to modify accessibility information from another app. --> 2682 <permission android:name="android.permission.MODIFY_ACCESSIBILITY_DATA" 2683 android:protectionLevel="signature" /> 2684 2685 <!-- @hide Allows an application to change the accessibility volume. --> 2686 <permission android:name="android.permission.CHANGE_ACCESSIBILITY_VOLUME" 2687 android:protectionLevel="signature" /> 2688 2689 <!-- @hide Allows an application to collect frame statistics --> 2690 <permission android:name="android.permission.FRAME_STATS" 2691 android:protectionLevel="signature" /> 2692 2693 <!-- @hide Allows an application to temporary enable accessibility on the device. --> 2694 <permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY" 2695 android:protectionLevel="signature" /> 2696 2697 <!-- @SystemApi Allows an application to watch and control how activities are 2698 started globally in the system. Only for is in debugging 2699 (usually the monkey command). 2700 <p>Not for use by third-party applications. 2701 @hide 2702 --> 2703 <permission android:name="android.permission.SET_ACTIVITY_WATCHER" 2704 android:protectionLevel="signature" /> 2705 2706 <!-- @SystemApi Allows an application to call the activity manager shutdown() API 2707 to put the higher-level system there into a shutdown state. 2708 @hide --> 2709 <permission android:name="android.permission.SHUTDOWN" 2710 android:protectionLevel="signature|privileged" /> 2711 2712 <!-- @SystemApi Allows an application to tell the activity manager to temporarily 2713 stop application switches, putting it into a special mode that 2714 prevents applications from immediately switching away from some 2715 critical UI such as the home screen. 2716 @hide --> 2717 <permission android:name="android.permission.STOP_APP_SWITCHES" 2718 android:protectionLevel="signature|privileged" /> 2719 2720 <!-- @SystemApi Allows an application to retrieve private information about 2721 the current top activity, such as any assist context it can provide. 2722 <p>Not for use by third-party applications. 2723 @hide 2724 --> 2725 <permission android:name="android.permission.GET_TOP_ACTIVITY_INFO" 2726 android:protectionLevel="signature" /> 2727 2728 <!-- Allows an application to retrieve the current state of keys and 2729 switches. 2730 <p>Not for use by third-party applications. 2731 @deprecated The API that used this permission has been removed. --> 2732 <permission android:name="android.permission.READ_INPUT_STATE" 2733 android:protectionLevel="signature" /> 2734 2735 <!-- Must be required by an {@link android.inputmethodservice.InputMethodService}, 2736 to ensure that only the system can bind to it. 2737 <p>Protection level: signature 2738 --> 2739 <permission android:name="android.permission.BIND_INPUT_METHOD" 2740 android:protectionLevel="signature" /> 2741 2742 <!-- Must be required by an {@link android.media.midi.MidiDeviceService}, 2743 to ensure that only the system can bind to it. 2744 <p>Protection level: signature 2745 --> 2746 <permission android:name="android.permission.BIND_MIDI_DEVICE_SERVICE" 2747 android:protectionLevel="signature" /> 2748 2749 <!-- Must be required by an {@link android.accessibilityservice.AccessibilityService}, 2750 to ensure that only the system can bind to it. 2751 <p>Protection level: signature 2752 --> 2753 <permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE" 2754 android:protectionLevel="signature" /> 2755 2756 <!-- Must be required by a {@link android.printservice.PrintService}, 2757 to ensure that only the system can bind to it. 2758 <p>Protection level: signature 2759 --> 2760 <permission android:name="android.permission.BIND_PRINT_SERVICE" 2761 android:protectionLevel="signature" /> 2762 2763 <!-- Must be required by a {@link android.printservice.recommendation.RecommendationService}, 2764 to ensure that only the system can bind to it. 2765 @hide 2766 @SystemApi 2767 <p>Protection level: signature 2768 --> 2769 <permission android:name="android.permission.BIND_PRINT_RECOMMENDATION_SERVICE" 2770 android:protectionLevel="signature" /> 2771 2772 <!-- Allows applications to get the installed and enabled print services. 2773 @hide 2774 @SystemApi 2775 <p>Protection level: signature|preinstalled 2776 --> 2777 <permission android:name="android.permission.READ_PRINT_SERVICES" 2778 android:protectionLevel="signature|preinstalled" /> 2779 2780 <!-- Allows applications to get the currently recommended print services for printers. 2781 @hide 2782 @SystemApi 2783 <p>Protection level: signature|preinstalled 2784 --> 2785 <permission android:name="android.permission.READ_PRINT_SERVICE_RECOMMENDATIONS" 2786 android:protectionLevel="signature|preinstalled" /> 2787 2788 <!-- Must be required by a {@link android.nfc.cardemulation.HostApduService} 2789 or {@link android.nfc.cardemulation.OffHostApduService} to ensure that only 2790 the system can bind to it. 2791 <p>Protection level: signature 2792 --> 2793 <permission android:name="android.permission.BIND_NFC_SERVICE" 2794 android:protectionLevel="signature" /> 2795 2796 <!-- Must be required by the PrintSpooler to ensure that only the system can bind to it. 2797 @hide --> 2798 <permission android:name="android.permission.BIND_PRINT_SPOOLER_SERVICE" 2799 android:protectionLevel="signature" /> 2800 2801 <!-- Must be required by the CompanionDeviceManager to ensure that only the system can bind to it. 2802 @hide --> 2803 <permission android:name="android.permission.BIND_COMPANION_DEVICE_MANAGER_SERVICE" 2804 android:protectionLevel="signature" /> 2805 2806 <!-- @SystemApi Must be required by the RuntimePermissionPresenterService to ensure 2807 that only the system can bind to it. 2808 @hide --> 2809 <permission android:name="android.permission.BIND_RUNTIME_PERMISSION_PRESENTER_SERVICE" 2810 android:protectionLevel="signature" /> 2811 2812 <!-- Must be required by a TextService (e.g. SpellCheckerService) 2813 to ensure that only the system can bind to it. 2814 <p>Protection level: signature 2815 --> 2816 <permission android:name="android.permission.BIND_TEXT_SERVICE" 2817 android:protectionLevel="signature" /> 2818 2819 <!-- Must be required by a {@link android.net.VpnService}, 2820 to ensure that only the system can bind to it. 2821 <p>Protection level: signature 2822 --> 2823 <permission android:name="android.permission.BIND_VPN_SERVICE" 2824 android:protectionLevel="signature" /> 2825 2826 <!-- Must be required by a {@link android.service.wallpaper.WallpaperService}, 2827 to ensure that only the system can bind to it. 2828 <p>Protection level: signature|privileged 2829 --> 2830 <permission android:name="android.permission.BIND_WALLPAPER" 2831 android:protectionLevel="signature|privileged" /> 2832 2833 <!-- Must be required by a {@link android.service.voice.VoiceInteractionService}, 2834 to ensure that only the system can bind to it. 2835 <p>Protection level: signature 2836 --> 2837 <permission android:name="android.permission.BIND_VOICE_INTERACTION" 2838 android:protectionLevel="signature" /> 2839 2840 <!-- Must be required by a {@link android.service.autofill.AutofillService}, 2841 to ensure that only the system can bind to it. 2842 <p>Protection level: signature 2843 --> 2844 <permission android:name="android.permission.BIND_AUTOFILL_SERVICE" 2845 android:protectionLevel="signature" /> 2846 2847 <!-- Alternative version of android.permission.BIND_AUTOFILL_FIELD_CLASSIFICATION_SERVICE. 2848 This permission was renamed during the O previews but it was supported on the final O 2849 release, so we need to carry it over. 2850 <p>Protection level: signature 2851 @hide 2852 --> 2853 <permission android:name="android.permission.BIND_AUTOFILL" 2854 android:protectionLevel="signature" /> 2855 2856 <!-- Must be required by an {@link android.service.autofill.AutofillFieldClassificationService} 2857 to ensure that only the system can bind to it. 2858 @hide This is not a third-party API (intended for OEMs and system apps). 2859 --> 2860 <permission android:name="android.permission.BIND_AUTOFILL_FIELD_CLASSIFICATION_SERVICE" 2861 android:protectionLevel="signature" /> 2862 2863 <!-- Must be required by a android.service.textclassifier.TextClassifierService, 2864 to ensure that only the system can bind to it. 2865 @SystemApi @hide This is not a third-party API (intended for OEMs and system apps). 2866 <p>Protection level: signature 2867 --> 2868 <permission android:name="android.permission.BIND_TEXTCLASSIFIER_SERVICE" 2869 android:protectionLevel="signature" /> 2870 2871 <!-- Must be required by hotword enrollment application, 2872 to ensure that only the system can interact with it. 2873 @hide <p>Not for use by third-party applications.</p> --> 2874 <permission android:name="android.permission.MANAGE_VOICE_KEYPHRASES" 2875 android:protectionLevel="signature|privileged" /> 2876 2877 <!-- Must be required by a {@link com.android.media.remotedisplay.RemoteDisplayProvider}, 2878 to ensure that only the system can bind to it. 2879 @hide --> 2880 <permission android:name="android.permission.BIND_REMOTE_DISPLAY" 2881 android:protectionLevel="signature" /> 2882 2883 <!-- Must be required by a {@link android.media.tv.TvInputService} 2884 to ensure that only the system can bind to it. 2885 <p>Protection level: signature|privileged 2886 --> 2887 <permission android:name="android.permission.BIND_TV_INPUT" 2888 android:protectionLevel="signature|privileged" /> 2889 2890 <!-- @SystemApi 2891 Must be required by a {@link com.android.media.tv.remoteprovider.TvRemoteProvider} 2892 to ensure that only the system can bind to it. 2893 <p>Protection level: signature|privileged 2894 <p>Not for use by third-party applications. </p> 2895 @hide --> 2896 <permission android:name="android.permission.BIND_TV_REMOTE_SERVICE" 2897 android:protectionLevel="signature|privileged" /> 2898 2899 <!-- @SystemApi 2900 Must be required for a virtual remote controller for TV. 2901 <p>Protection level: signature|privileged 2902 <p>Not for use by third-party applications. </p> 2903 @hide --> 2904 <permission android:name="android.permission.TV_VIRTUAL_REMOTE_CONTROLLER" 2905 android:protectionLevel="signature|privileged" /> 2906 2907 <!-- Allows an application to change HDMI CEC active source. 2908 <p>Not for use by third-party applications. 2909 @hide --> 2910 <permission android:name="android.permission.CHANGE_HDMI_CEC_ACTIVE_SOURCE" 2911 android:protectionLevel="signature|privileged" /> 2912 2913 <!-- @SystemApi Allows an application to modify parental controls 2914 <p>Not for use by third-party applications. 2915 @hide --> 2916 <permission android:name="android.permission.MODIFY_PARENTAL_CONTROLS" 2917 android:protectionLevel="signature|privileged" /> 2918 2919 <!-- @SystemApi Allows an application to read TvContentRatingSystemInfo 2920 <p>Not for use by third-party applications. 2921 @hide --> 2922 <permission android:name="android.permission.READ_CONTENT_RATING_SYSTEMS" 2923 android:protectionLevel="signature|privileged" /> 2924 2925 <!-- @SystemApi Allows an application to notify TV inputs by sending broadcasts. 2926 <p>Protection level: signature|privileged 2927 <p>Not for use by third-party applications. 2928 @hide --> 2929 <permission android:name="android.permission.NOTIFY_TV_INPUTS" 2930 android:protectionLevel="signature|privileged" /> 2931 2932 <!-- Must be required by a {@link android.media.routing.MediaRouteService} 2933 to ensure that only the system can interact with it. 2934 @hide --> 2935 <permission android:name="android.permission.BIND_ROUTE_PROVIDER" 2936 android:protectionLevel="signature" /> 2937 2938 <!-- Must be required by device administration receiver, to ensure that only the 2939 system can interact with it. 2940 <p>Protection level: signature 2941 --> 2942 <permission android:name="android.permission.BIND_DEVICE_ADMIN" 2943 android:protectionLevel="signature" /> 2944 2945 <!-- @SystemApi Required to add or remove another application as a device admin. 2946 <p>Not for use by third-party applications. 2947 @hide --> 2948 <permission android:name="android.permission.MANAGE_DEVICE_ADMINS" 2949 android:protectionLevel="signature|privileged" /> 2950 2951 <!-- @SystemApi Allows low-level access to setting the orientation (actually 2952 rotation) of the screen. 2953 <p>Not for use by third-party applications. 2954 @hide 2955 --> 2956 <permission android:name="android.permission.SET_ORIENTATION" 2957 android:protectionLevel="signature" /> 2958 2959 <!-- @SystemApi Allows low-level access to setting the pointer speed. 2960 <p>Not for use by third-party applications. 2961 @hide 2962 --> 2963 <permission android:name="android.permission.SET_POINTER_SPEED" 2964 android:protectionLevel="signature" /> 2965 2966 <!-- Allows low-level access to setting input device calibration. 2967 <p>Not for use by normal applications. 2968 @hide --> 2969 <permission android:name="android.permission.SET_INPUT_CALIBRATION" 2970 android:protectionLevel="signature" /> 2971 2972 <!-- Allows low-level access to setting the keyboard layout. 2973 <p>Not for use by third-party applications. 2974 @hide --> 2975 <permission android:name="android.permission.SET_KEYBOARD_LAYOUT" 2976 android:protectionLevel="signature" /> 2977 2978 <!-- Allows an application to query tablet mode state and monitor changes 2979 in it. 2980 <p>Not for use by third-party applications. 2981 @hide --> 2982 <permission android:name="android.permission.TABLET_MODE" 2983 android:protectionLevel="signature" /> 2984 2985 <!-- Allows an application to request installing packages. Apps 2986 targeting APIs greater than 25 must hold this permission in 2987 order to use {@link android.content.Intent#ACTION_INSTALL_PACKAGE}. 2988 <p>Protection level: signature 2989 --> 2990 <permission android:name="android.permission.REQUEST_INSTALL_PACKAGES" 2991 android:label="@string/permlab_requestInstallPackages" 2992 android:description="@string/permdesc_requestInstallPackages" 2993 android:protectionLevel="signature|appop" /> 2994 2995 <!-- Allows an application to request deleting packages. Apps 2996 targeting APIs {@link android.os.Build.VERSION_CODES#P} or greater must hold this 2997 permission in order to use {@link android.content.Intent#ACTION_UNINSTALL_PACKAGE} or 2998 {@link android.content.pm.PackageInstaller#uninstall}. 2999 <p>Protection level: normal 3000 --> 3001 <permission android:name="android.permission.REQUEST_DELETE_PACKAGES" 3002 android:label="@string/permlab_requestDeletePackages" 3003 android:description="@string/permdesc_requestDeletePackages" 3004 android:protectionLevel="normal" /> 3005 3006 <!-- @SystemApi Allows an application to install packages. 3007 <p>Not for use by third-party applications. --> 3008 <permission android:name="android.permission.INSTALL_PACKAGES" 3009 android:protectionLevel="signature|privileged" /> 3010 3011 <!-- @SystemApi Allows an application to install self updates. This is a limited version 3012 of {@link android.Manifest.permission#INSTALL_PACKAGES}. 3013 <p>Not for use by third-party applications. 3014 @hide 3015 --> 3016 <permission android:name="android.permission.INSTALL_SELF_UPDATES" 3017 android:protectionLevel="signature|privileged" /> 3018 3019 <!-- @SystemApi Allows an application to install updates. This is a limited version 3020 of {@link android.Manifest.permission#INSTALL_PACKAGES}. 3021 <p>Not for use by third-party applications. 3022 @hide 3023 --> 3024 <permission android:name="android.permission.INSTALL_PACKAGE_UPDATES" 3025 android:protectionLevel="signature|privileged" /> 3026 3027 <!-- @SystemApi Allows an application to clear user data. 3028 <p>Not for use by third-party applications 3029 @hide 3030 --> 3031 <permission android:name="android.permission.CLEAR_APP_USER_DATA" 3032 android:protectionLevel="signature|installer" /> 3033 3034 <!-- @hide Allows an application to get the URI permissions 3035 granted to another application. 3036 <p>Not for use by third-party applications 3037 --> 3038 <permission android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS" 3039 android:protectionLevel="signature" /> 3040 3041 <!-- @hide Allows an application to clear the URI permissions 3042 granted to another application. 3043 <p>Not for use by third-party applications 3044 --> 3045 <permission 3046 android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS" 3047 android:protectionLevel="signature" /> 3048 3049 <!-- @hide 3050 Allows an application to change the status of Scoped Access Directory requests granted or 3051 rejected by the user. 3052 <p>This permission should <em>only</em> be requested by the platform 3053 settings app. This permission cannot be granted to third-party apps. 3054 <p>Protection level: signature 3055 --> 3056 <permission 3057 android:name="android.permission.MANAGE_SCOPED_ACCESS_DIRECTORY_PERMISSIONS" 3058 android:protectionLevel="signature" /> 3059 3060 <!-- @hide 3061 Allows an application to change the status of a persistable URI permission granted 3062 to another application. 3063 <p>This permission should <em>only</em> be requested by the platform 3064 settings app. This permission cannot be granted to third-party apps. 3065 <p>Protection level: signature 3066 --> 3067 <permission android:name="android.permission.FORCE_PERSISTABLE_URI_PERMISSIONS" 3068 android:protectionLevel="signature" /> 3069 3070 <!-- @SystemApi Old permission for deleting an app's cache files, no longer used, 3071 but signals for us to quietly ignore calls instead of throwing an exception. --> 3072 <permission android:name="android.permission.DELETE_CACHE_FILES" 3073 android:protectionLevel="signature|privileged" /> 3074 3075 <!-- Allows an application to delete cache files. 3076 @hide --> 3077 <permission android:name="android.permission.INTERNAL_DELETE_CACHE_FILES" 3078 android:protectionLevel="signature" /> 3079 3080 <!-- @SystemApi Allows an application to delete packages. 3081 <p>Not for use by third-party applications. 3082 <p>Starting in {@link android.os.Build.VERSION_CODES#N}, user confirmation is requested 3083 when the application deleting the package is not the same application that installed the 3084 package. --> 3085 <permission android:name="android.permission.DELETE_PACKAGES" 3086 android:protectionLevel="signature|privileged" /> 3087 3088 <!-- @SystemApi Allows an application to move location of installed package. 3089 @hide --> 3090 <permission android:name="android.permission.MOVE_PACKAGE" 3091 android:protectionLevel="signature|privileged" /> 3092 3093 <!-- @SystemApi Allows an application to change whether an application component (other than its own) is 3094 enabled or not. 3095 <p>Not for use by third-party applications. --> 3096 <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE" 3097 android:protectionLevel="signature|privileged" /> 3098 3099 <!-- @SystemApi Allows an application to grant specific permissions. 3100 @hide --> 3101 <permission android:name="android.permission.GRANT_RUNTIME_PERMISSIONS" 3102 android:protectionLevel="signature|installer|verifier" /> 3103 3104 <!-- @SystemApi Allows an app that has this permission and the permissions to install packages 3105 to request certain runtime permissions to be granted at installation. 3106 @hide --> 3107 <permission android:name="android.permission.INSTALL_GRANT_RUNTIME_PERMISSIONS" 3108 android:protectionLevel="signature|installer|verifier" /> 3109 3110 <!-- @SystemApi Allows an application to revoke specific permissions. 3111 @hide --> 3112 <permission android:name="android.permission.REVOKE_RUNTIME_PERMISSIONS" 3113 android:protectionLevel="signature|installer|verifier" /> 3114 3115 <!-- @hide Allows an application to observe permission changes. --> 3116 <permission android:name="android.permission.OBSERVE_GRANT_REVOKE_PERMISSIONS" 3117 android:protectionLevel="signature|privileged" /> 3118 3119 <!-- Allows an application to manage the companion devices. 3120 @hide --> 3121 <permission android:name="android.permission.MANAGE_COMPANION_DEVICES" 3122 android:protectionLevel="signature" /> 3123 3124 <!-- @SystemApi Allows an application to use SurfaceFlinger's low level features. 3125 <p>Not for use by third-party applications. 3126 @hide 3127 --> 3128 <permission android:name="android.permission.ACCESS_SURFACE_FLINGER" 3129 android:protectionLevel="signature" /> 3130 3131 <!-- @SystemApi Allows an application to take screen shots and more generally 3132 get access to the frame buffer data. 3133 <p>Not for use by third-party applications. --> 3134 <permission android:name="android.permission.READ_FRAME_BUFFER" 3135 android:protectionLevel="signature|privileged" /> 3136 3137 <!-- Allows an application to use InputFlinger's low level features. 3138 @hide --> 3139 <permission android:name="android.permission.ACCESS_INPUT_FLINGER" 3140 android:protectionLevel="signature" /> 3141 3142 <!-- Allows an application to disable/enable input devices. 3143 Could be used to prevent unwanted touch events 3144 on a touchscreen, for example during swimming or rain. 3145 @hide --> 3146 <permission android:name="android.permission.DISABLE_INPUT_DEVICE" 3147 android:protectionLevel="signature" /> 3148 3149 <!-- Allows an application to configure and connect to Wifi displays 3150 @hide --> 3151 <permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY" 3152 android:protectionLevel="signature" /> 3153 3154 <!-- Allows an application to control low-level features of Wifi displays 3155 such as opening an RTSP socket. This permission should only be used 3156 by the display manager. 3157 @hide --> 3158 <permission android:name="android.permission.CONTROL_WIFI_DISPLAY" 3159 android:protectionLevel="signature" /> 3160 3161 <!-- Allows an application to control the color modes set for displays system-wide. 3162 <p>Not for use by third-party applications.</p> 3163 @hide --> 3164 <permission android:name="android.permission.CONFIGURE_DISPLAY_COLOR_MODE" 3165 android:protectionLevel="signature" /> 3166 3167 <!-- Allows an application to control the color saturation of the display. 3168 @hide 3169 @SystemApi --> 3170 <permission android:name="android.permission.CONTROL_DISPLAY_SATURATION" 3171 android:protectionLevel="signature|privileged" /> 3172 3173 <!-- Allows an application to collect usage infomation about brightness slider changes. 3174 <p>Not for use by third-party applications.</p> 3175 @hide 3176 @SystemApi 3177 @TestApi --> 3178 <permission android:name="android.permission.BRIGHTNESS_SLIDER_USAGE" 3179 android:protectionLevel="signature|privileged|development" /> 3180 3181 <!-- Allows an application to collect ambient light stats. 3182 <p>Not for use by third party applications.</p> 3183 @hide 3184 @SystemApi --> 3185 <permission android:name="android.permission.ACCESS_AMBIENT_LIGHT_STATS" 3186 android:protectionLevel="signature|privileged|development" /> 3187 3188 <!-- Allows an application to modify the display brightness configuration 3189 @hide 3190 @SystemApi 3191 @TestApi --> 3192 <permission android:name="android.permission.CONFIGURE_DISPLAY_BRIGHTNESS" 3193 android:protectionLevel="signature|privileged|development" /> 3194 3195 <!-- Allows an application to control the system's display brightness 3196 @hide --> 3197 <permission android:name="android.permission.CONTROL_DISPLAY_BRIGHTNESS" 3198 android:protectionLevel="signature" /> 3199 3200 <!-- @SystemApi Allows an application to control VPN. 3201 <p>Not for use by third-party applications.</p> 3202 @hide --> 3203 <permission android:name="android.permission.CONTROL_VPN" 3204 android:protectionLevel="signature|privileged" /> 3205 <uses-permission android:name="android.permission.CONTROL_VPN" /> 3206 3207 <!-- @SystemApi Allows an application to capture audio output. 3208 <p>Not for use by third-party applications.</p> --> 3209 <permission android:name="android.permission.CAPTURE_AUDIO_OUTPUT" 3210 android:protectionLevel="signature|privileged" /> 3211 3212 <!-- @SystemApi Allows an application to capture audio for hotword detection. 3213 <p>Not for use by third-party applications.</p> 3214 @hide --> 3215 <permission android:name="android.permission.CAPTURE_AUDIO_HOTWORD" 3216 android:protectionLevel="signature|privileged" /> 3217 3218 <!-- @SystemApi Allows an application to modify audio routing and override policy decisions. 3219 <p>Not for use by third-party applications.</p> 3220 @hide --> 3221 <permission android:name="android.permission.MODIFY_AUDIO_ROUTING" 3222 android:protectionLevel="signature|privileged" /> 3223 3224 <!-- @SystemApi Allows an application to capture video output. 3225 <p>Not for use by third-party applications.</p> --> 3226 <permission android:name="android.permission.CAPTURE_VIDEO_OUTPUT" 3227 android:protectionLevel="signature|privileged" /> 3228 3229 <!-- @SystemApi Allows an application to capture secure video output. 3230 <p>Not for use by third-party applications.</p> --> 3231 <permission android:name="android.permission.CAPTURE_SECURE_VIDEO_OUTPUT" 3232 android:protectionLevel="signature|privileged" /> 3233 3234 <!-- @SystemApi Allows an application to know what content is playing and control its playback. 3235 <p>Not for use by third-party applications due to privacy of media consumption</p> --> 3236 <permission android:name="android.permission.MEDIA_CONTENT_CONTROL" 3237 android:protectionLevel="signature|privileged" /> 3238 3239 <!-- @SystemApi @hide Allows an application to set the volume key long-press listener. 3240 <p>When it's set, the application will receive the volume key long-press event 3241 instead of changing volume.</p> 3242 <p>Not for use by third-party applications</p> --> 3243 <permission android:name="android.permission.SET_VOLUME_KEY_LONG_PRESS_LISTENER" 3244 android:protectionLevel="signature|privileged|development" /> 3245 3246 <!-- @SystemApi @hide Allows an application to set media key event listener. 3247 <p>When it's set, the application will receive the media key event before 3248 any other media sessions. If the event is handled by the listener, other sessions 3249 cannot get the event.</p> 3250 <p>Not for use by third-party applications</p> --> 3251 <permission android:name="android.permission.SET_MEDIA_KEY_LISTENER" 3252 android:protectionLevel="signature|privileged|development" /> 3253 3254 <!-- @SystemApi Required to be able to disable the device (very dangerous!). 3255 <p>Not for use by third-party applications. 3256 @hide 3257 --> 3258 <permission android:name="android.permission.BRICK" 3259 android:protectionLevel="signature" /> 3260 3261 <!-- @SystemApi Required to be able to reboot the device. 3262 <p>Not for use by third-party applications. --> 3263 <permission android:name="android.permission.REBOOT" 3264 android:protectionLevel="signature|privileged" /> 3265 3266 <!-- @SystemApi Allows low-level access to power management. 3267 <p>Not for use by third-party applications. 3268 @hide 3269 --> 3270 <permission android:name="android.permission.DEVICE_POWER" 3271 android:protectionLevel="signature" /> 3272 3273 <!-- Allows access to the PowerManager.userActivity function. 3274 <p>Not for use by third-party applications. @hide @SystemApi --> 3275 <permission android:name="android.permission.USER_ACTIVITY" 3276 android:protectionLevel="signature|privileged" /> 3277 3278 <!-- @hide Allows low-level access to tun tap driver --> 3279 <permission android:name="android.permission.NET_TUNNELING" 3280 android:protectionLevel="signature" /> 3281 3282 <!-- Run as a manufacturer test application, running as the root user. 3283 Only available when the device is running in manufacturer test mode. 3284 <p>Not for use by third-party applications. 3285 --> 3286 <permission android:name="android.permission.FACTORY_TEST" 3287 android:protectionLevel="signature" /> 3288 3289 <!-- Allows an application to broadcast a notification that an application 3290 package has been removed. 3291 <p>Not for use by third-party applications. 3292 --> 3293 <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED" 3294 android:protectionLevel="signature" /> 3295 3296 <!-- Allows an application to broadcast an SMS receipt notification. 3297 <p>Not for use by third-party applications. 3298 --> 3299 <permission android:name="android.permission.BROADCAST_SMS" 3300 android:protectionLevel="signature" /> 3301 3302 <!-- Allows an application to broadcast a WAP PUSH receipt notification. 3303 <p>Not for use by third-party applications. 3304 --> 3305 <permission android:name="android.permission.BROADCAST_WAP_PUSH" 3306 android:protectionLevel="signature" /> 3307 3308 <!-- @SystemApi Allows an application to broadcast privileged networking requests. 3309 <p>Not for use by third-party applications. 3310 @hide 3311 @deprecated Use {@link android.Manifest.permission#REQUEST_NETWORK_SCORES} instead 3312 --> 3313 <permission android:name="android.permission.BROADCAST_NETWORK_PRIVILEGED" 3314 android:protectionLevel="signature|privileged" /> 3315 3316 <!-- @SystemApi Not for use by third-party applications. --> 3317 <permission android:name="android.permission.MASTER_CLEAR" 3318 android:protectionLevel="signature|privileged" /> 3319 3320 <!-- @SystemApi Allows an application to call any phone number, including emergency 3321 numbers, without going through the Dialer user interface for the user 3322 to confirm the call being placed. 3323 <p>Not for use by third-party applications. --> 3324 <permission android:name="android.permission.CALL_PRIVILEGED" 3325 android:protectionLevel="signature|privileged" /> 3326 3327 <!-- @SystemApi Allows an application to perform CDMA OTA provisioning @hide --> 3328 <permission android:name="android.permission.PERFORM_CDMA_PROVISIONING" 3329 android:protectionLevel="signature|privileged" /> 3330 3331 <!-- @SystemApi Allows an application to perform SIM Activation @hide --> 3332 <permission android:name="android.permission.PERFORM_SIM_ACTIVATION" 3333 android:protectionLevel="signature|privileged" /> 3334 3335 <!-- @SystemApi Allows enabling/disabling location update notifications from 3336 the radio. 3337 <p>Not for use by third-party applications. --> 3338 <permission android:name="android.permission.CONTROL_LOCATION_UPDATES" 3339 android:protectionLevel="signature|privileged" /> 3340 3341 <!-- @SystemApi Allows read/write access to the "properties" table in the checkin 3342 database, to change values that get uploaded. 3343 <p>Not for use by third-party applications. --> 3344 <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES" 3345 android:protectionLevel="signature|privileged" /> 3346 3347 <!-- @SystemApi Allows an application to collect component usage 3348 statistics 3349 <p>Declaring the permission implies intention to use the API and the user of the 3350 device can grant permission through the Settings application. --> 3351 <permission android:name="android.permission.PACKAGE_USAGE_STATS" 3352 android:protectionLevel="signature|privileged|development|appop" /> 3353 <uses-permission android:name="android.permission.PACKAGE_USAGE_STATS" /> 3354 3355 <!-- @hide @SystemApi Allows an application to observe usage time of apps. The app can register 3356 for callbacks when apps reach a certain usage time limit, etc. --> 3357 <permission android:name="android.permission.OBSERVE_APP_USAGE" 3358 android:protectionLevel="signature|privileged" /> 3359 3360 <!-- @hide @SystemApi Allows an application to change the app idle state of an app. 3361 <p>Not for use by third-party applications. --> 3362 <permission android:name="android.permission.CHANGE_APP_IDLE_STATE" 3363 android:protectionLevel="signature|privileged" /> 3364 3365 <!-- @hide @SystemApi Allows an application to temporarily whitelist an inactive app to 3366 access the network and acquire wakelocks. 3367 <p>Not for use by third-party applications. --> 3368 <permission android:name="android.permission.CHANGE_DEVICE_IDLE_TEMP_WHITELIST" 3369 android:protectionLevel="signature|privileged" /> 3370 3371 <!-- Permission an application must hold in order to use 3372 {@link android.provider.Settings#ACTION_REQUEST_IGNORE_BATTERY_OPTIMIZATIONS}. 3373 This is a normal permission: an app requesting it will always be granted the 3374 permission, without the user needing to approve or see it. --> 3375 <permission android:name="android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS" 3376 android:label="@string/permlab_requestIgnoreBatteryOptimizations" 3377 android:description="@string/permdesc_requestIgnoreBatteryOptimizations" 3378 android:protectionLevel="normal" /> 3379 3380 <!-- @SystemApi Allows an application to collect battery statistics --> 3381 <permission android:name="android.permission.BATTERY_STATS" 3382 android:protectionLevel="signature|privileged|development" /> 3383 3384 <!--Allows an application to manage statscompanion. 3385 <p>Not for use by third-party applications. 3386 @hide --> 3387 <permission android:name="android.permission.STATSCOMPANION" 3388 android:protectionLevel="signature" /> 3389 3390 <!-- @SystemApi Allows an application to control the backup and restore process. 3391 <p>Not for use by third-party applications. 3392 @hide pending API council --> 3393 <permission android:name="android.permission.BACKUP" 3394 android:protectionLevel="signature|privileged" /> 3395 3396 <!-- @SystemApi Allows application to manage 3397 {@link android.security.keystore.recovery.RecoveryController}. 3398 <p>Not for use by third-party applications. 3399 @hide --> 3400 <permission android:name="android.permission.RECOVER_KEYSTORE" 3401 android:protectionLevel="signature|privileged" /> 3402 3403 <!-- Allows a package to launch the secure full-backup confirmation UI. 3404 ONLY the system process may hold this permission. 3405 @hide --> 3406 <permission android:name="android.permission.CONFIRM_FULL_BACKUP" 3407 android:protectionLevel="signature" /> 3408 3409 <!-- @SystemApi Must be required by a {@link android.widget.RemoteViewsService}, 3410 to ensure that only the system can bind to it. --> 3411 <permission android:name="android.permission.BIND_REMOTEVIEWS" 3412 android:protectionLevel="signature|privileged" /> 3413 3414 <!-- @SystemApi Allows an application to tell the AppWidget service which application 3415 can access AppWidget's data. The normal user flow is that a user 3416 picks an AppWidget to go into a particular host, thereby giving that 3417 host application access to the private data from the AppWidget app. 3418 An application that has this permission should honor that contract. 3419 <p>Not for use by third-party applications. --> 3420 <permission android:name="android.permission.BIND_APPWIDGET" 3421 android:protectionLevel="signature|privileged" /> 3422 3423 <!-- @hide Allows sysui to manage user grants of slice permissions. --> 3424 <permission android:name="android.permission.MANAGE_SLICE_PERMISSIONS" 3425 android:protectionLevel="signature" /> 3426 3427 <!-- @SystemApi Private permission, to restrict who can bring up a dialog to add a new 3428 keyguard widget 3429 @hide --> 3430 <permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET" 3431 android:protectionLevel="signature|privileged" /> 3432 3433 <!-- @SystemApi Internal permission allowing an application to query/set which 3434 applications can bind AppWidgets. 3435 @hide --> 3436 <permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS" 3437 android:protectionLevel="signature|privileged" /> 3438 3439 <!-- Allows applications to change the background data setting. 3440 <p>Not for use by third-party applications. 3441 @hide pending API council --> 3442 <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING" 3443 android:protectionLevel="signature" /> 3444 3445 <!-- @SystemApi This permission can be used on content providers to allow the global 3446 search system to access their data. Typically it used when the 3447 provider has some permissions protecting it (which global search 3448 would not be expected to hold), and added as a read-only permission 3449 to the path in the provider where global search queries are 3450 performed. This permission can not be held by regular applications; 3451 it is used by applications to protect themselves from everyone else 3452 besides global search. --> 3453 <permission android:name="android.permission.GLOBAL_SEARCH" 3454 android:protectionLevel="signature|privileged" /> 3455 3456 <!-- Internal permission protecting access to the global search 3457 system: ensures that only the system can access the provider 3458 to perform queries (since this otherwise provides unrestricted 3459 access to a variety of content providers), and to write the 3460 search statistics (to keep applications from gaming the source 3461 ranking). 3462 @hide --> 3463 <permission android:name="android.permission.GLOBAL_SEARCH_CONTROL" 3464 android:protectionLevel="signature" /> 3465 3466 <!-- @SystemApi Internal permission to allows an application to read indexable data. 3467 @hide --> 3468 <permission android:name="android.permission.READ_SEARCH_INDEXABLES" 3469 android:protectionLevel="signature|privileged" /> 3470 3471 <!-- @SystemApi Internal permission to allows an application to bind to suggestion service. 3472 @hide --> 3473 <permission android:name="android.permission.BIND_SETTINGS_SUGGESTIONS_SERVICE" 3474 android:protectionLevel="signature" /> 3475 3476 <!-- @SystemApi Allows applications to set a live wallpaper. 3477 @hide XXX Change to signature once the picker is moved to its 3478 own apk as Ghod Intended. --> 3479 <permission android:name="android.permission.SET_WALLPAPER_COMPONENT" 3480 android:protectionLevel="signature|privileged" /> 3481 3482 <!-- @SystemApi Allows applications to read dream settings and dream state. 3483 @hide --> 3484 <permission android:name="android.permission.READ_DREAM_STATE" 3485 android:protectionLevel="signature|privileged" /> 3486 3487 <!-- @SystemApi Allows applications to write dream settings, and start or stop dreaming. 3488 @hide --> 3489 <permission android:name="android.permission.WRITE_DREAM_STATE" 3490 android:protectionLevel="signature|privileged" /> 3491 3492 <!-- @SystemApi Allow an application to read and write the cache partition. 3493 @hide --> 3494 <permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM" 3495 android:protectionLevel="signature|privileged" /> 3496 3497 <!-- Must be required by default container service so that only 3498 the system can bind to it and use it to copy 3499 protected data to secure containers or files 3500 accessible to the system. 3501 @hide --> 3502 <permission android:name="android.permission.COPY_PROTECTED_DATA" 3503 android:protectionLevel="signature" /> 3504 3505 <!-- @SystemApi Internal permission protecting access to the encryption methods 3506 @hide 3507 --> 3508 <permission android:name="android.permission.CRYPT_KEEPER" 3509 android:protectionLevel="signature|privileged" /> 3510 3511 <!-- @SystemApi Allows an application to read historical network usage for 3512 specific networks and applications. @hide --> 3513 <permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY" 3514 android:protectionLevel="signature|privileged" /> 3515 3516 <!-- Allows an application to manage network policies (such as warning and disable 3517 limits) and to define application-specific rules. @hide --> 3518 <permission android:name="android.permission.MANAGE_NETWORK_POLICY" 3519 android:protectionLevel="signature" /> 3520 3521 <!-- @SystemApi @hide @deprecated use UPDATE_DEVICE_STATS instead --> 3522 <permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING" 3523 android:protectionLevel="signature|privileged" /> 3524 3525 <!-- @SystemApi @hide Allows an application to manage carrier subscription plans. --> 3526 <permission android:name="android.permission.MANAGE_SUBSCRIPTION_PLANS" 3527 android:protectionLevel="signature|privileged" /> 3528 3529 <!-- C2DM permission. 3530 @hide Used internally. 3531 --> 3532 <permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE" 3533 android:protectionLevel="signature" /> 3534 <uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/> 3535 3536 <!-- @SystemApi @hide Package verifier needs to have this permission before the PackageManager will 3537 trust it to verify packages. 3538 --> 3539 <permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT" 3540 android:protectionLevel="signature|privileged" /> 3541 3542 <!-- Must be required by package verifier receiver, to ensure that only the 3543 system can interact with it. 3544 @hide 3545 --> 3546 <permission android:name="android.permission.BIND_PACKAGE_VERIFIER" 3547 android:protectionLevel="signature" /> 3548 3549 <!-- @SystemApi @hide Allows an application to mark other applications as harmful --> 3550 <permission android:name="android.permission.SET_HARMFUL_APP_WARNINGS" 3551 android:protectionLevel="signature|verifier" /> 3552 3553 <!-- @SystemApi @hide Intent filter verifier needs to have this permission before the 3554 PackageManager will trust it to verify intent filters. 3555 --> 3556 <permission android:name="android.permission.INTENT_FILTER_VERIFICATION_AGENT" 3557 android:protectionLevel="signature|privileged" /> 3558 3559 <!-- Must be required by intent filter verifier receiver, to ensure that only the 3560 system can interact with it. 3561 @hide 3562 --> 3563 <permission android:name="android.permission.BIND_INTENT_FILTER_VERIFIER" 3564 android:protectionLevel="signature" /> 3565 3566 <!-- @SystemApi Allows applications to access serial ports via the SerialManager. 3567 @hide --> 3568 <permission android:name="android.permission.SERIAL_PORT" 3569 android:protectionLevel="signature|privileged" /> 3570 3571 <!-- Allows the holder to access content providers from outside an ApplicationThread. 3572 This permission is enforced by the ActivityManagerService on the corresponding APIs, 3573 in particular ActivityManagerService#getContentProviderExternal(String) and 3574 ActivityManagerService#removeContentProviderExternal(String). 3575 @hide 3576 --> 3577 <permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY" 3578 android:protectionLevel="signature" /> 3579 3580 <!-- @SystemApi Allows an application to hold an UpdateLock, recommending that a headless 3581 OTA reboot *not* occur while the lock is held. 3582 @hide --> 3583 <permission android:name="android.permission.UPDATE_LOCK" 3584 android:protectionLevel="signature|privileged" /> 3585 3586 <!-- @SystemApi Allows an application to read the current set of notifications, including 3587 any metadata and intents attached. 3588 @hide --> 3589 <permission android:name="android.permission.ACCESS_NOTIFICATIONS" 3590 android:protectionLevel="signature|privileged|appop" /> 3591 3592 <!-- Marker permission for applications that wish to access notification policy. 3593 <p>Protection level: normal 3594 --> 3595 <permission android:name="android.permission.ACCESS_NOTIFICATION_POLICY" 3596 android:description="@string/permdesc_access_notification_policy" 3597 android:label="@string/permlab_access_notification_policy" 3598 android:protectionLevel="normal" /> 3599 3600 <!-- Allows modification of do not disturb rules and policies. Only allowed for system 3601 processes. 3602 @hide --> 3603 <permission android:name="android.permission.MANAGE_NOTIFICATIONS" 3604 android:protectionLevel="signature" /> 3605 3606 <!-- Allows notifications to be colorized 3607 <p>Not for use by third-party applications. @hide --> 3608 <permission android:name="android.permission.USE_COLORIZED_NOTIFICATIONS" 3609 android:protectionLevel="signature|setup" /> 3610 3611 <!-- Allows access to keyguard secure storage. Only allowed for system processes. 3612 @hide --> 3613 <permission android:name="android.permission.ACCESS_KEYGUARD_SECURE_STORAGE" 3614 android:protectionLevel="signature" /> 3615 3616 <!-- Allows managing (adding, removing) fingerprint templates. Reserved for the system. @hide --> 3617 <permission android:name="android.permission.MANAGE_FINGERPRINT" 3618 android:protectionLevel="signature|privileged" /> 3619 3620 <!-- Allows an app to reset fingerprint attempt counter. Reserved for the system. @hide --> 3621 <permission android:name="android.permission.RESET_FINGERPRINT_LOCKOUT" 3622 android:protectionLevel="signature" /> 3623 3624 <!-- Allows an application to control keyguard. Only allowed for system processes. 3625 @hide --> 3626 <permission android:name="android.permission.CONTROL_KEYGUARD" 3627 android:protectionLevel="signature" /> 3628 3629 <!-- Allows an application to listen to trust changes. Only allowed for system processes. 3630 @hide --> 3631 <permission android:name="android.permission.TRUST_LISTENER" 3632 android:protectionLevel="signature" /> 3633 3634 <!-- @SystemApi Allows an application to provide a trust agent. 3635 @hide For security reasons, this is a platform-only permission. --> 3636 <permission android:name="android.permission.PROVIDE_TRUST_AGENT" 3637 android:protectionLevel="signature|privileged" /> 3638 3639 <!-- @SystemApi Allows an application to show a message 3640 on the keyguard when asking to dismiss it. 3641 @hide For security reasons, this is a platform-only permission. --> 3642 <permission android:name="android.permission.SHOW_KEYGUARD_MESSAGE" 3643 android:protectionLevel="signature|privileged" /> 3644 3645 <!-- Allows an application to launch the trust agent settings activity. 3646 @hide --> 3647 <permission android:name="android.permission.LAUNCH_TRUST_AGENT_SETTINGS" 3648 android:protectionLevel="signature|privileged" /> 3649 3650 <!-- @SystemApi Must be required by an {@link 3651 android.service.trust.TrustAgentService}, 3652 to ensure that only the system can bind to it. 3653 @hide --> 3654 <permission android:name="android.permission.BIND_TRUST_AGENT" 3655 android:protectionLevel="signature" /> 3656 3657 <!-- Must be required by an {@link 3658 android.service.notification.NotificationListenerService}, 3659 to ensure that only the system can bind to it. 3660 <p>Protection level: signature 3661 --> 3662 <permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE" 3663 android:protectionLevel="signature" /> 3664 3665 <!-- @SystemApi Must be required by an {@link 3666 android.service.notification.NotificationAssistantService} to ensure that only the system 3667 can bind to it. 3668 <p>Protection level: signature 3669 @hide 3670 --> 3671 <permission android:name="android.permission.BIND_NOTIFICATION_ASSISTANT_SERVICE" 3672 android:protectionLevel="signature" /> 3673 3674 <!-- Must be required by a {@link 3675 android.service.chooser.ChooserTargetService}, to ensure that 3676 only the system can bind to it. 3677 <p>Protection level: signature 3678 --> 3679 <permission android:name="android.permission.BIND_CHOOSER_TARGET_SERVICE" 3680 android:protectionLevel="signature" /> 3681 3682 <!-- @SystemApi Must be held by services that extend 3683 {@link android.service.resolver.ResolverRankerService}. 3684 <p>Protection level: signature|privileged 3685 @hide 3686 --> 3687 <permission android:name="android.permission.PROVIDE_RESOLVER_RANKER_SERVICE" 3688 android:protectionLevel="signature|privileged" /> 3689 3690 <!-- @SystemApi Must be required by services that extend 3691 {@link android.service.resolver.ResolverRankerService}, to ensure that only the system can 3692 bind to them. 3693 <p>Protection level: signature 3694 @hide 3695 --> 3696 <permission android:name="android.permission.BIND_RESOLVER_RANKER_SERVICE" 3697 android:protectionLevel="signature" /> 3698 3699 <!-- Must be required by a {@link 3700 android.service.notification.ConditionProviderService}, 3701 to ensure that only the system can bind to it. 3702 <p>Protection level: signature 3703 --> 3704 <permission android:name="android.permission.BIND_CONDITION_PROVIDER_SERVICE" 3705 android:protectionLevel="signature" /> 3706 3707 <!-- Must be required by an {@link android.service.dreams.DreamService}, 3708 to ensure that only the system can bind to it. 3709 <p>Protection level: signature 3710 --> 3711 <permission android:name="android.permission.BIND_DREAM_SERVICE" 3712 android:protectionLevel="signature" /> 3713 3714 <!-- Must be required by an {@link android.app.usage.CacheQuotaService} to ensure that only the 3715 system can bind to it. 3716 @hide This is not a third-party API (intended for OEMs and system apps). 3717 --> 3718 <permission android:name="android.permission.BIND_CACHE_QUOTA_SERVICE" 3719 android:protectionLevel="signature" /> 3720 3721 <!-- @SystemApi Allows an application to call into a carrier setup flow. It is up to the 3722 carrier setup application to enforce that this permission is required 3723 @hide This is not a third-party API (intended for OEMs and system apps). --> 3724 <permission android:name="android.permission.INVOKE_CARRIER_SETUP" 3725 android:protectionLevel="signature|privileged" /> 3726 3727 <!-- @SystemApi Allows an application to listen for network condition observations. 3728 @hide This is not a third-party API (intended for system apps). --> 3729 <permission android:name="android.permission.ACCESS_NETWORK_CONDITIONS" 3730 android:protectionLevel="signature|privileged" /> 3731 3732 <!-- @SystemApi Allows an application to provision and access DRM certificates 3733 @hide This is not a third-party API (intended for system apps). --> 3734 <permission android:name="android.permission.ACCESS_DRM_CERTIFICATES" 3735 android:protectionLevel="signature|privileged" /> 3736 3737 <!-- Api Allows an application to manage media projection sessions. 3738 @hide This is not a third-party API (intended for system apps). --> 3739 <permission android:name="android.permission.MANAGE_MEDIA_PROJECTION" 3740 android:protectionLevel="signature" /> 3741 3742 <!-- @SystemApi Allows an application to read install sessions 3743 @hide This is not a third-party API (intended for system apps). --> 3744 <permission android:name="android.permission.READ_INSTALL_SESSIONS" 3745 android:label="@string/permlab_readInstallSessions" 3746 android:description="@string/permdesc_readInstallSessions" 3747 android:protectionLevel="normal"/> 3748 3749 <!-- @SystemApi Allows an application to remove DRM certificates 3750 @hide This is not a third-party API (intended for system apps). --> 3751 <permission android:name="android.permission.REMOVE_DRM_CERTIFICATES" 3752 android:protectionLevel="signature|privileged" /> 3753 3754 <!-- @deprecated Use {@link android.Manifest.permission#BIND_CARRIER_SERVICES} instead --> 3755 <permission android:name="android.permission.BIND_CARRIER_MESSAGING_SERVICE" 3756 android:protectionLevel="signature|privileged" /> 3757 3758 <!-- Allows an application to interact with the currently active 3759 {@link android.service.voice.VoiceInteractionService}. 3760 @hide --> 3761 <permission android:name="android.permission.ACCESS_VOICE_INTERACTION_SERVICE" 3762 android:protectionLevel="signature" /> 3763 3764 <!-- The system process that is allowed to bind to services in carrier apps will 3765 have this permission. Carrier apps should use this permission to protect 3766 their services that only the system is allowed to bind to. 3767 <p>Protection level: signature|privileged 3768 --> 3769 <permission android:name="android.permission.BIND_CARRIER_SERVICES" 3770 android:label="@string/permlab_bindCarrierServices" 3771 android:description="@string/permdesc_bindCarrierServices" 3772 android:protectionLevel="signature|privileged" /> 3773 3774 <!-- Allows an application to query whether DO_NOT_ASK_CREDENTIALS_ON_BOOT 3775 flag is set. 3776 @hide --> 3777 <permission android:name="android.permission.QUERY_DO_NOT_ASK_CREDENTIALS_ON_BOOT" 3778 android:protectionLevel="signature" /> 3779 3780 <!-- @SystemApi Allows applications to kill UIDs. 3781 <p>Not for use by third-party applications. 3782 @hide --> 3783 <permission android:name="android.permission.KILL_UID" 3784 android:protectionLevel="signature|installer" /> 3785 3786 <!-- @SystemApi Allows applications to read the local WiFi and Bluetooth MAC address. 3787 @hide --> 3788 <permission android:name="android.permission.LOCAL_MAC_ADDRESS" 3789 android:protectionLevel="signature|privileged" /> 3790 <uses-permission android:name="android.permission.LOCAL_MAC_ADDRESS"/> 3791 3792 <!-- @SystemApi Allows access to MAC addresses of WiFi and Bluetooth peer devices. 3793 @hide --> 3794 <permission android:name="android.permission.PEERS_MAC_ADDRESS" 3795 android:protectionLevel="signature|setup" /> 3796 3797 <!-- Allows the Nfc stack to dispatch Nfc messages to applications. Applications 3798 can use this permission to ensure incoming Nfc messages are from the Nfc stack 3799 and not simulated by another application. 3800 @hide --> 3801 <permission android:name="android.permission.DISPATCH_NFC_MESSAGE" 3802 android:protectionLevel="signature|privileged" /> 3803 3804 <!-- @SystemApi Allows changing day / night mode when system is configured with 3805 config_lockDayNightMode set to true. If requesting app does not have permission, 3806 it will be ignored. 3807 @hide --> 3808 <permission android:name="android.permission.MODIFY_DAY_NIGHT_MODE" 3809 android:protectionLevel="signature|privileged" /> 3810 3811 <!-- The system process is explicitly the only one allowed to launch the 3812 confirmation UI for full backup/restore --> 3813 <uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/> 3814 3815 <!-- Allows the holder to access and manage instant applications on the device. 3816 @hide --> 3817 <permission android:name="android.permission.ACCESS_INSTANT_APPS" 3818 android:protectionLevel="signature|installer|verifier" /> 3819 <uses-permission android:name="android.permission.ACCESS_INSTANT_APPS"/> 3820 3821 <!-- Allows the holder to view the instant applications on the device. 3822 @hide --> 3823 <permission android:name="android.permission.VIEW_INSTANT_APPS" 3824 android:protectionLevel="signature|preinstalled" /> 3825 3826 <!-- Allows the holder to manage whether the system can bind to services 3827 provided by instant apps. This permission is intended to protect 3828 test/development fucntionality and should be used only in such cases. 3829 @hide --> 3830 <permission android:name="android.permission.MANAGE_BIND_INSTANT_SERVICE" 3831 android:protectionLevel="signature" /> 3832 3833 <!-- Allows receiving the usage of media resource e.g. video/audio codec and 3834 graphic memory. 3835 @hide --> 3836 <permission android:name="android.permission.RECEIVE_MEDIA_RESOURCE_USAGE" 3837 android:protectionLevel="signature|privileged" /> 3838 3839 <!-- Must be required by system/priv apps when accessing the sound trigger 3840 APIs given by {@link SoundTriggerManager}. 3841 @hide 3842 @SystemApi --> 3843 <permission android:name="android.permission.MANAGE_SOUND_TRIGGER" 3844 android:protectionLevel="signature|privileged" /> 3845 3846 <!-- Must be required by system/priv apps implementing sound trigger detection services 3847 @hide 3848 @SystemApi --> 3849 <permission android:name="android.permission.BIND_SOUND_TRIGGER_DETECTION_SERVICE" 3850 android:protectionLevel="signature" /> 3851 3852 <!-- @SystemApi Allows trusted applications to dispatch managed provisioning message to Managed 3853 Provisioning app. If requesting app does not have permission, it will be ignored. 3854 @hide --> 3855 <permission android:name="android.permission.DISPATCH_PROVISIONING_MESSAGE" 3856 android:protectionLevel="signature|privileged" /> 3857 3858 <!-- Allows the holder to read blocked numbers. See 3859 {@link android.provider.BlockedNumberContract}. 3860 @hide --> 3861 <permission android:name="android.permission.READ_BLOCKED_NUMBERS" 3862 android:protectionLevel="signature" /> 3863 3864 <!-- Allows the holder to write blocked numbers. See 3865 {@link android.provider.BlockedNumberContract}. 3866 @hide --> 3867 <permission android:name="android.permission.WRITE_BLOCKED_NUMBERS" 3868 android:protectionLevel="signature" /> 3869 3870 <!-- Must be required by an {@link android.service.vr.VrListenerService}, to ensure that only 3871 the system can bind to it. 3872 <p>Protection level: signature --> 3873 <permission android:name="android.permission.BIND_VR_LISTENER_SERVICE" 3874 android:protectionLevel="signature" /> 3875 3876 <!-- Must be required by system apps when accessing restricted VR APIs. 3877 @hide 3878 @SystemApi 3879 <p>Protection level: signature --> 3880 <permission android:name="android.permission.RESTRICTED_VR_ACCESS" 3881 android:protectionLevel="signature|preinstalled" /> 3882 3883 <!-- Required to make calls to {@link android.service.vr.IVrManager}. 3884 @hide --> 3885 <permission android:name="android.permission.ACCESS_VR_MANAGER" 3886 android:protectionLevel="signature" /> 3887 3888 <!-- Required to access VR-Mode state and state change events via {android.app.VrStateCallback} 3889 @hide --> 3890 <permission android:name="android.permission.ACCESS_VR_STATE" 3891 android:protectionLevel="signature|preinstalled" /> 3892 3893 <!-- Allows an application to whitelist tasks during lock task mode 3894 @hide <p>Not for use by third-party applications.</p> --> 3895 <permission android:name="android.permission.UPDATE_LOCK_TASK_PACKAGES" 3896 android:protectionLevel="signature|setup" /> 3897 3898 <!-- @SystemApi Allows an application to replace the app name displayed alongside notifications 3899 in the N-release and later. 3900 @hide <p>Not for use by third-party applications.</p> --> 3901 <permission android:name="android.permission.SUBSTITUTE_NOTIFICATION_APP_NAME" 3902 android:protectionLevel="signature|privileged" /> 3903 3904 <!-- @SystemApi Allows an application to show notifications before the device is provisioned. 3905 @hide <p>Not for use by third-party applications.</p> --> 3906 <permission android:name="android.permission.NOTIFICATION_DURING_SETUP" 3907 android:protectionLevel="signature|privileged" /> 3908 3909 <!-- @SystemApi Allows an application to manage auto-fill sessions. 3910 @hide <p>Not for use by third-party applications.</p> --> 3911 <permission android:name="android.permission.MANAGE_AUTO_FILL" 3912 android:protectionLevel="signature" /> 3913 3914 <!-- Allows an app to set the theme overlay in /vendor/overlay 3915 being used. 3916 @hide <p>Not for use by third-party applications.</p> --> 3917 <permission android:name="android.permission.MODIFY_THEME_OVERLAY" 3918 android:protectionLevel="signature" /> 3919 3920 <!-- Allows an instant app to create foreground services. --> 3921 <permission android:name="android.permission.INSTANT_APP_FOREGROUND_SERVICE" 3922 android:protectionLevel="signature|development|instant|appop" /> 3923 3924 <!-- Allows a regular application to use {@link android.app.Service#startForeground 3925 Service.startForeground}. 3926 <p>Protection level: normal 3927 --> 3928 <permission android:name="android.permission.FOREGROUND_SERVICE" 3929 android:description="@string/permdesc_foregroundService" 3930 android:label="@string/permlab_foregroundService" 3931 android:protectionLevel="normal|instant" /> 3932 3933 <!-- @SystemApi Allows to access all app shortcuts. 3934 @hide --> 3935 <permission android:name="android.permission.ACCESS_SHORTCUTS" 3936 android:protectionLevel="signature|textClassifier" /> 3937 3938 <!-- @SystemApi Allows unlimited calls to shortcut mutation APIs. 3939 @hide --> 3940 <permission android:name="android.permission.UNLIMITED_SHORTCUTS_API_CALLS" 3941 android:protectionLevel="signature|textClassifier" /> 3942 3943 <!-- @SystemApi Allows an application to read the runtime profiles of other apps. 3944 @hide <p>Not for use by third-party applications. --> 3945 <permission android:name="android.permission.READ_RUNTIME_PROFILES" 3946 android:protectionLevel="signature|privileged" /> 3947 3948 <!-- @hide Allows audio policy management. --> 3949 <permission android:name="android.permission.MANAGE_AUDIO_POLICY" 3950 android:protectionLevel="signature" /> 3951 3952 <!-- @SystemApi Allows an application to turn on / off quiet mode. 3953 @hide <p>Not for use by third-party applications. --> 3954 <permission android:name="android.permission.MODIFY_QUIET_MODE" 3955 android:protectionLevel="signature|privileged" /> 3956 3957 <!-- Allows internal management of the camera framework 3958 @hide --> 3959 <permission android:name="android.permission.MANAGE_CAMERA" 3960 android:protectionLevel="signature" /> 3961 3962 <!-- Allows an application to control remote animations. See 3963 {@link ActivityOptions#makeRemoteAnimation} 3964 @hide <p>Not for use by third-party applications. --> 3965 <permission android:name="android.permission.CONTROL_REMOTE_APP_TRANSITION_ANIMATIONS" 3966 android:protectionLevel="signature|privileged" /> 3967 3968 <!-- Allows an application to watch changes and/or active state of app ops. 3969 @hide <p>Not for use by third-party applications. --> 3970 <permission android:name="android.permission.WATCH_APPOPS" 3971 android:protectionLevel="signature" /> 3972 3973 <!-- Allows an application to directly open the "Open by default" page inside a package's 3974 Details screen. 3975 @hide <p>Not for use by third-party applications. --> 3976 <permission android:name="android.permission.OPEN_APPLICATION_DETAILS_OPEN_BY_DEFAULT_PAGE" 3977 android:protectionLevel="signature" /> 3978 3979 <!-- Allows hidden API checks to be disabled when starting a process. 3980 @hide <p>Not for use by third-party applications. --> 3981 <permission android:name="android.permission.DISABLE_HIDDEN_API_CHECKS" 3982 android:protectionLevel="signature" /> 3983 3984 <application android:process="system" 3985 android:persistent="true" 3986 android:hasCode="false" 3987 android:label="@string/android_system_label" 3988 android:allowClearUserData="false" 3989 android:backupAgent="com.android.server.backup.SystemBackupAgent" 3990 android:killAfterRestore="false" 3991 android:icon="@drawable/ic_launcher_android" 3992 android:supportsRtl="true" 3993 android:theme="@style/Theme.DeviceDefault.Light.DarkActionBar" 3994 android:defaultToDeviceProtectedStorage="true" 3995 android:directBootAware="true"> 3996 <activity android:name="com.android.internal.app.ChooserActivity" 3997 android:theme="@style/Theme.DeviceDefault.Resolver" 3998 android:finishOnCloseSystemDialogs="true" 3999 android:excludeFromRecents="true" 4000 android:documentLaunchMode="never" 4001 android:relinquishTaskIdentity="true" 4002 android:configChanges="screenSize|smallestScreenSize|screenLayout|orientation|keyboard|keyboardHidden" 4003 android:process=":ui" 4004 android:visibleToInstantApps="true"> 4005 <intent-filter> 4006 <action android:name="android.intent.action.CHOOSER" /> 4007 <category android:name="android.intent.category.DEFAULT" /> 4008 <category android:name="android.intent.category.VOICE" /> 4009 </intent-filter> 4010 </activity> 4011 <activity android:name="com.android.internal.app.AccessibilityButtonChooserActivity" 4012 android:exported="false" 4013 android:theme="@style/Theme.DeviceDefault.Resolver" 4014 android:finishOnCloseSystemDialogs="true" 4015 android:excludeFromRecents="true" 4016 android:documentLaunchMode="never" 4017 android:relinquishTaskIdentity="true" 4018 android:configChanges="screenSize|smallestScreenSize|screenLayout|orientation|keyboard|keyboardHidden" 4019 android:process=":ui" 4020 android:visibleToInstantApps="true"> 4021 <intent-filter> 4022 <action android:name="com.android.internal.intent.action.CHOOSE_ACCESSIBILITY_BUTTON" /> 4023 <category android:name="android.intent.category.DEFAULT" /> 4024 </intent-filter> 4025 </activity> 4026 <activity android:name="com.android.internal.app.IntentForwarderActivity" 4027 android:finishOnCloseSystemDialogs="true" 4028 android:theme="@style/Theme.NoDisplay" 4029 android:excludeFromRecents="true" 4030 android:label="@string/user_owner_label" 4031 android:exported="true" 4032 android:visibleToInstantApps="true" 4033 > 4034 </activity> 4035 <activity-alias android:name="com.android.internal.app.ForwardIntentToParent" 4036 android:targetActivity="com.android.internal.app.IntentForwarderActivity" 4037 android:exported="true" 4038 android:label="@string/user_owner_label"> 4039 </activity-alias> 4040 <activity-alias android:name="com.android.internal.app.ForwardIntentToManagedProfile" 4041 android:targetActivity="com.android.internal.app.IntentForwarderActivity" 4042 android:icon="@drawable/ic_corp_badge" 4043 android:exported="true" 4044 android:label="@string/managed_profile_label"> 4045 </activity-alias> 4046 <activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity" 4047 android:theme="@style/Theme.DeviceDefault.Light.Dialog" 4048 android:label="@string/heavy_weight_switcher_title" 4049 android:finishOnCloseSystemDialogs="true" 4050 android:excludeFromRecents="true" 4051 android:process=":ui"> 4052 </activity> 4053 <activity android:name="com.android.internal.app.PlatLogoActivity" 4054 android:theme="@style/Theme.Wallpaper.NoTitleBar.Fullscreen" 4055 android:configChanges="orientation|keyboardHidden" 4056 android:process=":ui"> 4057 </activity> 4058 <activity android:name="com.android.internal.app.DisableCarModeActivity" 4059 android:theme="@style/Theme.NoDisplay" 4060 android:excludeFromRecents="true" 4061 android:process=":ui"> 4062 </activity> 4063 <activity android:name="com.android.internal.app.DumpHeapActivity" 4064 android:theme="@style/Theme.Translucent.NoTitleBar" 4065 android:label="@string/dump_heap_title" 4066 android:finishOnCloseSystemDialogs="true" 4067 android:noHistory="true" 4068 android:excludeFromRecents="true" 4069 android:process=":ui"> 4070 </activity> 4071 <provider android:name="com.android.server.am.DumpHeapProvider" 4072 android:authorities="com.android.server.heapdump" 4073 android:grantUriPermissions="true" 4074 android:multiprocess="false" 4075 android:singleUser="true" /> 4076 4077 <activity android:name="android.accounts.ChooseAccountActivity" 4078 android:excludeFromRecents="true" 4079 android:exported="true" 4080 android:theme="@style/Theme.DeviceDefault.Light.Dialog" 4081 android:label="@string/choose_account_label" 4082 android:process=":ui" 4083 android:visibleToInstantApps="true"> 4084 </activity> 4085 4086 <activity android:name="android.accounts.ChooseTypeAndAccountActivity" 4087 android:excludeFromRecents="true" 4088 android:exported="true" 4089 android:theme="@style/Theme.DeviceDefault.Light.Dialog" 4090 android:label="@string/choose_account_label" 4091 android:process=":ui" 4092 android:visibleToInstantApps="true"> 4093 </activity> 4094 4095 <activity android:name="android.accounts.ChooseAccountTypeActivity" 4096 android:excludeFromRecents="true" 4097 android:theme="@style/Theme.DeviceDefault.Light.Dialog" 4098 android:label="@string/choose_account_label" 4099 android:process=":ui" 4100 android:visibleToInstantApps="true"> 4101 </activity> 4102 4103 <activity android:name="android.accounts.CantAddAccountActivity" 4104 android:excludeFromRecents="true" 4105 android:exported="true" 4106 android:theme="@style/Theme.DeviceDefault.Light.Dialog.NoActionBar" 4107 android:process=":ui"> 4108 </activity> 4109 4110 <activity android:name="android.accounts.GrantCredentialsPermissionActivity" 4111 android:excludeFromRecents="true" 4112 android:exported="true" 4113 android:theme="@style/Theme.DeviceDefault.Light.DialogWhenLarge" 4114 android:process=":ui" 4115 android:visibleToInstantApps="true"> 4116 </activity> 4117 4118 <activity android:name="android.content.SyncActivityTooManyDeletes" 4119 android:theme="@style/Theme.DeviceDefault.Light.Dialog" 4120 android:label="@string/sync_too_many_deletes" 4121 android:process=":ui"> 4122 </activity> 4123 4124 <activity android:name="com.android.internal.app.ShutdownActivity" 4125 android:permission="android.permission.SHUTDOWN" 4126 android:theme="@style/Theme.NoDisplay" 4127 android:excludeFromRecents="true"> 4128 <intent-filter> 4129 <action android:name="com.android.internal.intent.action.REQUEST_SHUTDOWN" /> 4130 <category android:name="android.intent.category.DEFAULT" /> 4131 </intent-filter> 4132 <intent-filter> 4133 <action android:name="android.intent.action.REBOOT" /> 4134 <category android:name="android.intent.category.DEFAULT" /> 4135 </intent-filter> 4136 </activity> 4137 4138 <activity android:name="com.android.internal.app.NetInitiatedActivity" 4139 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert" 4140 android:excludeFromRecents="true" 4141 android:process=":ui"> 4142 </activity> 4143 4144 <activity android:name="com.android.internal.app.SystemUserHomeActivity" 4145 android:enabled="false" 4146 android:process=":ui" 4147 android:systemUserOnly="true" 4148 android:theme="@style/Theme.Translucent.NoTitleBar"> 4149 <intent-filter android:priority="-100"> 4150 <action android:name="android.intent.action.MAIN" /> 4151 <category android:name="android.intent.category.HOME" /> 4152 </intent-filter> 4153 </activity> 4154 4155 <!-- Activity to prompt user if it's ok to create a new user sandbox for a 4156 specified account. --> 4157 <activity android:name="com.android.internal.app.ConfirmUserCreationActivity" 4158 android:excludeFromRecents="true" 4159 android:process=":ui" 4160 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert"> 4161 <intent-filter android:priority="1000"> 4162 <action android:name="android.os.action.CREATE_USER" /> 4163 <category android:name="android.intent.category.DEFAULT" /> 4164 </intent-filter> 4165 </activity> 4166 4167 <activity android:name="com.android.internal.app.SuspendedAppActivity" 4168 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert" 4169 android:excludeFromRecents="true" 4170 android:process=":ui"> 4171 </activity> 4172 4173 <activity android:name="com.android.internal.app.UnlaunchableAppActivity" 4174 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert" 4175 android:excludeFromRecents="true" 4176 android:process=":ui"> 4177 </activity> 4178 4179 <activity android:name="com.android.settings.notification.NotificationAccessConfirmationActivity" 4180 android:theme="@android:style/Theme.DeviceDefault.Light.Dialog.Alert" 4181 android:excludeFromRecents="true"> 4182 </activity> 4183 4184 <activity android:name="com.android.internal.app.HarmfulAppWarningActivity" 4185 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert" 4186 android:excludeFromRecents="true" 4187 android:process=":ui" 4188 android:label="@string/harmful_app_warning_title" 4189 android:exported="false"> 4190 </activity> 4191 4192 <receiver android:name="com.android.server.BootReceiver" 4193 android:systemUserOnly="true"> 4194 <intent-filter android:priority="1000"> 4195 <action android:name="android.intent.action.BOOT_COMPLETED" /> 4196 </intent-filter> 4197 </receiver> 4198 4199 <receiver android:name="com.android.server.updates.CertPinInstallReceiver" 4200 android:permission="android.permission.UPDATE_CONFIG"> 4201 <intent-filter> 4202 <action android:name="android.intent.action.UPDATE_PINS" /> 4203 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 4204 </intent-filter> 4205 </receiver> 4206 4207 <receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver" 4208 android:permission="android.permission.UPDATE_CONFIG"> 4209 <intent-filter> 4210 <action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" /> 4211 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 4212 </intent-filter> 4213 </receiver> 4214 4215 <receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver" 4216 android:permission="android.permission.UPDATE_CONFIG"> 4217 <intent-filter> 4218 <action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" /> 4219 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 4220 </intent-filter> 4221 </receiver> 4222 4223 <receiver android:name="com.android.server.updates.NetworkWatchlistInstallReceiver" 4224 android:permission="android.permission.UPDATE_CONFIG"> 4225 <intent-filter> 4226 <action android:name="android.intent.action.UPDATE_NETWORK_WATCHLIST" /> 4227 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 4228 </intent-filter> 4229 </receiver> 4230 4231 <receiver android:name="com.android.server.updates.ApnDbInstallReceiver" 4232 android:permission="android.permission.UPDATE_CONFIG"> 4233 <intent-filter> 4234 <action android:name="com.android.internal.intent.action.UPDATE_APN_DB" /> 4235 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 4236 </intent-filter> 4237 </receiver> 4238 4239 <receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver" 4240 android:permission="android.permission.UPDATE_CONFIG"> 4241 <intent-filter> 4242 <action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" /> 4243 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 4244 </intent-filter> 4245 </receiver> 4246 4247 <receiver android:name="com.android.server.updates.CertificateTransparencyLogInstallReceiver" 4248 android:permission="android.permission.UPDATE_CONFIG"> 4249 <intent-filter> 4250 <action android:name="android.intent.action.UPDATE_CT_LOGS" /> 4251 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 4252 </intent-filter> 4253 </receiver> 4254 4255 <receiver android:name="com.android.server.updates.LangIdInstallReceiver" 4256 android:permission="android.permission.UPDATE_CONFIG"> 4257 <intent-filter> 4258 <action android:name="android.intent.action.UPDATE_LANG_ID" /> 4259 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 4260 </intent-filter> 4261 </receiver> 4262 4263 <receiver android:name="com.android.server.updates.SmartSelectionInstallReceiver" 4264 android:permission="android.permission.UPDATE_CONFIG"> 4265 <intent-filter> 4266 <action android:name="android.intent.action.UPDATE_SMART_SELECTION" /> 4267 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 4268 </intent-filter> 4269 </receiver> 4270 4271 <receiver android:name="com.android.server.updates.CarrierIdInstallReceiver" 4272 android:permission="android.permission.UPDATE_CONFIG"> 4273 <intent-filter> 4274 <action android:name="android.os.action.UPDATE_CARRIER_ID_DB" /> 4275 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 4276 </intent-filter> 4277 </receiver> 4278 4279 <receiver android:name="com.android.server.MasterClearReceiver" 4280 android:permission="android.permission.MASTER_CLEAR"> 4281 <intent-filter 4282 android:priority="100" > 4283 <!-- For Checkin, Settings, etc.: action=FACTORY_RESET --> 4284 <action android:name="android.intent.action.FACTORY_RESET" /> 4285 <!-- As above until all the references to the deprecated MASTER_CLEAR get updated to 4286 FACTORY_RESET. --> 4287 <action android:name="android.intent.action.MASTER_CLEAR" /> 4288 4289 <!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR --> 4290 <action android:name="com.google.android.c2dm.intent.RECEIVE" /> 4291 <category android:name="android.intent.category.MASTER_CLEAR" /> 4292 </intent-filter> 4293 </receiver> 4294 4295 <receiver android:name="com.android.server.stats.StatsCompanionService$AnomalyAlarmReceiver" 4296 android:permission="android.permission.STATSCOMPANION" 4297 android:exported="false"> 4298 </receiver> 4299 4300 <receiver android:name="com.android.server.stats.StatsCompanionService$PullingAlarmReceiver" 4301 android:permission="android.permission.STATSCOMPANION" 4302 android:exported="false"> 4303 </receiver> 4304 4305 <receiver android:name="com.android.server.stats.StatsCompanionService$PeriodicAlarmReceiver" 4306 android:permission="android.permission.STATSCOMPANION" 4307 android:exported="false"> 4308 </receiver> 4309 4310 <service android:name="android.hardware.location.GeofenceHardwareService" 4311 android:permission="android.permission.LOCATION_HARDWARE" 4312 android:exported="false" /> 4313 4314 <service android:name="com.android.internal.backup.LocalTransportService" 4315 android:permission="android.permission.CONFIRM_FULL_BACKUP" 4316 android:exported="false"> 4317 <intent-filter> 4318 <action android:name="android.backup.TRANSPORT_HOST" /> 4319 </intent-filter> 4320 </service> 4321 4322 <service android:name="com.android.server.MountServiceIdler" 4323 android:exported="true" 4324 android:permission="android.permission.BIND_JOB_SERVICE" > 4325 </service> 4326 4327 <service android:name="com.android.server.backup.FullBackupJob" 4328 android:exported="true" 4329 android:permission="android.permission.BIND_JOB_SERVICE" > 4330 </service> 4331 4332 <service android:name="com.android.server.backup.KeyValueBackupJob" 4333 android:permission="android.permission.BIND_JOB_SERVICE" > 4334 </service> 4335 4336 <service android:name="com.android.server.content.SyncJobService" 4337 android:permission="android.permission.BIND_JOB_SERVICE" > 4338 </service> 4339 4340 <service android:name="com.android.server.pm.BackgroundDexOptService" 4341 android:exported="true" 4342 android:permission="android.permission.BIND_JOB_SERVICE"> 4343 </service> 4344 4345 <service android:name="com.android.server.PruneInstantAppsJobService" 4346 android:permission="android.permission.BIND_JOB_SERVICE" > 4347 </service> 4348 4349 <service android:name="com.android.server.storage.DiskStatsLoggingService" 4350 android:permission="android.permission.BIND_JOB_SERVICE" > 4351 </service> 4352 4353 <service android:name="com.android.server.PreloadsFileCacheExpirationJobService" 4354 android:permission="android.permission.BIND_JOB_SERVICE" > 4355 </service> 4356 4357 <service android:name="com.android.server.camera.CameraStatsJobService" 4358 android:permission="android.permission.BIND_JOB_SERVICE" > 4359 </service> 4360 4361 <service android:name="com.android.server.timezone.TimeZoneUpdateIdler" 4362 android:permission="android.permission.BIND_JOB_SERVICE" > 4363 </service> 4364 4365 <service android:name="com.android.server.net.watchlist.ReportWatchlistJobService" 4366 android:permission="android.permission.BIND_JOB_SERVICE" > 4367 </service> 4368 4369 <service android:name="com.android.server.display.BrightnessIdleJob" 4370 android:permission="android.permission.BIND_JOB_SERVICE" > 4371 </service> 4372 4373 <service 4374 android:name="com.android.server.autofill.AutofillCompatAccessibilityService" 4375 android:permission="android.permission.BIND_ACCESSIBILITY_SERVICE" 4376 android:exported="true"> 4377 <meta-data 4378 android:name="android.accessibilityservice" 4379 android:resource="@xml/autofill_compat_accessibility_service" /> 4380 </service> 4381 4382</application> 4383 4384</manifest> 4385