1<?xml version="1.0" encoding="utf-8"?> 2<!-- 3/* //device/apps/common/AndroidManifest.xml 4** 5** Copyright 2006, The Android Open Source Project 6** 7** Licensed under the Apache License, Version 2.0 (the "License"); 8** you may not use this file except in compliance with the License. 9** You may obtain a copy of the License at 10** 11** http://www.apache.org/licenses/LICENSE-2.0 12** 13** Unless required by applicable law or agreed to in writing, software 14** distributed under the License is distributed on an "AS IS" BASIS, 15** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 16** See the License for the specific language governing permissions and 17** limitations under the License. 18*/ 19--> 20<manifest xmlns:android="http://schemas.android.com/apk/res/android" 21 package="android" coreApp="true" android:sharedUserId="android.uid.system" 22 android:sharedUserLabel="@string/android_system_label"> 23 24 <!-- ================================================ --> 25 <!-- Special broadcasts that only the system can send --> 26 <!-- ================================================ --> 27 <eat-comment /> 28 29 <protected-broadcast android:name="android.intent.action.SCREEN_OFF" /> 30 <protected-broadcast android:name="android.intent.action.SCREEN_ON" /> 31 <protected-broadcast android:name="android.intent.action.USER_PRESENT" /> 32 <protected-broadcast android:name="android.intent.action.TIME_SET" /> 33 <protected-broadcast android:name="android.intent.action.TIME_TICK" /> 34 <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" /> 35 <protected-broadcast android:name="android.intent.action.DATE_CHANGED" /> 36 <protected-broadcast android:name="android.intent.action.PRE_BOOT_COMPLETED" /> 37 <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" /> 38 <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" /> 39 <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" /> 40 <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" /> 41 <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" /> 42 <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" /> 43 <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" /> 44 <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" /> 45 <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" /> 46 <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" /> 47 <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" /> 48 <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" /> 49 <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" /> 50 <protected-broadcast android:name="android.intent.action.PACKAGES_SUSPENDED" /> 51 <protected-broadcast android:name="android.intent.action.PACKAGES_UNSUSPENDED" /> 52 <protected-broadcast android:name="android.intent.action.ACTION_PREFERRED_ACTIVITY_CHANGED" /> 53 <protected-broadcast android:name="android.intent.action.UID_REMOVED" /> 54 <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" /> 55 <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" /> 56 <protected-broadcast android:name="android.intent.action.SPLIT_CONFIGURATION_CHANGED" /> 57 <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" /> 58 <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" /> 59 <protected-broadcast android:name="android.intent.action.BATTERY_LEVEL_CHANGED" /> 60 <protected-broadcast android:name="android.intent.action.BATTERY_LOW" /> 61 <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" /> 62 <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" /> 63 <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" /> 64 <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" /> 65 <protected-broadcast android:name="android.intent.action.CHARGING" /> 66 <protected-broadcast android:name="android.intent.action.DISCHARGING" /> 67 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" /> 68 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" /> 69 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" /> 70 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" /> 71 <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" /> 72 <protected-broadcast android:name="android.intent.action.REBOOT" /> 73 <protected-broadcast android:name="android.intent.action.DOCK_EVENT" /> 74 <protected-broadcast android:name="android.intent.action.THERMAL_EVENT" /> 75 <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" /> 76 <protected-broadcast android:name="android.intent.action.USER_ADDED" /> 77 <protected-broadcast android:name="android.intent.action.USER_REMOVED" /> 78 <protected-broadcast android:name="android.intent.action.USER_STARTING" /> 79 <protected-broadcast android:name="android.intent.action.USER_STARTED" /> 80 <protected-broadcast android:name="android.intent.action.USER_STOPPING" /> 81 <protected-broadcast android:name="android.intent.action.USER_STOPPED" /> 82 <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" /> 83 <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" /> 84 <protected-broadcast android:name="android.intent.action.USER_SWITCHED" /> 85 <protected-broadcast android:name="android.intent.action.USER_INITIALIZE" /> 86 <protected-broadcast android:name="android.intent.action.INTENT_FILTER_NEEDS_VERIFICATION" /> 87 <protected-broadcast android:name="android.intent.action.OVERLAY_ADDED" /> 88 <protected-broadcast android:name="android.intent.action.OVERLAY_CHANGED" /> 89 <protected-broadcast android:name="android.intent.action.OVERLAY_REMOVED" /> 90 <protected-broadcast android:name="android.intent.action.OVERLAY_PRIORITY_CHANGED" /> 91 <protected-broadcast android:name="android.intent.action.USER_ACTIVITY_NOTIFICATION" /> 92 <protected-broadcast android:name="android.intent.action.MY_PACKAGE_SUSPENDED" /> 93 <protected-broadcast android:name="android.intent.action.MY_PACKAGE_UNSUSPENDED" /> 94 95 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED" /> 96 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGING" /> 97 <protected-broadcast android:name="android.os.action.DEVICE_IDLE_MODE_CHANGED" /> 98 <protected-broadcast android:name="android.os.action.POWER_SAVE_WHITELIST_CHANGED" /> 99 <protected-broadcast android:name="android.os.action.POWER_SAVE_TEMP_WHITELIST_CHANGED" /> 100 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED_INTERNAL" /> 101 102 <!-- @deprecated This is rarely used and will be phased out soon. --> 103 <protected-broadcast android:name="android.os.action.SCREEN_BRIGHTNESS_BOOST_CHANGED" /> 104 105 <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" /> 106 <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" /> 107 <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" /> 108 <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" /> 109 <protected-broadcast android:name="android.app.action.NEXT_ALARM_CLOCK_CHANGED" /> 110 111 <protected-broadcast android:name="android.app.action.BUGREPORT_SHARING_DECLINED" /> 112 <protected-broadcast android:name="android.app.action.BUGREPORT_FAILED" /> 113 <protected-broadcast android:name="android.app.action.BUGREPORT_SHARE" /> 114 <protected-broadcast android:name="android.app.action.SHOW_DEVICE_MONITORING_DIALOG" /> 115 116 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" /> 117 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" /> 118 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" /> 119 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" /> 120 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_HOST_RESTORED" /> 121 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_RESTORED" /> 122 123 <protected-broadcast android:name="android.os.action.SETTING_RESTORED" /> 124 125 <protected-broadcast android:name="android.app.backup.intent.RUN" /> 126 <protected-broadcast android:name="android.app.backup.intent.CLEAR" /> 127 <protected-broadcast android:name="android.app.backup.intent.INIT" /> 128 129 <protected-broadcast android:name="android.bluetooth.intent.DISCOVERABLE_TIMEOUT" /> 130 <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" /> 131 <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" /> 132 <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" /> 133 <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" /> 134 <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" /> 135 <protected-broadcast android:name="android.bluetooth.adapter.action.BLUETOOTH_ADDRESS_CHANGED" /> 136 <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" /> 137 <protected-broadcast android:name="android.bluetooth.device.action.UUID" /> 138 <protected-broadcast android:name="android.bluetooth.device.action.MAS_INSTANCE" /> 139 <protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" /> 140 <protected-broadcast android:name="android.bluetooth.device.action.FOUND" /> 141 <protected-broadcast android:name="android.bluetooth.device.action.DISAPPEARED" /> 142 <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" /> 143 <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" /> 144 <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" /> 145 <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" /> 146 <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" /> 147 <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" /> 148 <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" /> 149 <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" /> 150 <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" /> 151 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" /> 152 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" /> 153 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" /> 154 <protected-broadcast android:name="android.bluetooth.device.action.SDP_RECORD" /> 155 <protected-broadcast android:name="android.bluetooth.device.action.BATTERY_LEVEL_CHANGED" /> 156 <protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" /> 157 <protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" /> 158 <protected-broadcast 159 android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" /> 160 <protected-broadcast 161 android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" /> 162 <protected-broadcast 163 android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" /> 164 <protected-broadcast 165 android:name="android.bluetooth.headset.action.HF_INDICATORS_VALUE_CHANGED" /> 166 <protected-broadcast 167 android:name="android.bluetooth.headset.profile.action.ACTIVE_DEVICE_CHANGED" /> 168 <protected-broadcast 169 android:name="android.bluetooth.headsetclient.profile.action.CONNECTION_STATE_CHANGED" /> 170 <protected-broadcast 171 android:name="android.bluetooth.headsetclient.profile.action.AUDIO_STATE_CHANGED" /> 172 <protected-broadcast 173 android:name="android.bluetooth.headsetclient.profile.action.AG_EVENT" /> 174 <protected-broadcast 175 android:name="android.bluetooth.headsetclient.profile.action.AG_CALL_CHANGED" /> 176 <protected-broadcast 177 android:name="android.bluetooth.headsetclient.profile.action.RESULT" /> 178 <protected-broadcast 179 android:name="android.bluetooth.headsetclient.profile.action.LAST_VTAG" /> 180 <protected-broadcast 181 android:name="android.bluetooth.hearingaid.profile.action.CONNECTION_STATE_CHANGED" /> 182 <protected-broadcast 183 android:name="android.bluetooth.hearingaid.profile.action.PLAYING_STATE_CHANGED" /> 184 <protected-broadcast 185 android:name="android.bluetooth.hearingaid.profile.action.ACTIVE_DEVICE_CHANGED" /> 186 <protected-broadcast 187 android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" /> 188 <protected-broadcast 189 android:name="android.bluetooth.a2dp.profile.action.ACTIVE_DEVICE_CHANGED" /> 190 <protected-broadcast 191 android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" /> 192 <protected-broadcast 193 android:name="android.bluetooth.a2dp.profile.action.CODEC_CONFIG_CHANGED" /> 194 <protected-broadcast 195 android:name="android.bluetooth.a2dp-sink.profile.action.CONNECTION_STATE_CHANGED" /> 196 <protected-broadcast 197 android:name="android.bluetooth.a2dp-sink.profile.action.PLAYING_STATE_CHANGED" /> 198 <protected-broadcast 199 android:name="android.bluetooth.a2dp-sink.profile.action.AUDIO_CONFIG_CHANGED" /> 200 <protected-broadcast 201 android:name="android.bluetooth.avrcp-controller.profile.action.BROWSE_CONNECTION_STATE_CHANGED" /> 202 <protected-broadcast 203 android:name="android.bluetooth.avrcp-controller.profile.action.CONNECTION_STATE_CHANGED" /> 204 <protected-broadcast 205 android:name="android.bluetooth.avrcp-controller.profile.action.FOLDER_LIST" /> 206 <protected-broadcast 207 android:name="android.bluetooth.avrcp-controller.profile.action.TRACK_EVENT" /> 208 <protected-broadcast 209 android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" /> 210 <protected-broadcast 211 android:name="android.bluetooth.input.profile.action.IDLE_TIME_CHANGED" /> 212 <protected-broadcast 213 android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" /> 214 <protected-broadcast 215 android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" /> 216 <protected-broadcast 217 android:name="android.bluetooth.hiddevice.profile.action.CONNECTION_STATE_CHANGED" /> 218 <protected-broadcast 219 android:name="android.bluetooth.map.profile.action.CONNECTION_STATE_CHANGED" /> 220 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.CONNECTION_STATE_CHANGED" /> 221 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_RECEIVED" /> 222 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_SENT_SUCCESSFULLY" /> 223 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_DELIVERED_SUCCESSFULLY" /> 224 <protected-broadcast 225 android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_SENT" /> 226 <protected-broadcast 227 android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_DELIVERY" /> 228 <protected-broadcast 229 android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" /> 230 <protected-broadcast android:name="android.bluetooth.pbap.profile.action.CONNECTION_STATE_CHANGED" /> 231 <protected-broadcast android:name="android.bluetooth.pbapclient.profile.action.CONNECTION_STATE_CHANGED" /> 232 <protected-broadcast android:name="android.bluetooth.sap.profile.action.CONNECTION_STATE_CHANGED" /> 233 <protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" /> 234 <protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" /> 235 <protected-broadcast android:name="android.btopp.intent.action.LIST" /> 236 <protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" /> 237 <protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" /> 238 <protected-broadcast android:name="android.btopp.intent.action.CONFIRM" /> 239 <protected-broadcast android:name="android.btopp.intent.action.HIDE" /> 240 <protected-broadcast android:name="android.btopp.intent.action.RETRY" /> 241 <protected-broadcast android:name="android.btopp.intent.action.OPEN" /> 242 <protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" /> 243 <protected-broadcast android:name="android.btopp.intent.action.TRANSFER_COMPLETE" /> 244 <protected-broadcast android:name="android.btopp.intent.action.ACCEPT" /> 245 <protected-broadcast android:name="android.btopp.intent.action.DECLINE" /> 246 <protected-broadcast android:name="com.android.bluetooth.gatt.REFRESH_BATCHED_SCAN" /> 247 <protected-broadcast android:name="com.android.bluetooth.pbap.authchall" /> 248 <protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" /> 249 <protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" /> 250 <protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" /> 251 <protected-broadcast android:name="com.android.bluetooth.sap.USER_CONFIRM_TIMEOUT" /> 252 <protected-broadcast android:name="com.android.bluetooth.sap.action.DISCONNECT_ACTION" /> 253 254 <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" /> 255 256 <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" /> 257 <protected-broadcast android:name="android.hardware.usb.action.USB_PORT_CHANGED" /> 258 <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" /> 259 <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_DETACHED" /> 260 <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" /> 261 <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" /> 262 263 <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" /> 264 <protected-broadcast android:name="android.media.action.HDMI_AUDIO_PLUG" /> 265 266 <protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" /> 267 <protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" /> 268 <protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" /> 269 <protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" /> 270 <protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" /> 271 <protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" /> 272 <protected-broadcast android:name="android.media.MASTER_MONO_CHANGED_ACTION" /> 273 <protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" /> 274 <protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" /> 275 276 <protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" /> 277 <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" /> 278 <protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" /> 279 <protected-broadcast android:name="android.intent.action.MEDIA_NOFS" /> 280 <protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" /> 281 <protected-broadcast android:name="android.intent.action.MEDIA_SHARED" /> 282 <protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" /> 283 <protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" /> 284 <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" /> 285 <protected-broadcast android:name="android.intent.action.MEDIA_EJECT" /> 286 287 <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL" /> 288 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" /> 289 <!-- @deprecated. Only {@link android.net.ConnectivityManager.CONNECTIVITY_ACTION} is sent. --> 290 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" /> 291 <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" /> 292 <protected-broadcast android:name="android.net.conn.RESTRICT_BACKGROUND_CHANGED" /> 293 <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" /> 294 <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" /> 295 296 <protected-broadcast android:name="android.net.nsd.STATE_CHANGED" /> 297 298 <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" /> 299 <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" /> 300 <protected-broadcast android:name="com.android.nfc.action.LLCP_UP" /> 301 <protected-broadcast android:name="com.android.nfc.action.LLCP_DOWN" /> 302 <protected-broadcast android:name="com.android.nfc.cardemulation.action.CLOSE_TAP_DIALOG" /> 303 <protected-broadcast android:name="com.android.nfc.handover.action.ALLOW_CONNECT" /> 304 <protected-broadcast android:name="com.android.nfc.handover.action.DENY_CONNECT" /> 305 <protected-broadcast android:name="com.android.nfc.handover.action.TIMEOUT_CONNECT" /> 306 <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" /> 307 <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" /> 308 <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" /> 309 <!-- For NFC to BT handover --> 310 <protected-broadcast android:name="android.btopp.intent.action.WHITELIST_DEVICE" /> 311 <protected-broadcast android:name="android.btopp.intent.action.STOP_HANDOVER_TRANSFER" /> 312 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND" /> 313 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND_MULTIPLE" /> 314 <protected-broadcast android:name="com.android.nfc.handover.action.CANCEL_HANDOVER_TRANSFER" /> 315 316 <protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" /> 317 <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" /> 318 319 <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" /> 320 321 <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" /> 322 <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" /> 323 <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" /> 324 325 <protected-broadcast android:name="com.android.server.stats.action.TRIGGER_COLLECTION" /> 326 327 <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" /> 328 <protected-broadcast android:name="com.android.server.WifiManager.action.START_PNO" /> 329 <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" /> 330 <protected-broadcast android:name="com.android.server.WifiManager.action.DEVICE_IDLE" /> 331 <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_ACCEPTED" /> 332 <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_DECLINED" /> 333 <protected-broadcast android:name="com.android.internal.action.EUICC_FACTORY_RESET" /> 334 <protected-broadcast android:name="com.android.server.usb.ACTION_OPEN_IN_APPS" /> 335 <protected-broadcast android:name="com.android.server.am.DELETE_DUMPHEAP" /> 336 <protected-broadcast android:name="com.android.server.net.action.SNOOZE_WARNING" /> 337 <protected-broadcast android:name="com.android.server.net.action.SNOOZE_RAPID" /> 338 <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.USER_DISMISSED_NOTIFICATION" /> 339 <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.CONNECT_TO_NETWORK" /> 340 <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.PICK_WIFI_NETWORK" /> 341 <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.PICK_NETWORK_AFTER_FAILURE" /> 342 <protected-broadcast android:name="com.android.server.wifi.wakeup.DISMISS_NOTIFICATION" /> 343 <protected-broadcast android:name="com.android.server.wifi.wakeup.OPEN_WIFI_PREFERENCES" /> 344 <protected-broadcast android:name="com.android.server.wifi.wakeup.OPEN_WIFI_SETTINGS" /> 345 <protected-broadcast android:name="com.android.server.wifi.wakeup.TURN_OFF_WIFI_WAKE" /> 346 <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" /> 347 <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" /> 348 <protected-broadcast android:name="android.net.wifi.WIFI_CREDENTIAL_CHANGED" /> 349 <protected-broadcast android:name="android.net.wifi.WIFI_SCAN_AVAILABLE" /> 350 <protected-broadcast android:name="android.net.wifi.aware.action.WIFI_AWARE_STATE_CHANGED" /> 351 <protected-broadcast android:name="android.net.wifi.rtt.action.WIFI_RTT_STATE_CHANGED" /> 352 <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" /> 353 <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" /> 354 <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" /> 355 <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" /> 356 <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" /> 357 <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_DEAUTH_IMMINENT" /> 358 <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_ICON" /> 359 <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_OSU_PROVIDERS_LIST" /> 360 <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_SUBSCRIPTION_REMEDIATION" /> 361 <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" /> 362 <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" /> 363 <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" /> 364 <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" /> 365 <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" /> 366 <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" /> 367 <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" /> 368 <protected-broadcast android:name="android.net.wifi.p2p.PERSISTENT_GROUPS_CHANGED" /> 369 <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" /> 370 <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" /> 371 <protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" /> 372 <protected-broadcast 373 android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" /> 374 <protected-broadcast android:name="android.net.scoring.SCORE_NETWORKS" /> 375 <protected-broadcast android:name="android.net.scoring.SCORER_CHANGED" /> 376 <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" /> 377 <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" /> 378 <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" /> 379 <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" /> 380 <protected-broadcast android:name="android.intent.action.APPLICATION_RESTRICTIONS_CHANGED" /> 381 382 <!-- Legacy --> 383 <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" /> 384 <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" /> 385 386 <protected-broadcast android:name="com.android.server.ACTION_TRIGGER_IDLE" /> 387 388 <protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" /> 389 390 <protected-broadcast android:name="android.intent.action.PHONE_STATE" /> 391 392 <protected-broadcast android:name="android.intent.action.SUB_DEFAULT_CHANGED" /> 393 394 <protected-broadcast android:name="android.location.GPS_ENABLED_CHANGE" /> 395 <protected-broadcast android:name="android.location.PROVIDERS_CHANGED" /> 396 <protected-broadcast android:name="android.location.MODE_CHANGED" /> 397 <protected-broadcast android:name="android.location.GPS_FIX_CHANGE" /> 398 <protected-broadcast android:name="android.net.proxy.PAC_REFRESH" /> 399 400 <protected-broadcast android:name="android.telecom.action.DEFAULT_DIALER_CHANGED" /> 401 <protected-broadcast android:name="android.provider.action.DEFAULT_SMS_PACKAGE_CHANGED" /> 402 <protected-broadcast android:name="android.intent.action.CONTENT_CHANGED" /> 403 <protected-broadcast android:name="android.provider.Telephony.MMS_DOWNLOADED" /> 404 405 <protected-broadcast 406 android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" /> 407 408 <!-- Defined in RestrictionsManager --> 409 <protected-broadcast 410 android:name="android.intent.action.PERMISSION_RESPONSE_RECEIVED" /> 411 <!-- Defined in RestrictionsManager --> 412 413 <protected-broadcast android:name="android.intent.action.REQUEST_PERMISSION" /> 414 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_STARTED" /> 415 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" /> 416 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_PROGRESS" /> 417 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" /> 418 419 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_DATA_SUBSCRIPTION_CHANGED" /> 420 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_VOICE_SUBSCRIPTION_CHANGED" /> 421 <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_CONTENT_CHANGE" /> 422 <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_RECORD_UPDATED" /> 423 424 <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_DONE" /> 425 <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_FAILED" /> 426 427 <protected-broadcast android:name="android.internal.policy.action.BURN_IN_PROTECTION" /> 428 <protected-broadcast android:name="android.app.action.SYSTEM_UPDATE_POLICY_CHANGED" /> 429 <protected-broadcast android:name="android.app.action.DEVICE_OWNER_CHANGED" /> 430 <protected-broadcast android:name="android.app.action.MANAGED_USER_CREATED" /> 431 432 <!-- Added in N --> 433 <protected-broadcast android:name="android.intent.action.ANR" /> 434 <protected-broadcast android:name="android.intent.action.CALL" /> 435 <protected-broadcast android:name="android.intent.action.CALL_PRIVILEGED" /> 436 <protected-broadcast android:name="android.intent.action.DROPBOX_ENTRY_ADDED" /> 437 <protected-broadcast android:name="android.intent.action.INPUT_METHOD_CHANGED" /> 438 <protected-broadcast android:name="android.intent.action.internal_sim_state_changed" /> 439 <protected-broadcast android:name="android.intent.action.LOCKED_BOOT_COMPLETED" /> 440 <protected-broadcast android:name="android.intent.action.PRECISE_CALL_STATE" /> 441 <protected-broadcast android:name="android.intent.action.PRECISE_DATA_CONNECTION_STATE_CHANGED" /> 442 <protected-broadcast android:name="android.intent.action.SUBSCRIPTION_PHONE_STATE" /> 443 <protected-broadcast android:name="android.intent.action.USER_INFO_CHANGED" /> 444 <protected-broadcast android:name="android.intent.action.USER_UNLOCKED" /> 445 <protected-broadcast android:name="android.intent.action.WALLPAPER_CHANGED" /> 446 447 <protected-broadcast android:name="android.app.action.DEVICE_POLICY_MANAGER_STATE_CHANGED" /> 448 <protected-broadcast android:name="android.app.action.CHOOSE_PRIVATE_KEY_ALIAS" /> 449 <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLED" /> 450 <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLE_REQUESTED" /> 451 <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_ENABLED" /> 452 <protected-broadcast android:name="android.app.action.LOCK_TASK_ENTERING" /> 453 <protected-broadcast android:name="android.app.action.LOCK_TASK_EXITING" /> 454 <protected-broadcast android:name="android.app.action.NOTIFY_PENDING_SYSTEM_UPDATE" /> 455 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_CHANGED" /> 456 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_EXPIRING" /> 457 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_FAILED" /> 458 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_SUCCEEDED" /> 459 <protected-broadcast android:name="com.android.server.ACTION_EXPIRED_PASSWORD_NOTIFICATION" /> 460 461 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_ADDED" /> 462 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNLOCKED" /> 463 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_REMOVED" /> 464 465 <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_STATE_CHANGED" /> 466 <protected-broadcast android:name="com.android.bluetooth.map.USER_CONFIRM_TIMEOUT" /> 467 <protected-broadcast android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_SENT" /> 468 <protected-broadcast android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_DELIVERY" /> 469 <protected-broadcast android:name="android.content.jobscheduler.JOB_DELAY_EXPIRED" /> 470 <protected-broadcast android:name="android.content.syncmanager.SYNC_ALARM" /> 471 <protected-broadcast android:name="android.media.INTERNAL_RINGER_MODE_CHANGED_ACTION" /> 472 <protected-broadcast android:name="android.media.STREAM_DEVICES_CHANGED_ACTION" /> 473 <protected-broadcast android:name="android.media.STREAM_MUTE_CHANGED_ACTION" /> 474 <protected-broadcast android:name="android.net.sip.SIP_SERVICE_UP" /> 475 <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" /> 476 <protected-broadcast android:name="android.os.action.CHARGING" /> 477 <protected-broadcast android:name="android.os.action.DISCHARGING" /> 478 <protected-broadcast android:name="android.search.action.SEARCHABLES_CHANGED" /> 479 <protected-broadcast android:name="android.security.STORAGE_CHANGED" /> 480 <protected-broadcast android:name="android.security.action.TRUST_STORE_CHANGED" /> 481 <protected-broadcast android:name="android.security.action.KEYCHAIN_CHANGED" /> 482 <protected-broadcast android:name="android.security.action.KEY_ACCESS_CHANGED" /> 483 <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_REGISTERED" /> 484 <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_UNREGISTERED" /> 485 <protected-broadcast android:name="android.telecom.action.SHOW_MISSED_CALLS_NOTIFICATION" /> 486 <protected-broadcast android:name="android.telephony.action.CARRIER_CONFIG_CHANGED" /> 487 <protected-broadcast android:name="android.telephony.action.DEFAULT_SUBSCRIPTION_CHANGED" /> 488 <protected-broadcast android:name="android.telephony.action.DEFAULT_SMS_SUBSCRIPTION_CHANGED" /> 489 <protected-broadcast android:name="android.telephony.action.SHOW_VOICEMAIL_NOTIFICATION" /> 490 <protected-broadcast android:name="android.telephony.action.SUBSCRIPTION_PLANS_CHANGED" /> 491 492 <protected-broadcast android:name="com.android.bluetooth.btservice.action.ALARM_WAKEUP" /> 493 <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_POLL" /> 494 <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_UPDATED" /> 495 <protected-broadcast android:name="com.android.server.NetworkTimeUpdateService.action.POLL" /> 496 <protected-broadcast android:name="com.android.server.telecom.intent.action.CALLS_ADD_ENTRY" /> 497 <protected-broadcast android:name="com.android.settings.location.MODE_CHANGING" /> 498 <protected-broadcast android:name="com.android.settings.bluetooth.ACTION_DISMISS_PAIRING" /> 499 500 <protected-broadcast android:name="NotificationManagerService.TIMEOUT" /> 501 <protected-broadcast android:name="ScheduleConditionProvider.EVALUATE" /> 502 <protected-broadcast android:name="EventConditionProvider.EVALUATE" /> 503 <protected-broadcast android:name="SnoozeHelper.EVALUATE" /> 504 <protected-broadcast android:name="wifi_scan_available" /> 505 506 <protected-broadcast android:name="action.cne.started" /> 507 <protected-broadcast android:name="android.content.jobscheduler.JOB_DEADLINE_EXPIRED" /> 508 <protected-broadcast android:name="android.intent.action.ACTION_UNSOL_RESPONSE_OEM_HOOK_RAW" /> 509 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_SUPL" /> 510 <protected-broadcast android:name="android.os.action.LIGHT_DEVICE_IDLE_MODE_CHANGED" /> 511 <protected-broadcast android:name="android.os.storage.action.VOLUME_STATE_CHANGED" /> 512 <protected-broadcast android:name="android.os.storage.action.DISK_SCANNED" /> 513 <protected-broadcast android:name="com.android.server.action.UPDATE_TWILIGHT_STATE" /> 514 <protected-broadcast android:name="com.android.server.action.RESET_TWILIGHT_AUTO" /> 515 <protected-broadcast android:name="com.android.server.device_idle.STEP_IDLE_STATE" /> 516 <protected-broadcast android:name="com.android.server.device_idle.STEP_LIGHT_IDLE_STATE" /> 517 <protected-broadcast android:name="com.android.server.Wifi.action.TOGGLE_PNO" /> 518 <protected-broadcast android:name="intent.action.ACTION_RF_BAND_INFO" /> 519 <protected-broadcast android:name="android.intent.action.MEDIA_RESOURCE_GRANTED" /> 520 <protected-broadcast android:name="android.app.action.NETWORK_LOGS_AVAILABLE" /> 521 <protected-broadcast android:name="android.app.action.SECURITY_LOGS_AVAILABLE" /> 522 523 <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED" /> 524 <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED_INTERNAL" /> 525 <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_CHANGED" /> 526 <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_ACCESS_GRANTED_CHANGED" /> 527 <protected-broadcast android:name="android.os.action.ACTION_EFFECTS_SUPPRESSOR_CHANGED" /> 528 <protected-broadcast android:name="android.app.action.NOTIFICATION_CHANNEL_BLOCK_STATE_CHANGED" /> 529 <protected-broadcast android:name="android.app.action.NOTIFICATION_CHANNEL_GROUP_BLOCK_STATE_CHANGED" /> 530 <protected-broadcast android:name="android.app.action.APP_BLOCK_STATE_CHANGED" /> 531 532 <protected-broadcast android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS" /> 533 <protected-broadcast android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS" /> 534 535 <protected-broadcast android:name="android.intent.action.DYNAMIC_SENSOR_CHANGED" /> 536 537 <protected-broadcast android:name="android.intent.action.ACTION_RADIO_OFF" /> 538 539 <protected-broadcast android:name="android.accounts.LOGIN_ACCOUNTS_CHANGED" /> 540 <protected-broadcast android:name="android.accounts.action.ACCOUNT_REMOVED" /> 541 <protected-broadcast android:name="android.accounts.action.VISIBLE_ACCOUNTS_CHANGED" /> 542 543 <protected-broadcast android:name="com.android.sync.SYNC_CONN_STATUS_CHANGED" /> 544 545 <protected-broadcast android:name="com.android.phone.SIP_INCOMING_CALL" /> 546 <protected-broadcast android:name="com.android.phone.SIP_ADD_PHONE" /> 547 <protected-broadcast android:name="com.android.phone.SIP_REMOVE_PHONE" /> 548 <protected-broadcast android:name="com.android.phone.SIP_CALL_OPTION_CHANGED" /> 549 550 <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_CONNECTED" /> 551 <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_DISCONNECTED" /> 552 553 <protected-broadcast android:name="android.bluetooth.input.profile.action.HANDSHAKE" /> 554 <protected-broadcast android:name="android.bluetooth.input.profile.action.REPORT" /> 555 556 <protected-broadcast android:name="android.intent.action.TWILIGHT_CHANGED" /> 557 558 <protected-broadcast android:name="com.android.server.fingerprint.ACTION_LOCKOUT_RESET" /> 559 <protected-broadcast android:name="android.net.wifi.PASSPOINT_ICON_RECEIVED" /> 560 <protected-broadcast android:name="com.android.server.notification.CountdownConditionProvider" /> 561 562 <protected-broadcast android:name="com.android.internal.location.ALARM_WAKEUP" /> 563 <protected-broadcast android:name="com.android.internal.location.ALARM_TIMEOUT" /> 564 <protected-broadcast android:name="android.intent.action.GLOBAL_BUTTON" /> 565 566 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_AVAILABLE" /> 567 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNAVAILABLE" /> 568 <protected-broadcast android:name="com.android.server.pm.DISABLE_QUIET_MODE_AFTER_UNLOCK" /> 569 570 <protected-broadcast android:name="com.android.server.retaildemo.ACTION_RESET_DEMO" /> 571 572 <protected-broadcast android:name="android.intent.action.DEVICE_LOCKED_CHANGED" /> 573 574 <!-- Added in O --> 575 <protected-broadcast android:name="android.app.action.APPLICATION_DELEGATION_SCOPES_CHANGED" /> 576 <protected-broadcast android:name="com.android.server.wm.ACTION_REVOKE_SYSTEM_ALERT_WINDOW_PERMISSION" /> 577 <protected-broadcast android:name="android.media.tv.action.PARENTAL_CONTROLS_ENABLED_CHANGED" /> 578 579 <protected-broadcast android:name="android.content.pm.action.SESSION_COMMITTED" /> 580 <protected-broadcast android:name="android.os.action.USER_RESTRICTIONS_CHANGED" /> 581 <protected-broadcast android:name="android.media.tv.action.PREVIEW_PROGRAM_ADDED_TO_WATCH_NEXT" /> 582 <protected-broadcast android:name="android.media.tv.action.PREVIEW_PROGRAM_BROWSABLE_DISABLED" /> 583 <protected-broadcast android:name="android.media.tv.action.WATCH_NEXT_PROGRAM_BROWSABLE_DISABLED" /> 584 <protected-broadcast android:name="android.media.tv.action.CHANNEL_BROWSABLE_REQUESTED" /> 585 <protected-broadcast android:name="com.android.server.InputMethodManagerService.SHOW_INPUT_METHOD_PICKER" /> 586 587 <!-- Time zone rules update intents fired by the system server --> 588 <protected-broadcast android:name="com.android.intent.action.timezone.RULES_UPDATE_OPERATION" /> 589 <protected-broadcast android:name="com.android.intent.action.timezone.TRIGGER_RULES_UPDATE_CHECK" /> 590 591 <!-- Made protected in P (was introduced in JB-MR2) --> 592 <protected-broadcast android:name="android.intent.action.GET_RESTRICTION_ENTRIES" /> 593 <protected-broadcast android:name="android.telephony.euicc.action.OTA_STATUS_CHANGED" /> 594 595 <!-- Added in P --> 596 <protected-broadcast android:name="android.app.action.PROFILE_OWNER_CHANGED" /> 597 <protected-broadcast android:name="android.app.action.TRANSFER_OWNERSHIP_COMPLETE" /> 598 <protected-broadcast android:name="android.app.action.AFFILIATED_PROFILE_TRANSFER_OWNERSHIP_COMPLETE" /> 599 <protected-broadcast android:name="android.app.action.DATA_SHARING_RESTRICTION_CHANGED" /> 600 <protected-broadcast android:name="android.app.action.STATSD_STARTED" /> 601 602 <!-- For IdleController --> 603 <protected-broadcast android:name="android.intent.action.DOCK_IDLE" /> 604 <protected-broadcast android:name="android.intent.action.DOCK_ACTIVE" /> 605 606 <!-- ====================================================================== --> 607 <!-- RUNTIME PERMISSIONS --> 608 <!-- ====================================================================== --> 609 <eat-comment /> 610 611 <!-- ====================================================================== --> 612 <!-- Permissions for accessing user's contacts including personal profile --> 613 <!-- ====================================================================== --> 614 <eat-comment /> 615 616 <!-- Used for runtime permissions related to contacts and profiles on this 617 device. --> 618 <permission-group android:name="android.permission-group.CONTACTS" 619 android:icon="@drawable/perm_group_contacts" 620 android:label="@string/permgrouplab_contacts" 621 android:description="@string/permgroupdesc_contacts" 622 android:request="@string/permgrouprequest_contacts" 623 android:priority="100" /> 624 625 <!-- Allows an application to read the user's contacts data. 626 <p>Protection level: dangerous 627 --> 628 <permission android:name="android.permission.READ_CONTACTS" 629 android:permissionGroup="android.permission-group.CONTACTS" 630 android:label="@string/permlab_readContacts" 631 android:description="@string/permdesc_readContacts" 632 android:protectionLevel="dangerous" /> 633 634 <!-- Allows an application to write the user's contacts data. 635 <p>Protection level: dangerous 636 --> 637 <permission android:name="android.permission.WRITE_CONTACTS" 638 android:permissionGroup="android.permission-group.CONTACTS" 639 android:label="@string/permlab_writeContacts" 640 android:description="@string/permdesc_writeContacts" 641 android:protectionLevel="dangerous" /> 642 643 <!-- ====================================================================== --> 644 <!-- Permissions for accessing user's calendar --> 645 <!-- ====================================================================== --> 646 <eat-comment /> 647 648 <!-- Used for runtime permissions related to user's calendar. --> 649 <permission-group android:name="android.permission-group.CALENDAR" 650 android:icon="@drawable/perm_group_calendar" 651 android:label="@string/permgrouplab_calendar" 652 android:description="@string/permgroupdesc_calendar" 653 android:request="@string/permgrouprequest_calendar" 654 android:priority="200" /> 655 656 <!-- Allows an application to read the user's calendar data. 657 <p>Protection level: dangerous 658 --> 659 <permission android:name="android.permission.READ_CALENDAR" 660 android:permissionGroup="android.permission-group.CALENDAR" 661 android:label="@string/permlab_readCalendar" 662 android:description="@string/permdesc_readCalendar" 663 android:protectionLevel="dangerous" /> 664 665 <!-- Allows an application to write the user's calendar data. 666 <p>Protection level: dangerous 667 --> 668 <permission android:name="android.permission.WRITE_CALENDAR" 669 android:permissionGroup="android.permission-group.CALENDAR" 670 android:label="@string/permlab_writeCalendar" 671 android:description="@string/permdesc_writeCalendar" 672 android:protectionLevel="dangerous" /> 673 674 <!-- ====================================================================== --> 675 <!-- Permissions for accessing and modifying user's SMS messages --> 676 <!-- ====================================================================== --> 677 <eat-comment /> 678 679 <!-- Used for runtime permissions related to user's SMS messages. --> 680 <permission-group android:name="android.permission-group.SMS" 681 android:icon="@drawable/perm_group_sms" 682 android:label="@string/permgrouplab_sms" 683 android:description="@string/permgroupdesc_sms" 684 android:request="@string/permgrouprequest_sms" 685 android:priority="300" /> 686 687 <!-- Allows an application to send SMS messages. 688 <p>Protection level: dangerous 689 --> 690 <permission android:name="android.permission.SEND_SMS" 691 android:permissionGroup="android.permission-group.SMS" 692 android:label="@string/permlab_sendSms" 693 android:description="@string/permdesc_sendSms" 694 android:permissionFlags="costsMoney" 695 android:protectionLevel="dangerous" /> 696 697 <!-- Allows an application to receive SMS messages. 698 <p>Protection level: dangerous 699 --> 700 <permission android:name="android.permission.RECEIVE_SMS" 701 android:permissionGroup="android.permission-group.SMS" 702 android:label="@string/permlab_receiveSms" 703 android:description="@string/permdesc_receiveSms" 704 android:protectionLevel="dangerous"/> 705 706 <!-- Allows an application to read SMS messages. 707 <p>Protection level: dangerous 708 --> 709 <permission android:name="android.permission.READ_SMS" 710 android:permissionGroup="android.permission-group.SMS" 711 android:label="@string/permlab_readSms" 712 android:description="@string/permdesc_readSms" 713 android:protectionLevel="dangerous" /> 714 715 <!-- Allows an application to receive WAP push messages. 716 <p>Protection level: dangerous 717 --> 718 <permission android:name="android.permission.RECEIVE_WAP_PUSH" 719 android:permissionGroup="android.permission-group.SMS" 720 android:label="@string/permlab_receiveWapPush" 721 android:description="@string/permdesc_receiveWapPush" 722 android:protectionLevel="dangerous" /> 723 724 <!-- Allows an application to monitor incoming MMS messages. 725 <p>Protection level: dangerous 726 --> 727 <permission android:name="android.permission.RECEIVE_MMS" 728 android:permissionGroup="android.permission-group.SMS" 729 android:label="@string/permlab_receiveMms" 730 android:description="@string/permdesc_receiveMms" 731 android:protectionLevel="dangerous" /> 732 733 <!-- Allows an application to read previously received cell broadcast 734 messages and to register a content observer to get notifications when 735 a cell broadcast has been received and added to the database. For 736 emergency alerts, the database is updated immediately after the 737 alert dialog and notification sound/vibration/speech are presented. 738 The "read" column is then updated after the user dismisses the alert. 739 This enables supplementary emergency assistance apps to start loading 740 additional emergency information (if Internet access is available) 741 when the alert is first received, and to delay presenting the info 742 to the user until after the initial alert dialog is dismissed. 743 <p>Protection level: dangerous 744 @hide Pending API council approval --> 745 <permission android:name="android.permission.READ_CELL_BROADCASTS" 746 android:permissionGroup="android.permission-group.SMS" 747 android:label="@string/permlab_readCellBroadcasts" 748 android:description="@string/permdesc_readCellBroadcasts" 749 android:protectionLevel="dangerous" /> 750 751 <!-- ====================================================================== --> 752 <!-- Permissions for accessing external storage --> 753 <!-- ====================================================================== --> 754 <eat-comment /> 755 756 <!-- Used for runtime permissions related to the shared external storage. --> 757 <permission-group android:name="android.permission-group.STORAGE" 758 android:icon="@drawable/perm_group_storage" 759 android:label="@string/permgrouplab_storage" 760 android:description="@string/permgroupdesc_storage" 761 android:request="@string/permgrouprequest_storage" 762 android:priority="900" /> 763 764 <!-- Allows an application to read from external storage. 765 <p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly 766 granted this permission.</p> 767 <p>This permission is enforced starting in API level 19. Before API level 19, this 768 permission is not enforced and all apps still have access to read from external storage. 769 You can test your app with the permission enforced by enabling <em>Protect USB 770 storage</em> under Developer options in the Settings app on a device running Android 4.1 or 771 higher.</p> 772 <p>Also starting in API level 19, this permission is <em>not</em> required to 773 read/write files in your application-specific directories returned by 774 {@link android.content.Context#getExternalFilesDir} and 775 {@link android.content.Context#getExternalCacheDir}. 776 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 777 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 778 minSdkVersion}</a> and <a 779 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 780 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 781 grants your app this permission. If you don't need this permission, be sure your <a 782 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 783 targetSdkVersion}</a> is 4 or higher. 784 <p>Protection level: dangerous 785 --> 786 <permission android:name="android.permission.READ_EXTERNAL_STORAGE" 787 android:permissionGroup="android.permission-group.STORAGE" 788 android:label="@string/permlab_sdcardRead" 789 android:description="@string/permdesc_sdcardRead" 790 android:protectionLevel="dangerous" /> 791 792 <!-- Allows an application to write to external storage. 793 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 794 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 795 minSdkVersion}</a> and <a 796 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 797 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 798 grants your app this permission. If you don't need this permission, be sure your <a 799 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 800 targetSdkVersion}</a> is 4 or higher. 801 <p>Starting in API level 19, this permission is <em>not</em> required to 802 read/write files in your application-specific directories returned by 803 {@link android.content.Context#getExternalFilesDir} and 804 {@link android.content.Context#getExternalCacheDir}. 805 <p>Protection level: dangerous 806 --> 807 <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE" 808 android:permissionGroup="android.permission-group.STORAGE" 809 android:label="@string/permlab_sdcardWrite" 810 android:description="@string/permdesc_sdcardWrite" 811 android:protectionLevel="dangerous" /> 812 813 <!-- ====================================================================== --> 814 <!-- Permissions for accessing the device location --> 815 <!-- ====================================================================== --> 816 <eat-comment /> 817 818 <!-- Used for permissions that allow accessing the device location. --> 819 <permission-group android:name="android.permission-group.LOCATION" 820 android:icon="@drawable/perm_group_location" 821 android:label="@string/permgrouplab_location" 822 android:description="@string/permgroupdesc_location" 823 android:request="@string/permgrouprequest_location" 824 android:priority="400" /> 825 826 <!-- Allows an app to access precise location. 827 Alternatively, you might want {@link #ACCESS_COARSE_LOCATION}. 828 <p>Protection level: dangerous 829 --> 830 <permission android:name="android.permission.ACCESS_FINE_LOCATION" 831 android:permissionGroup="android.permission-group.LOCATION" 832 android:label="@string/permlab_accessFineLocation" 833 android:description="@string/permdesc_accessFineLocation" 834 android:protectionLevel="dangerous|instant" /> 835 836 <!-- Allows an app to access approximate location. 837 Alternatively, you might want {@link #ACCESS_FINE_LOCATION}. 838 <p>Protection level: dangerous 839 --> 840 <permission android:name="android.permission.ACCESS_COARSE_LOCATION" 841 android:permissionGroup="android.permission-group.LOCATION" 842 android:label="@string/permlab_accessCoarseLocation" 843 android:description="@string/permdesc_accessCoarseLocation" 844 android:protectionLevel="dangerous|instant" /> 845 846 <!-- ====================================================================== --> 847 <!-- Permissions for accessing the call log --> 848 <!-- ====================================================================== --> 849 <eat-comment /> 850 851 <!-- Used for permissions that are associated telephony features. --> 852 <permission-group android:name="android.permission-group.CALL_LOG" 853 android:icon="@drawable/perm_group_call_log" 854 android:label="@string/permgrouplab_calllog" 855 android:description="@string/permgroupdesc_calllog" 856 android:request="@string/permgrouprequest_calllog" 857 android:priority="450" /> 858 859 <!-- Allows an application to access the IMS call service: making and 860 modifying a call 861 <p>Protection level: signature|privileged 862 @hide 863 --> 864 <permission android:name="android.permission.ACCESS_IMS_CALL_SERVICE" 865 android:label="@string/permlab_accessImsCallService" 866 android:description="@string/permdesc_accessImsCallService" 867 android:protectionLevel="signature|privileged" /> 868 869 <!-- Allows an application to read the user's call log. 870 <p class="note"><strong>Note:</strong> If your app uses the 871 {@link #READ_CONTACTS} permission and <em>both</em> your <a 872 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 873 minSdkVersion}</a> and <a 874 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 875 targetSdkVersion}</a> values are set to 15 or lower, the system implicitly 876 grants your app this permission. If you don't need this permission, be sure your <a 877 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 878 targetSdkVersion}</a> is 16 or higher.</p> 879 <p>Protection level: dangerous 880 --> 881 <permission android:name="android.permission.READ_CALL_LOG" 882 android:permissionGroup="android.permission-group.CALL_LOG" 883 android:label="@string/permlab_readCallLog" 884 android:description="@string/permdesc_readCallLog" 885 android:protectionLevel="dangerous" /> 886 887 <!-- Allows an application to write (but not read) the user's 888 call log data. 889 <p class="note"><strong>Note:</strong> If your app uses the 890 {@link #WRITE_CONTACTS} permission and <em>both</em> your <a 891 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 892 minSdkVersion}</a> and <a 893 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 894 targetSdkVersion}</a> values are set to 15 or lower, the system implicitly 895 grants your app this permission. If you don't need this permission, be sure your <a 896 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 897 targetSdkVersion}</a> is 16 or higher.</p> 898 <p>Protection level: dangerous 899 --> 900 <permission android:name="android.permission.WRITE_CALL_LOG" 901 android:permissionGroup="android.permission-group.CALL_LOG" 902 android:label="@string/permlab_writeCallLog" 903 android:description="@string/permdesc_writeCallLog" 904 android:protectionLevel="dangerous" /> 905 906 <!-- Allows an application to see the number being dialed during an outgoing 907 call with the option to redirect the call to a different number or 908 abort the call altogether. 909 <p>Protection level: dangerous 910 --> 911 <permission android:name="android.permission.PROCESS_OUTGOING_CALLS" 912 android:permissionGroup="android.permission-group.CALL_LOG" 913 android:label="@string/permlab_processOutgoingCalls" 914 android:description="@string/permdesc_processOutgoingCalls" 915 android:protectionLevel="dangerous" /> 916 917 <!-- ====================================================================== --> 918 <!-- Permissions for accessing the device telephony --> 919 <!-- ====================================================================== --> 920 <eat-comment /> 921 922 <!-- Used for permissions that are associated telephony features. --> 923 <permission-group android:name="android.permission-group.PHONE" 924 android:icon="@drawable/perm_group_phone_calls" 925 android:label="@string/permgrouplab_phone" 926 android:description="@string/permgroupdesc_phone" 927 android:request="@string/permgrouprequest_phone" 928 android:priority="500" /> 929 930 <!-- Allows read only access to phone state, including the phone number of the device, 931 current cellular network information, the status of any ongoing calls, and a list of any 932 {@link android.telecom.PhoneAccount}s registered on the device. 933 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 934 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 935 minSdkVersion}</a> and <a 936 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 937 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 938 grants your app this permission. If you don't need this permission, be sure your <a 939 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 940 targetSdkVersion}</a> is 4 or higher. 941 <p>Protection level: dangerous 942 --> 943 <permission android:name="android.permission.READ_PHONE_STATE" 944 android:permissionGroup="android.permission-group.PHONE" 945 android:label="@string/permlab_readPhoneState" 946 android:description="@string/permdesc_readPhoneState" 947 android:protectionLevel="dangerous" /> 948 949 <!-- Allows read access to the device's phone number(s). This is a subset of the capabilities 950 granted by {@link #READ_PHONE_STATE} but is exposed to instant applications. 951 <p>Protection level: dangerous--> 952 <permission android:name="android.permission.READ_PHONE_NUMBERS" 953 android:permissionGroup="android.permission-group.PHONE" 954 android:label="@string/permlab_readPhoneNumbers" 955 android:description="@string/permdesc_readPhoneNumbers" 956 android:protectionLevel="dangerous|instant" /> 957 958 <!-- Allows an application to initiate a phone call without going through 959 the Dialer user interface for the user to confirm the call. 960 <p>Protection level: dangerous 961 --> 962 <permission android:name="android.permission.CALL_PHONE" 963 android:permissionGroup="android.permission-group.PHONE" 964 android:permissionFlags="costsMoney" 965 android:label="@string/permlab_callPhone" 966 android:description="@string/permdesc_callPhone" 967 android:protectionLevel="dangerous" /> 968 969 <!-- Allows an application to add voicemails into the system. 970 <p>Protection level: dangerous 971 --> 972 <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL" 973 android:permissionGroup="android.permission-group.PHONE" 974 android:label="@string/permlab_addVoicemail" 975 android:description="@string/permdesc_addVoicemail" 976 android:protectionLevel="dangerous" /> 977 978 <!-- Allows an application to use SIP service. 979 <p>Protection level: dangerous 980 --> 981 <permission android:name="android.permission.USE_SIP" 982 android:permissionGroup="android.permission-group.PHONE" 983 android:description="@string/permdesc_use_sip" 984 android:label="@string/permlab_use_sip" 985 android:protectionLevel="dangerous"/> 986 987 <!-- Allows the app to answer an incoming phone call. 988 <p>Protection level: dangerous 989 --> 990 <permission android:name="android.permission.ANSWER_PHONE_CALLS" 991 android:permissionGroup="android.permission-group.PHONE" 992 android:label="@string/permlab_answerPhoneCalls" 993 android:description="@string/permdesc_answerPhoneCalls" 994 android:protectionLevel="dangerous|runtime" /> 995 996 <!-- Allows a calling application which manages it own calls through the self-managed 997 {@link android.telecom.ConnectionService} APIs. See 998 {@link android.telecom.PhoneAccount#CAPABILITY_SELF_MANAGED for more information on the 999 self-managed ConnectionService APIs. 1000 <p>Protection level: normal 1001 --> 1002 <permission android:name="android.permission.MANAGE_OWN_CALLS" 1003 android:label="@string/permlab_manageOwnCalls" 1004 android:description="@string/permdesc_manageOwnCalls" 1005 android:protectionLevel="normal" /> 1006 1007 <!-- Allows a calling app to continue a call which was started in another app. An example is a 1008 video calling app that wants to continue a voice call on the user's mobile network.<p> 1009 When the handover of a call from one app to another takes place, there are two devices 1010 which are involved in the handover; the initiating and receiving devices. The initiating 1011 device is where the request to handover the call was started, and the receiving device is 1012 where the handover request is confirmed by the other party.<p> 1013 This permission protects access to the 1014 {@link android.telecom.TelecomManager#acceptHandover(Uri, int, PhoneAccountHandle)} which 1015 the receiving side of the handover uses to accept a handover. 1016 <p>Protection level: dangerous 1017 --> 1018 <permission android:name="android.permission.ACCEPT_HANDOVER" 1019 android:permissionGroup="android.permission-group.PHONE" 1020 android.label="@string/permlab_acceptHandover" 1021 android:description="@string/permdesc_acceptHandovers" 1022 android:protectionLevel="dangerous" /> 1023 1024 <!-- ====================================================================== --> 1025 <!-- Permissions for accessing the device microphone --> 1026 <!-- ====================================================================== --> 1027 <eat-comment /> 1028 1029 <!-- Used for permissions that are associated with accessing 1030 microphone audio from the device. Note that phone calls also capture audio 1031 but are in a separate (more visible) permission group. --> 1032 <permission-group android:name="android.permission-group.MICROPHONE" 1033 android:icon="@drawable/perm_group_microphone" 1034 android:label="@string/permgrouplab_microphone" 1035 android:description="@string/permgroupdesc_microphone" 1036 android:request="@string/permgrouprequest_microphone" 1037 android:priority="600" /> 1038 1039 <!-- Allows an application to record audio. 1040 <p>Protection level: dangerous 1041 --> 1042 <permission android:name="android.permission.RECORD_AUDIO" 1043 android:permissionGroup="android.permission-group.MICROPHONE" 1044 android:label="@string/permlab_recordAudio" 1045 android:description="@string/permdesc_recordAudio" 1046 android:protectionLevel="dangerous|instant"/> 1047 1048 <!-- ====================================================================== --> 1049 <!-- Permissions for accessing the UCE Service --> 1050 <!-- ====================================================================== --> 1051 1052 <!-- @hide Allows an application to Access UCE-Presence. 1053 <p>Protection level: signature|privileged 1054 --> 1055 <permission android:name="android.permission.ACCESS_UCE_PRESENCE_SERVICE" 1056 android:permissionGroup="android.permission-group.PHONE" 1057 android:protectionLevel="signature|privileged"/> 1058 1059 <!-- @hide Allows an application to Access UCE-OPTIONS. 1060 <p>Protection level: signature|privileged 1061 --> 1062 <permission android:name="android.permission.ACCESS_UCE_OPTIONS_SERVICE" 1063 android:permissionGroup="android.permission-group.PHONE" 1064 android:protectionLevel="signature|privileged"/> 1065 1066 1067 1068 <!-- ====================================================================== --> 1069 <!-- Permissions for accessing the device camera --> 1070 <!-- ====================================================================== --> 1071 <eat-comment /> 1072 1073 <!-- Used for permissions that are associated with accessing 1074 camera or capturing images/video from the device. --> 1075 <permission-group android:name="android.permission-group.CAMERA" 1076 android:icon="@drawable/perm_group_camera" 1077 android:label="@string/permgrouplab_camera" 1078 android:description="@string/permgroupdesc_camera" 1079 android:request="@string/permgrouprequest_camera" 1080 android:priority="700" /> 1081 1082 <!-- Required to be able to access the camera device. 1083 <p>This will automatically enforce the <a 1084 href="{@docRoot}guide/topics/manifest/uses-feature-element.html"> 1085 <uses-feature>}</a> manifest element for <em>all</em> camera features. 1086 If you do not require all camera features or can properly operate if a camera 1087 is not available, then you must modify your manifest as appropriate in order to 1088 install on devices that don't support all camera features.</p> 1089 <p>Protection level: dangerous 1090 --> 1091 <permission android:name="android.permission.CAMERA" 1092 android:permissionGroup="android.permission-group.CAMERA" 1093 android:label="@string/permlab_camera" 1094 android:description="@string/permdesc_camera" 1095 android:protectionLevel="dangerous|instant" /> 1096 1097 1098 <!-- ====================================================================== --> 1099 <!-- Permissions for accessing the device sensors --> 1100 <!-- ====================================================================== --> 1101 <eat-comment /> 1102 1103 <!-- Used for permissions that are associated with accessing 1104 body or environmental sensors. --> 1105 <permission-group android:name="android.permission-group.SENSORS" 1106 android:icon="@drawable/perm_group_sensors" 1107 android:label="@string/permgrouplab_sensors" 1108 android:description="@string/permgroupdesc_sensors" 1109 android:request="@string/permgrouprequest_sensors" 1110 android:priority="800" /> 1111 1112 <!-- Allows an application to access data from sensors that the user uses to 1113 measure what is happening inside his/her body, such as heart rate. 1114 <p>Protection level: dangerous --> 1115 <permission android:name="android.permission.BODY_SENSORS" 1116 android:permissionGroup="android.permission-group.SENSORS" 1117 android:label="@string/permlab_bodySensors" 1118 android:description="@string/permdesc_bodySensors" 1119 android:protectionLevel="dangerous" /> 1120 1121 <!-- Allows an app to use fingerprint hardware. 1122 <p>Protection level: normal 1123 @deprecated Applications should request {@link 1124 android.Manifest.permission#USE_BIOMETRIC} instead 1125 --> 1126 <permission android:name="android.permission.USE_FINGERPRINT" 1127 android:permissionGroup="android.permission-group.SENSORS" 1128 android:label="@string/permlab_useFingerprint" 1129 android:description="@string/permdesc_useFingerprint" 1130 android:protectionLevel="normal" /> 1131 1132 <!-- Allows an app to use device supported biometric modalities. 1133 <p>Protection level: normal 1134 --> 1135 <permission android:name="android.permission.USE_BIOMETRIC" 1136 android:permissionGroup="android.permission-group.SENSORS" 1137 android:label="@string/permlab_useBiometric" 1138 android:description="@string/permdesc_useBiometric" 1139 android:protectionLevel="normal" /> 1140 1141 <!-- ====================================================================== --> 1142 <!-- REMOVED PERMISSIONS --> 1143 <!-- ====================================================================== --> 1144 1145 <!-- @hide We need to keep this around for backwards compatibility --> 1146 <permission android:name="android.permission.READ_PROFILE" 1147 android:protectionLevel="normal" 1148 android:permissionFlags="removed"/> 1149 1150 <!-- @hide We need to keep this around for backwards compatibility --> 1151 <permission android:name="android.permission.WRITE_PROFILE" 1152 android:protectionLevel="normal" 1153 android:permissionFlags="removed"/> 1154 1155 <!-- @hide We need to keep this around for backwards compatibility --> 1156 <permission android:name="android.permission.READ_SOCIAL_STREAM" 1157 android:protectionLevel="normal" 1158 android:permissionFlags="removed"/> 1159 1160 <!-- @hide We need to keep this around for backwards compatibility --> 1161 <permission android:name="android.permission.WRITE_SOCIAL_STREAM" 1162 android:protectionLevel="normal" 1163 android:permissionFlags="removed"/> 1164 1165 <!-- @hide We need to keep this around for backwards compatibility --> 1166 <permission android:name="android.permission.READ_USER_DICTIONARY" 1167 android:protectionLevel="normal" 1168 android:permissionFlags="removed"/> 1169 1170 <!-- @hide We need to keep this around for backwards compatibility --> 1171 <permission android:name="android.permission.WRITE_USER_DICTIONARY" 1172 android:protectionLevel="normal" 1173 android:permissionFlags="removed"/> 1174 1175 <!-- @hide We need to keep this around for backwards compatibility --> 1176 <permission android:name="android.permission.WRITE_SMS" 1177 android:protectionLevel="normal" 1178 android:permissionFlags="removed"/> 1179 1180 <!-- @hide We need to keep this around for backwards compatibility --> 1181 <permission android:name="com.android.browser.permission.READ_HISTORY_BOOKMARKS" 1182 android:protectionLevel="normal" 1183 android:permissionFlags="removed"/> 1184 1185 <!-- @hide We need to keep this around for backwards compatibility --> 1186 <permission android:name="com.android.browser.permission.WRITE_HISTORY_BOOKMARKS" 1187 android:protectionLevel="normal" 1188 android:permissionFlags="removed"/> 1189 1190 <!-- @hide We need to keep this around for backwards compatibility --> 1191 <permission android:name="android.permission.AUTHENTICATE_ACCOUNTS" 1192 android:protectionLevel="normal" 1193 android:permissionFlags="removed"/> 1194 1195 <!-- @hide We need to keep this around for backwards compatibility --> 1196 <permission android:name="android.permission.MANAGE_ACCOUNTS" 1197 android:protectionLevel="normal" 1198 android:permissionFlags="removed"/> 1199 1200 <!-- @hide We need to keep this around for backwards compatibility --> 1201 <permission android:name="android.permission.USE_CREDENTIALS" 1202 android:protectionLevel="normal" 1203 android:permissionFlags="removed"/> 1204 1205 <!-- @hide We need to keep this around for backwards compatibility --> 1206 <permission android:name="android.permission.SUBSCRIBED_FEEDS_READ" 1207 android:protectionLevel="normal" 1208 android:permissionFlags="removed"/> 1209 1210 <!-- @hide We need to keep this around for backwards compatibility --> 1211 <permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE" 1212 android:protectionLevel="normal" 1213 android:permissionFlags="removed"/> 1214 1215 <!-- @hide We need to keep this around for backwards compatibility --> 1216 <permission android:name="android.permission.FLASHLIGHT" 1217 android:protectionLevel="normal" 1218 android:permissionFlags="removed"/> 1219 1220 <!-- ====================================================================== --> 1221 <!-- INSTALL PERMISSIONS --> 1222 <!-- ====================================================================== --> 1223 1224 <!-- ================================== --> 1225 <!-- Permissions for accessing messages --> 1226 <!-- ================================== --> 1227 <eat-comment /> 1228 1229 <!-- @SystemApi Allows an application (Phone) to send a request to other applications 1230 to handle the respond-via-message action during incoming calls. 1231 <p>Not for use by third-party applications. --> 1232 <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE" 1233 android:protectionLevel="signature|privileged" /> 1234 1235 <!-- @SystemApi Allows an application to send SMS to premium shortcodes without user permission. 1236 <p>Not for use by third-party applications. 1237 @hide --> 1238 <permission android:name="android.permission.SEND_SMS_NO_CONFIRMATION" 1239 android:protectionLevel="signature|privileged" /> 1240 1241 <!-- Allows an application to filter carrier specific sms. 1242 @hide --> 1243 <permission android:name="android.permission.CARRIER_FILTER_SMS" 1244 android:protectionLevel="signature|privileged" /> 1245 1246 <!-- @SystemApi Allows an application to receive emergency cell broadcast messages, 1247 to record or display them to the user. 1248 <p>Not for use by third-party applications. 1249 @hide --> 1250 <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST" 1251 android:protectionLevel="signature|privileged" /> 1252 1253 <!-- Allows an application to monitor incoming Bluetooth MAP messages, to record 1254 or perform processing on them. --> 1255 <!-- @hide --> 1256 <permission android:name="android.permission.RECEIVE_BLUETOOTH_MAP" 1257 android:protectionLevel="signature|privileged" /> 1258 1259 <!-- @SystemApi @hide Allows an application to execute contacts directory search. 1260 This should only be used by ContactsProvider. 1261 <p>Not for use by third-party applications. --> 1262 <permission android:name="android.permission.BIND_DIRECTORY_SEARCH" 1263 android:protectionLevel="signature|privileged" /> 1264 1265 <!-- @SystemApi @hide Allows an application to modify cell broadcasts through the content provider. 1266 <p>Not for use by third-party applications. --> 1267 <permission android:name="android.permission.MODIFY_CELL_BROADCASTS" 1268 android:protectionLevel="signature|privileged" /> 1269 1270 <!-- =============================================================== --> 1271 <!-- Permissions for setting the device alarm --> 1272 <!-- =============================================================== --> 1273 <eat-comment /> 1274 1275 <!-- Allows an application to broadcast an Intent to set an alarm for the user. 1276 <p>Protection level: normal 1277 --> 1278 <permission android:name="com.android.alarm.permission.SET_ALARM" 1279 android:label="@string/permlab_setAlarm" 1280 android:description="@string/permdesc_setAlarm" 1281 android:protectionLevel="normal" /> 1282 1283 <!-- =============================================================== --> 1284 <!-- Permissions for accessing the user voicemail --> 1285 <!-- =============================================================== --> 1286 <eat-comment /> 1287 1288 <!-- Allows an application to modify and remove existing voicemails in the system. 1289 <p>Protection level: signature|privileged 1290 --> 1291 <permission android:name="com.android.voicemail.permission.WRITE_VOICEMAIL" 1292 android:protectionLevel="signature|privileged" /> 1293 1294 <!-- Allows an application to read voicemails in the system. 1295 <p>Protection level: signature|privileged 1296 --> 1297 <permission android:name="com.android.voicemail.permission.READ_VOICEMAIL" 1298 android:protectionLevel="signature|privileged" /> 1299 1300 <!-- ======================================= --> 1301 <!-- Permissions for accessing location info --> 1302 <!-- ======================================= --> 1303 <eat-comment /> 1304 1305 <!-- Allows an application to access extra location provider commands. 1306 <p>Protection level: normal 1307 --> 1308 <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS" 1309 android:label="@string/permlab_accessLocationExtraCommands" 1310 android:description="@string/permdesc_accessLocationExtraCommands" 1311 android:protectionLevel="normal" /> 1312 1313 <!-- @SystemApi Allows an application to install a location provider into the Location Manager. 1314 <p>Not for use by third-party applications. --> 1315 <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER" 1316 android:protectionLevel="signature|privileged" /> 1317 1318 <!-- @SystemApi @hide Allows HDMI-CEC service to access device and configuration files. 1319 This should only be used by HDMI-CEC service. 1320 --> 1321 <permission android:name="android.permission.HDMI_CEC" 1322 android:protectionLevel="signature|privileged" /> 1323 1324 <!-- @SystemApi Allows an application to use location features in hardware, 1325 such as the geofencing api. 1326 <p>Not for use by third-party applications. --> 1327 <permission android:name="android.permission.LOCATION_HARDWARE" 1328 android:protectionLevel="signature|privileged" /> 1329 <uses-permission android:name="android.permission.LOCATION_HARDWARE"/> 1330 1331 <!-- @SystemApi Allows an application to create mock location providers for testing. 1332 <p>Protection level: signature 1333 @hide 1334 --> 1335 <permission android:name="android.permission.ACCESS_MOCK_LOCATION" 1336 android:protectionLevel="signature" /> 1337 1338 <!-- ======================================= --> 1339 <!-- Permissions for accessing networks --> 1340 <!-- ======================================= --> 1341 <eat-comment /> 1342 1343 <!-- Allows applications to open network sockets. 1344 <p>Protection level: normal 1345 --> 1346 <permission android:name="android.permission.INTERNET" 1347 android:description="@string/permdesc_createNetworkSockets" 1348 android:label="@string/permlab_createNetworkSockets" 1349 android:protectionLevel="normal|instant" /> 1350 1351 <!-- Allows applications to access information about networks. 1352 <p>Protection level: normal 1353 --> 1354 <permission android:name="android.permission.ACCESS_NETWORK_STATE" 1355 android:description="@string/permdesc_accessNetworkState" 1356 android:label="@string/permlab_accessNetworkState" 1357 android:protectionLevel="normal|instant" /> 1358 1359 <!-- Allows applications to access information about Wi-Fi networks. 1360 <p>Protection level: normal 1361 --> 1362 <permission android:name="android.permission.ACCESS_WIFI_STATE" 1363 android:description="@string/permdesc_accessWifiState" 1364 android:label="@string/permlab_accessWifiState" 1365 android:protectionLevel="normal" /> 1366 1367 <!-- Allows applications to change Wi-Fi connectivity state. 1368 <p>Protection level: normal 1369 --> 1370 <permission android:name="android.permission.CHANGE_WIFI_STATE" 1371 android:description="@string/permdesc_changeWifiState" 1372 android:label="@string/permlab_changeWifiState" 1373 android:protectionLevel="normal" /> 1374 1375 <!-- @SystemApi @hide Allows apps to create and manage IPsec tunnels. 1376 <p>Only granted to applications that are currently bound by the 1377 system for creating and managing IPsec-based interfaces. 1378 --> 1379 <permission android:name="android.permission.MANAGE_IPSEC_TUNNELS" 1380 android:protectionLevel="signature|appop" /> 1381 1382 <!-- @SystemApi @hide Allows applications to read Wi-Fi credential. 1383 <p>Not for use by third-party applications. --> 1384 <permission android:name="android.permission.READ_WIFI_CREDENTIAL" 1385 android:protectionLevel="signature|privileged" /> 1386 1387 <!-- @SystemApi @hide Allows applications to change tether state and run 1388 tether carrier provisioning. 1389 <p>Not for use by third-party applications. --> 1390 <permission android:name="android.permission.TETHER_PRIVILEGED" 1391 android:protectionLevel="signature|privileged" /> 1392 1393 <!-- @SystemApi @hide Allow system apps to receive broadcast 1394 when a wifi network credential is changed. 1395 <p>Not for use by third-party applications. --> 1396 <permission android:name="android.permission.RECEIVE_WIFI_CREDENTIAL_CHANGE" 1397 android:protectionLevel="signature|privileged" /> 1398 1399 <!-- @SystemApi @hide Allows an application to modify any wifi configuration, even if created 1400 by another application. Once reconfigured the original creator cannot make any further 1401 modifications. 1402 <p>Not for use by third-party applications. --> 1403 <permission android:name="android.permission.OVERRIDE_WIFI_CONFIG" 1404 android:protectionLevel="signature|privileged" /> 1405 1406 <!-- @hide --> 1407 <permission android:name="android.permission.ACCESS_WIMAX_STATE" 1408 android:description="@string/permdesc_accessWimaxState" 1409 android:label="@string/permlab_accessWimaxState" 1410 android:protectionLevel="normal" /> 1411 1412 <!-- @hide --> 1413 <permission android:name="android.permission.CHANGE_WIMAX_STATE" 1414 android:description="@string/permdesc_changeWimaxState" 1415 android:label="@string/permlab_changeWimaxState" 1416 android:protectionLevel="normal" /> 1417 1418 <!-- Allows applications to act as network scorers. @hide @SystemApi--> 1419 <permission android:name="android.permission.SCORE_NETWORKS" 1420 android:protectionLevel="signature|privileged" /> 1421 1422 <!-- Allows applications to request network 1423 recommendations and scores from the NetworkScoreService. 1424 <p>Not for use by third-party applications. @hide --> 1425 <permission android:name="android.permission.REQUEST_NETWORK_SCORES" 1426 android:protectionLevel="signature|setup" /> 1427 1428 <!-- Allows network stack services (Connectivity and Wifi) to coordinate 1429 <p>Not for use by third-party or privileged applications. 1430 @hide This should only be used by Connectivity and Wifi Services. 1431 --> 1432 <permission android:name="android.permission.NETWORK_STACK" 1433 android:protectionLevel="signature" /> 1434 1435 <!-- Allows Settings and SystemUI to call methods in Networking services 1436 <p>Not for use by third-party or privileged applications. 1437 @hide This should only be used by Settings and SystemUI. 1438 --> 1439 <permission android:name="android.permission.NETWORK_SETTINGS" 1440 android:protectionLevel="signature" /> 1441 1442 <!-- Allows SetupWizard to call methods in Networking services 1443 <p>Not for use by any other third-party or privileged applications. 1444 @hide This should only be used by SetupWizard. 1445 --> 1446 <permission android:name="android.permission.NETWORK_SETUP_WIZARD" 1447 android:protectionLevel="signature|setup" /> 1448 1449 <!-- #SystemApi @hide Allows applications to access information about LoWPAN interfaces. 1450 <p>Not for use by third-party applications. --> 1451 <permission android:name="android.permission.ACCESS_LOWPAN_STATE" 1452 android:protectionLevel="signature|privileged" /> 1453 1454 <!-- #SystemApi @hide Allows applications to change LoWPAN connectivity state. 1455 <p>Not for use by third-party applications. --> 1456 <permission android:name="android.permission.CHANGE_LOWPAN_STATE" 1457 android:protectionLevel="signature|privileged" /> 1458 1459 <!-- #SystemApi @hide Allows applications to read LoWPAN credential. 1460 <p>Not for use by third-party applications. --> 1461 <permission android:name="android.permission.READ_LOWPAN_CREDENTIAL" 1462 android:protectionLevel="signature|privileged" /> 1463 1464 <!-- #SystemApi @hide Allows a service to register or unregister 1465 new LoWPAN interfaces. 1466 <p>Not for use by third-party applications. --> 1467 <permission android:name="android.permission.MANAGE_LOWPAN_INTERFACES" 1468 android:protectionLevel="signature|privileged" /> 1469 1470 <!-- @hide Allows internal management of Wi-Fi connectivity state when on 1471 permission review mode. 1472 <p>Not for use by third-party applications. --> 1473 <permission android:name="android.permission.MANAGE_WIFI_WHEN_PERMISSION_REVIEW_REQUIRED" 1474 android:protectionLevel="signature" /> 1475 1476 <!-- #SystemApi @hide Allows an app to bypass Private DNS. 1477 <p>Not for use by third-party applications. 1478 TODO: publish as system API in next API release. --> 1479 <permission android:name="android.permission.NETWORK_BYPASS_PRIVATE_DNS" 1480 android:protectionLevel="signature" /> 1481 1482 <!-- ======================================= --> 1483 <!-- Permissions for short range, peripheral networks --> 1484 <!-- ======================================= --> 1485 <eat-comment /> 1486 1487 <!-- Allows applications to connect to paired bluetooth devices. 1488 <p>Protection level: normal 1489 --> 1490 <permission android:name="android.permission.BLUETOOTH" 1491 android:description="@string/permdesc_bluetooth" 1492 android:label="@string/permlab_bluetooth" 1493 android:protectionLevel="normal" /> 1494 1495 <!-- @SystemApi Allows an application to suspend other apps, which will prevent the user 1496 from using them until they are unsuspended. 1497 @hide 1498 --> 1499 <permission android:name="android.permission.SUSPEND_APPS" 1500 android:protectionLevel="signature|privileged" /> 1501 1502 <!-- Allows applications to discover and pair bluetooth devices. 1503 <p>Protection level: normal 1504 --> 1505 <permission android:name="android.permission.BLUETOOTH_ADMIN" 1506 android:description="@string/permdesc_bluetoothAdmin" 1507 android:label="@string/permlab_bluetoothAdmin" 1508 android:protectionLevel="normal" /> 1509 1510 <!-- @SystemApi Allows applications to pair bluetooth devices without user interaction, and to 1511 allow or disallow phonebook access or message access. 1512 This is not available to third party applications. --> 1513 <permission android:name="android.permission.BLUETOOTH_PRIVILEGED" 1514 android:protectionLevel="signature|privileged" /> 1515 1516 <!-- Control access to email providers exclusively for Bluetooth 1517 @hide 1518 --> 1519 <permission android:name="android.permission.BLUETOOTH_MAP" 1520 android:protectionLevel="signature" /> 1521 1522 <!-- Allows bluetooth stack to access files 1523 @hide This should only be used by Bluetooth apk. 1524 --> 1525 <permission android:name="android.permission.BLUETOOTH_STACK" 1526 android:protectionLevel="signature" /> 1527 1528 <!-- Allows applications to perform I/O operations over NFC. 1529 <p>Protection level: normal 1530 --> 1531 <permission android:name="android.permission.NFC" 1532 android:description="@string/permdesc_nfc" 1533 android:label="@string/permlab_nfc" 1534 android:protectionLevel="normal" /> 1535 1536 <!-- Allows applications to receive NFC transaction events. 1537 <p>Protection level: normal 1538 --> 1539 <permission android:name="android.permission.NFC_TRANSACTION_EVENT" 1540 android:protectionLevel="normal" /> 1541 1542 <!-- @SystemApi Allows an internal user to use privileged ConnectivityManager APIs. 1543 @hide --> 1544 <permission android:name="android.permission.CONNECTIVITY_INTERNAL" 1545 android:protectionLevel="signature|privileged" /> 1546 1547 <!-- @SystemApi Allows an internal user to use restricted Networks. 1548 @hide --> 1549 <permission android:name="android.permission.CONNECTIVITY_USE_RESTRICTED_NETWORKS" 1550 android:protectionLevel="signature|privileged" /> 1551 1552 <!-- Allows a system application to access hardware packet offload capabilities. 1553 @hide --> 1554 <permission android:name="android.permission.PACKET_KEEPALIVE_OFFLOAD" 1555 android:protectionLevel="signature|privileged" /> 1556 1557 <!-- @SystemApi 1558 @hide --> 1559 <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE" 1560 android:protectionLevel="signature|privileged" /> 1561 1562 <!-- @SystemApi Allows access to the loop radio (Android@Home mesh network) device. 1563 @hide --> 1564 <permission android:name="android.permission.LOOP_RADIO" 1565 android:protectionLevel="signature|privileged" /> 1566 1567 <!-- Allows sending and receiving handover transfer status from Wifi and Bluetooth 1568 @hide --> 1569 <permission android:name="android.permission.NFC_HANDOVER_STATUS" 1570 android:protectionLevel="signature|privileged" /> 1571 1572 <!-- @hide Allows internal management of Bluetooth state when on permission review mode. 1573 <p>Not for use by third-party applications. --> 1574 <permission android:name="android.permission.MANAGE_BLUETOOTH_WHEN_PERMISSION_REVIEW_REQUIRED" 1575 android:protectionLevel="signature" /> 1576 1577 <!-- ================================== --> 1578 <!-- Permissions for accessing accounts --> 1579 <!-- ================================== --> 1580 <eat-comment /> 1581 1582 <!-- Allows access to the list of accounts in the Accounts Service. 1583 1584 <p class="note"><strong>Note:</strong> Beginning with Android 6.0 (API level 1585 23), if an app shares the signature of the authenticator that manages an 1586 account, it does not need <code>"GET_ACCOUNTS"</code> permission to read 1587 information about that account. On Android 5.1 and lower, all apps need 1588 <code>"GET_ACCOUNTS"</code> permission to read information about any 1589 account.</p> 1590 1591 <p>Protection level: dangerous 1592 --> 1593 <permission android:name="android.permission.GET_ACCOUNTS" 1594 android:permissionGroup="android.permission-group.CONTACTS" 1595 android:protectionLevel="dangerous" 1596 android:description="@string/permdesc_getAccounts" 1597 android:label="@string/permlab_getAccounts" /> 1598 <uses-permission android:name="android.permission.GET_ACCOUNTS"/> 1599 1600 <!-- @SystemApi Allows applications to call into AccountAuthenticators. 1601 <p>Not for use by third-party applications. --> 1602 <permission android:name="android.permission.ACCOUNT_MANAGER" 1603 android:protectionLevel="signature" /> 1604 1605 <!-- ================================== --> 1606 <!-- Permissions for accessing hardware that may effect battery life--> 1607 <!-- ================================== --> 1608 <eat-comment /> 1609 1610 <!-- Allows applications to enter Wi-Fi Multicast mode. 1611 <p>Protection level: normal 1612 --> 1613 <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE" 1614 android:description="@string/permdesc_changeWifiMulticastState" 1615 android:label="@string/permlab_changeWifiMulticastState" 1616 android:protectionLevel="normal" /> 1617 1618 <!-- Allows access to the vibrator. 1619 <p>Protection level: normal 1620 --> 1621 <permission android:name="android.permission.VIBRATE" 1622 android:label="@string/permlab_vibrate" 1623 android:description="@string/permdesc_vibrate" 1624 android:protectionLevel="normal|instant" /> 1625 1626 <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen 1627 from dimming. 1628 <p>Protection level: normal 1629 --> 1630 <permission android:name="android.permission.WAKE_LOCK" 1631 android:label="@string/permlab_wakeLock" 1632 android:description="@string/permdesc_wakeLock" 1633 android:protectionLevel="normal|instant" /> 1634 1635 <!-- Allows using the device's IR transmitter, if available. 1636 <p>Protection level: normal 1637 --> 1638 <permission android:name="android.permission.TRANSMIT_IR" 1639 android:label="@string/permlab_transmitIr" 1640 android:description="@string/permdesc_transmitIr" 1641 android:protectionLevel="normal" /> 1642 1643 <!-- ==================================================== --> 1644 <!-- Permissions related to changing audio settings --> 1645 <!-- ==================================================== --> 1646 <eat-comment /> 1647 1648 <!-- Allows an application to modify global audio settings. 1649 <p>Protection level: normal 1650 --> 1651 <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS" 1652 android:label="@string/permlab_modifyAudioSettings" 1653 android:description="@string/permdesc_modifyAudioSettings" 1654 android:protectionLevel="normal" /> 1655 1656 <!-- ================================== --> 1657 <!-- Permissions for accessing hardware --> 1658 <!-- ================================== --> 1659 <eat-comment /> 1660 1661 <!-- @SystemApi Allows an application to manage preferences and permissions for USB devices 1662 @hide --> 1663 <permission android:name="android.permission.MANAGE_USB" 1664 android:protectionLevel="signature|privileged" /> 1665 1666 <!-- @SystemApi Allows an application to access the MTP USB kernel driver. 1667 For use only by the device side MTP implementation. 1668 @hide --> 1669 <permission android:name="android.permission.ACCESS_MTP" 1670 android:protectionLevel="signature|privileged" /> 1671 1672 <!-- @SystemApi Allows access to hardware peripherals. Intended only for hardware testing. 1673 <p>Not for use by third-party applications. 1674 @hide 1675 --> 1676 <permission android:name="android.permission.HARDWARE_TEST" 1677 android:protectionLevel="signature" /> 1678 1679 <!-- @SystemApi Allows access to Broadcast Radio 1680 @hide This is not a third-party API (intended for system apps).--> 1681 <permission android:name="android.permission.ACCESS_BROADCAST_RADIO" 1682 android:protectionLevel="signature|privileged" /> 1683 1684 <!-- @deprecated @SystemApi Allows access to FM 1685 @hide This is not a third-party API (intended for system apps).--> 1686 <permission android:name="android.permission.ACCESS_FM_RADIO" 1687 android:protectionLevel="signature|privileged" /> 1688 1689 <!-- Allows access to configure network interfaces, configure/use IPSec, etc. 1690 @hide --> 1691 <permission android:name="android.permission.NET_ADMIN" 1692 android:protectionLevel="signature" /> 1693 1694 <!-- Allows registration for remote audio playback. @hide --> 1695 <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK" 1696 android:protectionLevel="signature" /> 1697 1698 <!-- @SystemApi Allows TvInputService to access underlying TV input hardware such as 1699 built-in tuners and HDMI-in's. 1700 @hide This should only be used by OEM's TvInputService's. 1701 --> 1702 <permission android:name="android.permission.TV_INPUT_HARDWARE" 1703 android:protectionLevel="signature|privileged" /> 1704 1705 <!-- @SystemApi Allows to capture a frame of TV input hardware such as 1706 built-in tuners and HDMI-in's. 1707 @hide <p>Not for use by third-party applications. 1708 --> 1709 <permission android:name="android.permission.CAPTURE_TV_INPUT" 1710 android:protectionLevel="signature|privileged" /> 1711 1712 <!-- @hide Allows TvInputService to access DVB device. 1713 <p>Not for use by third-party applications. --> 1714 <permission android:name="android.permission.DVB_DEVICE" 1715 android:protectionLevel="signature|privileged" /> 1716 1717 <!-- @SystemApi Allows reading and enabling/disabling the OEM unlock allowed by carrier state 1718 @hide <p>Not for use by third-party applications. --> 1719 <permission android:name="android.permission.MANAGE_CARRIER_OEM_UNLOCK_STATE" 1720 android:protectionLevel="signature|privileged" /> 1721 1722 <!-- @SystemApi Allows reading and enabling/disabling the OEM unlock allowed by user state 1723 @hide <p>Not for use by third-party applications. --> 1724 <permission android:name="android.permission.MANAGE_USER_OEM_UNLOCK_STATE" 1725 android:protectionLevel="signature|privileged" /> 1726 1727 <!-- @SystemApi Allows reading the OEM unlock state 1728 @hide <p>Not for use by third-party applications. --> 1729 <permission android:name="android.permission.READ_OEM_UNLOCK_STATE" 1730 android:protectionLevel="signature|privileged" /> 1731 1732 <!-- @hide Allows enabling/disabling OEM unlock 1733 <p>Not for use by third-party applications. --> 1734 <permission android:name="android.permission.OEM_UNLOCK_STATE" 1735 android:protectionLevel="signature" /> 1736 1737 <!-- @hide Allows querying state of PersistentDataBlock 1738 <p>Not for use by third-party applications. --> 1739 <permission android:name="android.permission.ACCESS_PDB_STATE" 1740 android:protectionLevel="signature" /> 1741 1742 <!-- Allows testing if a passwords is forbidden by the admins. 1743 @hide <p>Not for use by third-party applications. --> 1744 <permission android:name="android.permission.TEST_BLACKLISTED_PASSWORD" 1745 android:protectionLevel="signature" /> 1746 1747 <!-- @hide Allows system update service to notify device owner about pending updates. 1748 <p>Not for use by third-party applications. --> 1749 <permission android:name="android.permission.NOTIFY_PENDING_SYSTEM_UPDATE" 1750 android:protectionLevel="signature|privileged" /> 1751 1752 <!-- =========================================== --> 1753 <!-- Permissions associated with camera and image capture --> 1754 <!-- =========================================== --> 1755 <eat-comment /> 1756 1757 <!-- @SystemApi Allows disabling the transmit-indicator LED that is normally on when 1758 a camera is in use by an application. 1759 @hide --> 1760 <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED" 1761 android:protectionLevel="signature|privileged" /> 1762 1763 <!-- Allows sending the camera service notifications about system-wide events. 1764 @hide --> 1765 <permission android:name="android.permission.CAMERA_SEND_SYSTEM_EVENTS" 1766 android:protectionLevel="signature|privileged" /> 1767 1768 <!-- =========================================== --> 1769 <!-- Permissions associated with telephony state --> 1770 <!-- =========================================== --> 1771 <eat-comment /> 1772 1773 <!-- @SystemApi Allows modification of the telephony state - power on, mmi, etc. 1774 Does not include placing calls. 1775 <p>Not for use by third-party applications. --> 1776 <permission android:name="android.permission.MODIFY_PHONE_STATE" 1777 android:protectionLevel="signature|privileged" /> 1778 1779 <!-- Allows read only access to precise phone state. 1780 @hide Pending API council approval --> 1781 <permission android:name="android.permission.READ_PRECISE_PHONE_STATE" 1782 android:protectionLevel="signature|privileged" /> 1783 1784 <!-- @SystemApi Allows read access to privileged phone state. 1785 @hide Used internally. --> 1786 <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE" 1787 android:protectionLevel="signature|privileged" /> 1788 1789 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1790 PhoneAccount#CAPABILITY_SIM_SUBSCRIPTION. This capability indicates that the PhoneAccount 1791 corresponds to a device SIM. 1792 @hide --> 1793 <permission android:name="android.permission.REGISTER_SIM_SUBSCRIPTION" 1794 android:protectionLevel="signature|privileged" /> 1795 1796 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1797 PhoneAccount#CAPABILITY_CALL_PROVIDER. 1798 @hide --> 1799 <permission android:name="android.permission.REGISTER_CALL_PROVIDER" 1800 android:protectionLevel="signature|privileged" /> 1801 1802 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1803 PhoneAccount#CAPABILITY_CONNECTION_MANAGER 1804 @hide --> 1805 <permission android:name="android.permission.REGISTER_CONNECTION_MANAGER" 1806 android:protectionLevel="signature|privileged" /> 1807 1808 <!-- Must be required by a {@link android.telecom.InCallService}, 1809 to ensure that only the system can bind to it. 1810 <p>Protection level: signature|privileged 1811 --> 1812 <permission android:name="android.permission.BIND_INCALL_SERVICE" 1813 android:protectionLevel="signature|privileged" /> 1814 1815 <!-- Must be required by a link {@link android.telephony.VisualVoicemailService} to ensure that 1816 only the system can bind to it. 1817 <p>Protection level: signature|privileged 1818 --> 1819 <permission 1820 android:name="android.permission.BIND_VISUAL_VOICEMAIL_SERVICE" 1821 android:protectionLevel="signature|privileged"/> 1822 1823 <!-- Must be required by a {@link android.telecom.CallScreeningService}, 1824 to ensure that only the system can bind to it. 1825 <p>Protection level: signature|privileged 1826 --> 1827 <permission android:name="android.permission.BIND_SCREENING_SERVICE" 1828 android:protectionLevel="signature|privileged" /> 1829 1830 <!-- Must be required by a {@link android.telecom.ConnectionService}, 1831 to ensure that only the system can bind to it. 1832 @deprecated {@link android.telecom.ConnectionService}s should require 1833 android.permission.BIND_TELECOM_CONNECTION_SERVICE instead. 1834 @SystemApi 1835 @hide --> 1836 <permission android:name="android.permission.BIND_CONNECTION_SERVICE" 1837 android:protectionLevel="signature|privileged" /> 1838 1839 <!-- Must be required by a {@link android.telecom.ConnectionService}, 1840 to ensure that only the system can bind to it. 1841 <p>Protection level: signature|privileged 1842 --> 1843 <permission android:name="android.permission.BIND_TELECOM_CONNECTION_SERVICE" 1844 android:protectionLevel="signature|privileged" /> 1845 1846 <!-- @SystemApi Allows an application to control the in-call experience. 1847 @hide --> 1848 <permission android:name="android.permission.CONTROL_INCALL_EXPERIENCE" 1849 android:protectionLevel="signature|privileged" /> 1850 1851 <!-- Allows an application to receive STK related commands. 1852 @hide --> 1853 <permission android:name="android.permission.RECEIVE_STK_COMMANDS" 1854 android:protectionLevel="signature|privileged" /> 1855 1856 <!-- Allows an application to send EMBMS download intents to apps 1857 @hide --> 1858 <permission android:name="android.permission.SEND_EMBMS_INTENTS" 1859 android:protectionLevel="signature|privileged" /> 1860 1861 1862 <!-- Allows internal management of the sensor framework 1863 @hide --> 1864 <permission android:name="android.permission.MANAGE_SENSORS" 1865 android:protectionLevel="signature" /> 1866 1867 <!-- Must be required by an ImsService to ensure that only the 1868 system can bind to it. 1869 <p>Protection level: signature|privileged|vendorPrivileged 1870 @SystemApi 1871 @hide 1872 --> 1873 <permission android:name="android.permission.BIND_IMS_SERVICE" 1874 android:protectionLevel="signature|privileged|vendorPrivileged" /> 1875 1876 <!-- Must be required by a telephony data service to ensure that only the 1877 system can bind to it. 1878 <p>Protection level: signature 1879 @SystemApi 1880 @hide 1881 --> 1882 <permission android:name="android.permission.BIND_TELEPHONY_DATA_SERVICE" 1883 android:protectionLevel="signature" /> 1884 1885 <!-- Must be required by a NetworkService to ensure that only the 1886 system can bind to it. 1887 <p>Protection level: signature 1888 @SystemApi 1889 @hide 1890 --> 1891 <permission android:name="android.permission.BIND_TELEPHONY_NETWORK_SERVICE" 1892 android:protectionLevel="signature" /> 1893 1894 <!-- @SystemApi Allows an application to manage embedded subscriptions (those on a eUICC) 1895 through EuiccManager APIs. 1896 <p>Protection level: signature|privileged|development 1897 @hide 1898 --> 1899 <permission android:name="android.permission.WRITE_EMBEDDED_SUBSCRIPTIONS" 1900 android:protectionLevel="signature|privileged|development" /> 1901 1902 <!-- @SystemApi Must be required by an EuiccService to ensure that only the system can bind to 1903 it. 1904 <p>Protection level: signature 1905 @hide 1906 --> 1907 <permission android:name="android.permission.BIND_EUICC_SERVICE" 1908 android:protectionLevel="signature" /> 1909 1910 <!-- ================================== --> 1911 <!-- Permissions for sdcard interaction --> 1912 <!-- ================================== --> 1913 <eat-comment /> 1914 1915 <!-- @SystemApi Allows an application to write to internal media storage 1916 @hide --> 1917 <permission android:name="android.permission.WRITE_MEDIA_STORAGE" 1918 android:protectionLevel="signature|privileged" /> 1919 1920 <!-- Allows an application to manage access to documents, usually as part 1921 of a document picker. 1922 <p>This permission should <em>only</em> be requested by the platform 1923 document management app. This permission cannot be granted to 1924 third-party apps. 1925 <p>Protection level: signature 1926 --> 1927 <permission android:name="android.permission.MANAGE_DOCUMENTS" 1928 android:protectionLevel="signature" /> 1929 1930 <!-- @hide Allows an application to cache content. 1931 <p>Not for use by third-party applications. 1932 <p>Protection level: signature 1933 --> 1934 <permission android:name="android.permission.CACHE_CONTENT" 1935 android:protectionLevel="signature" /> 1936 1937 <!-- @SystemApi @hide 1938 Allows an application to aggressively allocate disk space. 1939 <p>Not for use by third-party applications. 1940 --> 1941 <permission android:name="android.permission.ALLOCATE_AGGRESSIVE" 1942 android:protectionLevel="signature|privileged" /> 1943 1944 <!-- @SystemApi @hide 1945 Allows an application to use reserved disk space. 1946 <p>Not for use by third-party applications. Should only be requested by 1947 apps that provide core system functionality, to ensure system stability 1948 when disk is otherwise completely full. 1949 --> 1950 <permission android:name="android.permission.USE_RESERVED_DISK" 1951 android:protectionLevel="signature|privileged" /> 1952 1953 <!-- ================================== --> 1954 <!-- Permissions for screenlock --> 1955 <!-- ================================== --> 1956 <eat-comment /> 1957 1958 <!-- Allows applications to disable the keyguard if it is not secure. 1959 <p>Protection level: normal 1960 --> 1961 <permission android:name="android.permission.DISABLE_KEYGUARD" 1962 android:description="@string/permdesc_disableKeyguard" 1963 android:label="@string/permlab_disableKeyguard" 1964 android:protectionLevel="normal" /> 1965 1966 <!-- ================================== --> 1967 <!-- Permissions to access other installed applications --> 1968 <!-- ================================== --> 1969 <eat-comment /> 1970 1971 <!-- @deprecated No longer enforced. --> 1972 <permission android:name="android.permission.GET_TASKS" 1973 android:label="@string/permlab_getTasks" 1974 android:description="@string/permdesc_getTasks" 1975 android:protectionLevel="normal" /> 1976 1977 <!-- New version of GET_TASKS that apps can request, since GET_TASKS doesn't really 1978 give access to task information. We need this new one because there are 1979 many existing apps that use add libraries and such that have validation 1980 code to ensure the app has requested the GET_TASKS permission by seeing 1981 if it has been granted the permission... if it hasn't, it kills the app 1982 with a message about being upset. So we need to have it continue to look 1983 like the app is getting that permission, even though it will never be 1984 checked, and new privileged apps can now request this one for real access. 1985 @hide 1986 @SystemApi --> 1987 <permission android:name="android.permission.REAL_GET_TASKS" 1988 android:protectionLevel="signature|privileged" /> 1989 1990 <!-- Allows an application to start a task from a ActivityManager#RecentTaskInfo. 1991 @hide --> 1992 <permission android:name="android.permission.START_TASKS_FROM_RECENTS" 1993 android:protectionLevel="signature|privileged" /> 1994 1995 <!-- @SystemApi @hide Allows an application to call APIs that allow it to do interactions 1996 across the users on the device, using singleton services and 1997 user-targeted broadcasts. This permission is not available to 1998 third party applications. --> 1999 <permission android:name="android.permission.INTERACT_ACROSS_USERS" 2000 android:protectionLevel="signature|privileged|development" /> 2001 2002 <!-- @SystemApi Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS} 2003 that removes restrictions on where broadcasts can be sent and allows other 2004 types of interactions 2005 @hide --> 2006 <permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL" 2007 android:protectionLevel="signature|installer" /> 2008 2009 <!-- @SystemApi @hide Allows an application to call APIs that allow it to query and manage 2010 users on the device. This permission is not available to 2011 third party applications. --> 2012 <permission android:name="android.permission.MANAGE_USERS" 2013 android:protectionLevel="signature|privileged" /> 2014 2015 <!-- @hide Allows an application to create, remove users and get the list of 2016 users on the device. Applications holding this permission can only create restricted, 2017 guest, managed, demo, and ephemeral users. For creating other kind of users, 2018 {@link android.Manifest.permission#MANAGE_USERS} is needed. 2019 This permission is not available to third party applications. --> 2020 <permission android:name="android.permission.CREATE_USERS" 2021 android:protectionLevel="signature" /> 2022 2023 <!-- @hide Allows an application to set the profile owners and the device owner. 2024 This permission is not available to third party applications.--> 2025 <permission android:name="android.permission.MANAGE_PROFILE_AND_DEVICE_OWNERS" 2026 android:protectionLevel="signature" 2027 android:label="@string/permlab_manageProfileAndDeviceOwners" 2028 android:description="@string/permdesc_manageProfileAndDeviceOwners" /> 2029 2030 <!-- Allows an application to get full detailed information about 2031 recently running tasks, with full fidelity to the real state. 2032 @hide --> 2033 <permission android:name="android.permission.GET_DETAILED_TASKS" 2034 android:protectionLevel="signature" /> 2035 2036 <!-- Allows an application to change the Z-order of tasks. 2037 <p>Protection level: normal 2038 --> 2039 <permission android:name="android.permission.REORDER_TASKS" 2040 android:label="@string/permlab_reorderTasks" 2041 android:description="@string/permdesc_reorderTasks" 2042 android:protectionLevel="normal" /> 2043 2044 <!-- @hide Allows an application to change to remove/kill tasks --> 2045 <permission android:name="android.permission.REMOVE_TASKS" 2046 android:protectionLevel="signature" /> 2047 2048 <!-- @SystemApi @TestApi @hide Allows an application to create/manage/remove stacks --> 2049 <permission android:name="android.permission.MANAGE_ACTIVITY_STACKS" 2050 android:protectionLevel="signature|privileged|development" /> 2051 2052 <!-- @SystemApi @TestApi @hide Allows an application to embed other activities --> 2053 <permission android:name="android.permission.ACTIVITY_EMBEDDING" 2054 android:protectionLevel="signature|privileged|development" /> 2055 2056 <!-- Allows an application to start any activity, regardless of permission 2057 protection or exported state. 2058 @hide --> 2059 <permission android:name="android.permission.START_ANY_ACTIVITY" 2060 android:protectionLevel="signature" /> 2061 2062 <!-- @SystemApi Must be required by activities that handle the intent action 2063 {@link Intent#ACTION_SEND_SHOW_SUSPENDED_APP_DETAILS}. This is for use by apps that 2064 hold {@link Manifest.permission#SUSPEND_APPS} to interact with the system. 2065 <p>Not for use by third-party applications. 2066 @hide --> 2067 <permission android:name="android.permission.SEND_SHOW_SUSPENDED_APP_DETAILS" 2068 android:protectionLevel="signature" /> 2069 <uses-permission android:name="android.permission.SEND_SHOW_SUSPENDED_APP_DETAILS" /> 2070 2071 <!-- @deprecated The {@link android.app.ActivityManager#restartPackage} 2072 API is no longer supported. --> 2073 <permission android:name="android.permission.RESTART_PACKAGES" 2074 android:label="@string/permlab_killBackgroundProcesses" 2075 android:description="@string/permdesc_killBackgroundProcesses" 2076 android:protectionLevel="normal" /> 2077 2078 <!-- Allows an application to call 2079 {@link android.app.ActivityManager#killBackgroundProcesses}. 2080 <p>Protection level: normal 2081 --> 2082 <permission android:name="android.permission.KILL_BACKGROUND_PROCESSES" 2083 android:label="@string/permlab_killBackgroundProcesses" 2084 android:description="@string/permdesc_killBackgroundProcesses" 2085 android:protectionLevel="normal" /> 2086 2087 <!-- @SystemApi @hide Allows an application to query process states and current 2088 OOM adjustment scores. 2089 <p>Not for use by third-party applications. --> 2090 <permission android:name="android.permission.GET_PROCESS_STATE_AND_OOM_SCORE" 2091 android:protectionLevel="signature|privileged|development" /> 2092 2093 <!-- Allows use of PendingIntent.getIntent(). 2094 @hide --> 2095 <permission android:name="android.permission.GET_INTENT_SENDER_INTENT" 2096 android:protectionLevel="signature" /> 2097 2098 <!-- ================================== --> 2099 <!-- Permissions affecting the display of other applications --> 2100 <!-- ================================== --> 2101 <eat-comment /> 2102 2103 <!-- Allows an app to create windows using the type 2104 {@link android.view.WindowManager.LayoutParams#TYPE_APPLICATION_OVERLAY}, 2105 shown on top of all other apps. Very few apps 2106 should use this permission; these windows are intended for 2107 system-level interaction with the user. 2108 2109 <p class="note"><strong>Note:</strong> If the app 2110 targets API level 23 or higher, the app user must explicitly grant 2111 this permission to the app through a permission management screen. The app requests 2112 the user's approval by sending an intent with action 2113 {@link android.provider.Settings#ACTION_MANAGE_OVERLAY_PERMISSION}. 2114 The app can check whether it has this authorization by calling 2115 {@link android.provider.Settings#canDrawOverlays 2116 Settings.canDrawOverlays()}. 2117 <p>Protection level: signature --> 2118 <permission android:name="android.permission.SYSTEM_ALERT_WINDOW" 2119 android:label="@string/permlab_systemAlertWindow" 2120 android:description="@string/permdesc_systemAlertWindow" 2121 android:protectionLevel="signature|preinstalled|appop|pre23|development" /> 2122 2123 <!-- @deprecated Use {@link android.Manifest.permission#REQUEST_COMPANION_RUN_IN_BACKGROUND} 2124 @hide 2125 --> 2126 <permission android:name="android.permission.RUN_IN_BACKGROUND" 2127 android:label="@string/permlab_runInBackground" 2128 android:description="@string/permdesc_runInBackground" 2129 android:protectionLevel="signature" /> 2130 2131 <!-- @deprecated Use 2132 {@link android.Manifest.permission#REQUEST_COMPANION_USE_DATA_IN_BACKGROUND} 2133 @hide 2134 --> 2135 <permission android:name="android.permission.USE_DATA_IN_BACKGROUND" 2136 android:label="@string/permlab_useDataInBackground" 2137 android:description="@string/permdesc_useDataInBackground" 2138 android:protectionLevel="signature" /> 2139 2140 <!-- @hide Allows an application to set display offsets for the screen. 2141 This permission is not available to third party applications. --> 2142 <permission android:name="android.permission.SET_DISPLAY_OFFSET" 2143 android:protectionLevel="signature|privileged" /> 2144 2145 <!-- Allows a companion app to run in the background. 2146 <p>Protection level: normal 2147 --> 2148 <permission android:name="android.permission.REQUEST_COMPANION_RUN_IN_BACKGROUND" 2149 android:label="@string/permlab_runInBackground" 2150 android:description="@string/permdesc_runInBackground" 2151 android:protectionLevel="normal" /> 2152 2153 <!-- Allows a companion app to use data in the background. 2154 <p>Protection level: normal 2155 --> 2156 <permission android:name="android.permission.REQUEST_COMPANION_USE_DATA_IN_BACKGROUND" 2157 android:label="@string/permlab_useDataInBackground" 2158 android:description="@string/permdesc_useDataInBackground" 2159 android:protectionLevel="normal" /> 2160 2161 2162 <!-- ================================== --> 2163 <!-- Permissions affecting the system wallpaper --> 2164 <!-- ================================== --> 2165 <eat-comment /> 2166 2167 <!-- Allows applications to set the wallpaper. 2168 <p>Protection level: normal 2169 --> 2170 <permission android:name="android.permission.SET_WALLPAPER" 2171 android:label="@string/permlab_setWallpaper" 2172 android:description="@string/permdesc_setWallpaper" 2173 android:protectionLevel="normal" /> 2174 2175 <!-- Allows applications to set the wallpaper hints. 2176 <p>Protection level: normal 2177 --> 2178 <permission android:name="android.permission.SET_WALLPAPER_HINTS" 2179 android:label="@string/permlab_setWallpaperHints" 2180 android:description="@string/permdesc_setWallpaperHints" 2181 android:protectionLevel="normal" /> 2182 2183 <!-- Allow the app to read the system wallpaper image without 2184 holding the READ_EXTERNAL_STORAGE permission. 2185 <p>Not for use by third-party applications. 2186 @hide 2187 @SystemApi 2188 --> 2189 <permission android:name="android.permission.READ_WALLPAPER_INTERNAL" 2190 android:protectionLevel="signature|privileged" /> 2191 2192 <!-- ============================================ --> 2193 <!-- Permissions for changing the system clock --> 2194 <!-- ============================================ --> 2195 <eat-comment /> 2196 2197 <!-- @SystemApi Allows applications to set the system time. 2198 <p>Not for use by third-party applications. --> 2199 <permission android:name="android.permission.SET_TIME" 2200 android:protectionLevel="signature|privileged" /> 2201 2202 <!-- Allows applications to set the system time zone. 2203 <p>Not for use by third-party applications. 2204 --> 2205 <permission android:name="android.permission.SET_TIME_ZONE" 2206 android:label="@string/permlab_setTimeZone" 2207 android:description="@string/permdesc_setTimeZone" 2208 android:protectionLevel="signature|privileged" /> 2209 2210 <!-- ==================================================== --> 2211 <!-- Permissions related to changing status bar --> 2212 <!-- ==================================================== --> 2213 <eat-comment /> 2214 2215 <!-- Allows an application to expand or collapse the status bar. 2216 <p>Protection level: normal 2217 --> 2218 <permission android:name="android.permission.EXPAND_STATUS_BAR" 2219 android:label="@string/permlab_expandStatusBar" 2220 android:description="@string/permdesc_expandStatusBar" 2221 android:protectionLevel="normal" /> 2222 2223 <!-- ============================================================== --> 2224 <!-- Permissions related to adding/removing shortcuts from Launcher --> 2225 <!-- ============================================================== --> 2226 <eat-comment /> 2227 2228 <!-- Allows an application to install a shortcut in Launcher. 2229 <p>In Android O (API level 26) and higher, the <code>INSTALL_SHORTCUT</code> broadcast no 2230 longer has any effect on your app because it's a private, implicit 2231 broadcast. Instead, you should create an app shortcut by using the 2232 {@link android.content.pm.ShortcutManager#requestPinShortcut requestPinShortcut()} 2233 method from the {@link android.content.pm.ShortcutManager} class. 2234 <p>Protection level: normal 2235 --> 2236 <permission android:name="com.android.launcher.permission.INSTALL_SHORTCUT" 2237 android:label="@string/permlab_install_shortcut" 2238 android:description="@string/permdesc_install_shortcut" 2239 android:protectionLevel="normal"/> 2240 2241 <!--This permission is no longer supported. 2242 --> 2243 <permission android:name="com.android.launcher.permission.UNINSTALL_SHORTCUT" 2244 android:label="@string/permlab_uninstall_shortcut" 2245 android:description="@string/permdesc_uninstall_shortcut" 2246 android:protectionLevel="normal"/> 2247 2248 <!-- ==================================================== --> 2249 <!-- Permissions related to accessing sync settings --> 2250 <!-- ==================================================== --> 2251 <eat-comment /> 2252 2253 <!-- Allows applications to read the sync settings. 2254 <p>Protection level: normal 2255 --> 2256 <permission android:name="android.permission.READ_SYNC_SETTINGS" 2257 android:description="@string/permdesc_readSyncSettings" 2258 android:label="@string/permlab_readSyncSettings" 2259 android:protectionLevel="normal" /> 2260 2261 <!-- Allows applications to write the sync settings. 2262 <p>Protection level: normal 2263 --> 2264 <permission android:name="android.permission.WRITE_SYNC_SETTINGS" 2265 android:description="@string/permdesc_writeSyncSettings" 2266 android:label="@string/permlab_writeSyncSettings" 2267 android:protectionLevel="normal" /> 2268 2269 <!-- Allows applications to read the sync stats. 2270 <p>Protection level: normal 2271 --> 2272 <permission android:name="android.permission.READ_SYNC_STATS" 2273 android:description="@string/permdesc_readSyncStats" 2274 android:label="@string/permlab_readSyncStats" 2275 android:protectionLevel="normal" /> 2276 2277 <!-- ============================================ --> 2278 <!-- Permissions for low-level system interaction --> 2279 <!-- ============================================ --> 2280 <eat-comment /> 2281 2282 <!-- @SystemApi @hide Change the screen compatibility mode of applications --> 2283 <permission android:name="android.permission.SET_SCREEN_COMPATIBILITY" 2284 android:protectionLevel="signature" /> 2285 2286 <!-- @SystemApi Allows an application to modify the current configuration, such 2287 as locale. --> 2288 <permission android:name="android.permission.CHANGE_CONFIGURATION" 2289 android:protectionLevel="signature|privileged|development" /> 2290 2291 <!-- Allows an application to read or write the system settings. 2292 2293 <p class="note"><strong>Note:</strong> If the app targets API level 23 2294 or higher, the app user 2295 must explicitly grant this permission to the app through a permission management screen. 2296 The app requests the user's approval by sending an intent with action 2297 {@link android.provider.Settings#ACTION_MANAGE_WRITE_SETTINGS}. The app 2298 can check whether it has this authorization by calling {@link 2299 android.provider.Settings.System#canWrite Settings.System.canWrite()}. 2300 2301 <p>Protection level: signature 2302 --> 2303 <permission android:name="android.permission.WRITE_SETTINGS" 2304 android:label="@string/permlab_writeSettings" 2305 android:description="@string/permdesc_writeSettings" 2306 android:protectionLevel="signature|preinstalled|appop|pre23" /> 2307 2308 <!-- @SystemApi Allows an application to modify the Google service map. 2309 <p>Not for use by third-party applications. --> 2310 <permission android:name="android.permission.WRITE_GSERVICES" 2311 android:protectionLevel="signature|privileged" /> 2312 2313 <!-- @SystemApi Allows an application to call 2314 {@link android.app.ActivityManager#forceStopPackage}. 2315 @hide --> 2316 <permission android:name="android.permission.FORCE_STOP_PACKAGES" 2317 android:protectionLevel="signature|privileged" /> 2318 2319 <!-- @SystemApi @hide Allows an application to retrieve the content of the active window 2320 An active window is the window that has fired an accessibility event. --> 2321 <permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT" 2322 android:protectionLevel="signature|privileged" /> 2323 2324 <!-- @SystemApi Modify the global animation scaling factor. 2325 <p>Not for use by third-party applications. --> 2326 <permission android:name="android.permission.SET_ANIMATION_SCALE" 2327 android:protectionLevel="signature|privileged|development" /> 2328 2329 <!-- @deprecated This functionality will be removed in the future; please do 2330 not use. Allow an application to make its activities persistent. --> 2331 <permission android:name="android.permission.PERSISTENT_ACTIVITY" 2332 android:label="@string/permlab_persistentActivity" 2333 android:description="@string/permdesc_persistentActivity" 2334 android:protectionLevel="normal" /> 2335 2336 <!-- Allows an application to find out the space used by any package. 2337 <p>Protection level: normal 2338 --> 2339 <permission android:name="android.permission.GET_PACKAGE_SIZE" 2340 android:label="@string/permlab_getPackageSize" 2341 android:description="@string/permdesc_getPackageSize" 2342 android:protectionLevel="normal" /> 2343 2344 <!-- @deprecated No longer useful, see 2345 {@link android.content.pm.PackageManager#addPackageToPreferred} 2346 for details. --> 2347 <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS" 2348 android:protectionLevel="signature|verifier" /> 2349 2350 <!-- Allows an application to receive the 2351 {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is 2352 broadcast after the system finishes booting. If you don't 2353 request this permission, you will not receive the broadcast at 2354 that time. Though holding this permission does not have any 2355 security implications, it can have a negative impact on the 2356 user experience by increasing the amount of time it takes the 2357 system to start and allowing applications to have themselves 2358 running without the user being aware of them. As such, you must 2359 explicitly declare your use of this facility to make that visible 2360 to the user. 2361 <p>Protection level: normal 2362 --> 2363 <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED" 2364 android:label="@string/permlab_receiveBootCompleted" 2365 android:description="@string/permdesc_receiveBootCompleted" 2366 android:protectionLevel="normal" /> 2367 2368 <!-- Allows an application to broadcast sticky intents. These are 2369 broadcasts whose data is held by the system after being finished, 2370 so that clients can quickly retrieve that data without having 2371 to wait for the next broadcast. 2372 <p>Protection level: normal 2373 --> 2374 <permission android:name="android.permission.BROADCAST_STICKY" 2375 android:label="@string/permlab_broadcastSticky" 2376 android:description="@string/permdesc_broadcastSticky" 2377 android:protectionLevel="normal" /> 2378 2379 <!-- @SystemApi Allows mounting and unmounting file systems for removable storage. 2380 <p>Not for use by third-party applications.--> 2381 <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS" 2382 android:protectionLevel="signature|privileged" /> 2383 2384 <!-- @SystemApi Allows formatting file systems for removable storage. 2385 <p>Not for use by third-party applications. --> 2386 <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS" 2387 android:protectionLevel="signature|privileged" /> 2388 2389 <!-- @hide --> 2390 <permission android:name="android.permission.STORAGE_INTERNAL" 2391 android:protectionLevel="signature" /> 2392 2393 <!-- Allows access to ASEC non-destructive API calls 2394 @hide --> 2395 <permission android:name="android.permission.ASEC_ACCESS" 2396 android:protectionLevel="signature" /> 2397 2398 <!-- Allows creation of ASEC volumes 2399 @hide --> 2400 <permission android:name="android.permission.ASEC_CREATE" 2401 android:protectionLevel="signature" /> 2402 2403 <!-- Allows destruction of ASEC volumes 2404 @hide --> 2405 <permission android:name="android.permission.ASEC_DESTROY" 2406 android:protectionLevel="signature" /> 2407 2408 <!-- Allows mount / unmount of ASEC volumes 2409 @hide --> 2410 <permission android:name="android.permission.ASEC_MOUNT_UNMOUNT" 2411 android:protectionLevel="signature" /> 2412 2413 <!-- Allows rename of ASEC volumes 2414 @hide --> 2415 <permission android:name="android.permission.ASEC_RENAME" 2416 android:protectionLevel="signature" /> 2417 2418 <!-- @SystemApi Allows applications to write the apn settings. 2419 <p>Not for use by third-party applications. --> 2420 <permission android:name="android.permission.WRITE_APN_SETTINGS" 2421 android:protectionLevel="signature|privileged" /> 2422 2423 <!-- Allows applications to change network connectivity state. 2424 <p>Protection level: normal 2425 --> 2426 <permission android:name="android.permission.CHANGE_NETWORK_STATE" 2427 android:description="@string/permdesc_changeNetworkState" 2428 android:label="@string/permlab_changeNetworkState" 2429 android:protectionLevel="normal" /> 2430 2431 <!-- Allows an application to clear the caches of all installed 2432 applications on the device. 2433 <p>Protection level: signature|privileged 2434 --> 2435 <permission android:name="android.permission.CLEAR_APP_CACHE" 2436 android:protectionLevel="signature|privileged" /> 2437 2438 <!-- @SystemApi Allows an application to use any media decoder when decoding for playback 2439 @hide --> 2440 <permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK" 2441 android:protectionLevel="signature|privileged" /> 2442 2443 <!-- @SystemApi Allows an application to install and/or uninstall CA certificates on 2444 behalf of the user. 2445 @hide --> 2446 <permission android:name="android.permission.MANAGE_CA_CERTIFICATES" 2447 android:protectionLevel="signature|privileged" /> 2448 2449 <!-- @SystemApi Allows an application to do certain operations needed for 2450 interacting with the recovery (system update) system. 2451 @hide --> 2452 <permission android:name="android.permission.RECOVERY" 2453 android:protectionLevel="signature|privileged" /> 2454 2455 <!-- @SystemApi Allows an application to read system update info. 2456 @hide --> 2457 <permission android:name="android.permission.READ_SYSTEM_UPDATE_INFO" 2458 android:protectionLevel="signature" /> 2459 2460 <!-- Allows the system to bind to an application's task services 2461 @hide --> 2462 <permission android:name="android.permission.BIND_JOB_SERVICE" 2463 android:protectionLevel="signature" /> 2464 <uses-permission android:name="android.permission.BIND_JOB_SERVICE"/> 2465 2466 <!-- Allows an application to initiate configuration updates 2467 <p>An application requesting this permission is responsible for 2468 verifying the source and integrity of any update before passing 2469 it off to the various individual installer components 2470 @hide --> 2471 <permission android:name="android.permission.UPDATE_CONFIG" 2472 android:protectionLevel="signature|privileged" /> 2473 2474 <!-- Allows an application to query the current time zone rules state 2475 on device. 2476 @SystemApi @hide --> 2477 <permission android:name="android.permission.QUERY_TIME_ZONE_RULES" 2478 android:protectionLevel="signature|privileged" /> 2479 2480 <!-- Allows a time zone rule updater application to request 2481 the system installs / uninstalls timezone rules. 2482 <p>An application requesting this permission is responsible for 2483 verifying the source and integrity of the update before passing 2484 it off to the installer components. 2485 @SystemApi @hide --> 2486 <permission android:name="android.permission.UPDATE_TIME_ZONE_RULES" 2487 android:protectionLevel="signature|privileged" /> 2488 2489 <!-- Must be required by a time zone rule updater application, 2490 to ensure that only the system can trigger it. 2491 @hide --> 2492 <permission android:name="android.permission.TRIGGER_TIME_ZONE_RULES_CHECK" 2493 android:protectionLevel="signature" /> 2494 <uses-permission android:name="android.permission.TRIGGER_TIME_ZONE_RULES_CHECK"/> 2495 2496 <!-- Allows the system to reset throttling in shortcut manager. 2497 @hide --> 2498 <permission android:name="android.permission.RESET_SHORTCUT_MANAGER_THROTTLING" 2499 android:protectionLevel="signature" /> 2500 2501 <!-- Allows the system to bind to the discovered Network Recommendation Service. 2502 @SystemApi @hide --> 2503 <permission android:name="android.permission.BIND_NETWORK_RECOMMENDATION_SERVICE" 2504 android:protectionLevel="signature" /> 2505 <uses-permission android:name="android.permission.BIND_NETWORK_RECOMMENDATION_SERVICE"/> 2506 2507 <!-- Allows an application to enable, disable and change priority of 2508 runtime resource overlays. 2509 @hide --> 2510 <permission android:name="android.permission.CHANGE_OVERLAY_PACKAGES" 2511 android:protectionLevel="signature|privileged" /> 2512 2513 <!-- ========================================= --> 2514 <!-- Permissions for special development tools --> 2515 <!-- ========================================= --> 2516 <eat-comment /> 2517 2518 <!-- @SystemApi Allows an application to read or write the secure system settings. 2519 <p>Not for use by third-party applications. --> 2520 <permission android:name="android.permission.WRITE_SECURE_SETTINGS" 2521 android:protectionLevel="signature|privileged|development" /> 2522 2523 <!-- @SystemApi Allows an application to retrieve state dump information from system services. 2524 <p>Not for use by third-party applications. --> 2525 <permission android:name="android.permission.DUMP" 2526 android:protectionLevel="signature|privileged|development" /> 2527 2528 <!-- @SystemApi Allows an application to read the low-level system log files. 2529 <p>Not for use by third-party applications, because 2530 Log entries can contain the user's private information. --> 2531 <permission android:name="android.permission.READ_LOGS" 2532 android:protectionLevel="signature|privileged|development" /> 2533 2534 <!-- @SystemApi Configure an application for debugging. 2535 <p>Not for use by third-party applications. --> 2536 <permission android:name="android.permission.SET_DEBUG_APP" 2537 android:protectionLevel="signature|privileged|development" /> 2538 2539 <!-- @SystemApi Allows an application to set the maximum number of (not needed) 2540 application processes that can be running. 2541 <p>Not for use by third-party applications. --> 2542 <permission android:name="android.permission.SET_PROCESS_LIMIT" 2543 android:protectionLevel="signature|privileged|development" /> 2544 2545 <!-- @SystemApi Allows an application to control whether activities are immediately 2546 finished when put in the background. 2547 <p>Not for use by third-party applications. --> 2548 <permission android:name="android.permission.SET_ALWAYS_FINISH" 2549 android:protectionLevel="signature|privileged|development" /> 2550 2551 <!-- @SystemApi Allow an application to request that a signal be sent to all persistent processes. 2552 <p>Not for use by third-party applications. --> 2553 <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES" 2554 android:protectionLevel="signature|privileged|development" /> 2555 2556 <!-- ==================================== --> 2557 <!-- Private permissions --> 2558 <!-- ==================================== --> 2559 <eat-comment /> 2560 2561 <!-- @SystemApi Allows access to the list of accounts in the Accounts Service. --> 2562 <permission android:name="android.permission.GET_ACCOUNTS_PRIVILEGED" 2563 android:protectionLevel="signature|privileged" /> 2564 2565 <!-- Allows but does not guarantee access to user passwords at the conclusion of add account 2566 @hide --> 2567 <permission android:name="android.permission.GET_PASSWORD" 2568 android:protectionLevel="signature" /> 2569 2570 <!-- @SystemApi Allows applications to RW to diagnostic resources. 2571 <p>Not for use by third-party applications. --> 2572 <permission android:name="android.permission.DIAGNOSTIC" 2573 android:protectionLevel="signature" /> 2574 2575 <!-- @SystemApi Allows an application to open, close, or disable the status bar 2576 and its icons. 2577 <p>Not for use by third-party applications. --> 2578 <permission android:name="android.permission.STATUS_BAR" 2579 android:protectionLevel="signature|privileged" /> 2580 2581 <!-- Allows an application to be the status bar. Currently used only by SystemUI.apk 2582 @hide --> 2583 <permission android:name="android.permission.STATUS_BAR_SERVICE" 2584 android:protectionLevel="signature" /> 2585 2586 <!-- Allows an application to bind to third party quick settings tiles. 2587 <p>Should only be requested by the System, should be required by 2588 TileService declarations.--> 2589 <permission android:name="android.permission.BIND_QUICK_SETTINGS_TILE" 2590 android:protectionLevel="signature" /> 2591 2592 <!-- @SystemApi Allows an application to force a BACK operation on whatever is the 2593 top activity. 2594 <p>Not for use by third-party applications. 2595 @hide 2596 --> 2597 <permission android:name="android.permission.FORCE_BACK" 2598 android:protectionLevel="signature" /> 2599 2600 <!-- @SystemApi Allows an application to update device statistics. 2601 <p>Not for use by third-party applications. --> 2602 <permission android:name="android.permission.UPDATE_DEVICE_STATS" 2603 android:protectionLevel="signature|privileged" /> 2604 2605 <!-- @SystemApi @hide Allows an application to collect application operation statistics. 2606 Not for use by third party apps. --> 2607 <permission android:name="android.permission.GET_APP_OPS_STATS" 2608 android:protectionLevel="signature|privileged|development" /> 2609 2610 <!-- @SystemApi Allows an application to update application operation statistics. Not for 2611 use by third party apps. 2612 @hide --> 2613 <permission android:name="android.permission.UPDATE_APP_OPS_STATS" 2614 android:protectionLevel="signature|privileged|installer" /> 2615 2616 <!-- @SystemApi Allows an application to update the user app op restrictions. 2617 Not for use by third party apps. 2618 @hide --> 2619 <permission android:name="android.permission.MANAGE_APP_OPS_RESTRICTIONS" 2620 android:protectionLevel="signature|installer" /> 2621 2622 <!-- Allows an application to update the user app op modes. 2623 Not for use by third party apps. 2624 @hide --> 2625 <permission android:name="android.permission.MANAGE_APP_OPS_MODES" 2626 android:protectionLevel="signature|installer|verifier" /> 2627 2628 <!-- @SystemApi Allows an application to open windows that are for use by parts 2629 of the system user interface. 2630 <p>Not for use by third-party applications. 2631 @hide 2632 --> 2633 <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW" 2634 android:protectionLevel="signature" /> 2635 2636 <!-- @SystemApi Allows an application to use 2637 {@link android.view.WindowManager.LayoutsParams#PRIVATE_FLAG_HIDE_NON_SYSTEM_OVERLAY_WINDOWS} 2638 to hide non-system-overlay windows. 2639 <p>Not for use by third-party applications. 2640 @hide 2641 --> 2642 <permission android:name="android.permission.HIDE_NON_SYSTEM_OVERLAY_WINDOWS" 2643 android:protectionLevel="signature|installer" /> 2644 2645 <!-- @SystemApi Allows an application to manage (create, destroy, 2646 Z-order) application tokens in the window manager. 2647 <p>Not for use by third-party applications. 2648 @hide 2649 --> 2650 <permission android:name="android.permission.MANAGE_APP_TOKENS" 2651 android:protectionLevel="signature" /> 2652 2653 <!-- Allows System UI to register listeners for events from Window Manager. 2654 @hide --> 2655 <permission android:name="android.permission.REGISTER_WINDOW_MANAGER_LISTENERS" 2656 android:protectionLevel="signature" /> 2657 2658 <!-- @hide Allows the application to temporarily freeze the screen for a 2659 full-screen transition. --> 2660 <permission android:name="android.permission.FREEZE_SCREEN" 2661 android:protectionLevel="signature" /> 2662 2663 <!-- @SystemApi Allows an application to inject user events (keys, touch, trackball) 2664 into the event stream and deliver them to ANY window. Without this 2665 permission, you can only deliver events to windows in your own process. 2666 <p>Not for use by third-party applications. 2667 @hide 2668 --> 2669 <permission android:name="android.permission.INJECT_EVENTS" 2670 android:protectionLevel="signature" /> 2671 2672 <!-- @hide Allows an application to register an input filter which filters the stream 2673 of user events (keys, touch, trackball) before they are dispatched to any window. --> 2674 <permission android:name="android.permission.FILTER_EVENTS" 2675 android:protectionLevel="signature" /> 2676 2677 <!-- @hide Allows an application to retrieve the window token from the accessibility manager. --> 2678 <permission android:name="android.permission.RETRIEVE_WINDOW_TOKEN" 2679 android:protectionLevel="signature" /> 2680 2681 <!-- @hide Allows an application to modify accessibility information from another app. --> 2682 <permission android:name="android.permission.MODIFY_ACCESSIBILITY_DATA" 2683 android:protectionLevel="signature" /> 2684 2685 <!-- @hide Allows an application to change the accessibility volume. --> 2686 <permission android:name="android.permission.CHANGE_ACCESSIBILITY_VOLUME" 2687 android:protectionLevel="signature" /> 2688 2689 <!-- @hide Allows an application to collect frame statistics --> 2690 <permission android:name="android.permission.FRAME_STATS" 2691 android:protectionLevel="signature" /> 2692 2693 <!-- @hide Allows an application to temporary enable accessibility on the device. --> 2694 <permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY" 2695 android:protectionLevel="signature" /> 2696 2697 <!-- @SystemApi Allows an application to watch and control how activities are 2698 started globally in the system. Only for is in debugging 2699 (usually the monkey command). 2700 <p>Not for use by third-party applications. 2701 @hide 2702 --> 2703 <permission android:name="android.permission.SET_ACTIVITY_WATCHER" 2704 android:protectionLevel="signature" /> 2705 2706 <!-- @SystemApi Allows an application to call the activity manager shutdown() API 2707 to put the higher-level system there into a shutdown state. 2708 @hide --> 2709 <permission android:name="android.permission.SHUTDOWN" 2710 android:protectionLevel="signature|privileged" /> 2711 2712 <!-- @SystemApi Allows an application to tell the activity manager to temporarily 2713 stop application switches, putting it into a special mode that 2714 prevents applications from immediately switching away from some 2715 critical UI such as the home screen. 2716 @hide --> 2717 <permission android:name="android.permission.STOP_APP_SWITCHES" 2718 android:protectionLevel="signature|privileged" /> 2719 2720 <!-- @SystemApi Allows an application to retrieve private information about 2721 the current top activity, such as any assist context it can provide. 2722 <p>Not for use by third-party applications. 2723 @hide 2724 --> 2725 <permission android:name="android.permission.GET_TOP_ACTIVITY_INFO" 2726 android:protectionLevel="signature" /> 2727 2728 <!-- Allows an application to retrieve the current state of keys and 2729 switches. 2730 <p>Not for use by third-party applications. 2731 @deprecated The API that used this permission has been removed. --> 2732 <permission android:name="android.permission.READ_INPUT_STATE" 2733 android:protectionLevel="signature" /> 2734 2735 <!-- Must be required by an {@link android.inputmethodservice.InputMethodService}, 2736 to ensure that only the system can bind to it. 2737 <p>Protection level: signature 2738 --> 2739 <permission android:name="android.permission.BIND_INPUT_METHOD" 2740 android:protectionLevel="signature" /> 2741 2742 <!-- Must be required by an {@link android.media.midi.MidiDeviceService}, 2743 to ensure that only the system can bind to it. 2744 <p>Protection level: signature 2745 --> 2746 <permission android:name="android.permission.BIND_MIDI_DEVICE_SERVICE" 2747 android:protectionLevel="signature" /> 2748 2749 <!-- Must be required by an {@link android.accessibilityservice.AccessibilityService}, 2750 to ensure that only the system can bind to it. 2751 <p>Protection level: signature 2752 --> 2753 <permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE" 2754 android:protectionLevel="signature" /> 2755 2756 <!-- Must be required by a {@link android.printservice.PrintService}, 2757 to ensure that only the system can bind to it. 2758 <p>Protection level: signature 2759 --> 2760 <permission android:name="android.permission.BIND_PRINT_SERVICE" 2761 android:protectionLevel="signature" /> 2762 2763 <!-- Must be required by a {@link android.printservice.recommendation.RecommendationService}, 2764 to ensure that only the system can bind to it. 2765 @hide 2766 @SystemApi 2767 <p>Protection level: signature 2768 --> 2769 <permission android:name="android.permission.BIND_PRINT_RECOMMENDATION_SERVICE" 2770 android:protectionLevel="signature" /> 2771 2772 <!-- Allows applications to get the installed and enabled print services. 2773 @hide 2774 @SystemApi 2775 <p>Protection level: signature|preinstalled 2776 --> 2777 <permission android:name="android.permission.READ_PRINT_SERVICES" 2778 android:protectionLevel="signature|preinstalled" /> 2779 2780 <!-- Allows applications to get the currently recommended print services for printers. 2781 @hide 2782 @SystemApi 2783 <p>Protection level: signature|preinstalled 2784 --> 2785 <permission android:name="android.permission.READ_PRINT_SERVICE_RECOMMENDATIONS" 2786 android:protectionLevel="signature|preinstalled" /> 2787 2788 <!-- Must be required by a {@link android.nfc.cardemulation.HostApduService} 2789 or {@link android.nfc.cardemulation.OffHostApduService} to ensure that only 2790 the system can bind to it. 2791 <p>Protection level: signature 2792 --> 2793 <permission android:name="android.permission.BIND_NFC_SERVICE" 2794 android:protectionLevel="signature" /> 2795 2796 <!-- Must be required by the PrintSpooler to ensure that only the system can bind to it. 2797 @hide --> 2798 <permission android:name="android.permission.BIND_PRINT_SPOOLER_SERVICE" 2799 android:protectionLevel="signature" /> 2800 2801 <!-- Must be required by the CompanionDeviceManager to ensure that only the system can bind to it. 2802 @hide --> 2803 <permission android:name="android.permission.BIND_COMPANION_DEVICE_MANAGER_SERVICE" 2804 android:protectionLevel="signature" /> 2805 2806 <!-- @SystemApi Must be required by the RuntimePermissionPresenterService to ensure 2807 that only the system can bind to it. 2808 @hide --> 2809 <permission android:name="android.permission.BIND_RUNTIME_PERMISSION_PRESENTER_SERVICE" 2810 android:protectionLevel="signature" /> 2811 2812 <!-- Must be required by a TextService (e.g. SpellCheckerService) 2813 to ensure that only the system can bind to it. 2814 <p>Protection level: signature 2815 --> 2816 <permission android:name="android.permission.BIND_TEXT_SERVICE" 2817 android:protectionLevel="signature" /> 2818 2819 <!-- Must be required by a {@link android.net.VpnService}, 2820 to ensure that only the system can bind to it. 2821 <p>Protection level: signature 2822 --> 2823 <permission android:name="android.permission.BIND_VPN_SERVICE" 2824 android:protectionLevel="signature" /> 2825 2826 <!-- Must be required by a {@link android.service.wallpaper.WallpaperService}, 2827 to ensure that only the system can bind to it. 2828 <p>Protection level: signature|privileged 2829 --> 2830 <permission android:name="android.permission.BIND_WALLPAPER" 2831 android:protectionLevel="signature|privileged" /> 2832 2833 <!-- Must be required by a {@link android.service.voice.VoiceInteractionService}, 2834 to ensure that only the system can bind to it. 2835 <p>Protection level: signature 2836 --> 2837 <permission android:name="android.permission.BIND_VOICE_INTERACTION" 2838 android:protectionLevel="signature" /> 2839 2840 <!-- Must be required by a {@link android.service.autofill.AutofillService}, 2841 to ensure that only the system can bind to it. 2842 <p>Protection level: signature 2843 --> 2844 <permission android:name="android.permission.BIND_AUTOFILL_SERVICE" 2845 android:protectionLevel="signature" /> 2846 2847 <!-- Alternative version of android.permission.BIND_AUTOFILL_FIELD_CLASSIFICATION_SERVICE. 2848 This permission was renamed during the O previews but it was supported on the final O 2849 release, so we need to carry it over. 2850 <p>Protection level: signature 2851 @hide 2852 --> 2853 <permission android:name="android.permission.BIND_AUTOFILL" 2854 android:protectionLevel="signature" /> 2855 2856 <!-- Must be required by an {@link android.service.autofill.AutofillFieldClassificationService} 2857 to ensure that only the system can bind to it. 2858 @hide This is not a third-party API (intended for OEMs and system apps). 2859 --> 2860 <permission android:name="android.permission.BIND_AUTOFILL_FIELD_CLASSIFICATION_SERVICE" 2861 android:protectionLevel="signature" /> 2862 2863 <!-- Must be required by a android.service.textclassifier.TextClassifierService, 2864 to ensure that only the system can bind to it. 2865 @SystemApi @hide This is not a third-party API (intended for OEMs and system apps). 2866 <p>Protection level: signature 2867 --> 2868 <permission android:name="android.permission.BIND_TEXTCLASSIFIER_SERVICE" 2869 android:protectionLevel="signature" /> 2870 2871 <!-- Must be required by hotword enrollment application, 2872 to ensure that only the system can interact with it. 2873 @hide <p>Not for use by third-party applications.</p> --> 2874 <permission android:name="android.permission.MANAGE_VOICE_KEYPHRASES" 2875 android:protectionLevel="signature|privileged" /> 2876 2877 <!-- Must be required by a {@link com.android.media.remotedisplay.RemoteDisplayProvider}, 2878 to ensure that only the system can bind to it. 2879 @hide --> 2880 <permission android:name="android.permission.BIND_REMOTE_DISPLAY" 2881 android:protectionLevel="signature" /> 2882 2883 <!-- Must be required by a {@link android.media.tv.TvInputService} 2884 to ensure that only the system can bind to it. 2885 <p>Protection level: signature|privileged 2886 --> 2887 <permission android:name="android.permission.BIND_TV_INPUT" 2888 android:protectionLevel="signature|privileged" /> 2889 2890 <!-- @SystemApi 2891 Must be required by a {@link com.android.media.tv.remoteprovider.TvRemoteProvider} 2892 to ensure that only the system can bind to it. 2893 <p>Protection level: signature|privileged 2894 <p>Not for use by third-party applications. </p> 2895 @hide --> 2896 <permission android:name="android.permission.BIND_TV_REMOTE_SERVICE" 2897 android:protectionLevel="signature|privileged" /> 2898 2899 <!-- @SystemApi 2900 Must be required for a virtual remote controller for TV. 2901 <p>Protection level: signature|privileged 2902 <p>Not for use by third-party applications. </p> 2903 @hide --> 2904 <permission android:name="android.permission.TV_VIRTUAL_REMOTE_CONTROLLER" 2905 android:protectionLevel="signature|privileged" /> 2906 2907 <!-- Allows an application to change HDMI CEC active source. 2908 <p>Not for use by third-party applications. 2909 @hide --> 2910 <permission android:name="android.permission.CHANGE_HDMI_CEC_ACTIVE_SOURCE" 2911 android:protectionLevel="signature|privileged" /> 2912 2913 <!-- @SystemApi Allows an application to modify parental controls 2914 <p>Not for use by third-party applications. 2915 @hide --> 2916 <permission android:name="android.permission.MODIFY_PARENTAL_CONTROLS" 2917 android:protectionLevel="signature|privileged" /> 2918 2919 <!-- @SystemApi Allows an application to read TvContentRatingSystemInfo 2920 <p>Not for use by third-party applications. 2921 @hide --> 2922 <permission android:name="android.permission.READ_CONTENT_RATING_SYSTEMS" 2923 android:protectionLevel="signature|privileged" /> 2924 2925 <!-- @SystemApi Allows an application to notify TV inputs by sending broadcasts. 2926 <p>Protection level: signature|privileged 2927 <p>Not for use by third-party applications. 2928 @hide --> 2929 <permission android:name="android.permission.NOTIFY_TV_INPUTS" 2930 android:protectionLevel="signature|privileged" /> 2931 2932 <!-- Must be required by a {@link android.media.routing.MediaRouteService} 2933 to ensure that only the system can interact with it. 2934 @hide --> 2935 <permission android:name="android.permission.BIND_ROUTE_PROVIDER" 2936 android:protectionLevel="signature" /> 2937 2938 <!-- Must be required by device administration receiver, to ensure that only the 2939 system can interact with it. 2940 <p>Protection level: signature 2941 --> 2942 <permission android:name="android.permission.BIND_DEVICE_ADMIN" 2943 android:protectionLevel="signature" /> 2944 2945 <!-- @SystemApi Required to add or remove another application as a device admin. 2946 <p>Not for use by third-party applications. 2947 @hide --> 2948 <permission android:name="android.permission.MANAGE_DEVICE_ADMINS" 2949 android:protectionLevel="signature|privileged" /> 2950 2951 <!-- @SystemApi Allows low-level access to setting the orientation (actually 2952 rotation) of the screen. 2953 <p>Not for use by third-party applications. 2954 @hide 2955 --> 2956 <permission android:name="android.permission.SET_ORIENTATION" 2957 android:protectionLevel="signature" /> 2958 2959 <!-- @SystemApi Allows low-level access to setting the pointer speed. 2960 <p>Not for use by third-party applications. 2961 @hide 2962 --> 2963 <permission android:name="android.permission.SET_POINTER_SPEED" 2964 android:protectionLevel="signature" /> 2965 2966 <!-- Allows low-level access to setting input device calibration. 2967 <p>Not for use by normal applications. 2968 @hide --> 2969 <permission android:name="android.permission.SET_INPUT_CALIBRATION" 2970 android:protectionLevel="signature" /> 2971 2972 <!-- Allows low-level access to setting the keyboard layout. 2973 <p>Not for use by third-party applications. 2974 @hide --> 2975 <permission android:name="android.permission.SET_KEYBOARD_LAYOUT" 2976 android:protectionLevel="signature" /> 2977 2978 <!-- Allows an application to query tablet mode state and monitor changes 2979 in it. 2980 <p>Not for use by third-party applications. 2981 @hide --> 2982 <permission android:name="android.permission.TABLET_MODE" 2983 android:protectionLevel="signature" /> 2984 2985 <!-- Allows an application to request installing packages. Apps 2986 targeting APIs greater than 25 must hold this permission in 2987 order to use {@link android.content.Intent#ACTION_INSTALL_PACKAGE}. 2988 <p>Protection level: signature 2989 --> 2990 <permission android:name="android.permission.REQUEST_INSTALL_PACKAGES" 2991 android:label="@string/permlab_requestInstallPackages" 2992 android:description="@string/permdesc_requestInstallPackages" 2993 android:protectionLevel="signature|appop" /> 2994 2995 <!-- Allows an application to request deleting packages. Apps 2996 targeting APIs {@link android.os.Build.VERSION_CODES#P} or greater must hold this 2997 permission in order to use {@link android.content.Intent#ACTION_UNINSTALL_PACKAGE} or 2998 {@link android.content.pm.PackageInstaller#uninstall}. 2999 <p>Protection level: normal 3000 --> 3001 <permission android:name="android.permission.REQUEST_DELETE_PACKAGES" 3002 android:label="@string/permlab_requestDeletePackages" 3003 android:description="@string/permdesc_requestDeletePackages" 3004 android:protectionLevel="normal" /> 3005 3006 <!-- @SystemApi Allows an application to install packages. 3007 <p>Not for use by third-party applications. --> 3008 <permission android:name="android.permission.INSTALL_PACKAGES" 3009 android:protectionLevel="signature|privileged" /> 3010 3011 <!-- @SystemApi Allows an application to install self updates. This is a limited version 3012 of {@link android.Manifest.permission#INSTALL_PACKAGES}. 3013 <p>Not for use by third-party applications. 3014 @hide 3015 --> 3016 <permission android:name="android.permission.INSTALL_SELF_UPDATES" 3017 android:protectionLevel="signature|privileged" /> 3018 3019 <!-- @SystemApi Allows an application to install updates. This is a limited version 3020 of {@link android.Manifest.permission#INSTALL_PACKAGES}. 3021 <p>Not for use by third-party applications. 3022 @hide 3023 --> 3024 <permission android:name="android.permission.INSTALL_PACKAGE_UPDATES" 3025 android:protectionLevel="signature|privileged" /> 3026 3027 <!-- @SystemApi Allows an application to clear user data. 3028 <p>Not for use by third-party applications 3029 @hide 3030 --> 3031 <permission android:name="android.permission.CLEAR_APP_USER_DATA" 3032 android:protectionLevel="signature|installer" /> 3033 3034 <!-- @hide Allows an application to get the URI permissions 3035 granted to another application. 3036 <p>Not for use by third-party applications 3037 --> 3038 <permission android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS" 3039 android:protectionLevel="signature" /> 3040 3041 <!-- @hide Allows an application to clear the URI permissions 3042 granted to another application. 3043 <p>Not for use by third-party applications 3044 --> 3045 <permission 3046 android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS" 3047 android:protectionLevel="signature" /> 3048 3049 <!-- @hide 3050 Allows an application to change the status of Scoped Access Directory requests granted or 3051 rejected by the user. 3052 <p>This permission should <em>only</em> be requested by the platform 3053 settings app. This permission cannot be granted to third-party apps. 3054 <p>Protection level: signature 3055 --> 3056 <permission 3057 android:name="android.permission.MANAGE_SCOPED_ACCESS_DIRECTORY_PERMISSIONS" 3058 android:protectionLevel="signature" /> 3059 3060 <!-- @hide 3061 Allows an application to change the status of a persistable URI permission granted 3062 to another application. 3063 <p>This permission should <em>only</em> be requested by the platform 3064 settings app. This permission cannot be granted to third-party apps. 3065 <p>Protection level: signature 3066 --> 3067 <permission android:name="android.permission.FORCE_PERSISTABLE_URI_PERMISSIONS" 3068 android:protectionLevel="signature" /> 3069 3070 <!-- @SystemApi Old permission for deleting an app's cache files, no longer used, 3071 but signals for us to quietly ignore calls instead of throwing an exception. --> 3072 <permission android:name="android.permission.DELETE_CACHE_FILES" 3073 android:protectionLevel="signature|privileged" /> 3074 3075 <!-- Allows an application to delete cache files. 3076 @hide --> 3077 <permission android:name="android.permission.INTERNAL_DELETE_CACHE_FILES" 3078 android:protectionLevel="signature" /> 3079 3080 <!-- @SystemApi Allows an application to delete packages. 3081 <p>Not for use by third-party applications. 3082 <p>Starting in {@link android.os.Build.VERSION_CODES#N}, user confirmation is requested 3083 when the application deleting the package is not the same application that installed the 3084 package. --> 3085 <permission android:name="android.permission.DELETE_PACKAGES" 3086 android:protectionLevel="signature|privileged" /> 3087 3088 <!-- @SystemApi Allows an application to move location of installed package. 3089 @hide --> 3090 <permission android:name="android.permission.MOVE_PACKAGE" 3091 android:protectionLevel="signature|privileged" /> 3092 3093 <!-- @SystemApi Allows an application to change whether an application component (other than its own) is 3094 enabled or not. 3095 <p>Not for use by third-party applications. --> 3096 <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE" 3097 android:protectionLevel="signature|privileged" /> 3098 3099 <!-- @SystemApi Allows an application to grant specific permissions. 3100 @hide --> 3101 <permission android:name="android.permission.GRANT_RUNTIME_PERMISSIONS" 3102 android:protectionLevel="signature|installer|verifier" /> 3103 3104 <!-- @SystemApi Allows an app that has this permission and the permissions to install packages 3105 to request certain runtime permissions to be granted at installation. 3106 @hide --> 3107 <permission android:name="android.permission.INSTALL_GRANT_RUNTIME_PERMISSIONS" 3108 android:protectionLevel="signature|installer|verifier" /> 3109 3110 <!-- @SystemApi Allows an application to revoke specific permissions. 3111 @hide --> 3112 <permission android:name="android.permission.REVOKE_RUNTIME_PERMISSIONS" 3113 android:protectionLevel="signature|installer|verifier" /> 3114 3115 <!-- @hide Allows an application to observe permission changes. --> 3116 <permission android:name="android.permission.OBSERVE_GRANT_REVOKE_PERMISSIONS" 3117 android:protectionLevel="signature|privileged" /> 3118 3119 <!-- @SystemApi Allows an application to use SurfaceFlinger's low level features. 3120 <p>Not for use by third-party applications. 3121 @hide 3122 --> 3123 <permission android:name="android.permission.ACCESS_SURFACE_FLINGER" 3124 android:protectionLevel="signature" /> 3125 3126 <!-- @SystemApi Allows an application to take screen shots and more generally 3127 get access to the frame buffer data. 3128 <p>Not for use by third-party applications. --> 3129 <permission android:name="android.permission.READ_FRAME_BUFFER" 3130 android:protectionLevel="signature|privileged" /> 3131 3132 <!-- Allows an application to use InputFlinger's low level features. 3133 @hide --> 3134 <permission android:name="android.permission.ACCESS_INPUT_FLINGER" 3135 android:protectionLevel="signature" /> 3136 3137 <!-- Allows an application to disable/enable input devices. 3138 Could be used to prevent unwanted touch events 3139 on a touchscreen, for example during swimming or rain. 3140 @hide --> 3141 <permission android:name="android.permission.DISABLE_INPUT_DEVICE" 3142 android:protectionLevel="signature" /> 3143 3144 <!-- Allows an application to configure and connect to Wifi displays 3145 @hide --> 3146 <permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY" 3147 android:protectionLevel="signature" /> 3148 3149 <!-- Allows an application to control low-level features of Wifi displays 3150 such as opening an RTSP socket. This permission should only be used 3151 by the display manager. 3152 @hide --> 3153 <permission android:name="android.permission.CONTROL_WIFI_DISPLAY" 3154 android:protectionLevel="signature" /> 3155 3156 <!-- Allows an application to control the color modes set for displays system-wide. 3157 <p>Not for use by third-party applications.</p> 3158 @hide --> 3159 <permission android:name="android.permission.CONFIGURE_DISPLAY_COLOR_MODE" 3160 android:protectionLevel="signature" /> 3161 3162 <!-- Allows an application to control the color saturation of the display. 3163 @hide 3164 @SystemApi --> 3165 <permission android:name="android.permission.CONTROL_DISPLAY_SATURATION" 3166 android:protectionLevel="signature|privileged" /> 3167 3168 <!-- Allows an application to collect usage infomation about brightness slider changes. 3169 <p>Not for use by third-party applications.</p> 3170 @hide 3171 @SystemApi 3172 @TestApi --> 3173 <permission android:name="android.permission.BRIGHTNESS_SLIDER_USAGE" 3174 android:protectionLevel="signature|privileged|development" /> 3175 3176 <!-- Allows an application to collect ambient light stats. 3177 <p>Not for use by third party applications.</p> 3178 @hide 3179 @SystemApi --> 3180 <permission android:name="android.permission.ACCESS_AMBIENT_LIGHT_STATS" 3181 android:protectionLevel="signature|privileged|development" /> 3182 3183 <!-- Allows an application to modify the display brightness configuration 3184 @hide 3185 @SystemApi 3186 @TestApi --> 3187 <permission android:name="android.permission.CONFIGURE_DISPLAY_BRIGHTNESS" 3188 android:protectionLevel="signature|privileged|development" /> 3189 3190 <!-- Allows an application to control the system's display brightness 3191 @hide --> 3192 <permission android:name="android.permission.CONTROL_DISPLAY_BRIGHTNESS" 3193 android:protectionLevel="signature" /> 3194 3195 <!-- @SystemApi Allows an application to control VPN. 3196 <p>Not for use by third-party applications.</p> 3197 @hide --> 3198 <permission android:name="android.permission.CONTROL_VPN" 3199 android:protectionLevel="signature|privileged" /> 3200 <uses-permission android:name="android.permission.CONTROL_VPN" /> 3201 3202 <!-- @SystemApi Allows an application to capture audio output. 3203 <p>Not for use by third-party applications.</p> --> 3204 <permission android:name="android.permission.CAPTURE_AUDIO_OUTPUT" 3205 android:protectionLevel="signature|privileged" /> 3206 3207 <!-- @SystemApi Allows an application to capture audio for hotword detection. 3208 <p>Not for use by third-party applications.</p> 3209 @hide --> 3210 <permission android:name="android.permission.CAPTURE_AUDIO_HOTWORD" 3211 android:protectionLevel="signature|privileged" /> 3212 3213 <!-- @SystemApi Allows an application to modify audio routing and override policy decisions. 3214 <p>Not for use by third-party applications.</p> 3215 @hide --> 3216 <permission android:name="android.permission.MODIFY_AUDIO_ROUTING" 3217 android:protectionLevel="signature|privileged" /> 3218 3219 <!-- @SystemApi Allows an application to capture video output. 3220 <p>Not for use by third-party applications.</p> --> 3221 <permission android:name="android.permission.CAPTURE_VIDEO_OUTPUT" 3222 android:protectionLevel="signature|privileged" /> 3223 3224 <!-- @SystemApi Allows an application to capture secure video output. 3225 <p>Not for use by third-party applications.</p> --> 3226 <permission android:name="android.permission.CAPTURE_SECURE_VIDEO_OUTPUT" 3227 android:protectionLevel="signature|privileged" /> 3228 3229 <!-- @SystemApi Allows an application to know what content is playing and control its playback. 3230 <p>Not for use by third-party applications due to privacy of media consumption</p> --> 3231 <permission android:name="android.permission.MEDIA_CONTENT_CONTROL" 3232 android:protectionLevel="signature|privileged" /> 3233 3234 <!-- @SystemApi @hide Allows an application to set the volume key long-press listener. 3235 <p>When it's set, the application will receive the volume key long-press event 3236 instead of changing volume.</p> 3237 <p>Not for use by third-party applications</p> --> 3238 <permission android:name="android.permission.SET_VOLUME_KEY_LONG_PRESS_LISTENER" 3239 android:protectionLevel="signature|privileged|development" /> 3240 3241 <!-- @SystemApi @hide Allows an application to set media key event listener. 3242 <p>When it's set, the application will receive the media key event before 3243 any other media sessions. If the event is handled by the listener, other sessions 3244 cannot get the event.</p> 3245 <p>Not for use by third-party applications</p> --> 3246 <permission android:name="android.permission.SET_MEDIA_KEY_LISTENER" 3247 android:protectionLevel="signature|privileged|development" /> 3248 3249 <!-- @SystemApi Required to be able to disable the device (very dangerous!). 3250 <p>Not for use by third-party applications. 3251 @hide 3252 --> 3253 <permission android:name="android.permission.BRICK" 3254 android:protectionLevel="signature" /> 3255 3256 <!-- @SystemApi Required to be able to reboot the device. 3257 <p>Not for use by third-party applications. --> 3258 <permission android:name="android.permission.REBOOT" 3259 android:protectionLevel="signature|privileged" /> 3260 3261 <!-- @SystemApi Allows low-level access to power management. 3262 <p>Not for use by third-party applications. 3263 @hide 3264 --> 3265 <permission android:name="android.permission.DEVICE_POWER" 3266 android:protectionLevel="signature" /> 3267 3268 <!-- Allows access to the PowerManager.userActivity function. 3269 <p>Not for use by third-party applications. @hide @SystemApi --> 3270 <permission android:name="android.permission.USER_ACTIVITY" 3271 android:protectionLevel="signature|privileged" /> 3272 3273 <!-- @hide Allows low-level access to tun tap driver --> 3274 <permission android:name="android.permission.NET_TUNNELING" 3275 android:protectionLevel="signature" /> 3276 3277 <!-- Run as a manufacturer test application, running as the root user. 3278 Only available when the device is running in manufacturer test mode. 3279 <p>Not for use by third-party applications. 3280 --> 3281 <permission android:name="android.permission.FACTORY_TEST" 3282 android:protectionLevel="signature" /> 3283 3284 <!-- Allows an application to broadcast a notification that an application 3285 package has been removed. 3286 <p>Not for use by third-party applications. 3287 --> 3288 <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED" 3289 android:protectionLevel="signature" /> 3290 3291 <!-- Allows an application to broadcast an SMS receipt notification. 3292 <p>Not for use by third-party applications. 3293 --> 3294 <permission android:name="android.permission.BROADCAST_SMS" 3295 android:protectionLevel="signature" /> 3296 3297 <!-- Allows an application to broadcast a WAP PUSH receipt notification. 3298 <p>Not for use by third-party applications. 3299 --> 3300 <permission android:name="android.permission.BROADCAST_WAP_PUSH" 3301 android:protectionLevel="signature" /> 3302 3303 <!-- @SystemApi Allows an application to broadcast privileged networking requests. 3304 <p>Not for use by third-party applications. 3305 @hide 3306 @deprecated Use {@link android.Manifest.permission#REQUEST_NETWORK_SCORES} instead 3307 --> 3308 <permission android:name="android.permission.BROADCAST_NETWORK_PRIVILEGED" 3309 android:protectionLevel="signature|privileged" /> 3310 3311 <!-- @SystemApi Not for use by third-party applications. --> 3312 <permission android:name="android.permission.MASTER_CLEAR" 3313 android:protectionLevel="signature|privileged" /> 3314 3315 <!-- @SystemApi Allows an application to call any phone number, including emergency 3316 numbers, without going through the Dialer user interface for the user 3317 to confirm the call being placed. 3318 <p>Not for use by third-party applications. --> 3319 <permission android:name="android.permission.CALL_PRIVILEGED" 3320 android:protectionLevel="signature|privileged" /> 3321 3322 <!-- @SystemApi Allows an application to perform CDMA OTA provisioning @hide --> 3323 <permission android:name="android.permission.PERFORM_CDMA_PROVISIONING" 3324 android:protectionLevel="signature|privileged" /> 3325 3326 <!-- @SystemApi Allows an application to perform SIM Activation @hide --> 3327 <permission android:name="android.permission.PERFORM_SIM_ACTIVATION" 3328 android:protectionLevel="signature|privileged" /> 3329 3330 <!-- @SystemApi Allows enabling/disabling location update notifications from 3331 the radio. 3332 <p>Not for use by third-party applications. --> 3333 <permission android:name="android.permission.CONTROL_LOCATION_UPDATES" 3334 android:protectionLevel="signature|privileged" /> 3335 3336 <!-- @SystemApi Allows read/write access to the "properties" table in the checkin 3337 database, to change values that get uploaded. 3338 <p>Not for use by third-party applications. --> 3339 <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES" 3340 android:protectionLevel="signature|privileged" /> 3341 3342 <!-- @SystemApi Allows an application to collect component usage 3343 statistics 3344 <p>Declaring the permission implies intention to use the API and the user of the 3345 device can grant permission through the Settings application. --> 3346 <permission android:name="android.permission.PACKAGE_USAGE_STATS" 3347 android:protectionLevel="signature|privileged|development|appop" /> 3348 <uses-permission android:name="android.permission.PACKAGE_USAGE_STATS" /> 3349 3350 <!-- @hide @SystemApi Allows an application to observe usage time of apps. The app can register 3351 for callbacks when apps reach a certain usage time limit, etc. --> 3352 <permission android:name="android.permission.OBSERVE_APP_USAGE" 3353 android:protectionLevel="signature|privileged" /> 3354 3355 <!-- @hide @SystemApi Allows an application to change the app idle state of an app. 3356 <p>Not for use by third-party applications. --> 3357 <permission android:name="android.permission.CHANGE_APP_IDLE_STATE" 3358 android:protectionLevel="signature|privileged" /> 3359 3360 <!-- @hide @SystemApi Allows an application to temporarily whitelist an inactive app to 3361 access the network and acquire wakelocks. 3362 <p>Not for use by third-party applications. --> 3363 <permission android:name="android.permission.CHANGE_DEVICE_IDLE_TEMP_WHITELIST" 3364 android:protectionLevel="signature|privileged" /> 3365 3366 <!-- Permission an application must hold in order to use 3367 {@link android.provider.Settings#ACTION_REQUEST_IGNORE_BATTERY_OPTIMIZATIONS}. 3368 This is a normal permission: an app requesting it will always be granted the 3369 permission, without the user needing to approve or see it. --> 3370 <permission android:name="android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS" 3371 android:label="@string/permlab_requestIgnoreBatteryOptimizations" 3372 android:description="@string/permdesc_requestIgnoreBatteryOptimizations" 3373 android:protectionLevel="normal" /> 3374 3375 <!-- @SystemApi Allows an application to collect battery statistics --> 3376 <permission android:name="android.permission.BATTERY_STATS" 3377 android:protectionLevel="signature|privileged|development" /> 3378 3379 <!--Allows an application to manage statscompanion. 3380 <p>Not for use by third-party applications. 3381 @hide --> 3382 <permission android:name="android.permission.STATSCOMPANION" 3383 android:protectionLevel="signature" /> 3384 3385 <!-- @SystemApi Allows an application to control the backup and restore process. 3386 <p>Not for use by third-party applications. 3387 @hide pending API council --> 3388 <permission android:name="android.permission.BACKUP" 3389 android:protectionLevel="signature|privileged" /> 3390 3391 <!-- @SystemApi Allows application to manage 3392 {@link android.security.keystore.recovery.RecoveryController}. 3393 <p>Not for use by third-party applications. 3394 @hide --> 3395 <permission android:name="android.permission.RECOVER_KEYSTORE" 3396 android:protectionLevel="signature|privileged" /> 3397 3398 <!-- Allows a package to launch the secure full-backup confirmation UI. 3399 ONLY the system process may hold this permission. 3400 @hide --> 3401 <permission android:name="android.permission.CONFIRM_FULL_BACKUP" 3402 android:protectionLevel="signature" /> 3403 3404 <!-- @SystemApi Must be required by a {@link android.widget.RemoteViewsService}, 3405 to ensure that only the system can bind to it. --> 3406 <permission android:name="android.permission.BIND_REMOTEVIEWS" 3407 android:protectionLevel="signature|privileged" /> 3408 3409 <!-- @SystemApi Allows an application to tell the AppWidget service which application 3410 can access AppWidget's data. The normal user flow is that a user 3411 picks an AppWidget to go into a particular host, thereby giving that 3412 host application access to the private data from the AppWidget app. 3413 An application that has this permission should honor that contract. 3414 <p>Not for use by third-party applications. --> 3415 <permission android:name="android.permission.BIND_APPWIDGET" 3416 android:protectionLevel="signature|privileged" /> 3417 3418 <!-- @hide Allows sysui to manage user grants of slice permissions. --> 3419 <permission android:name="android.permission.MANAGE_SLICE_PERMISSIONS" 3420 android:protectionLevel="signature" /> 3421 3422 <!-- @SystemApi Private permission, to restrict who can bring up a dialog to add a new 3423 keyguard widget 3424 @hide --> 3425 <permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET" 3426 android:protectionLevel="signature|privileged" /> 3427 3428 <!-- @SystemApi Internal permission allowing an application to query/set which 3429 applications can bind AppWidgets. 3430 @hide --> 3431 <permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS" 3432 android:protectionLevel="signature|privileged" /> 3433 3434 <!-- Allows applications to change the background data setting. 3435 <p>Not for use by third-party applications. 3436 @hide pending API council --> 3437 <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING" 3438 android:protectionLevel="signature" /> 3439 3440 <!-- @SystemApi This permission can be used on content providers to allow the global 3441 search system to access their data. Typically it used when the 3442 provider has some permissions protecting it (which global search 3443 would not be expected to hold), and added as a read-only permission 3444 to the path in the provider where global search queries are 3445 performed. This permission can not be held by regular applications; 3446 it is used by applications to protect themselves from everyone else 3447 besides global search. --> 3448 <permission android:name="android.permission.GLOBAL_SEARCH" 3449 android:protectionLevel="signature|privileged" /> 3450 3451 <!-- Internal permission protecting access to the global search 3452 system: ensures that only the system can access the provider 3453 to perform queries (since this otherwise provides unrestricted 3454 access to a variety of content providers), and to write the 3455 search statistics (to keep applications from gaming the source 3456 ranking). 3457 @hide --> 3458 <permission android:name="android.permission.GLOBAL_SEARCH_CONTROL" 3459 android:protectionLevel="signature" /> 3460 3461 <!-- @SystemApi Internal permission to allows an application to read indexable data. 3462 @hide --> 3463 <permission android:name="android.permission.READ_SEARCH_INDEXABLES" 3464 android:protectionLevel="signature|privileged" /> 3465 3466 <!-- @SystemApi Internal permission to allows an application to bind to suggestion service. 3467 @hide --> 3468 <permission android:name="android.permission.BIND_SETTINGS_SUGGESTIONS_SERVICE" 3469 android:protectionLevel="signature" /> 3470 3471 <!-- @SystemApi Allows applications to set a live wallpaper. 3472 @hide XXX Change to signature once the picker is moved to its 3473 own apk as Ghod Intended. --> 3474 <permission android:name="android.permission.SET_WALLPAPER_COMPONENT" 3475 android:protectionLevel="signature|privileged" /> 3476 3477 <!-- @SystemApi Allows applications to read dream settings and dream state. 3478 @hide --> 3479 <permission android:name="android.permission.READ_DREAM_STATE" 3480 android:protectionLevel="signature|privileged" /> 3481 3482 <!-- @SystemApi Allows applications to write dream settings, and start or stop dreaming. 3483 @hide --> 3484 <permission android:name="android.permission.WRITE_DREAM_STATE" 3485 android:protectionLevel="signature|privileged" /> 3486 3487 <!-- @SystemApi Allow an application to read and write the cache partition. 3488 @hide --> 3489 <permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM" 3490 android:protectionLevel="signature|privileged" /> 3491 3492 <!-- Must be required by default container service so that only 3493 the system can bind to it and use it to copy 3494 protected data to secure containers or files 3495 accessible to the system. 3496 @hide --> 3497 <permission android:name="android.permission.COPY_PROTECTED_DATA" 3498 android:protectionLevel="signature" /> 3499 3500 <!-- @SystemApi Internal permission protecting access to the encryption methods 3501 @hide 3502 --> 3503 <permission android:name="android.permission.CRYPT_KEEPER" 3504 android:protectionLevel="signature|privileged" /> 3505 3506 <!-- @SystemApi Allows an application to read historical network usage for 3507 specific networks and applications. @hide --> 3508 <permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY" 3509 android:protectionLevel="signature|privileged" /> 3510 3511 <!-- Allows an application to manage network policies (such as warning and disable 3512 limits) and to define application-specific rules. @hide --> 3513 <permission android:name="android.permission.MANAGE_NETWORK_POLICY" 3514 android:protectionLevel="signature" /> 3515 3516 <!-- @SystemApi @hide @deprecated use UPDATE_DEVICE_STATS instead --> 3517 <permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING" 3518 android:protectionLevel="signature|privileged" /> 3519 3520 <!-- @SystemApi @hide Allows an application to manage carrier subscription plans. --> 3521 <permission android:name="android.permission.MANAGE_SUBSCRIPTION_PLANS" 3522 android:protectionLevel="signature|privileged" /> 3523 3524 <!-- C2DM permission. 3525 @hide Used internally. 3526 --> 3527 <permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE" 3528 android:protectionLevel="signature" /> 3529 <uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/> 3530 3531 <!-- @SystemApi @hide Package verifier needs to have this permission before the PackageManager will 3532 trust it to verify packages. 3533 --> 3534 <permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT" 3535 android:protectionLevel="signature|privileged" /> 3536 3537 <!-- Must be required by package verifier receiver, to ensure that only the 3538 system can interact with it. 3539 @hide 3540 --> 3541 <permission android:name="android.permission.BIND_PACKAGE_VERIFIER" 3542 android:protectionLevel="signature" /> 3543 3544 <!-- @SystemApi @hide Allows an application to mark other applications as harmful --> 3545 <permission android:name="android.permission.SET_HARMFUL_APP_WARNINGS" 3546 android:protectionLevel="signature|verifier" /> 3547 3548 <!-- @SystemApi @hide Intent filter verifier needs to have this permission before the 3549 PackageManager will trust it to verify intent filters. 3550 --> 3551 <permission android:name="android.permission.INTENT_FILTER_VERIFICATION_AGENT" 3552 android:protectionLevel="signature|privileged" /> 3553 3554 <!-- Must be required by intent filter verifier receiver, to ensure that only the 3555 system can interact with it. 3556 @hide 3557 --> 3558 <permission android:name="android.permission.BIND_INTENT_FILTER_VERIFIER" 3559 android:protectionLevel="signature" /> 3560 3561 <!-- @SystemApi Allows applications to access serial ports via the SerialManager. 3562 @hide --> 3563 <permission android:name="android.permission.SERIAL_PORT" 3564 android:protectionLevel="signature|privileged" /> 3565 3566 <!-- Allows the holder to access content providers from outside an ApplicationThread. 3567 This permission is enforced by the ActivityManagerService on the corresponding APIs, 3568 in particular ActivityManagerService#getContentProviderExternal(String) and 3569 ActivityManagerService#removeContentProviderExternal(String). 3570 @hide 3571 --> 3572 <permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY" 3573 android:protectionLevel="signature" /> 3574 3575 <!-- @SystemApi Allows an application to hold an UpdateLock, recommending that a headless 3576 OTA reboot *not* occur while the lock is held. 3577 @hide --> 3578 <permission android:name="android.permission.UPDATE_LOCK" 3579 android:protectionLevel="signature|privileged" /> 3580 3581 <!-- @SystemApi Allows an application to read the current set of notifications, including 3582 any metadata and intents attached. 3583 @hide --> 3584 <permission android:name="android.permission.ACCESS_NOTIFICATIONS" 3585 android:protectionLevel="signature|privileged|appop" /> 3586 3587 <!-- Marker permission for applications that wish to access notification policy. 3588 <p>Protection level: normal 3589 --> 3590 <permission android:name="android.permission.ACCESS_NOTIFICATION_POLICY" 3591 android:description="@string/permdesc_access_notification_policy" 3592 android:label="@string/permlab_access_notification_policy" 3593 android:protectionLevel="normal" /> 3594 3595 <!-- Allows modification of do not disturb rules and policies. Only allowed for system 3596 processes. 3597 @hide --> 3598 <permission android:name="android.permission.MANAGE_NOTIFICATIONS" 3599 android:protectionLevel="signature" /> 3600 3601 <!-- Allows notifications to be colorized 3602 <p>Not for use by third-party applications. @hide --> 3603 <permission android:name="android.permission.USE_COLORIZED_NOTIFICATIONS" 3604 android:protectionLevel="signature|setup" /> 3605 3606 <!-- Allows access to keyguard secure storage. Only allowed for system processes. 3607 @hide --> 3608 <permission android:name="android.permission.ACCESS_KEYGUARD_SECURE_STORAGE" 3609 android:protectionLevel="signature" /> 3610 3611 <!-- Allows managing (adding, removing) fingerprint templates. Reserved for the system. @hide --> 3612 <permission android:name="android.permission.MANAGE_FINGERPRINT" 3613 android:protectionLevel="signature|privileged" /> 3614 3615 <!-- Allows an app to reset fingerprint attempt counter. Reserved for the system. @hide --> 3616 <permission android:name="android.permission.RESET_FINGERPRINT_LOCKOUT" 3617 android:protectionLevel="signature" /> 3618 3619 <!-- Allows an application to control keyguard. Only allowed for system processes. 3620 @hide --> 3621 <permission android:name="android.permission.CONTROL_KEYGUARD" 3622 android:protectionLevel="signature" /> 3623 3624 <!-- Allows an application to listen to trust changes. Only allowed for system processes. 3625 @hide --> 3626 <permission android:name="android.permission.TRUST_LISTENER" 3627 android:protectionLevel="signature" /> 3628 3629 <!-- @SystemApi Allows an application to provide a trust agent. 3630 @hide For security reasons, this is a platform-only permission. --> 3631 <permission android:name="android.permission.PROVIDE_TRUST_AGENT" 3632 android:protectionLevel="signature|privileged" /> 3633 3634 <!-- @SystemApi Allows an application to show a message 3635 on the keyguard when asking to dismiss it. 3636 @hide For security reasons, this is a platform-only permission. --> 3637 <permission android:name="android.permission.SHOW_KEYGUARD_MESSAGE" 3638 android:protectionLevel="signature|privileged" /> 3639 3640 <!-- Allows an application to launch the trust agent settings activity. 3641 @hide --> 3642 <permission android:name="android.permission.LAUNCH_TRUST_AGENT_SETTINGS" 3643 android:protectionLevel="signature|privileged" /> 3644 3645 <!-- @SystemApi Must be required by an {@link 3646 android.service.trust.TrustAgentService}, 3647 to ensure that only the system can bind to it. 3648 @hide --> 3649 <permission android:name="android.permission.BIND_TRUST_AGENT" 3650 android:protectionLevel="signature" /> 3651 3652 <!-- Must be required by an {@link 3653 android.service.notification.NotificationListenerService}, 3654 to ensure that only the system can bind to it. 3655 <p>Protection level: signature 3656 --> 3657 <permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE" 3658 android:protectionLevel="signature" /> 3659 3660 <!-- @SystemApi Must be required by an {@link 3661 android.service.notification.NotificationAssistantService} to ensure that only the system 3662 can bind to it. 3663 <p>Protection level: signature 3664 @hide 3665 --> 3666 <permission android:name="android.permission.BIND_NOTIFICATION_ASSISTANT_SERVICE" 3667 android:protectionLevel="signature" /> 3668 3669 <!-- Must be required by a {@link 3670 android.service.chooser.ChooserTargetService}, to ensure that 3671 only the system can bind to it. 3672 <p>Protection level: signature 3673 --> 3674 <permission android:name="android.permission.BIND_CHOOSER_TARGET_SERVICE" 3675 android:protectionLevel="signature" /> 3676 3677 <!-- @SystemApi Must be held by services that extend 3678 {@link android.service.resolver.ResolverRankerService}. 3679 <p>Protection level: signature|privileged 3680 @hide 3681 --> 3682 <permission android:name="android.permission.PROVIDE_RESOLVER_RANKER_SERVICE" 3683 android:protectionLevel="signature|privileged" /> 3684 3685 <!-- @SystemApi Must be required by services that extend 3686 {@link android.service.resolver.ResolverRankerService}, to ensure that only the system can 3687 bind to them. 3688 <p>Protection level: signature 3689 @hide 3690 --> 3691 <permission android:name="android.permission.BIND_RESOLVER_RANKER_SERVICE" 3692 android:protectionLevel="signature" /> 3693 3694 <!-- Must be required by a {@link 3695 android.service.notification.ConditionProviderService}, 3696 to ensure that only the system can bind to it. 3697 <p>Protection level: signature 3698 --> 3699 <permission android:name="android.permission.BIND_CONDITION_PROVIDER_SERVICE" 3700 android:protectionLevel="signature" /> 3701 3702 <!-- Must be required by an {@link android.service.dreams.DreamService}, 3703 to ensure that only the system can bind to it. 3704 <p>Protection level: signature 3705 --> 3706 <permission android:name="android.permission.BIND_DREAM_SERVICE" 3707 android:protectionLevel="signature" /> 3708 3709 <!-- Must be required by an {@link android.app.usage.CacheQuotaService} to ensure that only the 3710 system can bind to it. 3711 @hide This is not a third-party API (intended for OEMs and system apps). 3712 --> 3713 <permission android:name="android.permission.BIND_CACHE_QUOTA_SERVICE" 3714 android:protectionLevel="signature" /> 3715 3716 <!-- @SystemApi Allows an application to call into a carrier setup flow. It is up to the 3717 carrier setup application to enforce that this permission is required 3718 @hide This is not a third-party API (intended for OEMs and system apps). --> 3719 <permission android:name="android.permission.INVOKE_CARRIER_SETUP" 3720 android:protectionLevel="signature|privileged" /> 3721 3722 <!-- @SystemApi Allows an application to listen for network condition observations. 3723 @hide This is not a third-party API (intended for system apps). --> 3724 <permission android:name="android.permission.ACCESS_NETWORK_CONDITIONS" 3725 android:protectionLevel="signature|privileged" /> 3726 3727 <!-- @SystemApi Allows an application to provision and access DRM certificates 3728 @hide This is not a third-party API (intended for system apps). --> 3729 <permission android:name="android.permission.ACCESS_DRM_CERTIFICATES" 3730 android:protectionLevel="signature|privileged" /> 3731 3732 <!-- Api Allows an application to manage media projection sessions. 3733 @hide This is not a third-party API (intended for system apps). --> 3734 <permission android:name="android.permission.MANAGE_MEDIA_PROJECTION" 3735 android:protectionLevel="signature" /> 3736 3737 <!-- @SystemApi Allows an application to read install sessions 3738 @hide This is not a third-party API (intended for system apps). --> 3739 <permission android:name="android.permission.READ_INSTALL_SESSIONS" 3740 android:label="@string/permlab_readInstallSessions" 3741 android:description="@string/permdesc_readInstallSessions" 3742 android:protectionLevel="normal"/> 3743 3744 <!-- @SystemApi Allows an application to remove DRM certificates 3745 @hide This is not a third-party API (intended for system apps). --> 3746 <permission android:name="android.permission.REMOVE_DRM_CERTIFICATES" 3747 android:protectionLevel="signature|privileged" /> 3748 3749 <!-- @deprecated Use {@link android.Manifest.permission#BIND_CARRIER_SERVICES} instead --> 3750 <permission android:name="android.permission.BIND_CARRIER_MESSAGING_SERVICE" 3751 android:protectionLevel="signature|privileged" /> 3752 3753 <!-- Allows an application to interact with the currently active 3754 {@link android.service.voice.VoiceInteractionService}. 3755 @hide --> 3756 <permission android:name="android.permission.ACCESS_VOICE_INTERACTION_SERVICE" 3757 android:protectionLevel="signature" /> 3758 3759 <!-- The system process that is allowed to bind to services in carrier apps will 3760 have this permission. Carrier apps should use this permission to protect 3761 their services that only the system is allowed to bind to. 3762 <p>Protection level: signature|privileged 3763 --> 3764 <permission android:name="android.permission.BIND_CARRIER_SERVICES" 3765 android:label="@string/permlab_bindCarrierServices" 3766 android:description="@string/permdesc_bindCarrierServices" 3767 android:protectionLevel="signature|privileged" /> 3768 3769 <!-- Allows an application to query whether DO_NOT_ASK_CREDENTIALS_ON_BOOT 3770 flag is set. 3771 @hide --> 3772 <permission android:name="android.permission.QUERY_DO_NOT_ASK_CREDENTIALS_ON_BOOT" 3773 android:protectionLevel="signature" /> 3774 3775 <!-- @SystemApi Allows applications to kill UIDs. 3776 <p>Not for use by third-party applications. 3777 @hide --> 3778 <permission android:name="android.permission.KILL_UID" 3779 android:protectionLevel="signature|installer" /> 3780 3781 <!-- @SystemApi Allows applications to read the local WiFi and Bluetooth MAC address. 3782 @hide --> 3783 <permission android:name="android.permission.LOCAL_MAC_ADDRESS" 3784 android:protectionLevel="signature|privileged" /> 3785 <uses-permission android:name="android.permission.LOCAL_MAC_ADDRESS"/> 3786 3787 <!-- @SystemApi Allows access to MAC addresses of WiFi and Bluetooth peer devices. 3788 @hide --> 3789 <permission android:name="android.permission.PEERS_MAC_ADDRESS" 3790 android:protectionLevel="signature|setup" /> 3791 3792 <!-- Allows the Nfc stack to dispatch Nfc messages to applications. Applications 3793 can use this permission to ensure incoming Nfc messages are from the Nfc stack 3794 and not simulated by another application. 3795 @hide --> 3796 <permission android:name="android.permission.DISPATCH_NFC_MESSAGE" 3797 android:protectionLevel="signature|privileged" /> 3798 3799 <!-- @SystemApi Allows changing day / night mode when system is configured with 3800 config_lockDayNightMode set to true. If requesting app does not have permission, 3801 it will be ignored. 3802 @hide --> 3803 <permission android:name="android.permission.MODIFY_DAY_NIGHT_MODE" 3804 android:protectionLevel="signature|privileged" /> 3805 3806 <!-- The system process is explicitly the only one allowed to launch the 3807 confirmation UI for full backup/restore --> 3808 <uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/> 3809 3810 <!-- Allows the holder to access and manage instant applications on the device. 3811 @hide --> 3812 <permission android:name="android.permission.ACCESS_INSTANT_APPS" 3813 android:protectionLevel="signature|installer|verifier" /> 3814 <uses-permission android:name="android.permission.ACCESS_INSTANT_APPS"/> 3815 3816 <!-- Allows the holder to view the instant applications on the device. 3817 @hide --> 3818 <permission android:name="android.permission.VIEW_INSTANT_APPS" 3819 android:protectionLevel="signature|preinstalled" /> 3820 3821 <!-- Allows the holder to manage whether the system can bind to services 3822 provided by instant apps. This permission is intended to protect 3823 test/development fucntionality and should be used only in such cases. 3824 @hide --> 3825 <permission android:name="android.permission.MANAGE_BIND_INSTANT_SERVICE" 3826 android:protectionLevel="signature" /> 3827 3828 <!-- Allows receiving the usage of media resource e.g. video/audio codec and 3829 graphic memory. 3830 @hide --> 3831 <permission android:name="android.permission.RECEIVE_MEDIA_RESOURCE_USAGE" 3832 android:protectionLevel="signature|privileged" /> 3833 3834 <!-- Must be required by system/priv apps when accessing the sound trigger 3835 APIs given by {@link SoundTriggerManager}. 3836 @hide 3837 @SystemApi --> 3838 <permission android:name="android.permission.MANAGE_SOUND_TRIGGER" 3839 android:protectionLevel="signature|privileged" /> 3840 3841 <!-- Must be required by system/priv apps implementing sound trigger detection services 3842 @hide 3843 @SystemApi --> 3844 <permission android:name="android.permission.BIND_SOUND_TRIGGER_DETECTION_SERVICE" 3845 android:protectionLevel="signature" /> 3846 3847 <!-- @SystemApi Allows trusted applications to dispatch managed provisioning message to Managed 3848 Provisioning app. If requesting app does not have permission, it will be ignored. 3849 @hide --> 3850 <permission android:name="android.permission.DISPATCH_PROVISIONING_MESSAGE" 3851 android:protectionLevel="signature|privileged" /> 3852 3853 <!-- Allows the holder to read blocked numbers. See 3854 {@link android.provider.BlockedNumberContract}. 3855 @hide --> 3856 <permission android:name="android.permission.READ_BLOCKED_NUMBERS" 3857 android:protectionLevel="signature" /> 3858 3859 <!-- Allows the holder to write blocked numbers. See 3860 {@link android.provider.BlockedNumberContract}. 3861 @hide --> 3862 <permission android:name="android.permission.WRITE_BLOCKED_NUMBERS" 3863 android:protectionLevel="signature" /> 3864 3865 <!-- Must be required by an {@link android.service.vr.VrListenerService}, to ensure that only 3866 the system can bind to it. 3867 <p>Protection level: signature --> 3868 <permission android:name="android.permission.BIND_VR_LISTENER_SERVICE" 3869 android:protectionLevel="signature" /> 3870 3871 <!-- Must be required by system apps when accessing restricted VR APIs. 3872 @hide 3873 @SystemApi 3874 <p>Protection level: signature --> 3875 <permission android:name="android.permission.RESTRICTED_VR_ACCESS" 3876 android:protectionLevel="signature|preinstalled" /> 3877 3878 <!-- Required to make calls to {@link android.service.vr.IVrManager}. 3879 @hide --> 3880 <permission android:name="android.permission.ACCESS_VR_MANAGER" 3881 android:protectionLevel="signature" /> 3882 3883 <!-- Required to access VR-Mode state and state change events via {android.app.VrStateCallback} 3884 @hide --> 3885 <permission android:name="android.permission.ACCESS_VR_STATE" 3886 android:protectionLevel="signature|preinstalled" /> 3887 3888 <!-- Allows an application to whitelist tasks during lock task mode 3889 @hide <p>Not for use by third-party applications.</p> --> 3890 <permission android:name="android.permission.UPDATE_LOCK_TASK_PACKAGES" 3891 android:protectionLevel="signature|setup" /> 3892 3893 <!-- @SystemApi Allows an application to replace the app name displayed alongside notifications 3894 in the N-release and later. 3895 @hide <p>Not for use by third-party applications.</p> --> 3896 <permission android:name="android.permission.SUBSTITUTE_NOTIFICATION_APP_NAME" 3897 android:protectionLevel="signature|privileged" /> 3898 3899 <!-- @SystemApi Allows an application to show notifications before the device is provisioned. 3900 @hide <p>Not for use by third-party applications.</p> --> 3901 <permission android:name="android.permission.NOTIFICATION_DURING_SETUP" 3902 android:protectionLevel="signature|privileged" /> 3903 3904 <!-- @SystemApi Allows an application to manage auto-fill sessions. 3905 @hide <p>Not for use by third-party applications.</p> --> 3906 <permission android:name="android.permission.MANAGE_AUTO_FILL" 3907 android:protectionLevel="signature" /> 3908 3909 <!-- Allows an app to set the theme overlay in /vendor/overlay 3910 being used. 3911 @hide <p>Not for use by third-party applications.</p> --> 3912 <permission android:name="android.permission.MODIFY_THEME_OVERLAY" 3913 android:protectionLevel="signature" /> 3914 3915 <!-- Allows an instant app to create foreground services. --> 3916 <permission android:name="android.permission.INSTANT_APP_FOREGROUND_SERVICE" 3917 android:protectionLevel="signature|development|instant|appop" /> 3918 3919 <!-- Allows a regular application to use {@link android.app.Service#startForeground 3920 Service.startForeground}. 3921 <p>Protection level: normal 3922 --> 3923 <permission android:name="android.permission.FOREGROUND_SERVICE" 3924 android:description="@string/permdesc_foregroundService" 3925 android:label="@string/permlab_foregroundService" 3926 android:protectionLevel="normal|instant" /> 3927 3928 <!-- @SystemApi Allows to access all app shortcuts. 3929 @hide --> 3930 <permission android:name="android.permission.ACCESS_SHORTCUTS" 3931 android:protectionLevel="signature|textClassifier" /> 3932 3933 <!-- @SystemApi Allows unlimited calls to shortcut mutation APIs. 3934 @hide --> 3935 <permission android:name="android.permission.UNLIMITED_SHORTCUTS_API_CALLS" 3936 android:protectionLevel="signature|textClassifier" /> 3937 3938 <!-- @SystemApi Allows an application to read the runtime profiles of other apps. 3939 @hide <p>Not for use by third-party applications. --> 3940 <permission android:name="android.permission.READ_RUNTIME_PROFILES" 3941 android:protectionLevel="signature|privileged" /> 3942 3943 <!-- @hide Allows audio policy management. --> 3944 <permission android:name="android.permission.MANAGE_AUDIO_POLICY" 3945 android:protectionLevel="signature" /> 3946 3947 <!-- @SystemApi Allows an application to turn on / off quiet mode. 3948 @hide <p>Not for use by third-party applications. --> 3949 <permission android:name="android.permission.MODIFY_QUIET_MODE" 3950 android:protectionLevel="signature|privileged" /> 3951 3952 <!-- Allows internal management of the camera framework 3953 @hide --> 3954 <permission android:name="android.permission.MANAGE_CAMERA" 3955 android:protectionLevel="signature" /> 3956 3957 <!-- Allows an application to control remote animations. See 3958 {@link ActivityOptions#makeRemoteAnimation} 3959 @hide <p>Not for use by third-party applications. --> 3960 <permission android:name="android.permission.CONTROL_REMOTE_APP_TRANSITION_ANIMATIONS" 3961 android:protectionLevel="signature|privileged" /> 3962 3963 <!-- Allows an application to watch changes and/or active state of app ops. 3964 @hide <p>Not for use by third-party applications. --> 3965 <permission android:name="android.permission.WATCH_APPOPS" 3966 android:protectionLevel="signature" /> 3967 3968 <!-- Allows an application to directly open the "Open by default" page inside a package's 3969 Details screen. 3970 @hide <p>Not for use by third-party applications. --> 3971 <permission android:name="android.permission.OPEN_APPLICATION_DETAILS_OPEN_BY_DEFAULT_PAGE" 3972 android:protectionLevel="signature" /> 3973 3974 <!-- Allows hidden API checks to be disabled when starting a process. 3975 @hide <p>Not for use by third-party applications. --> 3976 <permission android:name="android.permission.DISABLE_HIDDEN_API_CHECKS" 3977 android:protectionLevel="signature" /> 3978 3979 <application android:process="system" 3980 android:persistent="true" 3981 android:hasCode="false" 3982 android:label="@string/android_system_label" 3983 android:allowClearUserData="false" 3984 android:backupAgent="com.android.server.backup.SystemBackupAgent" 3985 android:killAfterRestore="false" 3986 android:icon="@drawable/ic_launcher_android" 3987 android:supportsRtl="true" 3988 android:theme="@style/Theme.DeviceDefault.Light.DarkActionBar" 3989 android:defaultToDeviceProtectedStorage="true" 3990 android:directBootAware="true"> 3991 <activity android:name="com.android.internal.app.ChooserActivity" 3992 android:theme="@style/Theme.DeviceDefault.Resolver" 3993 android:finishOnCloseSystemDialogs="true" 3994 android:excludeFromRecents="true" 3995 android:documentLaunchMode="never" 3996 android:relinquishTaskIdentity="true" 3997 android:configChanges="screenSize|smallestScreenSize|screenLayout|orientation|keyboard|keyboardHidden" 3998 android:process=":ui" 3999 android:visibleToInstantApps="true"> 4000 <intent-filter> 4001 <action android:name="android.intent.action.CHOOSER" /> 4002 <category android:name="android.intent.category.DEFAULT" /> 4003 <category android:name="android.intent.category.VOICE" /> 4004 </intent-filter> 4005 </activity> 4006 <activity android:name="com.android.internal.app.AccessibilityButtonChooserActivity" 4007 android:exported="false" 4008 android:theme="@style/Theme.DeviceDefault.Resolver" 4009 android:finishOnCloseSystemDialogs="true" 4010 android:excludeFromRecents="true" 4011 android:documentLaunchMode="never" 4012 android:relinquishTaskIdentity="true" 4013 android:configChanges="screenSize|smallestScreenSize|screenLayout|orientation|keyboard|keyboardHidden" 4014 android:process=":ui" 4015 android:visibleToInstantApps="true"> 4016 <intent-filter> 4017 <action android:name="com.android.internal.intent.action.CHOOSE_ACCESSIBILITY_BUTTON" /> 4018 <category android:name="android.intent.category.DEFAULT" /> 4019 </intent-filter> 4020 </activity> 4021 <activity android:name="com.android.internal.app.IntentForwarderActivity" 4022 android:finishOnCloseSystemDialogs="true" 4023 android:theme="@style/Theme.NoDisplay" 4024 android:excludeFromRecents="true" 4025 android:label="@string/user_owner_label" 4026 android:exported="true" 4027 android:visibleToInstantApps="true" 4028 > 4029 </activity> 4030 <activity-alias android:name="com.android.internal.app.ForwardIntentToParent" 4031 android:targetActivity="com.android.internal.app.IntentForwarderActivity" 4032 android:exported="true" 4033 android:label="@string/user_owner_label"> 4034 </activity-alias> 4035 <activity-alias android:name="com.android.internal.app.ForwardIntentToManagedProfile" 4036 android:targetActivity="com.android.internal.app.IntentForwarderActivity" 4037 android:icon="@drawable/ic_corp_badge" 4038 android:exported="true" 4039 android:label="@string/managed_profile_label"> 4040 </activity-alias> 4041 <activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity" 4042 android:theme="@style/Theme.DeviceDefault.Light.Dialog" 4043 android:label="@string/heavy_weight_switcher_title" 4044 android:finishOnCloseSystemDialogs="true" 4045 android:excludeFromRecents="true" 4046 android:process=":ui"> 4047 </activity> 4048 <activity android:name="com.android.internal.app.PlatLogoActivity" 4049 android:theme="@style/Theme.Wallpaper.NoTitleBar.Fullscreen" 4050 android:configChanges="orientation|keyboardHidden" 4051 android:process=":ui"> 4052 </activity> 4053 <activity android:name="com.android.internal.app.DisableCarModeActivity" 4054 android:theme="@style/Theme.NoDisplay" 4055 android:excludeFromRecents="true" 4056 android:process=":ui"> 4057 </activity> 4058 <activity android:name="com.android.internal.app.DumpHeapActivity" 4059 android:theme="@style/Theme.Translucent.NoTitleBar" 4060 android:label="@string/dump_heap_title" 4061 android:finishOnCloseSystemDialogs="true" 4062 android:noHistory="true" 4063 android:excludeFromRecents="true" 4064 android:process=":ui"> 4065 </activity> 4066 <provider android:name="com.android.server.am.DumpHeapProvider" 4067 android:authorities="com.android.server.heapdump" 4068 android:grantUriPermissions="true" 4069 android:multiprocess="false" 4070 android:singleUser="true" /> 4071 4072 <activity android:name="android.accounts.ChooseAccountActivity" 4073 android:excludeFromRecents="true" 4074 android:exported="true" 4075 android:theme="@style/Theme.DeviceDefault.Light.Dialog" 4076 android:label="@string/choose_account_label" 4077 android:process=":ui" 4078 android:visibleToInstantApps="true"> 4079 </activity> 4080 4081 <activity android:name="android.accounts.ChooseTypeAndAccountActivity" 4082 android:excludeFromRecents="true" 4083 android:exported="true" 4084 android:theme="@style/Theme.DeviceDefault.Light.Dialog" 4085 android:label="@string/choose_account_label" 4086 android:process=":ui" 4087 android:visibleToInstantApps="true"> 4088 </activity> 4089 4090 <activity android:name="android.accounts.ChooseAccountTypeActivity" 4091 android:excludeFromRecents="true" 4092 android:theme="@style/Theme.DeviceDefault.Light.Dialog" 4093 android:label="@string/choose_account_label" 4094 android:process=":ui" 4095 android:visibleToInstantApps="true"> 4096 </activity> 4097 4098 <activity android:name="android.accounts.CantAddAccountActivity" 4099 android:excludeFromRecents="true" 4100 android:exported="true" 4101 android:theme="@style/Theme.DeviceDefault.Light.Dialog.NoActionBar" 4102 android:process=":ui"> 4103 </activity> 4104 4105 <activity android:name="android.accounts.GrantCredentialsPermissionActivity" 4106 android:excludeFromRecents="true" 4107 android:exported="true" 4108 android:theme="@style/Theme.DeviceDefault.Light.DialogWhenLarge" 4109 android:process=":ui" 4110 android:visibleToInstantApps="true"> 4111 </activity> 4112 4113 <activity android:name="android.content.SyncActivityTooManyDeletes" 4114 android:theme="@style/Theme.DeviceDefault.Light.Dialog" 4115 android:label="@string/sync_too_many_deletes" 4116 android:process=":ui"> 4117 </activity> 4118 4119 <activity android:name="com.android.internal.app.ShutdownActivity" 4120 android:permission="android.permission.SHUTDOWN" 4121 android:theme="@style/Theme.NoDisplay" 4122 android:excludeFromRecents="true"> 4123 <intent-filter> 4124 <action android:name="com.android.internal.intent.action.REQUEST_SHUTDOWN" /> 4125 <category android:name="android.intent.category.DEFAULT" /> 4126 </intent-filter> 4127 <intent-filter> 4128 <action android:name="android.intent.action.REBOOT" /> 4129 <category android:name="android.intent.category.DEFAULT" /> 4130 </intent-filter> 4131 </activity> 4132 4133 <activity android:name="com.android.internal.app.NetInitiatedActivity" 4134 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert" 4135 android:excludeFromRecents="true" 4136 android:process=":ui"> 4137 </activity> 4138 4139 <activity android:name="com.android.internal.app.SystemUserHomeActivity" 4140 android:enabled="false" 4141 android:process=":ui" 4142 android:systemUserOnly="true" 4143 android:theme="@style/Theme.Translucent.NoTitleBar"> 4144 <intent-filter android:priority="-100"> 4145 <action android:name="android.intent.action.MAIN" /> 4146 <category android:name="android.intent.category.HOME" /> 4147 </intent-filter> 4148 </activity> 4149 4150 <!-- Activity to prompt user if it's ok to create a new user sandbox for a 4151 specified account. --> 4152 <activity android:name="com.android.internal.app.ConfirmUserCreationActivity" 4153 android:excludeFromRecents="true" 4154 android:process=":ui" 4155 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert"> 4156 <intent-filter android:priority="1000"> 4157 <action android:name="android.os.action.CREATE_USER" /> 4158 <category android:name="android.intent.category.DEFAULT" /> 4159 </intent-filter> 4160 </activity> 4161 4162 <activity android:name="com.android.internal.app.SuspendedAppActivity" 4163 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert" 4164 android:excludeFromRecents="true" 4165 android:process=":ui"> 4166 </activity> 4167 4168 <activity android:name="com.android.internal.app.UnlaunchableAppActivity" 4169 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert" 4170 android:excludeFromRecents="true" 4171 android:process=":ui"> 4172 </activity> 4173 4174 <activity android:name="com.android.settings.notification.NotificationAccessConfirmationActivity" 4175 android:theme="@android:style/Theme.DeviceDefault.Light.Dialog.Alert" 4176 android:excludeFromRecents="true"> 4177 </activity> 4178 4179 <activity android:name="com.android.internal.app.HarmfulAppWarningActivity" 4180 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert" 4181 android:excludeFromRecents="true" 4182 android:process=":ui" 4183 android:label="@string/harmful_app_warning_title" 4184 android:exported="false"> 4185 </activity> 4186 4187 <receiver android:name="com.android.server.BootReceiver" 4188 android:systemUserOnly="true"> 4189 <intent-filter android:priority="1000"> 4190 <action android:name="android.intent.action.BOOT_COMPLETED" /> 4191 </intent-filter> 4192 </receiver> 4193 4194 <receiver android:name="com.android.server.updates.CertPinInstallReceiver" 4195 android:permission="android.permission.UPDATE_CONFIG"> 4196 <intent-filter> 4197 <action android:name="android.intent.action.UPDATE_PINS" /> 4198 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 4199 </intent-filter> 4200 </receiver> 4201 4202 <receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver" 4203 android:permission="android.permission.UPDATE_CONFIG"> 4204 <intent-filter> 4205 <action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" /> 4206 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 4207 </intent-filter> 4208 </receiver> 4209 4210 <receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver" 4211 android:permission="android.permission.UPDATE_CONFIG"> 4212 <intent-filter> 4213 <action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" /> 4214 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 4215 </intent-filter> 4216 </receiver> 4217 4218 <receiver android:name="com.android.server.updates.NetworkWatchlistInstallReceiver" 4219 android:permission="android.permission.UPDATE_CONFIG"> 4220 <intent-filter> 4221 <action android:name="android.intent.action.UPDATE_NETWORK_WATCHLIST" /> 4222 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 4223 </intent-filter> 4224 </receiver> 4225 4226 <receiver android:name="com.android.server.updates.ApnDbInstallReceiver" 4227 android:permission="android.permission.UPDATE_CONFIG"> 4228 <intent-filter> 4229 <action android:name="com.android.internal.intent.action.UPDATE_APN_DB" /> 4230 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 4231 </intent-filter> 4232 </receiver> 4233 4234 <receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver" 4235 android:permission="android.permission.UPDATE_CONFIG"> 4236 <intent-filter> 4237 <action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" /> 4238 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 4239 </intent-filter> 4240 </receiver> 4241 4242 <receiver android:name="com.android.server.updates.CertificateTransparencyLogInstallReceiver" 4243 android:permission="android.permission.UPDATE_CONFIG"> 4244 <intent-filter> 4245 <action android:name="android.intent.action.UPDATE_CT_LOGS" /> 4246 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 4247 </intent-filter> 4248 </receiver> 4249 4250 <receiver android:name="com.android.server.updates.LangIdInstallReceiver" 4251 android:permission="android.permission.UPDATE_CONFIG"> 4252 <intent-filter> 4253 <action android:name="android.intent.action.UPDATE_LANG_ID" /> 4254 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 4255 </intent-filter> 4256 </receiver> 4257 4258 <receiver android:name="com.android.server.updates.SmartSelectionInstallReceiver" 4259 android:permission="android.permission.UPDATE_CONFIG"> 4260 <intent-filter> 4261 <action android:name="android.intent.action.UPDATE_SMART_SELECTION" /> 4262 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 4263 </intent-filter> 4264 </receiver> 4265 4266 <receiver android:name="com.android.server.updates.CarrierIdInstallReceiver" 4267 android:permission="android.permission.UPDATE_CONFIG"> 4268 <intent-filter> 4269 <action android:name="android.os.action.UPDATE_CARRIER_ID_DB" /> 4270 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 4271 </intent-filter> 4272 </receiver> 4273 4274 <receiver android:name="com.android.server.MasterClearReceiver" 4275 android:permission="android.permission.MASTER_CLEAR"> 4276 <intent-filter 4277 android:priority="100" > 4278 <!-- For Checkin, Settings, etc.: action=FACTORY_RESET --> 4279 <action android:name="android.intent.action.FACTORY_RESET" /> 4280 <!-- As above until all the references to the deprecated MASTER_CLEAR get updated to 4281 FACTORY_RESET. --> 4282 <action android:name="android.intent.action.MASTER_CLEAR" /> 4283 4284 <!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR --> 4285 <action android:name="com.google.android.c2dm.intent.RECEIVE" /> 4286 <category android:name="android.intent.category.MASTER_CLEAR" /> 4287 </intent-filter> 4288 </receiver> 4289 4290 <receiver android:name="com.android.server.stats.StatsCompanionService$AnomalyAlarmReceiver" 4291 android:permission="android.permission.STATSCOMPANION" 4292 android:exported="false"> 4293 </receiver> 4294 4295 <receiver android:name="com.android.server.stats.StatsCompanionService$PullingAlarmReceiver" 4296 android:permission="android.permission.STATSCOMPANION" 4297 android:exported="false"> 4298 </receiver> 4299 4300 <receiver android:name="com.android.server.stats.StatsCompanionService$PeriodicAlarmReceiver" 4301 android:permission="android.permission.STATSCOMPANION" 4302 android:exported="false"> 4303 </receiver> 4304 4305 <service android:name="android.hardware.location.GeofenceHardwareService" 4306 android:permission="android.permission.LOCATION_HARDWARE" 4307 android:exported="false" /> 4308 4309 <service android:name="com.android.internal.backup.LocalTransportService" 4310 android:permission="android.permission.CONFIRM_FULL_BACKUP" 4311 android:exported="false"> 4312 <intent-filter> 4313 <action android:name="android.backup.TRANSPORT_HOST" /> 4314 </intent-filter> 4315 </service> 4316 4317 <service android:name="com.android.server.MountServiceIdler" 4318 android:exported="true" 4319 android:permission="android.permission.BIND_JOB_SERVICE" > 4320 </service> 4321 4322 <service android:name="com.android.server.backup.FullBackupJob" 4323 android:exported="true" 4324 android:permission="android.permission.BIND_JOB_SERVICE" > 4325 </service> 4326 4327 <service android:name="com.android.server.backup.KeyValueBackupJob" 4328 android:permission="android.permission.BIND_JOB_SERVICE" > 4329 </service> 4330 4331 <service android:name="com.android.server.content.SyncJobService" 4332 android:permission="android.permission.BIND_JOB_SERVICE" > 4333 </service> 4334 4335 <service android:name="com.android.server.pm.BackgroundDexOptService" 4336 android:exported="true" 4337 android:permission="android.permission.BIND_JOB_SERVICE"> 4338 </service> 4339 4340 <service android:name="com.android.server.PruneInstantAppsJobService" 4341 android:permission="android.permission.BIND_JOB_SERVICE" > 4342 </service> 4343 4344 <service android:name="com.android.server.storage.DiskStatsLoggingService" 4345 android:permission="android.permission.BIND_JOB_SERVICE" > 4346 </service> 4347 4348 <service android:name="com.android.server.PreloadsFileCacheExpirationJobService" 4349 android:permission="android.permission.BIND_JOB_SERVICE" > 4350 </service> 4351 4352 <service android:name="com.android.server.camera.CameraStatsJobService" 4353 android:permission="android.permission.BIND_JOB_SERVICE" > 4354 </service> 4355 4356 <service android:name="com.android.server.timezone.TimeZoneUpdateIdler" 4357 android:permission="android.permission.BIND_JOB_SERVICE" > 4358 </service> 4359 4360 <service android:name="com.android.server.net.watchlist.ReportWatchlistJobService" 4361 android:permission="android.permission.BIND_JOB_SERVICE" > 4362 </service> 4363 4364 <service android:name="com.android.server.display.BrightnessIdleJob" 4365 android:permission="android.permission.BIND_JOB_SERVICE" > 4366 </service> 4367 4368 <service 4369 android:name="com.android.server.autofill.AutofillCompatAccessibilityService" 4370 android:permission="android.permission.BIND_ACCESSIBILITY_SERVICE" 4371 android:exported="true"> 4372 <meta-data 4373 android:name="android.accessibilityservice" 4374 android:resource="@xml/autofill_compat_accessibility_service" /> 4375 </service> 4376 4377</application> 4378 4379</manifest> 4380