1 <?xml version="1.0" encoding="utf-8"?>
3 /* //device/apps/common/AndroidManifest.xml
5 ** Copyright 2006, The Android Open Source Project
7 ** Licensed under the Apache License, Version 2.0 (the "License");
8 ** you may not use this file except in compliance with the License.
9 ** You may obtain a copy of the License at
11 ** http://www.apache.org/licenses/LICENSE-2.0
13 ** Unless required by applicable law or agreed to in writing, software
14 ** distributed under the License is distributed on an "AS IS" BASIS,
15 ** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16 ** See the License for the specific language governing permissions and
17 ** limitations under the License.
20 <manifest xmlns:android="http://schemas.android.com/apk/res/android"
21 package="android" coreApp="true" android:sharedUserId="android.uid.system"
22 android:sharedUserLabel="@string/android_system_label">
24 <!-- ================================================ -->
25 <!-- Special broadcasts that only the system can send -->
26 <!-- ================================================ -->
29 <protected-broadcast android:name="android.intent.action.SCREEN_OFF" />
30 <protected-broadcast android:name="android.intent.action.SCREEN_ON" />
31 <protected-broadcast android:name="android.intent.action.USER_PRESENT" />
32 <protected-broadcast android:name="android.intent.action.TIME_SET" />
33 <protected-broadcast android:name="android.intent.action.TIME_TICK" />
34 <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" />
35 <protected-broadcast android:name="android.intent.action.DATE_CHANGED" />
36 <protected-broadcast android:name="android.intent.action.PRE_BOOT_COMPLETED" />
37 <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" />
38 <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" />
39 <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" />
40 <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" />
41 <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" />
42 <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" />
43 <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" />
44 <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" />
45 <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" />
46 <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" />
47 <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" />
48 <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" />
49 <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" />
50 <protected-broadcast android:name="android.intent.action.PACKAGES_SUSPENDED" />
51 <protected-broadcast android:name="android.intent.action.PACKAGES_UNSUSPENDED" />
52 <protected-broadcast android:name="android.intent.action.ACTION_PREFERRED_ACTIVITY_CHANGED" />
53 <protected-broadcast android:name="android.intent.action.UID_REMOVED" />
54 <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" />
55 <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" />
56 <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" />
57 <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" />
58 <protected-broadcast android:name="android.intent.action.BATTERY_LOW" />
59 <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" />
60 <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" />
61 <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" />
62 <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" />
63 <protected-broadcast android:name="android.intent.action.CHARGING" />
64 <protected-broadcast android:name="android.intent.action.DISCHARGING" />
65 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" />
66 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" />
67 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" />
68 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" />
69 <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" />
70 <protected-broadcast android:name="android.intent.action.REBOOT" />
71 <protected-broadcast android:name="android.intent.action.DOCK_EVENT" />
72 <protected-broadcast android:name="android.intent.action.THERMAL_EVENT" />
73 <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" />
74 <protected-broadcast android:name="android.intent.action.USER_ADDED" />
75 <protected-broadcast android:name="android.intent.action.USER_REMOVED" />
76 <protected-broadcast android:name="android.intent.action.USER_STARTING" />
77 <protected-broadcast android:name="android.intent.action.USER_STARTED" />
78 <protected-broadcast android:name="android.intent.action.USER_STOPPING" />
79 <protected-broadcast android:name="android.intent.action.USER_STOPPED" />
80 <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" />
81 <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" />
82 <protected-broadcast android:name="android.intent.action.USER_SWITCHED" />
83 <protected-broadcast android:name="android.intent.action.USER_INITIALIZE" />
84 <protected-broadcast android:name="android.intent.action.INTENT_FILTER_NEEDS_VERIFICATION" />
85 <protected-broadcast android:name="android.intent.action.OVERLAY_ADDED" />
86 <protected-broadcast android:name="android.intent.action.OVERLAY_CHANGED" />
87 <protected-broadcast android:name="android.intent.action.OVERLAY_REMOVED" />
88 <protected-broadcast android:name="android.intent.action.OVERLAY_PRIORITY_CHANGED" />
90 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED" />
91 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGING" />
92 <protected-broadcast android:name="android.os.action.DEVICE_IDLE_MODE_CHANGED" />
93 <protected-broadcast android:name="android.os.action.POWER_SAVE_WHITELIST_CHANGED" />
94 <protected-broadcast android:name="android.os.action.POWER_SAVE_TEMP_WHITELIST_CHANGED" />
95 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED_INTERNAL" />
97 <!-- @deprecated This is rarely used and will be phased out soon. -->
98 <protected-broadcast android:name="android.os.action.SCREEN_BRIGHTNESS_BOOST_CHANGED" />
100 <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" />
101 <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" />
102 <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" />
103 <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" />
104 <protected-broadcast android:name="android.app.action.NEXT_ALARM_CLOCK_CHANGED" />
106 <protected-broadcast android:name="android.app.action.BUGREPORT_SHARING_DECLINED" />
107 <protected-broadcast android:name="android.app.action.BUGREPORT_FAILED" />
108 <protected-broadcast android:name="android.app.action.BUGREPORT_SHARE" />
109 <protected-broadcast android:name="android.app.action.SHOW_DEVICE_MONITORING_DIALOG" />
111 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" />
112 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" />
113 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" />
114 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" />
115 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_HOST_RESTORED" />
116 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_RESTORED" />
118 <protected-broadcast android:name="android.os.action.SETTING_RESTORED" />
120 <protected-broadcast android:name="android.app.backup.intent.RUN" />
121 <protected-broadcast android:name="android.app.backup.intent.CLEAR" />
122 <protected-broadcast android:name="android.app.backup.intent.INIT" />
124 <protected-broadcast android:name="android.bluetooth.intent.DISCOVERABLE_TIMEOUT" />
125 <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" />
126 <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" />
127 <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" />
128 <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" />
129 <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" />
130 <protected-broadcast android:name="android.bluetooth.adapter.action.BLUETOOTH_ADDRESS_CHANGED" />
131 <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" />
132 <protected-broadcast android:name="android.bluetooth.device.action.UUID" />
133 <protected-broadcast android:name="android.bluetooth.device.action.MAS_INSTANCE" />
134 <protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" />
135 <protected-broadcast android:name="android.bluetooth.device.action.FOUND" />
136 <protected-broadcast android:name="android.bluetooth.device.action.DISAPPEARED" />
137 <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" />
138 <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" />
139 <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" />
140 <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" />
141 <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" />
142 <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" />
143 <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" />
144 <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" />
145 <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" />
146 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" />
147 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" />
148 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" />
149 <protected-broadcast android:name="android.bluetooth.device.action.SDP_RECORD" />
150 <protected-broadcast android:name="android.bluetooth.device.action.BATTERY_LEVEL_CHANGED" />
151 <protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" />
152 <protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" />
154 android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" />
156 android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" />
158 android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" />
160 android:name="android.bluetooth.headset.action.HF_INDICATORS_VALUE_CHANGED" />
162 android:name="android.bluetooth.headsetclient.profile.action.CONNECTION_STATE_CHANGED" />
164 android:name="android.bluetooth.headsetclient.profile.action.AUDIO_STATE_CHANGED" />
166 android:name="android.bluetooth.headsetclient.profile.action.AG_EVENT" />
168 android:name="android.bluetooth.headsetclient.profile.action.AG_CALL_CHANGED" />
170 android:name="android.bluetooth.headsetclient.profile.action.RESULT" />
172 android:name="android.bluetooth.headsetclient.profile.action.LAST_VTAG" />
174 android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" />
176 android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" />
178 android:name="android.bluetooth.a2dp.profile.action.CODEC_CONFIG_CHANGED" />
180 android:name="android.bluetooth.a2dp-sink.profile.action.CONNECTION_STATE_CHANGED" />
182 android:name="android.bluetooth.a2dp-sink.profile.action.PLAYING_STATE_CHANGED" />
184 android:name="android.bluetooth.a2dp-sink.profile.action.AUDIO_CONFIG_CHANGED" />
186 android:name="android.bluetooth.avrcp-controller.profile.action.CONNECTION_STATE_CHANGED" />
188 android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" />
190 android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" />
192 android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" />
194 android:name="android.bluetooth.inputhost.profile.action.CONNECTION_STATE_CHANGED" />
196 android:name="android.bluetooth.map.profile.action.CONNECTION_STATE_CHANGED" />
197 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.CONNECTION_STATE_CHANGED" />
198 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_RECEIVED" />
199 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_SENT_SUCCESSFULLY" />
200 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_DELIVERED_SUCCESSFULLY" />
202 android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_SENT" />
204 android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_DELIVERY" />
206 android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" />
207 <protected-broadcast android:name="android.bluetooth.pbap.intent.action.PBAP_STATE_CHANGED" />
208 <protected-broadcast android:name="android.bluetooth.pbap.profile.action.CONNECTION_STATE_CHANGED" />
209 <protected-broadcast android:name="android.bluetooth.sap.profile.action.CONNECTION_STATE_CHANGED" />
210 <protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" />
211 <protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" />
212 <protected-broadcast android:name="android.btopp.intent.action.LIST" />
213 <protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" />
214 <protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" />
215 <protected-broadcast android:name="android.btopp.intent.action.CONFIRM" />
216 <protected-broadcast android:name="android.btopp.intent.action.HIDE" />
217 <protected-broadcast android:name="android.btopp.intent.action.RETRY" />
218 <protected-broadcast android:name="android.btopp.intent.action.OPEN" />
219 <protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" />
220 <protected-broadcast android:name="android.btopp.intent.action.TRANSFER_COMPLETE" />
221 <protected-broadcast android:name="android.btopp.intent.action.ACCEPT" />
222 <protected-broadcast android:name="android.btopp.intent.action.DECLINE" />
223 <protected-broadcast android:name="com.android.bluetooth.gatt.REFRESH_BATCHED_SCAN" />
224 <protected-broadcast android:name="com.android.bluetooth.pbap.authchall" />
225 <protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" />
226 <protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" />
227 <protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" />
228 <protected-broadcast android:name="com.android.bluetooth.sap.USER_CONFIRM_TIMEOUT" />
229 <protected-broadcast android:name="com.android.bluetooth.sap.action.DISCONNECT_ACTION" />
231 <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" />
233 <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" />
234 <protected-broadcast android:name="android.hardware.usb.action.USB_PORT_CHANGED" />
235 <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" />
236 <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_DETACHED" />
237 <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" />
238 <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" />
240 <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" />
241 <protected-broadcast android:name="android.media.action.HDMI_AUDIO_PLUG" />
243 <protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" />
244 <protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" />
245 <protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" />
246 <protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" />
247 <protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" />
248 <protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" />
249 <protected-broadcast android:name="android.media.MASTER_MONO_CHANGED_ACTION" />
250 <protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" />
251 <protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" />
253 <protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" />
254 <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" />
255 <protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" />
256 <protected-broadcast android:name="android.intent.action.MEDIA_NOFS" />
257 <protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" />
258 <protected-broadcast android:name="android.intent.action.MEDIA_SHARED" />
259 <protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" />
260 <protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" />
261 <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" />
262 <protected-broadcast android:name="android.intent.action.MEDIA_EJECT" />
264 <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL" />
265 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" />
266 <!-- @deprecated. Only {@link android.net.ConnectivityManager.CONNECTIVITY_ACTION} is sent. -->
267 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" />
268 <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" />
269 <protected-broadcast android:name="android.net.conn.RESTRICT_BACKGROUND_CHANGED" />
270 <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" />
271 <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" />
273 <protected-broadcast android:name="android.net.nsd.STATE_CHANGED" />
275 <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" />
276 <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" />
277 <protected-broadcast android:name="com.android.nfc.action.LLCP_UP" />
278 <protected-broadcast android:name="com.android.nfc.action.LLCP_DOWN" />
279 <protected-broadcast android:name="com.android.nfc.cardemulation.action.CLOSE_TAP_DIALOG" />
280 <protected-broadcast android:name="com.android.nfc.handover.action.ALLOW_CONNECT" />
281 <protected-broadcast android:name="com.android.nfc.handover.action.DENY_CONNECT" />
282 <protected-broadcast android:name="com.android.nfc.handover.action.TIMEOUT_CONNECT" />
283 <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" />
284 <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" />
285 <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" />
286 <!-- For NFC to BT handover -->
287 <protected-broadcast android:name="android.btopp.intent.action.WHITELIST_DEVICE" />
288 <protected-broadcast android:name="android.btopp.intent.action.STOP_HANDOVER_TRANSFER" />
289 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND" />
290 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND_MULTIPLE" />
291 <protected-broadcast android:name="com.android.nfc.handover.action.CANCEL_HANDOVER_TRANSFER" />
293 <protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" />
294 <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" />
296 <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" />
298 <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" />
299 <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" />
300 <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" />
302 <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" />
303 <protected-broadcast android:name="com.android.server.WifiManager.action.START_PNO" />
304 <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" />
305 <protected-broadcast android:name="com.android.server.WifiManager.action.DEVICE_IDLE" />
306 <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_ACCEPTED" />
307 <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_DECLINED" />
308 <protected-broadcast android:name="com.android.server.action.WIPE_EUICC_DATA" />
309 <protected-broadcast android:name="com.android.server.usb.ACTION_OPEN_IN_APPS" />
310 <protected-broadcast android:name="com.android.server.am.DELETE_DUMPHEAP" />
311 <protected-broadcast android:name="com.android.server.net.action.SNOOZE_WARNING" />
312 <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" />
313 <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" />
314 <protected-broadcast android:name="android.net.wifi.WIFI_CREDENTIAL_CHANGED" />
315 <protected-broadcast android:name="android.net.wifi.WIFI_SCAN_AVAILABLE" />
316 <protected-broadcast android:name="android.net.wifi.aware.action.WIFI_AWARE_STATE_CHANGED" />
317 <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" />
318 <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" />
319 <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" />
320 <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" />
321 <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" />
322 <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_DEAUTH_IMMINENT" />
323 <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_ICON" />
324 <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_OSU_PROVIDERS_LIST" />
325 <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_SUBSCRIPTION_REMEDIATION" />
326 <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" />
327 <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" />
328 <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" />
329 <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" />
330 <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" />
331 <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" />
332 <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" />
333 <protected-broadcast android:name="android.net.wifi.p2p.PERSISTENT_GROUPS_CHANGED" />
334 <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" />
335 <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" />
336 <protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" />
338 android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" />
339 <protected-broadcast android:name="android.net.scoring.SCORE_NETWORKS" />
340 <protected-broadcast android:name="android.net.scoring.SCORER_CHANGED" />
341 <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" />
342 <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" />
343 <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" />
344 <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" />
345 <protected-broadcast android:name="android.intent.action.APPLICATION_RESTRICTIONS_CHANGED" />
348 <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" />
349 <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" />
351 <protected-broadcast android:name="com.android.server.ACTION_TRIGGER_IDLE" />
353 <protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" />
355 <protected-broadcast android:name="android.intent.action.PHONE_STATE" />
357 <protected-broadcast android:name="android.intent.action.SUB_DEFAULT_CHANGED" />
359 <protected-broadcast android:name="android.location.GPS_ENABLED_CHANGE" />
360 <protected-broadcast android:name="android.location.PROVIDERS_CHANGED" />
361 <protected-broadcast android:name="android.location.MODE_CHANGED" />
362 <protected-broadcast android:name="android.location.GPS_FIX_CHANGE" />
363 <protected-broadcast android:name="android.net.proxy.PAC_REFRESH" />
365 <protected-broadcast android:name="android.telecom.action.DEFAULT_DIALER_CHANGED" />
366 <protected-broadcast android:name="android.provider.action.DEFAULT_SMS_PACKAGE_CHANGED" />
367 <protected-broadcast android:name="android.intent.action.CONTENT_CHANGED" />
368 <protected-broadcast android:name="android.provider.Telephony.MMS_DOWNLOADED" />
371 android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" />
373 <!-- Defined in RestrictionsManager -->
375 android:name="android.intent.action.PERMISSION_RESPONSE_RECEIVED" />
376 <!-- Defined in RestrictionsManager -->
378 <protected-broadcast android:name="android.intent.action.REQUEST_PERMISSION" />
379 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_STARTED" />
380 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
381 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_PROGRESS" />
382 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
384 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_DATA_SUBSCRIPTION_CHANGED" />
385 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_VOICE_SUBSCRIPTION_CHANGED" />
386 <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_CONTENT_CHANGE" />
387 <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_RECORD_UPDATED" />
389 <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_DONE" />
390 <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_FAILED" />
392 <protected-broadcast android:name="android.internal.policy.action.BURN_IN_PROTECTION" />
393 <protected-broadcast android:name="android.app.action.SYSTEM_UPDATE_POLICY_CHANGED" />
394 <protected-broadcast android:name="android.app.action.DEVICE_OWNER_CHANGED" />
397 <protected-broadcast android:name="android.intent.action.ANR" />
398 <protected-broadcast android:name="android.intent.action.CALL" />
399 <protected-broadcast android:name="android.intent.action.CALL_PRIVILEGED" />
400 <protected-broadcast android:name="android.intent.action.DROPBOX_ENTRY_ADDED" />
401 <protected-broadcast android:name="android.intent.action.INPUT_METHOD_CHANGED" />
402 <protected-broadcast android:name="android.intent.action.internal_sim_state_changed" />
403 <protected-broadcast android:name="android.intent.action.LOCKED_BOOT_COMPLETED" />
404 <protected-broadcast android:name="android.intent.action.PRECISE_CALL_STATE" />
405 <protected-broadcast android:name="android.intent.action.PRECISE_DATA_CONNECTION_STATE_CHANGED" />
406 <protected-broadcast android:name="android.intent.action.SUBSCRIPTION_PHONE_STATE" />
407 <protected-broadcast android:name="android.intent.action.USER_INFO_CHANGED" />
408 <protected-broadcast android:name="android.intent.action.USER_UNLOCKED" />
409 <protected-broadcast android:name="android.intent.action.WALLPAPER_CHANGED" />
411 <protected-broadcast android:name="android.app.action.DEVICE_POLICY_MANAGER_STATE_CHANGED" />
412 <protected-broadcast android:name="android.app.action.CHOOSE_PRIVATE_KEY_ALIAS" />
413 <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLED" />
414 <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLE_REQUESTED" />
415 <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_ENABLED" />
416 <protected-broadcast android:name="android.app.action.LOCK_TASK_ENTERING" />
417 <protected-broadcast android:name="android.app.action.LOCK_TASK_EXITING" />
418 <protected-broadcast android:name="android.app.action.NOTIFY_PENDING_SYSTEM_UPDATE" />
419 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_CHANGED" />
420 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_EXPIRING" />
421 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_FAILED" />
422 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_SUCCEEDED" />
423 <protected-broadcast android:name="com.android.server.ACTION_EXPIRED_PASSWORD_NOTIFICATION" />
425 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_ADDED" />
426 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNLOCKED" />
427 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_REMOVED" />
429 <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_STATE_CHANGED" />
430 <protected-broadcast android:name="com.android.bluetooth.map.USER_CONFIRM_TIMEOUT" />
431 <protected-broadcast android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_SENT" />
432 <protected-broadcast android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_DELIVERY" />
433 <protected-broadcast android:name="android.content.jobscheduler.JOB_DELAY_EXPIRED" />
434 <protected-broadcast android:name="android.content.syncmanager.SYNC_ALARM" />
435 <protected-broadcast android:name="android.media.INTERNAL_RINGER_MODE_CHANGED_ACTION" />
436 <protected-broadcast android:name="android.media.STREAM_DEVICES_CHANGED_ACTION" />
437 <protected-broadcast android:name="android.media.STREAM_MUTE_CHANGED_ACTION" />
438 <protected-broadcast android:name="android.net.sip.SIP_SERVICE_UP" />
439 <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" />
440 <protected-broadcast android:name="android.os.action.CHARGING" />
441 <protected-broadcast android:name="android.os.action.DISCHARGING" />
442 <protected-broadcast android:name="android.search.action.SEARCHABLES_CHANGED" />
443 <protected-broadcast android:name="android.security.STORAGE_CHANGED" />
444 <protected-broadcast android:name="android.security.action.TRUST_STORE_CHANGED" />
445 <protected-broadcast android:name="android.security.action.KEYCHAIN_CHANGED" />
446 <protected-broadcast android:name="android.security.action.KEY_ACCESS_CHANGED" />
447 <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_REGISTERED" />
448 <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_UNREGISTERED" />
449 <protected-broadcast android:name="android.telecom.action.SHOW_MISSED_CALLS_NOTIFICATION" />
450 <protected-broadcast android:name="android.telephony.action.CARRIER_CONFIG_CHANGED" />
451 <protected-broadcast android:name="android.telephony.action.DEFAULT_SUBSCRIPTION_CHANGED" />
452 <protected-broadcast android:name="android.telephony.action.DEFAULT_SMS_SUBSCRIPTION_CHANGED" />
453 <protected-broadcast android:name="android.telephony.action.SHOW_VOICEMAIL_NOTIFICATION" />
455 <protected-broadcast android:name="com.android.bluetooth.btservice.action.ALARM_WAKEUP" />
456 <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_POLL" />
457 <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_UPDATED" />
458 <protected-broadcast android:name="com.android.server.NetworkTimeUpdateService.action.POLL" />
459 <protected-broadcast android:name="com.android.server.telecom.intent.action.CALLS_ADD_ENTRY" />
460 <protected-broadcast android:name="com.android.settings.location.MODE_CHANGING" />
461 <protected-broadcast android:name="com.android.settings.bluetooth.ACTION_DISMISS_PAIRING" />
463 <protected-broadcast android:name="NotificationManagerService.TIMEOUT" />
464 <protected-broadcast android:name="ScheduleConditionProvider.EVALUATE" />
465 <protected-broadcast android:name="EventConditionProvider.EVALUATE" />
466 <protected-broadcast android:name="SnoozeHelper.EVALUATE" />
467 <protected-broadcast android:name="wifi_scan_available" />
469 <protected-broadcast android:name="action.cne.started" />
470 <protected-broadcast android:name="android.content.jobscheduler.JOB_DEADLINE_EXPIRED" />
471 <protected-broadcast android:name="android.intent.action.ACTION_UNSOL_RESPONSE_OEM_HOOK_RAW" />
472 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_SUPL" />
473 <protected-broadcast android:name="android.os.action.ACTION_EFFECTS_SUPPRESSOR_CHANGED" />
474 <protected-broadcast android:name="android.os.action.LIGHT_DEVICE_IDLE_MODE_CHANGED" />
475 <protected-broadcast android:name="android.os.storage.action.VOLUME_STATE_CHANGED" />
476 <protected-broadcast android:name="android.os.storage.action.DISK_SCANNED" />
477 <protected-broadcast android:name="com.android.server.action.UPDATE_TWILIGHT_STATE" />
478 <protected-broadcast android:name="com.android.server.action.RESET_TWILIGHT_AUTO" />
479 <protected-broadcast android:name="com.android.server.device_idle.STEP_IDLE_STATE" />
480 <protected-broadcast android:name="com.android.server.device_idle.STEP_LIGHT_IDLE_STATE" />
481 <protected-broadcast android:name="com.android.server.Wifi.action.TOGGLE_PNO" />
482 <protected-broadcast android:name="intent.action.ACTION_RF_BAND_INFO" />
483 <protected-broadcast android:name="android.intent.action.MEDIA_RESOURCE_GRANTED" />
484 <protected-broadcast android:name="android.app.action.NETWORK_LOGS_AVAILABLE" />
485 <protected-broadcast android:name="android.app.action.SECURITY_LOGS_AVAILABLE" />
487 <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED" />
488 <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED_INTERNAL" />
489 <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_CHANGED" />
490 <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_ACCESS_GRANTED_CHANGED" />
491 <protected-broadcast android:name="android.os.action.ACTION_EFFECTS_SUPPRESSOR_CHANGED" />
493 <protected-broadcast android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS" />
494 <protected-broadcast android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS" />
496 <protected-broadcast android:name="android.intent.action.DYNAMIC_SENSOR_CHANGED" />
498 <protected-broadcast android:name="android.intent.action.ACTION_RADIO_OFF" />
500 <protected-broadcast android:name="android.accounts.LOGIN_ACCOUNTS_CHANGED" />
501 <protected-broadcast android:name="android.accounts.action.ACCOUNT_REMOVED" />
502 <protected-broadcast android:name="android.accounts.action.VISIBLE_ACCOUNTS_CHANGED" />
504 <protected-broadcast android:name="com.android.sync.SYNC_CONN_STATUS_CHANGED" />
506 <protected-broadcast android:name="com.android.phone.SIP_INCOMING_CALL" />
507 <protected-broadcast android:name="com.android.phone.SIP_ADD_PHONE" />
508 <protected-broadcast android:name="com.android.phone.SIP_REMOVE_PHONE" />
509 <protected-broadcast android:name="com.android.phone.SIP_CALL_OPTION_CHANGED" />
511 <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_CONNECTED" />
512 <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_DISCONNECTED" />
514 <protected-broadcast android:name="android.bluetooth.input.profile.action.HANDSHAKE" />
515 <protected-broadcast android:name="android.bluetooth.input.profile.action.REPORT" />
517 <protected-broadcast android:name="android.intent.action.TWILIGHT_CHANGED" />
519 <protected-broadcast android:name="com.android.server.fingerprint.ACTION_LOCKOUT_RESET" />
520 <protected-broadcast android:name="android.net.wifi.PASSPOINT_ICON_RECEIVED" />
521 <protected-broadcast android:name="com.android.server.notification.CountdownConditionProvider" />
523 <protected-broadcast android:name="com.android.internal.location.ALARM_WAKEUP" />
524 <protected-broadcast android:name="com.android.internal.location.ALARM_TIMEOUT" />
525 <protected-broadcast android:name="android.intent.action.GLOBAL_BUTTON" />
527 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_AVAILABLE" />
528 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNAVAILABLE" />
529 <protected-broadcast android:name="com.android.server.pm.DISABLE_QUIET_MODE_AFTER_UNLOCK" />
531 <protected-broadcast android:name="com.android.server.retaildemo.ACTION_RESET_DEMO" />
533 <protected-broadcast android:name="android.intent.action.DEVICE_LOCKED_CHANGED" />
536 <!-- TODO: temporary broadcast used by AutoFillManagerServiceImpl; will be removed -->
537 <protected-broadcast android:name="com.android.internal.autofill.action.REQUEST_AUTOFILL" />
538 <protected-broadcast android:name="android.app.action.APPLICATION_DELEGATION_SCOPES_CHANGED" />
539 <protected-broadcast android:name="com.android.server.wm.ACTION_REVOKE_SYSTEM_ALERT_WINDOW_PERMISSION" />
540 <protected-broadcast android:name="android.media.tv.action.PARENTAL_CONTROLS_ENABLED_CHANGED" />
542 <protected-broadcast android:name="android.content.pm.action.SESSION_COMMITTED" />
543 <protected-broadcast android:name="android.os.action.USER_RESTRICTIONS_CHANGED" />
544 <protected-broadcast android:name="android.media.tv.action.PREVIEW_PROGRAM_ADDED_TO_WATCH_NEXT" />
545 <protected-broadcast android:name="android.media.tv.action.PREVIEW_PROGRAM_BROWSABLE_DISABLED" />
546 <protected-broadcast android:name="android.media.tv.action.WATCH_NEXT_PROGRAM_BROWSABLE_DISABLED" />
547 <protected-broadcast android:name="android.media.tv.action.CHANNEL_BROWSABLE_REQUESTED" />
548 <protected-broadcast android:name="com.android.server.InputMethodManagerService.SHOW_INPUT_METHOD_PICKER" />
550 <!-- ====================================================================== -->
551 <!-- RUNTIME PERMISSIONS -->
552 <!-- ====================================================================== -->
555 <!-- ====================================================================== -->
556 <!-- Permissions for accessing user's contacts including personal profile -->
557 <!-- ====================================================================== -->
560 <!-- Used for runtime permissions related to contacts and profiles on this
562 <permission-group android:name="android.permission-group.CONTACTS"
563 android:icon="@drawable/perm_group_contacts"
564 android:label="@string/permgrouplab_contacts"
565 android:description="@string/permgroupdesc_contacts"
566 android:priority="100" />
568 <!-- Allows an application to read the user's contacts data.
569 <p>Protection level: dangerous
571 <permission android:name="android.permission.READ_CONTACTS"
572 android:permissionGroup="android.permission-group.CONTACTS"
573 android:label="@string/permlab_readContacts"
574 android:description="@string/permdesc_readContacts"
575 android:protectionLevel="dangerous" />
577 <!-- Allows an application to write the user's contacts data.
578 <p>Protection level: dangerous
580 <permission android:name="android.permission.WRITE_CONTACTS"
581 android:permissionGroup="android.permission-group.CONTACTS"
582 android:label="@string/permlab_writeContacts"
583 android:description="@string/permdesc_writeContacts"
584 android:protectionLevel="dangerous" />
586 <!-- ====================================================================== -->
587 <!-- Permissions for accessing user's calendar -->
588 <!-- ====================================================================== -->
591 <!-- Used for runtime permissions related to user's calendar. -->
592 <permission-group android:name="android.permission-group.CALENDAR"
593 android:icon="@drawable/perm_group_calendar"
594 android:label="@string/permgrouplab_calendar"
595 android:description="@string/permgroupdesc_calendar"
596 android:priority="200" />
598 <!-- Allows an application to read the user's calendar data.
599 <p>Protection level: dangerous
601 <permission android:name="android.permission.READ_CALENDAR"
602 android:permissionGroup="android.permission-group.CALENDAR"
603 android:label="@string/permlab_readCalendar"
604 android:description="@string/permdesc_readCalendar"
605 android:protectionLevel="dangerous" />
607 <!-- Allows an application to write the user's calendar data.
608 <p>Protection level: dangerous
610 <permission android:name="android.permission.WRITE_CALENDAR"
611 android:permissionGroup="android.permission-group.CALENDAR"
612 android:label="@string/permlab_writeCalendar"
613 android:description="@string/permdesc_writeCalendar"
614 android:protectionLevel="dangerous" />
616 <!-- ====================================================================== -->
617 <!-- Permissions for accessing and modifying user's SMS messages -->
618 <!-- ====================================================================== -->
621 <!-- Used for runtime permissions related to user's SMS messages. -->
622 <permission-group android:name="android.permission-group.SMS"
623 android:icon="@drawable/perm_group_sms"
624 android:label="@string/permgrouplab_sms"
625 android:description="@string/permgroupdesc_sms"
626 android:priority="300" />
628 <!-- Allows an application to send SMS messages.
629 <p>Protection level: dangerous
631 <permission android:name="android.permission.SEND_SMS"
632 android:permissionGroup="android.permission-group.SMS"
633 android:label="@string/permlab_sendSms"
634 android:description="@string/permdesc_sendSms"
635 android:permissionFlags="costsMoney"
636 android:protectionLevel="dangerous" />
638 <!-- Allows an application to receive SMS messages.
639 <p>Protection level: dangerous
641 <permission android:name="android.permission.RECEIVE_SMS"
642 android:permissionGroup="android.permission-group.SMS"
643 android:label="@string/permlab_receiveSms"
644 android:description="@string/permdesc_receiveSms"
645 android:protectionLevel="dangerous"/>
647 <!-- Allows an application to read SMS messages.
648 <p>Protection level: dangerous
650 <permission android:name="android.permission.READ_SMS"
651 android:permissionGroup="android.permission-group.SMS"
652 android:label="@string/permlab_readSms"
653 android:description="@string/permdesc_readSms"
654 android:protectionLevel="dangerous" />
656 <!-- Allows an application to receive WAP push messages.
657 <p>Protection level: dangerous
659 <permission android:name="android.permission.RECEIVE_WAP_PUSH"
660 android:permissionGroup="android.permission-group.SMS"
661 android:label="@string/permlab_receiveWapPush"
662 android:description="@string/permdesc_receiveWapPush"
663 android:protectionLevel="dangerous" />
665 <!-- Allows an application to monitor incoming MMS messages.
666 <p>Protection level: dangerous
668 <permission android:name="android.permission.RECEIVE_MMS"
669 android:permissionGroup="android.permission-group.SMS"
670 android:label="@string/permlab_receiveMms"
671 android:description="@string/permdesc_receiveMms"
672 android:protectionLevel="dangerous" />
674 <!-- Allows an application to read previously received cell broadcast
675 messages and to register a content observer to get notifications when
676 a cell broadcast has been received and added to the database. For
677 emergency alerts, the database is updated immediately after the
678 alert dialog and notification sound/vibration/speech are presented.
679 The "read" column is then updated after the user dismisses the alert.
680 This enables supplementary emergency assistance apps to start loading
681 additional emergency information (if Internet access is available)
682 when the alert is first received, and to delay presenting the info
683 to the user until after the initial alert dialog is dismissed.
684 <p>Protection level: dangerous
685 @hide Pending API council approval -->
686 <permission android:name="android.permission.READ_CELL_BROADCASTS"
687 android:permissionGroup="android.permission-group.SMS"
688 android:label="@string/permlab_readCellBroadcasts"
689 android:description="@string/permdesc_readCellBroadcasts"
690 android:protectionLevel="dangerous" />
692 <!-- ====================================================================== -->
693 <!-- Permissions for accessing external storage -->
694 <!-- ====================================================================== -->
697 <!-- Used for runtime permissions related to the shared external storage. -->
698 <permission-group android:name="android.permission-group.STORAGE"
699 android:icon="@drawable/perm_group_storage"
700 android:label="@string/permgrouplab_storage"
701 android:description="@string/permgroupdesc_storage"
702 android:priority="900" />
704 <!-- Allows an application to read from external storage.
705 <p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly
706 granted this permission.</p>
707 <p>This permission is enforced starting in API level 19. Before API level 19, this
708 permission is not enforced and all apps still have access to read from external storage.
709 You can test your app with the permission enforced by enabling <em>Protect USB
710 storage</em> under Developer options in the Settings app on a device running Android 4.1 or
712 <p>Also starting in API level 19, this permission is <em>not</em> required to
713 read/write files in your application-specific directories returned by
714 {@link android.content.Context#getExternalFilesDir} and
715 {@link android.content.Context#getExternalCacheDir}.
716 <p class="note"><strong>Note:</strong> If <em>both</em> your <a
717 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
718 minSdkVersion}</a> and <a
719 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
720 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
721 grants your app this permission. If you don't need this permission, be sure your <a
722 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
723 targetSdkVersion}</a> is 4 or higher.
724 <p>Protection level: dangerous
726 <permission android:name="android.permission.READ_EXTERNAL_STORAGE"
727 android:permissionGroup="android.permission-group.STORAGE"
728 android:label="@string/permlab_sdcardRead"
729 android:description="@string/permdesc_sdcardRead"
730 android:protectionLevel="dangerous" />
732 <!-- Allows an application to write to external storage.
733 <p class="note"><strong>Note:</strong> If <em>both</em> your <a
734 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
735 minSdkVersion}</a> and <a
736 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
737 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
738 grants your app this permission. If you don't need this permission, be sure your <a
739 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
740 targetSdkVersion}</a> is 4 or higher.
741 <p>Starting in API level 19, this permission is <em>not</em> required to
742 read/write files in your application-specific directories returned by
743 {@link android.content.Context#getExternalFilesDir} and
744 {@link android.content.Context#getExternalCacheDir}.
745 <p>Protection level: dangerous
747 <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE"
748 android:permissionGroup="android.permission-group.STORAGE"
749 android:label="@string/permlab_sdcardWrite"
750 android:description="@string/permdesc_sdcardWrite"
751 android:protectionLevel="dangerous" />
753 <!-- ====================================================================== -->
754 <!-- Permissions for accessing the device location -->
755 <!-- ====================================================================== -->
758 <!-- Used for permissions that allow accessing the device location. -->
759 <permission-group android:name="android.permission-group.LOCATION"
760 android:icon="@drawable/perm_group_location"
761 android:label="@string/permgrouplab_location"
762 android:description="@string/permgroupdesc_location"
763 android:priority="400" />
765 <!-- Allows an app to access precise location.
766 Alternatively, you might want {@link #ACCESS_COARSE_LOCATION}.
767 <p>Protection level: dangerous
769 <permission android:name="android.permission.ACCESS_FINE_LOCATION"
770 android:permissionGroup="android.permission-group.LOCATION"
771 android:label="@string/permlab_accessFineLocation"
772 android:description="@string/permdesc_accessFineLocation"
773 android:protectionLevel="dangerous|ephemeral" />
775 <!-- Allows an app to access approximate location.
776 Alternatively, you might want {@link #ACCESS_FINE_LOCATION}.
777 <p>Protection level: dangerous
779 <permission android:name="android.permission.ACCESS_COARSE_LOCATION"
780 android:permissionGroup="android.permission-group.LOCATION"
781 android:label="@string/permlab_accessCoarseLocation"
782 android:description="@string/permdesc_accessCoarseLocation"
783 android:protectionLevel="dangerous|ephemeral" />
785 <!-- ====================================================================== -->
786 <!-- Permissions for accessing the device telephony -->
787 <!-- ====================================================================== -->
790 <!-- Used for permissions that are associated telephony features. -->
791 <permission-group android:name="android.permission-group.PHONE"
792 android:icon="@drawable/perm_group_phone_calls"
793 android:label="@string/permgrouplab_phone"
794 android:description="@string/permgroupdesc_phone"
795 android:priority="500" />
797 <!-- Allows read only access to phone state, including the phone number of the device,
798 current cellular network information, the status of any ongoing calls, and a list of any
799 {@link android.telecom.PhoneAccount}s registered on the device.
800 <p class="note"><strong>Note:</strong> If <em>both</em> your <a
801 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
802 minSdkVersion}</a> and <a
803 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
804 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
805 grants your app this permission. If you don't need this permission, be sure your <a
806 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
807 targetSdkVersion}</a> is 4 or higher.
808 <p>Protection level: dangerous
810 <permission android:name="android.permission.READ_PHONE_STATE"
811 android:permissionGroup="android.permission-group.PHONE"
812 android:label="@string/permlab_readPhoneState"
813 android:description="@string/permdesc_readPhoneState"
814 android:protectionLevel="dangerous" />
816 <!-- Allows read access to the device's phone number(s). This is a subset of the capabilities
817 granted by {@link #READ_PHONE_STATE} but is exposed to ephemeral applications.
818 <p>Protection level: dangerous-->
819 <permission android:name="android.permission.READ_PHONE_NUMBERS"
820 android:permissionGroup="android.permission-group.PHONE"
821 android:label="@string/permlab_readPhoneNumbers"
822 android:description="@string/permdesc_readPhoneNumbers"
823 android:protectionLevel="dangerous|ephemeral" />
825 <!-- Allows an application to initiate a phone call without going through
826 the Dialer user interface for the user to confirm the call.
827 <p>Protection level: dangerous
829 <permission android:name="android.permission.CALL_PHONE"
830 android:permissionGroup="android.permission-group.PHONE"
831 android:permissionFlags="costsMoney"
832 android:label="@string/permlab_callPhone"
833 android:description="@string/permdesc_callPhone"
834 android:protectionLevel="dangerous" />
836 <!-- Allows an application to access the IMS call service: making and
838 <p>Protection level: signature|privileged
841 <permission android:name="android.permission.ACCESS_IMS_CALL_SERVICE"
842 android:permissionGroup="android.permission-group.PHONE"
843 android:label="@string/permlab_accessImsCallService"
844 android:description="@string/permdesc_accessImsCallService"
845 android:protectionLevel="signature|privileged" />
847 <!-- Allows an application to read the user's call log.
848 <p class="note"><strong>Note:</strong> If your app uses the
849 {@link #READ_CONTACTS} permission and <em>both</em> your <a
850 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
851 minSdkVersion}</a> and <a
852 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
853 targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
854 grants your app this permission. If you don't need this permission, be sure your <a
855 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
856 targetSdkVersion}</a> is 16 or higher.</p>
857 <p>Protection level: dangerous
859 <permission android:name="android.permission.READ_CALL_LOG"
860 android:permissionGroup="android.permission-group.PHONE"
861 android:label="@string/permlab_readCallLog"
862 android:description="@string/permdesc_readCallLog"
863 android:protectionLevel="dangerous" />
865 <!-- Allows an application to write (but not read) the user's
867 <p class="note"><strong>Note:</strong> If your app uses the
868 {@link #WRITE_CONTACTS} permission and <em>both</em> your <a
869 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
870 minSdkVersion}</a> and <a
871 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
872 targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
873 grants your app this permission. If you don't need this permission, be sure your <a
874 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
875 targetSdkVersion}</a> is 16 or higher.</p>
876 <p>Protection level: dangerous
878 <permission android:name="android.permission.WRITE_CALL_LOG"
879 android:permissionGroup="android.permission-group.PHONE"
880 android:label="@string/permlab_writeCallLog"
881 android:description="@string/permdesc_writeCallLog"
882 android:protectionLevel="dangerous" />
884 <!-- Allows an application to add voicemails into the system.
885 <p>Protection level: dangerous
887 <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL"
888 android:permissionGroup="android.permission-group.PHONE"
889 android:label="@string/permlab_addVoicemail"
890 android:description="@string/permdesc_addVoicemail"
891 android:protectionLevel="dangerous" />
893 <!-- Allows an application to use SIP service.
894 <p>Protection level: dangerous
896 <permission android:name="android.permission.USE_SIP"
897 android:permissionGroup="android.permission-group.PHONE"
898 android:description="@string/permdesc_use_sip"
899 android:label="@string/permlab_use_sip"
900 android:protectionLevel="dangerous"/>
902 <!-- Allows an application to see the number being dialed during an outgoing
903 call with the option to redirect the call to a different number or
904 abort the call altogether.
905 <p>Protection level: dangerous
907 <permission android:name="android.permission.PROCESS_OUTGOING_CALLS"
908 android:permissionGroup="android.permission-group.PHONE"
909 android:label="@string/permlab_processOutgoingCalls"
910 android:description="@string/permdesc_processOutgoingCalls"
911 android:protectionLevel="dangerous" />
914 <!-- Allows the app to answer an incoming phone call.
915 <p>Protection level: dangerous
917 <permission android:name="android.permission.ANSWER_PHONE_CALLS"
918 android:permissionGroup="android.permission-group.PHONE"
919 android:label="@string/permlab_answerPhoneCalls"
920 android:description="@string/permdesc_answerPhoneCalls"
921 android:protectionLevel="dangerous|runtime" />
923 <!-- Allows a calling application which manages it own calls through the self-managed
924 {@link android.telecom.ConnectionService} APIs. See
925 {@link android.telecom.PhoneAccount#CAPABILITY_SELF_MANAGED for more information on the
926 self-managed ConnectionService APIs.
927 <p>Protection level: normal
929 <permission android:name="android.permission.MANAGE_OWN_CALLS"
930 android:label="@string/permlab_manageOwnCalls"
931 android:description="@string/permdesc_manageOwnCalls"
932 android:protectionLevel="normal" />
934 <!-- ====================================================================== -->
935 <!-- Permissions for accessing the device microphone -->
936 <!-- ====================================================================== -->
939 <!-- Used for permissions that are associated with accessing
940 microphone audio from the device. Note that phone calls also capture audio
941 but are in a separate (more visible) permission group. -->
942 <permission-group android:name="android.permission-group.MICROPHONE"
943 android:icon="@drawable/perm_group_microphone"
944 android:label="@string/permgrouplab_microphone"
945 android:description="@string/permgroupdesc_microphone"
946 android:priority="600" />
948 <!-- Allows an application to record audio.
949 <p>Protection level: dangerous
951 <permission android:name="android.permission.RECORD_AUDIO"
952 android:permissionGroup="android.permission-group.MICROPHONE"
953 android:label="@string/permlab_recordAudio"
954 android:description="@string/permdesc_recordAudio"
955 android:protectionLevel="dangerous"/>
957 <!-- ====================================================================== -->
958 <!-- Permissions for accessing the UCE Service -->
959 <!-- ====================================================================== -->
961 <!-- @hide Allows an application to Access UCE-Presence.
962 <p>Protection level: signature|privileged
964 <permission android:name="android.permission.ACCESS_UCE_PRESENCE_SERVICE"
965 android:permissionGroup="android.permission-group.PHONE"
966 android:protectionLevel="signature|privileged"/>
968 <!-- @hide Allows an application to Access UCE-OPTIONS.
969 <p>Protection level: signature|privileged
971 <permission android:name="android.permission.ACCESS_UCE_OPTIONS_SERVICE"
972 android:permissionGroup="android.permission-group.PHONE"
973 android:protectionLevel="signature|privileged"/>
977 <!-- ====================================================================== -->
978 <!-- Permissions for accessing the device camera -->
979 <!-- ====================================================================== -->
982 <!-- Used for permissions that are associated with accessing
983 camera or capturing images/video from the device. -->
984 <permission-group android:name="android.permission-group.CAMERA"
985 android:icon="@drawable/perm_group_camera"
986 android:label="@string/permgrouplab_camera"
987 android:description="@string/permgroupdesc_camera"
988 android:priority="700" />
990 <!-- Required to be able to access the camera device.
991 <p>This will automatically enforce the <a
992 href="{@docRoot}guide/topics/manifest/uses-feature-element.html">
993 <uses-feature>}</a> manifest element for <em>all</em> camera features.
994 If you do not require all camera features or can properly operate if a camera
995 is not available, then you must modify your manifest as appropriate in order to
996 install on devices that don't support all camera features.</p>
997 <p>Protection level: dangerous
999 <permission android:name="android.permission.CAMERA"
1000 android:permissionGroup="android.permission-group.CAMERA"
1001 android:label="@string/permlab_camera"
1002 android:description="@string/permdesc_camera"
1003 android:protectionLevel="dangerous|ephemeral" />
1006 <!-- ====================================================================== -->
1007 <!-- Permissions for accessing the device sensors -->
1008 <!-- ====================================================================== -->
1011 <!-- Used for permissions that are associated with accessing
1012 camera or capturing images/video from the device. -->
1013 <permission-group android:name="android.permission-group.SENSORS"
1014 android:icon="@drawable/perm_group_sensors"
1015 android:label="@string/permgrouplab_sensors"
1016 android:description="@string/permgroupdesc_sensors"
1017 android:priority="800" />
1019 <!-- Allows an application to access data from sensors that the user uses to
1020 measure what is happening inside his/her body, such as heart rate.
1021 <p>Protection level: dangerous -->
1022 <permission android:name="android.permission.BODY_SENSORS"
1023 android:permissionGroup="android.permission-group.SENSORS"
1024 android:label="@string/permlab_bodySensors"
1025 android:description="@string/permdesc_bodySensors"
1026 android:protectionLevel="dangerous" />
1028 <!-- Allows an app to use fingerprint hardware.
1029 <p>Protection level: normal
1031 <permission android:name="android.permission.USE_FINGERPRINT"
1032 android:permissionGroup="android.permission-group.SENSORS"
1033 android:label="@string/permlab_useFingerprint"
1034 android:description="@string/permdesc_useFingerprint"
1035 android:protectionLevel="normal" />
1037 <!-- ====================================================================== -->
1038 <!-- REMOVED PERMISSIONS -->
1039 <!-- ====================================================================== -->
1041 <!-- @hide We need to keep this around for backwards compatibility -->
1042 <permission android:name="android.permission.READ_PROFILE"
1043 android:protectionLevel="normal"
1044 android:permissionFlags="removed"/>
1046 <!-- @hide We need to keep this around for backwards compatibility -->
1047 <permission android:name="android.permission.WRITE_PROFILE"
1048 android:protectionLevel="normal"
1049 android:permissionFlags="removed"/>
1051 <!-- @hide We need to keep this around for backwards compatibility -->
1052 <permission android:name="android.permission.READ_SOCIAL_STREAM"
1053 android:protectionLevel="normal"
1054 android:permissionFlags="removed"/>
1056 <!-- @hide We need to keep this around for backwards compatibility -->
1057 <permission android:name="android.permission.WRITE_SOCIAL_STREAM"
1058 android:protectionLevel="normal"
1059 android:permissionFlags="removed"/>
1061 <!-- @hide We need to keep this around for backwards compatibility -->
1062 <permission android:name="android.permission.READ_USER_DICTIONARY"
1063 android:protectionLevel="normal"
1064 android:permissionFlags="removed"/>
1066 <!-- @hide We need to keep this around for backwards compatibility -->
1067 <permission android:name="android.permission.WRITE_USER_DICTIONARY"
1068 android:protectionLevel="normal"
1069 android:permissionFlags="removed"/>
1071 <!-- @hide We need to keep this around for backwards compatibility -->
1072 <permission android:name="android.permission.WRITE_SMS"
1073 android:protectionLevel="normal"
1074 android:permissionFlags="removed"/>
1076 <!-- @hide We need to keep this around for backwards compatibility -->
1077 <permission android:name="com.android.browser.permission.READ_HISTORY_BOOKMARKS"
1078 android:protectionLevel="normal"
1079 android:permissionFlags="removed"/>
1081 <!-- @hide We need to keep this around for backwards compatibility -->
1082 <permission android:name="com.android.browser.permission.WRITE_HISTORY_BOOKMARKS"
1083 android:protectionLevel="normal"
1084 android:permissionFlags="removed"/>
1086 <!-- @hide We need to keep this around for backwards compatibility -->
1087 <permission android:name="android.permission.AUTHENTICATE_ACCOUNTS"
1088 android:protectionLevel="normal"
1089 android:permissionFlags="removed"/>
1091 <!-- @hide We need to keep this around for backwards compatibility -->
1092 <permission android:name="android.permission.MANAGE_ACCOUNTS"
1093 android:protectionLevel="normal"
1094 android:permissionFlags="removed"/>
1096 <!-- @hide We need to keep this around for backwards compatibility -->
1097 <permission android:name="android.permission.USE_CREDENTIALS"
1098 android:protectionLevel="normal"
1099 android:permissionFlags="removed"/>
1101 <!-- @hide We need to keep this around for backwards compatibility -->
1102 <permission android:name="android.permission.SUBSCRIBED_FEEDS_READ"
1103 android:protectionLevel="normal"
1104 android:permissionFlags="removed"/>
1106 <!-- @hide We need to keep this around for backwards compatibility -->
1107 <permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE"
1108 android:protectionLevel="normal"
1109 android:permissionFlags="removed"/>
1111 <!-- @hide We need to keep this around for backwards compatibility -->
1112 <permission android:name="android.permission.FLASHLIGHT"
1113 android:protectionLevel="normal"
1114 android:permissionFlags="removed"/>
1116 <!-- ====================================================================== -->
1117 <!-- INSTALL PERMISSIONS -->
1118 <!-- ====================================================================== -->
1120 <!-- ================================== -->
1121 <!-- Permissions for accessing messages -->
1122 <!-- ================================== -->
1125 <!-- @SystemApi Allows an application (Phone) to send a request to other applications
1126 to handle the respond-via-message action during incoming calls.
1127 <p>Not for use by third-party applications. -->
1128 <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE"
1129 android:protectionLevel="signature|privileged" />
1131 <!-- @SystemApi Allows an application to send SMS to premium shortcodes without user permission.
1132 <p>Not for use by third-party applications.
1134 <permission android:name="android.permission.SEND_SMS_NO_CONFIRMATION"
1135 android:protectionLevel="signature|privileged" />
1137 <!-- Allows an application to filter carrier specific sms.
1139 <permission android:name="android.permission.CARRIER_FILTER_SMS"
1140 android:protectionLevel="signature|privileged" />
1142 <!-- @SystemApi Allows an application to receive emergency cell broadcast messages,
1143 to record or display them to the user.
1144 <p>Not for use by third-party applications.
1146 <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST"
1147 android:protectionLevel="signature|privileged" />
1149 <!-- Allows an application to monitor incoming Bluetooth MAP messages, to record
1150 or perform processing on them. -->
1152 <permission android:name="android.permission.RECEIVE_BLUETOOTH_MAP"
1153 android:protectionLevel="signature|privileged" />
1155 <!-- @SystemApi @hide Allows an application to execute contacts directory search.
1156 This should only be used by ContactsProvider.
1157 <p>Not for use by third-party applications. -->
1158 <permission android:name="android.permission.BIND_DIRECTORY_SEARCH"
1159 android:protectionLevel="signature|privileged" />
1161 <!-- @SystemApi @hide Allows an application to modify cell broadcasts through the content provider.
1162 <p>Not for use by third-party applications. -->
1163 <permission android:name="android.permission.MODIFY_CELL_BROADCASTS"
1164 android:protectionLevel="signature|privileged" />
1166 <!-- =============================================================== -->
1167 <!-- Permissions for setting the device alarm -->
1168 <!-- =============================================================== -->
1171 <!-- Allows an application to broadcast an Intent to set an alarm for the user.
1172 <p>Protection level: normal
1174 <permission android:name="com.android.alarm.permission.SET_ALARM"
1175 android:label="@string/permlab_setAlarm"
1176 android:description="@string/permdesc_setAlarm"
1177 android:protectionLevel="normal" />
1179 <!-- =============================================================== -->
1180 <!-- Permissions for accessing the user voicemail -->
1181 <!-- =============================================================== -->
1184 <!-- Allows an application to modify and remove existing voicemails in the system.
1185 <p>Protection level: signature|privileged
1187 <permission android:name="com.android.voicemail.permission.WRITE_VOICEMAIL"
1188 android:protectionLevel="signature|privileged" />
1190 <!-- Allows an application to read voicemails in the system.
1191 <p>Protection level: signature|privileged
1193 <permission android:name="com.android.voicemail.permission.READ_VOICEMAIL"
1194 android:protectionLevel="signature|privileged" />
1196 <!-- ======================================= -->
1197 <!-- Permissions for accessing location info -->
1198 <!-- ======================================= -->
1201 <!-- Allows an application to access extra location provider commands.
1202 <p>Protection level: normal
1204 <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS"
1205 android:label="@string/permlab_accessLocationExtraCommands"
1206 android:description="@string/permdesc_accessLocationExtraCommands"
1207 android:protectionLevel="normal" />
1209 <!-- @SystemApi Allows an application to install a location provider into the Location Manager.
1210 <p>Not for use by third-party applications. -->
1211 <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER"
1212 android:protectionLevel="signature|privileged" />
1214 <!-- @SystemApi @hide Allows HDMI-CEC service to access device and configuration files.
1215 This should only be used by HDMI-CEC service.
1217 <permission android:name="android.permission.HDMI_CEC"
1218 android:protectionLevel="signature|privileged" />
1220 <!-- @SystemApi Allows an application to use location features in hardware,
1221 such as the geofencing api.
1222 <p>Not for use by third-party applications. -->
1223 <permission android:name="android.permission.LOCATION_HARDWARE"
1224 android:protectionLevel="signature|privileged" />
1225 <uses-permission android:name="android.permission.LOCATION_HARDWARE"/>
1227 <!-- @SystemApi Allows an application to create mock location providers for testing.
1228 <p>Protection level: signature
1231 <permission android:name="android.permission.ACCESS_MOCK_LOCATION"
1232 android:protectionLevel="signature" />
1234 <!-- ======================================= -->
1235 <!-- Permissions for accessing networks -->
1236 <!-- ======================================= -->
1239 <!-- Allows applications to open network sockets.
1240 <p>Protection level: normal
1242 <permission android:name="android.permission.INTERNET"
1243 android:description="@string/permdesc_createNetworkSockets"
1244 android:label="@string/permlab_createNetworkSockets"
1245 android:protectionLevel="normal|ephemeral" />
1247 <!-- Allows applications to access information about networks.
1248 <p>Protection level: normal
1250 <permission android:name="android.permission.ACCESS_NETWORK_STATE"
1251 android:description="@string/permdesc_accessNetworkState"
1252 android:label="@string/permlab_accessNetworkState"
1253 android:protectionLevel="normal|ephemeral" />
1255 <!-- Allows applications to access information about Wi-Fi networks.
1256 <p>Protection level: normal
1258 <permission android:name="android.permission.ACCESS_WIFI_STATE"
1259 android:description="@string/permdesc_accessWifiState"
1260 android:label="@string/permlab_accessWifiState"
1261 android:protectionLevel="normal" />
1263 <!-- Allows applications to change Wi-Fi connectivity state.
1264 <p>Protection level: normal
1266 <permission android:name="android.permission.CHANGE_WIFI_STATE"
1267 android:description="@string/permdesc_changeWifiState"
1268 android:label="@string/permlab_changeWifiState"
1269 android:protectionLevel="normal" />
1271 <!-- @SystemApi @hide Allows applications to read Wi-Fi credential.
1272 <p>Not for use by third-party applications. -->
1273 <permission android:name="android.permission.READ_WIFI_CREDENTIAL"
1274 android:protectionLevel="signature|privileged" />
1276 <!-- @SystemApi @hide Allows applications to change tether state and run
1277 tether carrier provisioning.
1278 <p>Not for use by third-party applications. -->
1279 <permission android:name="android.permission.TETHER_PRIVILEGED"
1280 android:protectionLevel="signature|privileged" />
1282 <!-- @SystemApi @hide Allow system apps to receive broadcast
1283 when a wifi network credential is changed.
1284 <p>Not for use by third-party applications. -->
1285 <permission android:name="android.permission.RECEIVE_WIFI_CREDENTIAL_CHANGE"
1286 android:protectionLevel="signature|privileged" />
1288 <!-- @SystemApi @hide Allows an application to modify any wifi configuration, even if created
1289 by another application. Once reconfigured the original creator cannot make any further
1291 <p>Not for use by third-party applications. -->
1292 <permission android:name="android.permission.OVERRIDE_WIFI_CONFIG"
1293 android:protectionLevel="signature|privileged" />
1296 <permission android:name="android.permission.ACCESS_WIMAX_STATE"
1297 android:description="@string/permdesc_accessWimaxState"
1298 android:label="@string/permlab_accessWimaxState"
1299 android:protectionLevel="normal" />
1302 <permission android:name="android.permission.CHANGE_WIMAX_STATE"
1303 android:description="@string/permdesc_changeWimaxState"
1304 android:label="@string/permlab_changeWimaxState"
1305 android:protectionLevel="normal" />
1307 <!-- Allows applications to act as network scorers. @hide @SystemApi-->
1308 <permission android:name="android.permission.SCORE_NETWORKS"
1309 android:protectionLevel="signature|privileged" />
1311 <!-- Allows applications to request network
1312 recommendations and scores from the NetworkScoreService.
1313 <p>Not for use by third-party applications. @hide -->
1314 <permission android:name="android.permission.REQUEST_NETWORK_SCORES"
1315 android:protectionLevel="signature|setup" />
1317 <!-- Allows network stack services (Connectivity and Wifi) to coordinate
1318 <p>Not for use by third-party or privileged applications.
1319 @hide This should only be used by Connectivity and Wifi Services.
1321 <permission android:name="android.permission.NETWORK_STACK"
1322 android:protectionLevel="signature" />
1324 <!-- Allows Settings and SystemUI to call methods in Networking services
1325 <p>Not for use by third-party or privileged applications.
1326 @hide This should only be used by Settings and SystemUI.
1328 <permission android:name="android.permission.NETWORK_SETTINGS"
1329 android:protectionLevel="signature" />
1331 <!-- #SystemApi @hide Allows applications to access information about LoWPAN interfaces.
1332 <p>Not for use by third-party applications. -->
1333 <permission android:name="android.permission.ACCESS_LOWPAN_STATE"
1334 android:protectionLevel="signature|privileged" />
1336 <!-- #SystemApi @hide Allows applications to change LoWPAN connectivity state.
1337 <p>Not for use by third-party applications. -->
1338 <permission android:name="android.permission.CHANGE_LOWPAN_STATE"
1339 android:protectionLevel="signature|privileged" />
1341 <!-- #SystemApi @hide Allows applications to read LoWPAN credential.
1342 <p>Not for use by third-party applications. -->
1343 <permission android:name="android.permission.READ_LOWPAN_CREDENTIAL"
1344 android:protectionLevel="signature|privileged" />
1346 <!-- #SystemApi @hide Allows a service to register or unregister
1347 new LoWPAN interfaces.
1348 <p>Not for use by third-party applications. -->
1349 <permission android:name="android.permission.MANAGE_LOWPAN_INTERFACES"
1350 android:protectionLevel="signature|privileged" />
1352 <!-- ======================================= -->
1353 <!-- Permissions for short range, peripheral networks -->
1354 <!-- ======================================= -->
1357 <!-- Allows applications to connect to paired bluetooth devices.
1358 <p>Protection level: normal
1360 <permission android:name="android.permission.BLUETOOTH"
1361 android:description="@string/permdesc_bluetooth"
1362 android:label="@string/permlab_bluetooth"
1363 android:protectionLevel="normal" />
1365 <!-- Allows applications to discover and pair bluetooth devices.
1366 <p>Protection level: normal
1368 <permission android:name="android.permission.BLUETOOTH_ADMIN"
1369 android:description="@string/permdesc_bluetoothAdmin"
1370 android:label="@string/permlab_bluetoothAdmin"
1371 android:protectionLevel="normal" />
1373 <!-- @SystemApi Allows applications to pair bluetooth devices without user interaction, and to
1374 allow or disallow phonebook access or message access.
1375 This is not available to third party applications. -->
1376 <permission android:name="android.permission.BLUETOOTH_PRIVILEGED"
1377 android:protectionLevel="signature|privileged" />
1379 <!-- Control access to email providers exclusively for Bluetooth
1382 <permission android:name="android.permission.BLUETOOTH_MAP"
1383 android:protectionLevel="signature" />
1385 <!-- Allows bluetooth stack to access files
1386 @hide This should only be used by Bluetooth apk.
1388 <permission android:name="android.permission.BLUETOOTH_STACK"
1389 android:protectionLevel="signature" />
1391 <!-- Allows applications to perform I/O operations over NFC.
1392 <p>Protection level: normal
1394 <permission android:name="android.permission.NFC"
1395 android:description="@string/permdesc_nfc"
1396 android:label="@string/permlab_nfc"
1397 android:protectionLevel="normal" />
1399 <!-- @SystemApi Allows an internal user to use privileged ConnectivityManager APIs.
1401 <permission android:name="android.permission.CONNECTIVITY_INTERNAL"
1402 android:protectionLevel="signature|privileged" />
1404 <!-- @SystemApi Allows an internal user to use restricted Networks.
1406 <permission android:name="android.permission.CONNECTIVITY_USE_RESTRICTED_NETWORKS"
1407 android:protectionLevel="signature|privileged" />
1409 <!-- Allows a system application to access hardware packet offload capabilities.
1411 <permission android:name="android.permission.PACKET_KEEPALIVE_OFFLOAD"
1412 android:protectionLevel="signature|privileged" />
1416 <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE"
1417 android:protectionLevel="signature|privileged" />
1419 <!-- @SystemApi Allows access to the loop radio (Android@Home mesh network) device.
1421 <permission android:name="android.permission.LOOP_RADIO"
1422 android:protectionLevel="signature|privileged" />
1424 <!-- Allows sending and receiving handover transfer status from Wifi and Bluetooth
1426 <permission android:name="android.permission.NFC_HANDOVER_STATUS"
1427 android:protectionLevel="signature|privileged" />
1429 <!-- ================================== -->
1430 <!-- Permissions for accessing accounts -->
1431 <!-- ================================== -->
1434 <!-- Allows access to the list of accounts in the Accounts Service.
1436 <p class="note"><strong>Note:</strong> Beginning with Android 6.0 (API level
1437 23), if an app shares the signature of the authenticator that manages an
1438 account, it does not need <code>"GET_ACCOUNTS"</code> permission to read
1439 information about that account. On Android 5.1 and lower, all apps need
1440 <code>"GET_ACCOUNTS"</code> permission to read information about any
1443 <p>Protection level: dangerous
1445 <permission android:name="android.permission.GET_ACCOUNTS"
1446 android:permissionGroup="android.permission-group.CONTACTS"
1447 android:protectionLevel="dangerous"
1448 android:description="@string/permdesc_getAccounts"
1449 android:label="@string/permlab_getAccounts" />
1450 <uses-permission android:name="android.permission.GET_ACCOUNTS"/>
1452 <!-- @SystemApi Allows applications to call into AccountAuthenticators.
1453 <p>Not for use by third-party applications. -->
1454 <permission android:name="android.permission.ACCOUNT_MANAGER"
1455 android:protectionLevel="signature" />
1457 <!-- ================================== -->
1458 <!-- Permissions for accessing hardware that may effect battery life-->
1459 <!-- ================================== -->
1462 <!-- Allows applications to enter Wi-Fi Multicast mode.
1463 <p>Protection level: normal
1465 <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE"
1466 android:description="@string/permdesc_changeWifiMulticastState"
1467 android:label="@string/permlab_changeWifiMulticastState"
1468 android:protectionLevel="normal" />
1470 <!-- Allows access to the vibrator.
1471 <p>Protection level: normal
1473 <permission android:name="android.permission.VIBRATE"
1474 android:label="@string/permlab_vibrate"
1475 android:description="@string/permdesc_vibrate"
1476 android:protectionLevel="normal|ephemeral" />
1478 <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen
1480 <p>Protection level: normal
1482 <permission android:name="android.permission.WAKE_LOCK"
1483 android:label="@string/permlab_wakeLock"
1484 android:description="@string/permdesc_wakeLock"
1485 android:protectionLevel="normal|ephemeral" />
1487 <!-- Allows using the device's IR transmitter, if available.
1488 <p>Protection level: normal
1490 <permission android:name="android.permission.TRANSMIT_IR"
1491 android:label="@string/permlab_transmitIr"
1492 android:description="@string/permdesc_transmitIr"
1493 android:protectionLevel="normal" />
1495 <!-- ==================================================== -->
1496 <!-- Permissions related to changing audio settings -->
1497 <!-- ==================================================== -->
1500 <!-- Allows an application to modify global audio settings.
1501 <p>Protection level: normal
1503 <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS"
1504 android:label="@string/permlab_modifyAudioSettings"
1505 android:description="@string/permdesc_modifyAudioSettings"
1506 android:protectionLevel="normal" />
1508 <!-- ================================== -->
1509 <!-- Permissions for accessing hardware -->
1510 <!-- ================================== -->
1513 <!-- @SystemApi Allows an application to manage preferences and permissions for USB devices
1515 <permission android:name="android.permission.MANAGE_USB"
1516 android:protectionLevel="signature|privileged" />
1518 <!-- @SystemApi Allows an application to access the MTP USB kernel driver.
1519 For use only by the device side MTP implementation.
1521 <permission android:name="android.permission.ACCESS_MTP"
1522 android:protectionLevel="signature|privileged" />
1524 <!-- @SystemApi Allows access to hardware peripherals. Intended only for hardware testing.
1525 <p>Not for use by third-party applications.
1528 <permission android:name="android.permission.HARDWARE_TEST"
1529 android:protectionLevel="signature" />
1531 <!-- @SystemApi Allows access to Broadcast Radio
1532 @hide This is not a third-party API (intended for system apps).-->
1533 <permission android:name="android.permission.ACCESS_BROADCAST_RADIO"
1534 android:protectionLevel="signature|privileged" />
1536 <!-- @deprecated @SystemApi Allows access to FM
1537 @hide This is not a third-party API (intended for system apps).-->
1538 <permission android:name="android.permission.ACCESS_FM_RADIO"
1539 android:protectionLevel="signature|privileged" />
1541 <!-- Allows access to configure network interfaces, configure/use IPSec, etc.
1543 <permission android:name="android.permission.NET_ADMIN"
1544 android:protectionLevel="signature" />
1546 <!-- Allows registration for remote audio playback. @hide -->
1547 <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK"
1548 android:protectionLevel="signature" />
1550 <!-- @SystemApi Allows TvInputService to access underlying TV input hardware such as
1551 built-in tuners and HDMI-in's.
1552 @hide This should only be used by OEM's TvInputService's.
1554 <permission android:name="android.permission.TV_INPUT_HARDWARE"
1555 android:protectionLevel="signature|privileged" />
1557 <!-- @SystemApi Allows to capture a frame of TV input hardware such as
1558 built-in tuners and HDMI-in's.
1559 @hide <p>Not for use by third-party applications.
1561 <permission android:name="android.permission.CAPTURE_TV_INPUT"
1562 android:protectionLevel="signature|privileged" />
1564 <!-- @hide Allows TvInputService to access DVB device.
1565 <p>Not for use by third-party applications. -->
1566 <permission android:name="android.permission.DVB_DEVICE"
1567 android:protectionLevel="signature|privileged" />
1569 <!-- @SystemApi Allows reading and enabling/disabling the OEM unlock allowed by carrier state
1570 @hide <p>Not for use by third-party applications. -->
1571 <permission android:name="android.permission.MANAGE_CARRIER_OEM_UNLOCK_STATE"
1572 android:protectionLevel="signature|privileged" />
1574 <!-- @SystemApi Allows reading and enabling/disabling the OEM unlock allowed by user state
1575 @hide <p>Not for use by third-party applications. -->
1576 <permission android:name="android.permission.MANAGE_USER_OEM_UNLOCK_STATE"
1577 android:protectionLevel="signature|privileged" />
1579 <!-- @SystemApi Allows reading the OEM unlock state
1580 @hide <p>Not for use by third-party applications. -->
1581 <permission android:name="android.permission.READ_OEM_UNLOCK_STATE"
1582 android:protectionLevel="signature|privileged" />
1584 <!-- @hide Allows enabling/disabling OEM unlock
1585 <p>Not for use by third-party applications. -->
1586 <permission android:name="android.permission.OEM_UNLOCK_STATE"
1587 android:protectionLevel="signature" />
1589 <!-- @hide Allows querying state of PersistentDataBlock
1590 <p>Not for use by third-party applications. -->
1591 <permission android:name="android.permission.ACCESS_PDB_STATE"
1592 android:protectionLevel="signature" />
1594 <!-- @hide Allows system update service to notify device owner about pending updates.
1595 <p>Not for use by third-party applications. -->
1596 <permission android:name="android.permission.NOTIFY_PENDING_SYSTEM_UPDATE"
1597 android:protectionLevel="signature|privileged" />
1599 <!-- =========================================== -->
1600 <!-- Permissions associated with camera and image capture -->
1601 <!-- =========================================== -->
1604 <!-- @SystemApi Allows disabling the transmit-indicator LED that is normally on when
1605 a camera is in use by an application.
1607 <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED"
1608 android:protectionLevel="signature|privileged" />
1610 <!-- Allows sending the camera service notifications about system-wide events.
1612 <permission android:name="android.permission.CAMERA_SEND_SYSTEM_EVENTS"
1613 android:protectionLevel="signature|privileged" />
1615 <!-- =========================================== -->
1616 <!-- Permissions associated with telephony state -->
1617 <!-- =========================================== -->
1620 <!-- @SystemApi Allows modification of the telephony state - power on, mmi, etc.
1621 Does not include placing calls.
1622 <p>Not for use by third-party applications. -->
1623 <permission android:name="android.permission.MODIFY_PHONE_STATE"
1624 android:protectionLevel="signature|privileged" />
1626 <!-- Allows read only access to precise phone state.
1627 @hide Pending API council approval -->
1628 <permission android:name="android.permission.READ_PRECISE_PHONE_STATE"
1629 android:protectionLevel="signature|privileged" />
1631 <!-- @SystemApi Allows read access to privileged phone state.
1632 @hide Used internally. -->
1633 <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE"
1634 android:protectionLevel="signature|privileged" />
1636 <!-- @SystemApi Protects the ability to register any PhoneAccount with
1637 PhoneAccount#CAPABILITY_SIM_SUBSCRIPTION. This capability indicates that the PhoneAccount
1638 corresponds to a device SIM.
1640 <permission android:name="android.permission.REGISTER_SIM_SUBSCRIPTION"
1641 android:protectionLevel="signature|privileged" />
1643 <!-- @SystemApi Protects the ability to register any PhoneAccount with
1644 PhoneAccount#CAPABILITY_CALL_PROVIDER.
1646 <permission android:name="android.permission.REGISTER_CALL_PROVIDER"
1647 android:protectionLevel="signature|privileged" />
1649 <!-- @SystemApi Protects the ability to register any PhoneAccount with
1650 PhoneAccount#CAPABILITY_CONNECTION_MANAGER
1652 <permission android:name="android.permission.REGISTER_CONNECTION_MANAGER"
1653 android:protectionLevel="signature|privileged" />
1655 <!-- Must be required by a {@link android.telecom.InCallService},
1656 to ensure that only the system can bind to it.
1657 <p>Protection level: signature|privileged
1659 <permission android:name="android.permission.BIND_INCALL_SERVICE"
1660 android:protectionLevel="signature|privileged" />
1662 <!-- Must be required by a link {@link android.telephony.VisualVoicemailService} to ensure that
1663 only the system can bind to it.
1664 <p>Protection level: signature|privileged
1667 android:name="android.permission.BIND_VISUAL_VOICEMAIL_SERVICE"
1668 android:protectionLevel="signature|privileged"/>
1670 <!-- Must be required by a {@link android.telecom.CallScreeningService},
1671 to ensure that only the system can bind to it.
1672 <p>Protection level: signature|privileged
1674 <permission android:name="android.permission.BIND_SCREENING_SERVICE"
1675 android:protectionLevel="signature|privileged" />
1677 <!-- Must be required by a {@link android.telecom.ConnectionService},
1678 to ensure that only the system can bind to it.
1679 @deprecated {@link android.telecom.ConnectionService}s should require
1680 android.permission.BIND_TELECOM_CONNECTION_SERVICE instead.
1683 <permission android:name="android.permission.BIND_CONNECTION_SERVICE"
1684 android:protectionLevel="signature|privileged" />
1686 <!-- Must be required by a {@link android.telecom.ConnectionService},
1687 to ensure that only the system can bind to it.
1688 <p>Protection level: signature|privileged
1690 <permission android:name="android.permission.BIND_TELECOM_CONNECTION_SERVICE"
1691 android:protectionLevel="signature|privileged" />
1693 <!-- @SystemApi Allows an application to control the in-call experience.
1695 <permission android:name="android.permission.CONTROL_INCALL_EXPERIENCE"
1696 android:protectionLevel="signature|privileged" />
1698 <!-- Allows an application to receive STK related commands.
1700 <permission android:name="android.permission.RECEIVE_STK_COMMANDS"
1701 android:protectionLevel="signature|privileged" />
1703 <!-- Allows an application to send EMBMS download intents to apps-->
1704 <permission android:name="android.permission.SEND_EMBMS_INTENTS"
1705 android:protectionLevel="signature|privileged" />
1707 <!-- Must be required by an ImsService to ensure that only the
1708 system can bind to it.
1709 <p>Protection level: signature|privileged
1713 <permission android:name="android.permission.BIND_IMS_SERVICE"
1714 android:protectionLevel="signature|privileged" />
1716 <!-- Allows an application to manage embedded subscriptions (those on a eUICC) through
1718 <p>Protection level: signature|privileged|development
1719 TODO(b/35851809): Mark this as a SystemApi and remove com. prefix.
1721 <permission android:name="com.android.permission.WRITE_EMBEDDED_SUBSCRIPTIONS"
1722 android:protectionLevel="signature|privileged|development" />
1724 <!-- Must be required by an EuiccService to ensure that only the system can bind to it.
1725 <p>Protection level: signature
1726 TODO(b/35851809): Mark this as a SystemApi and remove com. prefix.
1728 <permission android:name="com.android.permission.BIND_EUICC_SERVICE"
1729 android:protectionLevel="signature" />
1731 <!-- ================================== -->
1732 <!-- Permissions for sdcard interaction -->
1733 <!-- ================================== -->
1736 <!-- @SystemApi Allows an application to write to internal media storage
1738 <permission android:name="android.permission.WRITE_MEDIA_STORAGE"
1739 android:protectionLevel="signature|privileged" />
1741 <!-- Allows an application to manage access to documents, usually as part
1742 of a document picker.
1743 <p>This permission should <em>only</em> be requested by the platform
1744 document management app. This permission cannot be granted to
1746 <p>Protection level: signature
1748 <permission android:name="android.permission.MANAGE_DOCUMENTS"
1749 android:protectionLevel="signature" />
1751 <!-- @hide Allows an application to cache content.
1752 <p>Not for use by third-party applications.
1753 <p>Protection level: signature
1755 <permission android:name="android.permission.CACHE_CONTENT"
1756 android:protectionLevel="signature" />
1758 <!-- @SystemApi @hide
1759 Allows an application to aggressively allocate disk space.
1760 <p>Not for use by third-party applications.
1762 <permission android:name="android.permission.ALLOCATE_AGGRESSIVE"
1763 android:protectionLevel="signature|privileged" />
1765 <!-- ================================== -->
1766 <!-- Permissions for screenlock -->
1767 <!-- ================================== -->
1770 <!-- Allows applications to disable the keyguard if it is not secure.
1771 <p>Protection level: normal
1773 <permission android:name="android.permission.DISABLE_KEYGUARD"
1774 android:description="@string/permdesc_disableKeyguard"
1775 android:label="@string/permlab_disableKeyguard"
1776 android:protectionLevel="normal" />
1778 <!-- ================================== -->
1779 <!-- Permissions to access other installed applications -->
1780 <!-- ================================== -->
1783 <!-- @deprecated No longer enforced. -->
1784 <permission android:name="android.permission.GET_TASKS"
1785 android:label="@string/permlab_getTasks"
1786 android:description="@string/permdesc_getTasks"
1787 android:protectionLevel="normal" />
1789 <!-- New version of GET_TASKS that apps can request, since GET_TASKS doesn't really
1790 give access to task information. We need this new one because there are
1791 many existing apps that use add libraries and such that have validation
1792 code to ensure the app has requested the GET_TASKS permission by seeing
1793 if it has been granted the permission... if it hasn't, it kills the app
1794 with a message about being upset. So we need to have it continue to look
1795 like the app is getting that permission, even though it will never be
1796 checked, and new privileged apps can now request this one for real access.
1799 <permission android:name="android.permission.REAL_GET_TASKS"
1800 android:protectionLevel="signature|privileged" />
1802 <!-- Allows an application to start a task from a ActivityManager#RecentTaskInfo.
1804 <permission android:name="android.permission.START_TASKS_FROM_RECENTS"
1805 android:protectionLevel="signature|privileged" />
1807 <!-- @SystemApi @hide Allows an application to call APIs that allow it to do interactions
1808 across the users on the device, using singleton services and
1809 user-targeted broadcasts. This permission is not available to
1810 third party applications. -->
1811 <permission android:name="android.permission.INTERACT_ACROSS_USERS"
1812 android:protectionLevel="signature|privileged|development" />
1814 <!-- @SystemApi Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS}
1815 that removes restrictions on where broadcasts can be sent and allows other
1816 types of interactions
1818 <permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL"
1819 android:protectionLevel="signature|installer" />
1821 <!-- @SystemApi @hide Allows an application to call APIs that allow it to query and manage
1822 users on the device. This permission is not available to
1823 third party applications. -->
1824 <permission android:name="android.permission.MANAGE_USERS"
1825 android:protectionLevel="signature|privileged" />
1827 <!-- @hide Allows an application to configure the assist gesture -->
1828 <permission android:name="android.permission.CONFIGURE_ASSIST_GESTURE"
1829 android:protectionLevel="signature" />
1831 <!-- @hide Allows an application to create, remove users and get the list of
1832 users on the device. Applications holding this permission can only create restricted,
1833 guest, managed, demo, and ephemeral users. For creating other kind of users,
1834 {@link android.Manifest.permission#MANAGE_USERS} is needed.
1835 This permission is not available to third party applications. -->
1836 <permission android:name="android.permission.CREATE_USERS"
1837 android:protectionLevel="signature" />
1839 <!-- @hide Allows an application to set the profile owners and the device owner.
1840 This permission is not available to third party applications.-->
1841 <permission android:name="android.permission.MANAGE_PROFILE_AND_DEVICE_OWNERS"
1842 android:protectionLevel="signature"
1843 android:label="@string/permlab_manageProfileAndDeviceOwners"
1844 android:description="@string/permdesc_manageProfileAndDeviceOwners" />
1846 <!-- Allows an application to get full detailed information about
1847 recently running tasks, with full fidelity to the real state.
1849 <permission android:name="android.permission.GET_DETAILED_TASKS"
1850 android:protectionLevel="signature" />
1852 <!-- Allows an application to change the Z-order of tasks.
1853 <p>Protection level: normal
1855 <permission android:name="android.permission.REORDER_TASKS"
1856 android:label="@string/permlab_reorderTasks"
1857 android:description="@string/permdesc_reorderTasks"
1858 android:protectionLevel="normal" />
1860 <!-- @hide Allows an application to change to remove/kill tasks -->
1861 <permission android:name="android.permission.REMOVE_TASKS"
1862 android:protectionLevel="signature" />
1864 <!-- @SystemApi @hide Allows an application to create/manage/remove stacks -->
1865 <permission android:name="android.permission.MANAGE_ACTIVITY_STACKS"
1866 android:protectionLevel="signature|privileged" />
1868 <!-- @SystemApi @hide Allows an application to embed other activities -->
1869 <permission android:name="android.permission.ACTIVITY_EMBEDDING"
1870 android:protectionLevel="signature|privileged" />
1872 <!-- Allows an application to start any activity, regardless of permission
1873 protection or exported state.
1875 <permission android:name="android.permission.START_ANY_ACTIVITY"
1876 android:protectionLevel="signature" />
1878 <!-- @deprecated The {@link android.app.ActivityManager#restartPackage}
1879 API is no longer supported. -->
1880 <permission android:name="android.permission.RESTART_PACKAGES"
1881 android:label="@string/permlab_killBackgroundProcesses"
1882 android:description="@string/permdesc_killBackgroundProcesses"
1883 android:protectionLevel="normal" />
1885 <!-- Allows an application to call
1886 {@link android.app.ActivityManager#killBackgroundProcesses}.
1887 <p>Protection level: normal
1889 <permission android:name="android.permission.KILL_BACKGROUND_PROCESSES"
1890 android:label="@string/permlab_killBackgroundProcesses"
1891 android:description="@string/permdesc_killBackgroundProcesses"
1892 android:protectionLevel="normal" />
1894 <!-- @SystemApi @hide Allows an application to query process states and current
1895 OOM adjustment scores.
1896 <p>Not for use by third-party applications. -->
1897 <permission android:name="android.permission.GET_PROCESS_STATE_AND_OOM_SCORE"
1898 android:protectionLevel="signature|privileged|development" />
1900 <!-- Allows use of PendingIntent.getIntent().
1902 <permission android:name="android.permission.GET_INTENT_SENDER_INTENT"
1903 android:protectionLevel="signature" />
1905 <!-- ================================== -->
1906 <!-- Permissions affecting the display of other applications -->
1907 <!-- ================================== -->
1910 <!-- Allows an app to create windows using the type
1911 {@link android.view.WindowManager.LayoutParams#TYPE_APPLICATION_OVERLAY},
1912 shown on top of all other apps. Very few apps
1913 should use this permission; these windows are intended for
1914 system-level interaction with the user.
1916 <p class="note"><strong>Note:</strong> If the app
1917 targets API level 23 or higher, the app user must explicitly grant
1918 this permission to the app through a permission management screen. The app requests
1919 the user's approval by sending an intent with action
1920 {@link android.provider.Settings#ACTION_MANAGE_OVERLAY_PERMISSION}.
1921 The app can check whether it has this authorization by calling
1922 {@link android.provider.Settings#canDrawOverlays
1923 Settings.canDrawOverlays()}.
1924 <p>Protection level: signature -->
1925 <permission android:name="android.permission.SYSTEM_ALERT_WINDOW"
1926 android:label="@string/permlab_systemAlertWindow"
1927 android:description="@string/permdesc_systemAlertWindow"
1928 android:protectionLevel="signature|preinstalled|appop|pre23|development" />
1930 <!-- @deprecated Use {@link android.Manifest.permission#REQUEST_COMPANION_RUN_IN_BACKGROUND}
1933 <permission android:name="android.permission.RUN_IN_BACKGROUND"
1934 android:label="@string/permlab_runInBackground"
1935 android:description="@string/permdesc_runInBackground"
1936 android:protectionLevel="signature" />
1938 <!-- @deprecated Use
1939 {@link android.Manifest.permission#REQUEST_COMPANION_USE_DATA_IN_BACKGROUND}
1942 <permission android:name="android.permission.USE_DATA_IN_BACKGROUND"
1943 android:label="@string/permlab_useDataInBackground"
1944 android:description="@string/permdesc_useDataInBackground"
1945 android:protectionLevel="signature" />
1947 <!-- @hide Allows an application to set display offsets for the screen.
1948 This permission is not available to third party applications. -->
1949 <permission android:name="android.permission.SET_DISPLAY_OFFSET"
1950 android:protectionLevel="signature|privileged" />
1952 <!-- Allows a companion app to run in the background.
1953 <p>Protection level: normal
1955 <permission android:name="android.permission.REQUEST_COMPANION_RUN_IN_BACKGROUND"
1956 android:label="@string/permlab_runInBackground"
1957 android:description="@string/permdesc_runInBackground"
1958 android:protectionLevel="normal" />
1960 <!-- Allows a companion app to use data in the background.
1961 <p>Protection level: normal
1963 <permission android:name="android.permission.REQUEST_COMPANION_USE_DATA_IN_BACKGROUND"
1964 android:label="@string/permlab_useDataInBackground"
1965 android:description="@string/permdesc_useDataInBackground"
1966 android:protectionLevel="normal" />
1969 <!-- ================================== -->
1970 <!-- Permissions affecting the system wallpaper -->
1971 <!-- ================================== -->
1974 <!-- Allows applications to set the wallpaper.
1975 <p>Protection level: normal
1977 <permission android:name="android.permission.SET_WALLPAPER"
1978 android:label="@string/permlab_setWallpaper"
1979 android:description="@string/permdesc_setWallpaper"
1980 android:protectionLevel="normal" />
1982 <!-- Allows applications to set the wallpaper hints.
1983 <p>Protection level: normal
1985 <permission android:name="android.permission.SET_WALLPAPER_HINTS"
1986 android:label="@string/permlab_setWallpaperHints"
1987 android:description="@string/permdesc_setWallpaperHints"
1988 android:protectionLevel="normal" />
1990 <!-- ============================================ -->
1991 <!-- Permissions for changing the system clock -->
1992 <!-- ============================================ -->
1995 <!-- @SystemApi Allows applications to set the system time.
1996 <p>Not for use by third-party applications. -->
1997 <permission android:name="android.permission.SET_TIME"
1998 android:protectionLevel="signature|privileged" />
2000 <!-- Allows applications to set the system time zone.
2001 <p>Not for use by third-party applications.
2003 <permission android:name="android.permission.SET_TIME_ZONE"
2004 android:label="@string/permlab_setTimeZone"
2005 android:description="@string/permdesc_setTimeZone"
2006 android:protectionLevel="signature|privileged" />
2008 <!-- ==================================================== -->
2009 <!-- Permissions related to changing status bar -->
2010 <!-- ==================================================== -->
2013 <!-- Allows an application to expand or collapse the status bar.
2014 <p>Protection level: normal
2016 <permission android:name="android.permission.EXPAND_STATUS_BAR"
2017 android:label="@string/permlab_expandStatusBar"
2018 android:description="@string/permdesc_expandStatusBar"
2019 android:protectionLevel="normal" />
2021 <!-- ============================================================== -->
2022 <!-- Permissions related to adding/removing shortcuts from Launcher -->
2023 <!-- ============================================================== -->
2026 <!-- Allows an application to install a shortcut in Launcher.
2027 <p>Protection level: normal
2029 <permission android:name="com.android.launcher.permission.INSTALL_SHORTCUT"
2030 android:label="@string/permlab_install_shortcut"
2031 android:description="@string/permdesc_install_shortcut"
2032 android:protectionLevel="normal"/>
2034 <!--This permission is no longer supported.
2036 <permission android:name="com.android.launcher.permission.UNINSTALL_SHORTCUT"
2037 android:label="@string/permlab_uninstall_shortcut"
2038 android:description="@string/permdesc_uninstall_shortcut"
2039 android:protectionLevel="normal"/>
2041 <!-- ==================================================== -->
2042 <!-- Permissions related to accessing sync settings -->
2043 <!-- ==================================================== -->
2046 <!-- Allows applications to read the sync settings.
2047 <p>Protection level: normal
2049 <permission android:name="android.permission.READ_SYNC_SETTINGS"
2050 android:description="@string/permdesc_readSyncSettings"
2051 android:label="@string/permlab_readSyncSettings"
2052 android:protectionLevel="normal" />
2054 <!-- Allows applications to write the sync settings.
2055 <p>Protection level: normal
2057 <permission android:name="android.permission.WRITE_SYNC_SETTINGS"
2058 android:description="@string/permdesc_writeSyncSettings"
2059 android:label="@string/permlab_writeSyncSettings"
2060 android:protectionLevel="normal" />
2062 <!-- Allows applications to read the sync stats.
2063 <p>Protection level: normal
2065 <permission android:name="android.permission.READ_SYNC_STATS"
2066 android:description="@string/permdesc_readSyncStats"
2067 android:label="@string/permlab_readSyncStats"
2068 android:protectionLevel="normal" />
2070 <!-- ============================================ -->
2071 <!-- Permissions for low-level system interaction -->
2072 <!-- ============================================ -->
2075 <!-- @SystemApi @hide Change the screen compatibility mode of applications -->
2076 <permission android:name="android.permission.SET_SCREEN_COMPATIBILITY"
2077 android:protectionLevel="signature" />
2079 <!-- @SystemApi Allows an application to modify the current configuration, such
2081 <permission android:name="android.permission.CHANGE_CONFIGURATION"
2082 android:protectionLevel="signature|privileged|development" />
2084 <!-- Allows an application to read or write the system settings.
2086 <p class="note"><strong>Note:</strong> If the app targets API level 23
2087 or higher, the app user
2088 must explicitly grant this permission to the app through a permission management screen.
2089 The app requests the user's approval by sending an intent with action
2090 {@link android.provider.Settings#ACTION_MANAGE_WRITE_SETTINGS}. The app
2091 can check whether it has this authorization by calling {@link
2092 android.provider.Settings.System#canWrite Settings.System.canWrite()}.
2094 <p>Protection level: signature
2096 <permission android:name="android.permission.WRITE_SETTINGS"
2097 android:label="@string/permlab_writeSettings"
2098 android:description="@string/permdesc_writeSettings"
2099 android:protectionLevel="signature|preinstalled|appop|pre23" />
2101 <!-- @SystemApi Allows an application to modify the Google service map.
2102 <p>Not for use by third-party applications. -->
2103 <permission android:name="android.permission.WRITE_GSERVICES"
2104 android:protectionLevel="signature|privileged" />
2106 <!-- @SystemApi Allows an application to call
2107 {@link android.app.ActivityManager#forceStopPackage}.
2109 <permission android:name="android.permission.FORCE_STOP_PACKAGES"
2110 android:protectionLevel="signature|privileged" />
2112 <!-- @SystemApi @hide Allows an application to retrieve the content of the active window
2113 An active window is the window that has fired an accessibility event. -->
2114 <permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT"
2115 android:protectionLevel="signature|privileged" />
2117 <!-- @SystemApi Modify the global animation scaling factor.
2118 <p>Not for use by third-party applications. -->
2119 <permission android:name="android.permission.SET_ANIMATION_SCALE"
2120 android:protectionLevel="signature|privileged|development" />
2122 <!-- @deprecated This functionality will be removed in the future; please do
2123 not use. Allow an application to make its activities persistent. -->
2124 <permission android:name="android.permission.PERSISTENT_ACTIVITY"
2125 android:label="@string/permlab_persistentActivity"
2126 android:description="@string/permdesc_persistentActivity"
2127 android:protectionLevel="normal" />
2129 <!-- Allows an application to find out the space used by any package.
2130 <p>Protection level: normal
2132 <permission android:name="android.permission.GET_PACKAGE_SIZE"
2133 android:label="@string/permlab_getPackageSize"
2134 android:description="@string/permdesc_getPackageSize"
2135 android:protectionLevel="normal" />
2137 <!-- @deprecated No longer useful, see
2138 {@link android.content.pm.PackageManager#addPackageToPreferred}
2140 <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS"
2141 android:protectionLevel="signature|verifier" />
2143 <!-- Allows an application to receive the
2144 {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is
2145 broadcast after the system finishes booting. If you don't
2146 request this permission, you will not receive the broadcast at
2147 that time. Though holding this permission does not have any
2148 security implications, it can have a negative impact on the
2149 user experience by increasing the amount of time it takes the
2150 system to start and allowing applications to have themselves
2151 running without the user being aware of them. As such, you must
2152 explicitly declare your use of this facility to make that visible
2154 <p>Protection level: normal
2156 <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED"
2157 android:label="@string/permlab_receiveBootCompleted"
2158 android:description="@string/permdesc_receiveBootCompleted"
2159 android:protectionLevel="normal" />
2161 <!-- Allows an application to broadcast sticky intents. These are
2162 broadcasts whose data is held by the system after being finished,
2163 so that clients can quickly retrieve that data without having
2164 to wait for the next broadcast.
2165 <p>Protection level: normal
2167 <permission android:name="android.permission.BROADCAST_STICKY"
2168 android:label="@string/permlab_broadcastSticky"
2169 android:description="@string/permdesc_broadcastSticky"
2170 android:protectionLevel="normal" />
2172 <!-- @SystemApi Allows mounting and unmounting file systems for removable storage.
2173 <p>Not for use by third-party applications.-->
2174 <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS"
2175 android:protectionLevel="signature|privileged" />
2177 <!-- @SystemApi Allows formatting file systems for removable storage.
2178 <p>Not for use by third-party applications. -->
2179 <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS"
2180 android:protectionLevel="signature|privileged" />
2183 <permission android:name="android.permission.STORAGE_INTERNAL"
2184 android:protectionLevel="signature" />
2186 <!-- Allows access to ASEC non-destructive API calls
2188 <permission android:name="android.permission.ASEC_ACCESS"
2189 android:protectionLevel="signature" />
2191 <!-- Allows creation of ASEC volumes
2193 <permission android:name="android.permission.ASEC_CREATE"
2194 android:protectionLevel="signature" />
2196 <!-- Allows destruction of ASEC volumes
2198 <permission android:name="android.permission.ASEC_DESTROY"
2199 android:protectionLevel="signature" />
2201 <!-- Allows mount / unmount of ASEC volumes
2203 <permission android:name="android.permission.ASEC_MOUNT_UNMOUNT"
2204 android:protectionLevel="signature" />
2206 <!-- Allows rename of ASEC volumes
2208 <permission android:name="android.permission.ASEC_RENAME"
2209 android:protectionLevel="signature" />
2211 <!-- @SystemApi Allows applications to write the apn settings.
2212 <p>Not for use by third-party applications. -->
2213 <permission android:name="android.permission.WRITE_APN_SETTINGS"
2214 android:protectionLevel="signature|privileged" />
2216 <!-- Allows applications to change network connectivity state.
2217 <p>Protection level: normal
2219 <permission android:name="android.permission.CHANGE_NETWORK_STATE"
2220 android:description="@string/permdesc_changeNetworkState"
2221 android:label="@string/permlab_changeNetworkState"
2222 android:protectionLevel="normal" />
2224 <!-- Allows an application to clear the caches of all installed
2225 applications on the device.
2226 <p>Protection level: signature|privileged
2228 <permission android:name="android.permission.CLEAR_APP_CACHE"
2229 android:protectionLevel="signature|privileged" />
2231 <!-- @SystemApi Allows an application to use any media decoder when decoding for playback
2233 <permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK"
2234 android:protectionLevel="signature|privileged" />
2236 <!-- @SystemApi Allows an application to install and/or uninstall CA certificates on
2239 <permission android:name="android.permission.MANAGE_CA_CERTIFICATES"
2240 android:protectionLevel="signature|privileged" />
2242 <!-- @SystemApi Allows an application to do certain operations needed for
2243 interacting with the recovery (system update) system.
2245 <permission android:name="android.permission.RECOVERY"
2246 android:protectionLevel="signature|privileged" />
2248 <!-- Allows the system to bind to an application's task services
2250 <permission android:name="android.permission.BIND_JOB_SERVICE"
2251 android:protectionLevel="signature" />
2252 <uses-permission android:name="android.permission.BIND_JOB_SERVICE"/>
2254 <!-- Allows an application to initiate configuration updates
2255 <p>An application requesting this permission is responsible for
2256 verifying the source and integrity of any update before passing
2257 it off to the various individual installer components
2259 <permission android:name="android.permission.UPDATE_CONFIG"
2260 android:protectionLevel="signature|privileged" />
2262 <!-- Allows a time zone rule updater application to request
2263 the system installs / uninstalls timezone rules.
2264 <p>An application requesting this permission is responsible for
2265 verifying the source and integrity of the update before passing
2266 it off to the installer components.
2268 <permission android:name="android.permission.UPDATE_TIME_ZONE_RULES"
2269 android:protectionLevel="signature|privileged" />
2271 <!-- Must be required by a time zone rule updater application,
2272 to ensure that only the system can trigger it.
2274 <permission android:name="android.permission.TRIGGER_TIME_ZONE_RULES_CHECK"
2275 android:protectionLevel="signature" />
2276 <uses-permission android:name="android.permission.TRIGGER_TIME_ZONE_RULES_CHECK"/>
2278 <!-- Allows the system to reset throttling in shortcut manager.
2280 <permission android:name="android.permission.RESET_SHORTCUT_MANAGER_THROTTLING"
2281 android:protectionLevel="signature" />
2283 <!-- Allows the system to bind to the discovered Network Recommendation Service.
2284 @SystemApi @hide -->
2285 <permission android:name="android.permission.BIND_NETWORK_RECOMMENDATION_SERVICE"
2286 android:protectionLevel="signature" />
2287 <uses-permission android:name="android.permission.BIND_NETWORK_RECOMMENDATION_SERVICE"/>
2289 <!-- Allows an application to enable, disable and change priority of
2290 runtime resource overlays.
2292 <permission android:name="android.permission.CHANGE_OVERLAY_PACKAGES"
2293 android:protectionLevel="signature|privileged" />
2295 <!-- ========================================= -->
2296 <!-- Permissions for special development tools -->
2297 <!-- ========================================= -->
2300 <!-- @SystemApi Allows an application to read or write the secure system settings.
2301 <p>Not for use by third-party applications. -->
2302 <permission android:name="android.permission.WRITE_SECURE_SETTINGS"
2303 android:protectionLevel="signature|privileged|development" />
2305 <!-- @SystemApi Allows an application to retrieve state dump information from system services.
2306 <p>Not for use by third-party applications. -->
2307 <permission android:name="android.permission.DUMP"
2308 android:protectionLevel="signature|privileged|development" />
2310 <!-- @SystemApi Allows an application to read the low-level system log files.
2311 <p>Not for use by third-party applications, because
2312 Log entries can contain the user's private information. -->
2313 <permission android:name="android.permission.READ_LOGS"
2314 android:protectionLevel="signature|privileged|development" />
2316 <!-- @SystemApi Configure an application for debugging.
2317 <p>Not for use by third-party applications. -->
2318 <permission android:name="android.permission.SET_DEBUG_APP"
2319 android:protectionLevel="signature|privileged|development" />
2321 <!-- @SystemApi Allows an application to set the maximum number of (not needed)
2322 application processes that can be running.
2323 <p>Not for use by third-party applications. -->
2324 <permission android:name="android.permission.SET_PROCESS_LIMIT"
2325 android:protectionLevel="signature|privileged|development" />
2327 <!-- @SystemApi Allows an application to control whether activities are immediately
2328 finished when put in the background.
2329 <p>Not for use by third-party applications. -->
2330 <permission android:name="android.permission.SET_ALWAYS_FINISH"
2331 android:protectionLevel="signature|privileged|development" />
2333 <!-- @SystemApi Allow an application to request that a signal be sent to all persistent processes.
2334 <p>Not for use by third-party applications. -->
2335 <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES"
2336 android:protectionLevel="signature|privileged|development" />
2338 <!-- ==================================== -->
2339 <!-- Private permissions -->
2340 <!-- ==================================== -->
2343 <!-- @SystemApi Allows access to the list of accounts in the Accounts Service. -->
2344 <permission android:name="android.permission.GET_ACCOUNTS_PRIVILEGED"
2345 android:protectionLevel="signature|privileged" />
2347 <!-- Allows but does not guarantee access to user passwords at the conclusion of add account
2349 <permission android:name="android.permission.GET_PASSWORD"
2350 android:protectionLevel="signature" />
2352 <!-- @SystemApi Allows applications to RW to diagnostic resources.
2353 <p>Not for use by third-party applications. -->
2354 <permission android:name="android.permission.DIAGNOSTIC"
2355 android:protectionLevel="signature" />
2357 <!-- @SystemApi Allows an application to open, close, or disable the status bar
2359 <p>Not for use by third-party applications. -->
2360 <permission android:name="android.permission.STATUS_BAR"
2361 android:protectionLevel="signature|privileged" />
2363 <!-- Allows an application to be the status bar. Currently used only by SystemUI.apk
2365 <permission android:name="android.permission.STATUS_BAR_SERVICE"
2366 android:protectionLevel="signature" />
2368 <!-- Allows an application to bind to third party quick settings tiles.
2369 <p>Should only be requested by the System, should be required by
2370 TileService declarations.-->
2371 <permission android:name="android.permission.BIND_QUICK_SETTINGS_TILE"
2372 android:protectionLevel="signature" />
2374 <!-- @SystemApi Allows an application to force a BACK operation on whatever is the
2376 <p>Not for use by third-party applications.
2379 <permission android:name="android.permission.FORCE_BACK"
2380 android:protectionLevel="signature" />
2382 <!-- @SystemApi Allows an application to update device statistics.
2383 <p>Not for use by third-party applications. -->
2384 <permission android:name="android.permission.UPDATE_DEVICE_STATS"
2385 android:protectionLevel="signature|privileged" />
2387 <!-- @SystemApi @hide Allows an application to collect battery statistics -->
2388 <permission android:name="android.permission.GET_APP_OPS_STATS"
2389 android:protectionLevel="signature|privileged|development" />
2391 <!-- @SystemApi Allows an application to update application operation statistics. Not for
2392 use by third party apps.
2394 <permission android:name="android.permission.UPDATE_APP_OPS_STATS"
2395 android:protectionLevel="signature|privileged|installer" />
2397 <!-- @SystemApi Allows an application to update the user app op restrictions.
2398 Not for use by third party apps.
2400 <permission android:name="android.permission.MANAGE_APP_OPS_RESTRICTIONS"
2401 android:protectionLevel="signature|installer" />
2403 <!-- @SystemApi Allows an application to open windows that are for use by parts
2404 of the system user interface.
2405 <p>Not for use by third-party applications.
2408 <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW"
2409 android:protectionLevel="signature" />
2411 <!-- @SystemApi Allows an application to use
2412 {@link android.view.WindowManager.LayoutsParams#PRIVATE_FLAG_HIDE_NON_SYSTEM_OVERLAY_WINDOWS}
2413 to hide non-system-overlay windows.
2414 <p>Not for use by third-party applications.
2417 <permission android:name="android.permission.HIDE_NON_SYSTEM_OVERLAY_WINDOWS"
2418 android:protectionLevel="signature|installer" />
2420 <!-- @SystemApi Allows an application to manage (create, destroy,
2421 Z-order) application tokens in the window manager.
2422 <p>Not for use by third-party applications.
2425 <permission android:name="android.permission.MANAGE_APP_TOKENS"
2426 android:protectionLevel="signature" />
2428 <!-- Allows System UI to register listeners for events from Window Manager.
2430 <permission android:name="android.permission.REGISTER_WINDOW_MANAGER_LISTENERS"
2431 android:protectionLevel="signature" />
2433 <!-- @hide Allows the application to temporarily freeze the screen for a
2434 full-screen transition. -->
2435 <permission android:name="android.permission.FREEZE_SCREEN"
2436 android:protectionLevel="signature" />
2438 <!-- @SystemApi Allows an application to inject user events (keys, touch, trackball)
2439 into the event stream and deliver them to ANY window. Without this
2440 permission, you can only deliver events to windows in your own process.
2441 <p>Not for use by third-party applications.
2444 <permission android:name="android.permission.INJECT_EVENTS"
2445 android:protectionLevel="signature" />
2447 <!-- @hide Allows an application to register an input filter which filters the stream
2448 of user events (keys, touch, trackball) before they are dispatched to any window. -->
2449 <permission android:name="android.permission.FILTER_EVENTS"
2450 android:protectionLevel="signature" />
2452 <!-- @hide Allows an application to retrieve the window token from the accessibility manager. -->
2453 <permission android:name="android.permission.RETRIEVE_WINDOW_TOKEN"
2454 android:protectionLevel="signature" />
2456 <!-- @hide Allows an application to modify accessibility information from another app. -->
2457 <permission android:name="android.permission.MODIFY_ACCESSIBILITY_DATA"
2458 android:protectionLevel="signature" />
2460 <!-- @hide Allows an application to change the accessibility volume. -->
2461 <permission android:name="android.permission.CHANGE_ACCESSIBILITY_VOLUME"
2462 android:protectionLevel="signature" />
2464 <!-- @hide Allows an application to collect frame statistics -->
2465 <permission android:name="android.permission.FRAME_STATS"
2466 android:protectionLevel="signature" />
2468 <!-- @hide Allows an application to temporary enable accessibility on the device. -->
2469 <permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY"
2470 android:protectionLevel="signature" />
2472 <!-- @SystemApi Allows an application to watch and control how activities are
2473 started globally in the system. Only for is in debugging
2474 (usually the monkey command).
2475 <p>Not for use by third-party applications.
2478 <permission android:name="android.permission.SET_ACTIVITY_WATCHER"
2479 android:protectionLevel="signature" />
2481 <!-- @SystemApi Allows an application to call the activity manager shutdown() API
2482 to put the higher-level system there into a shutdown state.
2484 <permission android:name="android.permission.SHUTDOWN"
2485 android:protectionLevel="signature|privileged" />
2487 <!-- @SystemApi Allows an application to tell the activity manager to temporarily
2488 stop application switches, putting it into a special mode that
2489 prevents applications from immediately switching away from some
2490 critical UI such as the home screen.
2492 <permission android:name="android.permission.STOP_APP_SWITCHES"
2493 android:protectionLevel="signature|privileged" />
2495 <!-- @SystemApi Allows an application to retrieve private information about
2496 the current top activity, such as any assist context it can provide.
2497 <p>Not for use by third-party applications.
2500 <permission android:name="android.permission.GET_TOP_ACTIVITY_INFO"
2501 android:protectionLevel="signature" />
2503 <!-- Allows an application to retrieve the current state of keys and
2505 <p>Not for use by third-party applications.
2506 @deprecated The API that used this permission has been removed. -->
2507 <permission android:name="android.permission.READ_INPUT_STATE"
2508 android:protectionLevel="signature" />
2510 <!-- Must be required by an {@link android.inputmethodservice.InputMethodService},
2511 to ensure that only the system can bind to it.
2512 <p>Protection level: signature
2514 <permission android:name="android.permission.BIND_INPUT_METHOD"
2515 android:protectionLevel="signature" />
2517 <!-- Must be required by an {@link android.media.midi.MidiDeviceService},
2518 to ensure that only the system can bind to it.
2519 <p>Protection level: signature
2521 <permission android:name="android.permission.BIND_MIDI_DEVICE_SERVICE"
2522 android:protectionLevel="signature" />
2524 <!-- Must be required by an {@link android.accessibilityservice.AccessibilityService},
2525 to ensure that only the system can bind to it.
2526 <p>Protection level: signature
2528 <permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE"
2529 android:protectionLevel="signature" />
2531 <!-- Must be required by a {@link android.printservice.PrintService},
2532 to ensure that only the system can bind to it.
2533 <p>Protection level: signature
2535 <permission android:name="android.permission.BIND_PRINT_SERVICE"
2536 android:protectionLevel="signature" />
2538 <!-- Must be required by a {@link android.printservice.recommendation.RecommendationService},
2539 to ensure that only the system can bind to it.
2542 <p>Protection level: signature
2544 <permission android:name="android.permission.BIND_PRINT_RECOMMENDATION_SERVICE"
2545 android:protectionLevel="signature" />
2547 <!-- Allows applications to get the installed and enabled print services.
2550 <p>Protection level: signature|preinstalled
2552 <permission android:name="android.permission.READ_PRINT_SERVICES"
2553 android:protectionLevel="signature|preinstalled" />
2555 <!-- Allows applications to get the currently recommended print services for printers.
2558 <p>Protection level: signature|preinstalled
2560 <permission android:name="android.permission.READ_PRINT_SERVICE_RECOMMENDATIONS"
2561 android:protectionLevel="signature|preinstalled" />
2563 <!-- Must be required by a {@link android.nfc.cardemulation.HostApduService}
2564 or {@link android.nfc.cardemulation.OffHostApduService} to ensure that only
2565 the system can bind to it.
2566 <p>Protection level: signature
2568 <permission android:name="android.permission.BIND_NFC_SERVICE"
2569 android:protectionLevel="signature" />
2571 <!-- Must be required by the PrintSpooler to ensure that only the system can bind to it.
2573 <permission android:name="android.permission.BIND_PRINT_SPOOLER_SERVICE"
2574 android:protectionLevel="signature" />
2576 <!-- Must be required by the CompanionDeviceManager to ensure that only the system can bind to it.
2578 <permission android:name="android.permission.BIND_COMPANION_DEVICE_MANAGER_SERVICE"
2579 android:protectionLevel="signature" />
2581 <!-- @SystemApi Must be required by the RuntimePermissionPresenterService to ensure
2582 that only the system can bind to it.
2584 <permission android:name="android.permission.BIND_RUNTIME_PERMISSION_PRESENTER_SERVICE"
2585 android:protectionLevel="signature" />
2587 <!-- Must be required by a TextService (e.g. SpellCheckerService)
2588 to ensure that only the system can bind to it.
2589 <p>Protection level: signature
2591 <permission android:name="android.permission.BIND_TEXT_SERVICE"
2592 android:protectionLevel="signature" />
2594 <!-- Must be required by a {@link android.net.VpnService},
2595 to ensure that only the system can bind to it.
2596 <p>Protection level: signature
2598 <permission android:name="android.permission.BIND_VPN_SERVICE"
2599 android:protectionLevel="signature" />
2601 <!-- Must be required by a {@link android.service.wallpaper.WallpaperService},
2602 to ensure that only the system can bind to it.
2603 <p>Protection level: signature|privileged
2605 <permission android:name="android.permission.BIND_WALLPAPER"
2606 android:protectionLevel="signature|privileged" />
2608 <!-- Must be required by a {@link android.service.voice.VoiceInteractionService},
2609 to ensure that only the system can bind to it.
2610 <p>Protection level: signature
2612 <permission android:name="android.permission.BIND_VOICE_INTERACTION"
2613 android:protectionLevel="signature" />
2615 <!-- Must be required by a {@link android.service.autofill.AutofillService},
2616 to ensure that only the system can bind to it.
2617 <p>Protection level: signature
2619 <permission android:name="android.permission.BIND_AUTOFILL_SERVICE"
2620 android:protectionLevel="signature" />
2622 <!-- @hide TODO(b/37563972): remove once clients use BIND_AUTOFILL_SERVICE -->
2623 <permission android:name="android.permission.BIND_AUTOFILL"
2624 android:protectionLevel="signature" />
2626 <!-- Must be required by hotword enrollment application,
2627 to ensure that only the system can interact with it.
2628 @hide <p>Not for use by third-party applications.</p> -->
2629 <permission android:name="android.permission.MANAGE_VOICE_KEYPHRASES"
2630 android:protectionLevel="signature|privileged" />
2632 <!-- Must be required by a {@link com.android.media.remotedisplay.RemoteDisplayProvider},
2633 to ensure that only the system can bind to it.
2635 <permission android:name="android.permission.BIND_REMOTE_DISPLAY"
2636 android:protectionLevel="signature" />
2638 <!-- Must be required by a {@link android.media.tv.TvInputService}
2639 to ensure that only the system can bind to it.
2640 <p>Protection level: signature|privileged
2642 <permission android:name="android.permission.BIND_TV_INPUT"
2643 android:protectionLevel="signature|privileged" />
2646 Must be required by a {@link com.android.media.tv.remoteprovider.TvRemoteProvider}
2647 to ensure that only the system can bind to it.
2648 <p>Protection level: signature|privileged
2649 <p>Not for use by third-party applications. </p>
2651 <permission android:name="android.permission.BIND_TV_REMOTE_SERVICE"
2652 android:protectionLevel="signature|privileged" />
2655 Must be required for a virtual remote controller for TV.
2656 <p>Protection level: signature|privileged
2657 <p>Not for use by third-party applications. </p>
2659 <permission android:name="android.permission.TV_VIRTUAL_REMOTE_CONTROLLER"
2660 android:protectionLevel="signature|privileged" />
2662 <!-- Allows an application to change HDMI CEC active source.
2663 <p>Not for use by third-party applications.
2665 <permission android:name="android.permission.CHANGE_HDMI_CEC_ACTIVE_SOURCE"
2666 android:protectionLevel="signature|privileged" />
2668 <!-- @SystemApi Allows an application to modify parental controls
2669 <p>Not for use by third-party applications.
2671 <permission android:name="android.permission.MODIFY_PARENTAL_CONTROLS"
2672 android:protectionLevel="signature|privileged" />
2674 <!-- @SystemApi Allows an application to read TvContentRatingSystemInfo
2675 <p>Not for use by third-party applications.
2677 <permission android:name="android.permission.READ_CONTENT_RATING_SYSTEMS"
2678 android:protectionLevel="signature|privileged" />
2680 <!-- @SystemApi Allows an application to notify TV inputs by sending broadcasts.
2681 <p>Protection level: signature|privileged
2682 <p>Not for use by third-party applications.
2684 <permission android:name="android.permission.NOTIFY_TV_INPUTS"
2685 android:protectionLevel="signature|privileged" />
2687 <!-- Must be required by a {@link android.media.routing.MediaRouteService}
2688 to ensure that only the system can interact with it.
2690 <permission android:name="android.permission.BIND_ROUTE_PROVIDER"
2691 android:protectionLevel="signature" />
2693 <!-- Must be required by device administration receiver, to ensure that only the
2694 system can interact with it.
2695 <p>Protection level: signature
2697 <permission android:name="android.permission.BIND_DEVICE_ADMIN"
2698 android:protectionLevel="signature" />
2700 <!-- @SystemApi Required to add or remove another application as a device admin.
2701 <p>Not for use by third-party applications.
2703 <permission android:name="android.permission.MANAGE_DEVICE_ADMINS"
2704 android:protectionLevel="signature|privileged" />
2706 <!-- @SystemApi Allows low-level access to setting the orientation (actually
2707 rotation) of the screen.
2708 <p>Not for use by third-party applications.
2711 <permission android:name="android.permission.SET_ORIENTATION"
2712 android:protectionLevel="signature" />
2714 <!-- @SystemApi Allows low-level access to setting the pointer speed.
2715 <p>Not for use by third-party applications.
2718 <permission android:name="android.permission.SET_POINTER_SPEED"
2719 android:protectionLevel="signature" />
2721 <!-- Allows low-level access to setting input device calibration.
2722 <p>Not for use by normal applications.
2724 <permission android:name="android.permission.SET_INPUT_CALIBRATION"
2725 android:protectionLevel="signature" />
2727 <!-- Allows low-level access to setting the keyboard layout.
2728 <p>Not for use by third-party applications.
2730 <permission android:name="android.permission.SET_KEYBOARD_LAYOUT"
2731 android:protectionLevel="signature" />
2733 <!-- Allows an application to query tablet mode state and monitor changes
2735 <p>Not for use by third-party applications.
2737 <permission android:name="android.permission.TABLET_MODE"
2738 android:protectionLevel="signature" />
2740 <!-- Allows an application to request installing packages. Apps
2741 targeting APIs greater than 25 must hold this permission in
2742 order to use {@link android.content.Intent#ACTION_INSTALL_PACKAGE}.
2743 <p>Protection level: signature
2745 <permission android:name="android.permission.REQUEST_INSTALL_PACKAGES"
2746 android:label="@string/permlab_requestInstallPackages"
2747 android:description="@string/permdesc_requestInstallPackages"
2748 android:protectionLevel="signature|appop" />
2750 <!-- Allows an application to request deleting packages. Apps
2751 targeting APIs greater than 25 must hold this permission in
2752 order to use {@link android.content.Intent#ACTION_UNINSTALL_PACKAGE}.
2753 <p>Protection level: normal
2755 <permission android:name="android.permission.REQUEST_DELETE_PACKAGES"
2756 android:label="@string/permlab_requestDeletePackages"
2757 android:description="@string/permdesc_requestDeletePackages"
2758 android:protectionLevel="normal" />
2760 <!-- @SystemApi Allows an application to install packages.
2761 <p>Not for use by third-party applications. -->
2762 <permission android:name="android.permission.INSTALL_PACKAGES"
2763 android:protectionLevel="signature|privileged" />
2765 <!-- @SystemApi Allows an application to clear user data.
2766 <p>Not for use by third-party applications
2769 <permission android:name="android.permission.CLEAR_APP_USER_DATA"
2770 android:protectionLevel="signature|installer" />
2772 <!-- @hide Allows an application to get the URI permissions
2773 granted to another application.
2774 <p>Not for use by third-party applications
2776 <permission android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS"
2777 android:protectionLevel="signature" />
2779 <!-- @hide Allows an application to clear the URI permissions
2780 granted to another application.
2781 <p>Not for use by third-party applications
2784 android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS"
2785 android:protectionLevel="signature" />
2787 <!-- @SystemApi Allows an application to delete cache files.
2788 <p>Not for use by third-party applications. -->
2789 <permission android:name="android.permission.DELETE_CACHE_FILES"
2790 android:protectionLevel="signature|privileged" />
2792 <!-- @SystemApi Allows an application to delete packages.
2793 <p>Not for use by third-party applications.
2794 <p>Starting in {@link android.os.Build.VERSION_CODES#N}, user confirmation is requested
2795 when the application deleting the package is not the same application that installed the
2797 <permission android:name="android.permission.DELETE_PACKAGES"
2798 android:protectionLevel="signature|privileged" />
2800 <!-- @SystemApi Allows an application to move location of installed package.
2802 <permission android:name="android.permission.MOVE_PACKAGE"
2803 android:protectionLevel="signature|privileged" />
2805 <!-- @SystemApi Allows an application to change whether an application component (other than its own) is
2807 <p>Not for use by third-party applications. -->
2808 <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE"
2809 android:protectionLevel="signature|privileged" />
2811 <!-- @SystemApi Allows an application to grant specific permissions.
2813 <permission android:name="android.permission.GRANT_RUNTIME_PERMISSIONS"
2814 android:protectionLevel="signature|installer|verifier" />
2816 <!-- @SystemApi Allows an app that has this permission and the permissions to install packages
2817 to request certain runtime permissions to be granted at installation.
2819 <permission android:name="android.permission.INSTALL_GRANT_RUNTIME_PERMISSIONS"
2820 android:protectionLevel="signature|installer|verifier" />
2822 <!-- @SystemApi Allows an application to revoke specific permissions.
2824 <permission android:name="android.permission.REVOKE_RUNTIME_PERMISSIONS"
2825 android:protectionLevel="signature|installer|verifier" />
2827 <!-- @hide Allows an application to observe permission changes. -->
2828 <permission android:name="android.permission.OBSERVE_GRANT_REVOKE_PERMISSIONS"
2829 android:protectionLevel="signature|privileged" />
2831 <!-- @SystemApi Allows an application to use SurfaceFlinger's low level features.
2832 <p>Not for use by third-party applications.
2835 <permission android:name="android.permission.ACCESS_SURFACE_FLINGER"
2836 android:protectionLevel="signature" />
2838 <!-- @SystemApi Allows an application to take screen shots and more generally
2839 get access to the frame buffer data.
2840 <p>Not for use by third-party applications. -->
2841 <permission android:name="android.permission.READ_FRAME_BUFFER"
2842 android:protectionLevel="signature|privileged" />
2844 <!-- Allows an application to use InputFlinger's low level features.
2846 <permission android:name="android.permission.ACCESS_INPUT_FLINGER"
2847 android:protectionLevel="signature" />
2849 <!-- Allows an application to disable/enable input devices.
2850 Could be used to prevent unwanted touch events
2851 on a touchscreen, for example during swimming or rain.
2853 <permission android:name="android.permission.DISABLE_INPUT_DEVICE"
2854 android:protectionLevel="signature" />
2856 <!-- Allows an application to configure and connect to Wifi displays
2858 <permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY"
2859 android:protectionLevel="signature" />
2861 <!-- Allows an application to control low-level features of Wifi displays
2862 such as opening an RTSP socket. This permission should only be used
2863 by the display manager.
2865 <permission android:name="android.permission.CONTROL_WIFI_DISPLAY"
2866 android:protectionLevel="signature" />
2868 <!-- Allows an application to control the color modes set for displays system-wide.
2869 <p>Not for use by third-party applications.</p>
2871 <permission android:name="android.permission.CONFIGURE_DISPLAY_COLOR_MODE"
2872 android:protectionLevel="signature" />
2874 <!-- @SystemApi Allows an application to control VPN.
2875 <p>Not for use by third-party applications.</p>
2877 <permission android:name="android.permission.CONTROL_VPN"
2878 android:protectionLevel="signature|privileged" />
2879 <uses-permission android:name="android.permission.CONTROL_VPN" />
2881 <!-- @SystemApi Allows an application to capture audio output.
2882 <p>Not for use by third-party applications.</p> -->
2883 <permission android:name="android.permission.CAPTURE_AUDIO_OUTPUT"
2884 android:protectionLevel="signature|privileged" />
2886 <!-- @SystemApi Allows an application to capture audio for hotword detection.
2887 <p>Not for use by third-party applications.</p>
2889 <permission android:name="android.permission.CAPTURE_AUDIO_HOTWORD"
2890 android:protectionLevel="signature|privileged" />
2892 <!-- @SystemApi Allows an application to modify audio routing and override policy decisions.
2893 <p>Not for use by third-party applications.</p>
2895 <permission android:name="android.permission.MODIFY_AUDIO_ROUTING"
2896 android:protectionLevel="signature|privileged" />
2898 <!-- @SystemApi Allows an application to capture video output.
2899 <p>Not for use by third-party applications.</p> -->
2900 <permission android:name="android.permission.CAPTURE_VIDEO_OUTPUT"
2901 android:protectionLevel="signature|privileged" />
2903 <!-- @SystemApi Allows an application to capture secure video output.
2904 <p>Not for use by third-party applications.</p> -->
2905 <permission android:name="android.permission.CAPTURE_SECURE_VIDEO_OUTPUT"
2906 android:protectionLevel="signature|privileged" />
2908 <!-- @SystemApi Allows an application to know what content is playing and control its playback.
2909 <p>Not for use by third-party applications due to privacy of media consumption</p> -->
2910 <permission android:name="android.permission.MEDIA_CONTENT_CONTROL"
2911 android:protectionLevel="signature|privileged" />
2913 <!-- @SystemApi @hide Allows an application to set the volume key long-press listener.
2914 <p>When it's set, the application will receive the volume key long-press event
2915 instead of changing volume.</p>
2916 <p>Not for use by third-party applications</p> -->
2917 <permission android:name="android.permission.SET_VOLUME_KEY_LONG_PRESS_LISTENER"
2918 android:protectionLevel="signature|privileged|development" />
2920 <!-- @SystemApi @hide Allows an application to set media key event listener.
2921 <p>When it's set, the application will receive the media key event before
2922 any other media sessions. If the event is handled by the listener, other sessions
2923 cannot get the event.</p>
2924 <p>Not for use by third-party applications</p> -->
2925 <permission android:name="android.permission.SET_MEDIA_KEY_LISTENER"
2926 android:protectionLevel="signature|privileged|development" />
2928 <!-- @SystemApi Required to be able to disable the device (very dangerous!).
2929 <p>Not for use by third-party applications.
2932 <permission android:name="android.permission.BRICK"
2933 android:protectionLevel="signature" />
2935 <!-- @SystemApi Required to be able to reboot the device.
2936 <p>Not for use by third-party applications. -->
2937 <permission android:name="android.permission.REBOOT"
2938 android:protectionLevel="signature|privileged" />
2940 <!-- @SystemApi Allows low-level access to power management.
2941 <p>Not for use by third-party applications.
2944 <permission android:name="android.permission.DEVICE_POWER"
2945 android:protectionLevel="signature" />
2947 <!-- Allows access to the PowerManager.userActivity function.
2948 <p>Not for use by third-party applications. @hide @SystemApi -->
2949 <permission android:name="android.permission.USER_ACTIVITY"
2950 android:protectionLevel="signature|privileged" />
2952 <!-- @hide Allows low-level access to tun tap driver -->
2953 <permission android:name="android.permission.NET_TUNNELING"
2954 android:protectionLevel="signature" />
2956 <!-- Run as a manufacturer test application, running as the root user.
2957 Only available when the device is running in manufacturer test mode.
2958 <p>Not for use by third-party applications.
2960 <permission android:name="android.permission.FACTORY_TEST"
2961 android:protectionLevel="signature" />
2963 <!-- Allows an application to broadcast a notification that an application
2964 package has been removed.
2965 <p>Not for use by third-party applications.
2967 <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED"
2968 android:protectionLevel="signature" />
2970 <!-- Allows an application to broadcast an SMS receipt notification.
2971 <p>Not for use by third-party applications.
2973 <permission android:name="android.permission.BROADCAST_SMS"
2974 android:protectionLevel="signature" />
2976 <!-- Allows an application to broadcast a WAP PUSH receipt notification.
2977 <p>Not for use by third-party applications.
2979 <permission android:name="android.permission.BROADCAST_WAP_PUSH"
2980 android:protectionLevel="signature" />
2982 <!-- @SystemApi Allows an application to broadcast privileged networking requests.
2983 <p>Not for use by third-party applications.
2985 @deprecated Use {@link android.Manifest.permission#REQUEST_NETWORK_SCORES} instead
2987 <permission android:name="android.permission.BROADCAST_NETWORK_PRIVILEGED"
2988 android:protectionLevel="signature|privileged" />
2990 <!-- @SystemApi Not for use by third-party applications. -->
2991 <permission android:name="android.permission.MASTER_CLEAR"
2992 android:protectionLevel="signature|privileged" />
2994 <!-- @SystemApi Allows an application to call any phone number, including emergency
2995 numbers, without going through the Dialer user interface for the user
2996 to confirm the call being placed.
2997 <p>Not for use by third-party applications. -->
2998 <permission android:name="android.permission.CALL_PRIVILEGED"
2999 android:protectionLevel="signature|privileged" />
3001 <!-- @SystemApi Allows an application to perform CDMA OTA provisioning @hide -->
3002 <permission android:name="android.permission.PERFORM_CDMA_PROVISIONING"
3003 android:protectionLevel="signature|privileged" />
3005 <!-- @SystemApi Allows an application to perform SIM Activation @hide -->
3006 <permission android:name="android.permission.PERFORM_SIM_ACTIVATION"
3007 android:protectionLevel="signature|privileged" />
3009 <!-- @SystemApi Allows enabling/disabling location update notifications from
3011 <p>Not for use by third-party applications. -->
3012 <permission android:name="android.permission.CONTROL_LOCATION_UPDATES"
3013 android:protectionLevel="signature|privileged" />
3015 <!-- @SystemApi Allows read/write access to the "properties" table in the checkin
3016 database, to change values that get uploaded.
3017 <p>Not for use by third-party applications. -->
3018 <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES"
3019 android:protectionLevel="signature|privileged" />
3021 <!-- @SystemApi Allows an application to collect component usage
3023 <p>Declaring the permission implies intention to use the API and the user of the
3024 device can grant permission through the Settings application. -->
3025 <permission android:name="android.permission.PACKAGE_USAGE_STATS"
3026 android:protectionLevel="signature|privileged|development|appop" />
3027 <uses-permission android:name="android.permission.PACKAGE_USAGE_STATS" />
3029 <!-- @hide Allows an application to change the app idle state of an app.
3030 <p>Not for use by third-party applications. -->
3031 <permission android:name="android.permission.CHANGE_APP_IDLE_STATE"
3032 android:protectionLevel="signature" />
3034 <!-- @hide @SystemApi Allows an application to temporarily whitelist an inactive app to
3035 access the network and acquire wakelocks.
3036 <p>Not for use by third-party applications. -->
3037 <permission android:name="android.permission.CHANGE_DEVICE_IDLE_TEMP_WHITELIST"
3038 android:protectionLevel="signature|privileged" />
3040 <!-- Permission an application must hold in order to use
3041 {@link android.provider.Settings#ACTION_REQUEST_IGNORE_BATTERY_OPTIMIZATIONS}.
3042 This is a normal permission: an app requesting it will always be granted the
3043 permission, without the user needing to approve or see it. -->
3044 <permission android:name="android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS"
3045 android:label="@string/permlab_requestIgnoreBatteryOptimizations"
3046 android:description="@string/permdesc_requestIgnoreBatteryOptimizations"
3047 android:protectionLevel="normal" />
3049 <!-- @SystemApi Allows an application to collect battery statistics -->
3050 <permission android:name="android.permission.BATTERY_STATS"
3051 android:protectionLevel="signature|privileged|development" />
3053 <!-- @SystemApi Allows an application to control the backup and restore process.
3054 <p>Not for use by third-party applications.
3055 @hide pending API council -->
3056 <permission android:name="android.permission.BACKUP"
3057 android:protectionLevel="signature|privileged" />
3059 <!-- Allows a package to launch the secure full-backup confirmation UI.
3060 ONLY the system process may hold this permission.
3062 <permission android:name="android.permission.CONFIRM_FULL_BACKUP"
3063 android:protectionLevel="signature" />
3065 <!-- @SystemApi Must be required by a {@link android.widget.RemoteViewsService},
3066 to ensure that only the system can bind to it. -->
3067 <permission android:name="android.permission.BIND_REMOTEVIEWS"
3068 android:protectionLevel="signature|privileged" />
3070 <!-- @SystemApi Allows an application to tell the AppWidget service which application
3071 can access AppWidget's data. The normal user flow is that a user
3072 picks an AppWidget to go into a particular host, thereby giving that
3073 host application access to the private data from the AppWidget app.
3074 An application that has this permission should honor that contract.
3075 <p>Not for use by third-party applications. -->
3076 <permission android:name="android.permission.BIND_APPWIDGET"
3077 android:protectionLevel="signature|privileged" />
3079 <!-- @SystemApi Private permission, to restrict who can bring up a dialog to add a new
3082 <permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET"
3083 android:protectionLevel="signature|privileged" />
3085 <!-- @SystemApi Internal permission allowing an application to query/set which
3086 applications can bind AppWidgets.
3088 <permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS"
3089 android:protectionLevel="signature|privileged" />
3091 <!-- Allows applications to change the background data setting.
3092 <p>Not for use by third-party applications.
3093 @hide pending API council -->
3094 <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING"
3095 android:protectionLevel="signature" />
3097 <!-- @SystemApi This permission can be used on content providers to allow the global
3098 search system to access their data. Typically it used when the
3099 provider has some permissions protecting it (which global search
3100 would not be expected to hold), and added as a read-only permission
3101 to the path in the provider where global search queries are
3102 performed. This permission can not be held by regular applications;
3103 it is used by applications to protect themselves from everyone else
3104 besides global search. -->
3105 <permission android:name="android.permission.GLOBAL_SEARCH"
3106 android:protectionLevel="signature|privileged" />
3108 <!-- Internal permission protecting access to the global search
3109 system: ensures that only the system can access the provider
3110 to perform queries (since this otherwise provides unrestricted
3111 access to a variety of content providers), and to write the
3112 search statistics (to keep applications from gaming the source
3115 <permission android:name="android.permission.GLOBAL_SEARCH_CONTROL"
3116 android:protectionLevel="signature" />
3118 <!-- @SystemApi Internal permission to allows an application to read indexable data.
3120 <permission android:name="android.permission.READ_SEARCH_INDEXABLES"
3121 android:protectionLevel="signature|privileged" />
3123 <!-- @SystemApi Allows applications to set a live wallpaper.
3124 @hide XXX Change to signature once the picker is moved to its
3125 own apk as Ghod Intended. -->
3126 <permission android:name="android.permission.SET_WALLPAPER_COMPONENT"
3127 android:protectionLevel="signature|privileged" />
3129 <!-- @SystemApi Allows applications to read dream settings and dream state.
3131 <permission android:name="android.permission.READ_DREAM_STATE"
3132 android:protectionLevel="signature|privileged" />
3134 <!-- @SystemApi Allows applications to write dream settings, and start or stop dreaming.
3136 <permission android:name="android.permission.WRITE_DREAM_STATE"
3137 android:protectionLevel="signature|privileged" />
3139 <!-- @SystemApi Allow an application to read and write the cache partition.
3141 <permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM"
3142 android:protectionLevel="signature|privileged" />
3144 <!-- Must be required by default container service so that only
3145 the system can bind to it and use it to copy
3146 protected data to secure containers or files
3147 accessible to the system.
3149 <permission android:name="android.permission.COPY_PROTECTED_DATA"
3150 android:protectionLevel="signature" />
3152 <!-- @SystemApi Internal permission protecting access to the encryption methods
3155 <permission android:name="android.permission.CRYPT_KEEPER"
3156 android:protectionLevel="signature|privileged" />
3158 <!-- @SystemApi Allows an application to read historical network usage for
3159 specific networks and applications. @hide -->
3160 <permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY"
3161 android:protectionLevel="signature|privileged" />
3163 <!-- Allows an application to manage network policies (such as warning and disable
3164 limits) and to define application-specific rules. @hide -->
3165 <permission android:name="android.permission.MANAGE_NETWORK_POLICY"
3166 android:protectionLevel="signature" />
3168 <!-- @SystemApi @hide @deprecated use UPDATE_DEVICE_STATS instead -->
3169 <permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING"
3170 android:protectionLevel="signature|privileged" />
3172 <!-- @SystemApi @hide Allows an application to manage carrier subscription plans. -->
3173 <permission android:name="android.permission.MANAGE_SUBSCRIPTION_PLANS"
3174 android:protectionLevel="signature|privileged" />
3176 <!-- C2DM permission.
3177 @hide Used internally.
3179 <permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"
3180 android:protectionLevel="signature" />
3181 <uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/>
3183 <!-- @SystemApi @hide Package verifier needs to have this permission before the PackageManager will
3184 trust it to verify packages.
3186 <permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT"
3187 android:protectionLevel="signature|privileged" />
3189 <!-- Must be required by package verifier receiver, to ensure that only the
3190 system can interact with it.
3193 <permission android:name="android.permission.BIND_PACKAGE_VERIFIER"
3194 android:protectionLevel="signature" />
3196 <!-- @SystemApi @hide Intent filter verifier needs to have this permission before the
3197 PackageManager will trust it to verify intent filters.
3199 <permission android:name="android.permission.INTENT_FILTER_VERIFICATION_AGENT"
3200 android:protectionLevel="signature|privileged" />
3202 <!-- Must be required by intent filter verifier receiver, to ensure that only the
3203 system can interact with it.
3206 <permission android:name="android.permission.BIND_INTENT_FILTER_VERIFIER"
3207 android:protectionLevel="signature" />
3209 <!-- @SystemApi Allows applications to access serial ports via the SerialManager.
3211 <permission android:name="android.permission.SERIAL_PORT"
3212 android:protectionLevel="signature|privileged" />
3214 <!-- Allows the holder to access content providers from outside an ApplicationThread.
3215 This permission is enforced by the ActivityManagerService on the corresponding APIs,
3216 in particular ActivityManagerService#getContentProviderExternal(String) and
3217 ActivityManagerService#removeContentProviderExternal(String).
3220 <permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY"
3221 android:protectionLevel="signature" />
3223 <!-- @SystemApi Allows an application to hold an UpdateLock, recommending that a headless
3224 OTA reboot *not* occur while the lock is held.
3226 <permission android:name="android.permission.UPDATE_LOCK"
3227 android:protectionLevel="signature|privileged" />
3229 <!-- @SystemApi Allows an application to read the current set of notifications, including
3230 any metadata and intents attached.
3232 <permission android:name="android.permission.ACCESS_NOTIFICATIONS"
3233 android:protectionLevel="signature|privileged|appop" />
3235 <!-- Marker permission for applications that wish to access notification policy.
3236 <p>Protection level: normal
3238 <permission android:name="android.permission.ACCESS_NOTIFICATION_POLICY"
3239 android:description="@string/permdesc_access_notification_policy"
3240 android:label="@string/permlab_access_notification_policy"
3241 android:protectionLevel="normal" />
3243 <!-- Allows modification of do not disturb rules and policies. Only allowed for system
3246 <permission android:name="android.permission.MANAGE_NOTIFICATIONS"
3247 android:protectionLevel="signature" />
3249 <!-- Allows notifications to be colorized
3250 <p>Not for use by third-party applications. @hide -->
3251 <permission android:name="android.permission.USE_COLORIZED_NOTIFICATIONS"
3252 android:protectionLevel="signature|setup" />
3254 <!-- Allows access to keyguard secure storage. Only allowed for system processes.
3256 <permission android:name="android.permission.ACCESS_KEYGUARD_SECURE_STORAGE"
3257 android:protectionLevel="signature" />
3259 <!-- Allows managing (adding, removing) fingerprint templates. Reserved for the system. @hide -->
3260 <permission android:name="android.permission.MANAGE_FINGERPRINT"
3261 android:protectionLevel="signature|privileged" />
3263 <!-- Allows an app to reset fingerprint attempt counter. Reserved for the system. @hide -->
3264 <permission android:name="android.permission.RESET_FINGERPRINT_LOCKOUT"
3265 android:protectionLevel="signature" />
3267 <!-- Allows an application to control keyguard. Only allowed for system processes.
3269 <permission android:name="android.permission.CONTROL_KEYGUARD"
3270 android:protectionLevel="signature" />
3272 <!-- Allows an application to listen to trust changes. Only allowed for system processes.
3274 <permission android:name="android.permission.TRUST_LISTENER"
3275 android:protectionLevel="signature" />
3277 <!-- @SystemApi Allows an application to provide a trust agent.
3278 @hide For security reasons, this is a platform-only permission. -->
3279 <permission android:name="android.permission.PROVIDE_TRUST_AGENT"
3280 android:protectionLevel="signature|privileged" />
3282 <!-- Allows an application to launch the trust agent settings activity.
3284 <permission android:name="android.permission.LAUNCH_TRUST_AGENT_SETTINGS"
3285 android:protectionLevel="signature|privileged" />
3287 <!-- @SystemApi Must be required by an {@link
3288 android.service.trust.TrustAgentService},
3289 to ensure that only the system can bind to it.
3291 <permission android:name="android.permission.BIND_TRUST_AGENT"
3292 android:protectionLevel="signature" />
3294 <!-- Must be required by an {@link
3295 android.service.notification.NotificationListenerService},
3296 to ensure that only the system can bind to it.
3297 <p>Protection level: signature
3299 <permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE"
3300 android:protectionLevel="signature" />
3302 <!-- @SystemApi Must be required by an {@link
3303 android.service.notification.NotificationAssistantService} to ensure that only the system
3305 <p>Protection level: signature
3308 <permission android:name="android.permission.BIND_NOTIFICATION_ASSISTANT_SERVICE"
3309 android:protectionLevel="signature" />
3311 <!-- Must be required by a {@link
3312 android.service.chooser.ChooserTargetService}, to ensure that
3313 only the system can bind to it.
3314 <p>Protection level: signature
3316 <permission android:name="android.permission.BIND_CHOOSER_TARGET_SERVICE"
3317 android:protectionLevel="signature" />
3319 <!-- @SystemApi Must be held by services that extend
3320 {@link android.service.resolver.ResolverRankerService}.
3321 <p>Protection level: signature|privileged
3324 <permission android:name="android.permission.PROVIDE_RESOLVER_RANKER_SERVICE"
3325 android:protectionLevel="signature|privileged" />
3327 <!-- @SystemApi Must be required by services that extend
3328 {@link android.service.resolver.ResolverRankerService}, to ensure that only the system can
3330 <p>Protection level: signature
3333 <permission android:name="android.permission.BIND_RESOLVER_RANKER_SERVICE"
3334 android:protectionLevel="signature" />
3336 <!-- Must be required by a {@link
3337 android.service.notification.ConditionProviderService},
3338 to ensure that only the system can bind to it.
3339 <p>Protection level: signature
3341 <permission android:name="android.permission.BIND_CONDITION_PROVIDER_SERVICE"
3342 android:protectionLevel="signature" />
3344 <!-- Must be required by an {@link android.service.dreams.DreamService},
3345 to ensure that only the system can bind to it.
3346 <p>Protection level: signature
3348 <permission android:name="android.permission.BIND_DREAM_SERVICE"
3349 android:protectionLevel="signature" />
3351 <!-- Must be required by an {@link android.app.usage.CacheQuotaService} to ensure that only the
3352 system can bind to it.
3353 @hide This is not a third-party API (intended for OEMs and system apps).
3355 <permission android:name="android.permission.BIND_CACHE_QUOTA_SERVICE"
3356 android:protectionLevel="signature" />
3358 <!-- @SystemApi Allows an application to call into a carrier setup flow. It is up to the
3359 carrier setup application to enforce that this permission is required
3360 @hide This is not a third-party API (intended for OEMs and system apps). -->
3361 <permission android:name="android.permission.INVOKE_CARRIER_SETUP"
3362 android:protectionLevel="signature|privileged" />
3364 <!-- @SystemApi Allows an application to listen for network condition observations.
3365 @hide This is not a third-party API (intended for system apps). -->
3366 <permission android:name="android.permission.ACCESS_NETWORK_CONDITIONS"
3367 android:protectionLevel="signature|privileged" />
3369 <!-- @SystemApi Allows an application to provision and access DRM certificates
3370 @hide This is not a third-party API (intended for system apps). -->
3371 <permission android:name="android.permission.ACCESS_DRM_CERTIFICATES"
3372 android:protectionLevel="signature|privileged" />
3374 <!-- Api Allows an application to manage media projection sessions.
3375 @hide This is not a third-party API (intended for system apps). -->
3376 <permission android:name="android.permission.MANAGE_MEDIA_PROJECTION"
3377 android:protectionLevel="signature" />
3379 <!-- @SystemApi Allows an application to read install sessions
3380 @hide This is not a third-party API (intended for system apps). -->
3381 <permission android:name="android.permission.READ_INSTALL_SESSIONS"
3382 android:label="@string/permlab_readInstallSessions"
3383 android:description="@string/permdesc_readInstallSessions"
3384 android:protectionLevel="normal"/>
3386 <!-- @SystemApi Allows an application to remove DRM certificates
3387 @hide This is not a third-party API (intended for system apps). -->
3388 <permission android:name="android.permission.REMOVE_DRM_CERTIFICATES"
3389 android:protectionLevel="signature|privileged" />
3391 <!-- @deprecated Use {@link android.Manifest.permission#BIND_CARRIER_SERVICES} instead -->
3392 <permission android:name="android.permission.BIND_CARRIER_MESSAGING_SERVICE"
3393 android:protectionLevel="signature|privileged" />
3395 <!-- Allows an application to interact with the currently active
3396 {@link android.service.voice.VoiceInteractionService}.
3398 <permission android:name="android.permission.ACCESS_VOICE_INTERACTION_SERVICE"
3399 android:protectionLevel="signature" />
3401 <!-- The system process that is allowed to bind to services in carrier apps will
3402 have this permission. Carrier apps should use this permission to protect
3403 their services that only the system is allowed to bind to.
3404 <p>Protection level: signature|privileged
3406 <permission android:name="android.permission.BIND_CARRIER_SERVICES"
3407 android:label="@string/permlab_bindCarrierServices"
3408 android:description="@string/permdesc_bindCarrierServices"
3409 android:protectionLevel="signature|privileged" />
3411 <!-- Allows an application to query whether DO_NOT_ASK_CREDENTIALS_ON_BOOT
3414 <permission android:name="android.permission.QUERY_DO_NOT_ASK_CREDENTIALS_ON_BOOT"
3415 android:protectionLevel="signature" />
3417 <!-- @SystemApi Allows applications to kill UIDs.
3418 <p>Not for use by third-party applications.
3420 <permission android:name="android.permission.KILL_UID"
3421 android:protectionLevel="signature|installer" />
3423 <!-- @SystemApi Allows applications to read the local WiFi and Bluetooth MAC address.
3425 <permission android:name="android.permission.LOCAL_MAC_ADDRESS"
3426 android:protectionLevel="signature|privileged" />
3428 <!-- @SystemApi Allows access to MAC addresses of WiFi and Bluetooth peer devices.
3430 <permission android:name="android.permission.PEERS_MAC_ADDRESS"
3431 android:protectionLevel="signature|setup" />
3433 <!-- Allows the Nfc stack to dispatch Nfc messages to applications. Applications
3434 can use this permission to ensure incoming Nfc messages are from the Nfc stack
3435 and not simulated by another application.
3437 <permission android:name="android.permission.DISPATCH_NFC_MESSAGE"
3438 android:protectionLevel="signature|privileged" />
3440 <!-- @SystemApi Allows changing day / night mode when system is configured with
3441 config_lockDayNightMode set to true. If requesting app does not have permission,
3444 <permission android:name="android.permission.MODIFY_DAY_NIGHT_MODE"
3445 android:protectionLevel="signature|privileged" />
3447 <!-- The system process is explicitly the only one allowed to launch the
3448 confirmation UI for full backup/restore -->
3449 <uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/>
3451 <!-- Allows the holder to access and manage instant applications on the device.
3453 <permission android:name="android.permission.ACCESS_INSTANT_APPS"
3454 android:protectionLevel="signature|installer|verifier" />
3456 <!-- Allows the holder to view the instant applications on the device.
3458 <permission android:name="android.permission.VIEW_INSTANT_APPS"
3459 android:protectionLevel="signature|preinstalled" />
3461 <!-- Allows receiving the usage of media resource e.g. video/audio codec and
3464 <permission android:name="android.permission.RECEIVE_MEDIA_RESOURCE_USAGE"
3465 android:protectionLevel="signature|privileged" />
3467 <!-- Must be required by system/priv apps when accessing the sound trigger
3468 APIs given by {@link SoundTriggerManager}.
3469 @hide <p>Not for use by third-party applications.</p> -->
3470 <permission android:name="android.permission.MANAGE_SOUND_TRIGGER"
3471 android:protectionLevel="signature|privileged" />
3473 <!-- @SystemApi Allows trusted applications to dispatch managed provisioning message to Managed
3474 Provisioning app. If requesting app does not have permission, it will be ignored.
3476 <permission android:name="android.permission.DISPATCH_PROVISIONING_MESSAGE"
3477 android:protectionLevel="signature|privileged" />
3479 <!-- Allows the holder to read blocked numbers. See
3480 {@link android.provider.BlockedNumberContract}.
3482 <permission android:name="android.permission.READ_BLOCKED_NUMBERS"
3483 android:protectionLevel="signature" />
3485 <!-- Allows the holder to write blocked numbers. See
3486 {@link android.provider.BlockedNumberContract}.
3488 <permission android:name="android.permission.WRITE_BLOCKED_NUMBERS"
3489 android:protectionLevel="signature" />
3491 <!-- Must be required by an {@link android.service.vr.VrListenerService}, to ensure that only
3492 the system can bind to it.
3493 <p>Protection level: signature -->
3494 <permission android:name="android.permission.BIND_VR_LISTENER_SERVICE"
3495 android:protectionLevel="signature" />
3497 <!-- Must be required by system apps when accessing restricted VR APIs.
3500 <p>Protection level: signature -->
3501 <permission android:name="android.permission.RESTRICTED_VR_ACCESS"
3502 android:protectionLevel="signature|preinstalled" />
3504 <!-- Required to make calls to {@link android.service.vr.IVrManager}.
3506 <permission android:name="android.permission.ACCESS_VR_MANAGER"
3507 android:protectionLevel="signature" />
3509 <!-- Allows an application to whitelist tasks during lock task mode
3510 @hide <p>Not for use by third-party applications.</p> -->
3511 <permission android:name="android.permission.UPDATE_LOCK_TASK_PACKAGES"
3512 android:protectionLevel="signature|setup" />
3514 <!-- @SystemApi Allows an application to replace the app name displayed alongside notifications
3515 in the N-release and later.
3516 @hide <p>Not for use by third-party applications.</p> -->
3517 <permission android:name="android.permission.SUBSTITUTE_NOTIFICATION_APP_NAME"
3518 android:protectionLevel="signature|privileged" />
3520 <!-- @SystemApi Allows an application to show notifications before the device is provisioned.
3521 @hide <p>Not for use by third-party applications.</p> -->
3522 <permission android:name="android.permission.NOTIFICATION_DURING_SETUP"
3523 android:protectionLevel="signature|privileged" />
3525 <!-- @SystemApi Allows an application to manage auto-fill sessions.
3526 @hide <p>Not for use by third-party applications.</p> -->
3527 <permission android:name="android.permission.MANAGE_AUTO_FILL"
3528 android:protectionLevel="signature" />
3530 <!-- Allows an app to set the theme overlay in /vendor/overlay
3532 @hide <p>Not for use by third-party applications.</p> -->
3533 <permission android:name="android.permission.MODIFY_THEME_OVERLAY"
3534 android:protectionLevel="signature" />
3536 <!-- Allows an instant app to create foreground services. -->
3537 <permission android:name="android.permission.INSTANT_APP_FOREGROUND_SERVICE"
3538 android:protectionLevel="signature|development|ephemeral|appop" />
3540 <application android:process="system"
3541 android:persistent="true"
3542 android:hasCode="false"
3543 android:label="@string/android_system_label"
3544 android:allowClearUserData="false"
3545 android:backupAgent="com.android.server.backup.SystemBackupAgent"
3546 android:killAfterRestore="false"
3547 android:icon="@drawable/ic_launcher_android"
3548 android:supportsRtl="true"
3549 android:theme="@style/Theme.DeviceDefault.Light.DarkActionBar"
3550 android:defaultToDeviceProtectedStorage="true"
3551 android:directBootAware="true">
3552 <activity android:name="com.android.internal.app.ChooserActivity"
3553 android:theme="@style/Theme.DeviceDefault.Resolver"
3554 android:finishOnCloseSystemDialogs="true"
3555 android:excludeFromRecents="true"
3556 android:documentLaunchMode="never"
3557 android:relinquishTaskIdentity="true"
3558 android:configChanges="screenSize|smallestScreenSize|screenLayout|orientation|keyboard|keyboardHidden"
3559 android:process=":ui"
3560 android:visibleToInstantApps="true">
3562 <action android:name="android.intent.action.CHOOSER" />
3563 <category android:name="android.intent.category.DEFAULT" />
3564 <category android:name="android.intent.category.VOICE" />
3567 <activity android:name="com.android.internal.app.AccessibilityButtonChooserActivity"
3568 android:exported="false"
3569 android:theme="@style/Theme.DeviceDefault.Resolver"
3570 android:finishOnCloseSystemDialogs="true"
3571 android:excludeFromRecents="true"
3572 android:documentLaunchMode="never"
3573 android:relinquishTaskIdentity="true"
3574 android:configChanges="screenSize|smallestScreenSize|screenLayout|orientation|keyboard|keyboardHidden"
3575 android:process=":ui"
3576 android:visibleToInstantApps="true">
3578 <action android:name="com.android.internal.intent.action.CHOOSE_ACCESSIBILITY_BUTTON" />
3579 <category android:name="android.intent.category.DEFAULT" />
3582 <activity android:name="com.android.internal.app.IntentForwarderActivity"
3583 android:finishOnCloseSystemDialogs="true"
3584 android:theme="@style/Theme.NoDisplay"
3585 android:excludeFromRecents="true"
3586 android:label="@string/user_owner_label"
3587 android:exported="true"
3590 <activity-alias android:name="com.android.internal.app.ForwardIntentToParent"
3591 android:targetActivity="com.android.internal.app.IntentForwarderActivity"
3592 android:exported="true"
3593 android:label="@string/user_owner_label">
3595 <activity-alias android:name="com.android.internal.app.ForwardIntentToManagedProfile"
3596 android:targetActivity="com.android.internal.app.IntentForwarderActivity"
3597 android:icon="@drawable/ic_corp_icon"
3598 android:exported="true"
3599 android:label="@string/managed_profile_label">
3601 <activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity"
3602 android:theme="@style/Theme.DeviceDefault.Light.Dialog"
3603 android:label="@string/heavy_weight_switcher_title"
3604 android:finishOnCloseSystemDialogs="true"
3605 android:excludeFromRecents="true"
3606 android:process=":ui">
3608 <activity android:name="com.android.internal.app.PlatLogoActivity"
3609 android:theme="@style/Theme.Wallpaper.NoTitleBar.Fullscreen"
3610 android:configChanges="orientation|keyboardHidden"
3611 android:process=":ui">
3613 <activity android:name="com.android.internal.app.DisableCarModeActivity"
3614 android:theme="@style/Theme.NoDisplay"
3615 android:excludeFromRecents="true"
3616 android:process=":ui">
3618 <activity android:name="com.android.internal.app.DumpHeapActivity"
3619 android:theme="@style/Theme.Translucent.NoTitleBar"
3620 android:label="@string/dump_heap_title"
3621 android:finishOnCloseSystemDialogs="true"
3622 android:noHistory="true"
3623 android:excludeFromRecents="true"
3624 android:process=":ui">
3626 <provider android:name="com.android.server.am.DumpHeapProvider"
3627 android:authorities="com.android.server.heapdump"
3628 android:grantUriPermissions="true"
3629 android:multiprocess="false"
3630 android:singleUser="true" />
3632 <activity android:name="android.accounts.ChooseAccountActivity"
3633 android:excludeFromRecents="true"
3634 android:exported="true"
3635 android:theme="@style/Theme.DeviceDefault.Light.Dialog"
3636 android:label="@string/choose_account_label"
3637 android:process=":ui"
3638 android:visibleToInstantApps="true">
3641 <activity android:name="android.accounts.ChooseTypeAndAccountActivity"
3642 android:excludeFromRecents="true"
3643 android:exported="true"
3644 android:theme="@style/Theme.DeviceDefault.Light.Dialog"
3645 android:label="@string/choose_account_label"
3646 android:process=":ui"
3647 android:visibleToInstantApps="true">
3650 <activity android:name="android.accounts.ChooseAccountTypeActivity"
3651 android:excludeFromRecents="true"
3652 android:theme="@style/Theme.DeviceDefault.Light.Dialog"
3653 android:label="@string/choose_account_label"
3654 android:process=":ui"
3655 android:visibleToInstantApps="true">
3658 <activity android:name="android.accounts.CantAddAccountActivity"
3659 android:excludeFromRecents="true"
3660 android:exported="true"
3661 android:theme="@style/Theme.DeviceDefault.Light.Dialog.NoActionBar"
3662 android:process=":ui">
3665 <activity android:name="android.accounts.GrantCredentialsPermissionActivity"
3666 android:excludeFromRecents="true"
3667 android:exported="true"
3668 android:theme="@style/Theme.DeviceDefault.Light.DialogWhenLarge"
3669 android:process=":ui"
3670 android:visibleToInstantApps="true">
3673 <activity android:name="android.content.SyncActivityTooManyDeletes"
3674 android:theme="@style/Theme.DeviceDefault.Light.Dialog"
3675 android:label="@string/sync_too_many_deletes"
3676 android:process=":ui">
3679 <activity android:name="com.android.internal.app.ShutdownActivity"
3680 android:permission="android.permission.SHUTDOWN"
3681 android:theme="@style/Theme.NoDisplay"
3682 android:excludeFromRecents="true">
3684 <action android:name="com.android.internal.intent.action.REQUEST_SHUTDOWN" />
3685 <category android:name="android.intent.category.DEFAULT" />
3688 <action android:name="android.intent.action.REBOOT" />
3689 <category android:name="android.intent.category.DEFAULT" />
3693 <activity android:name="com.android.internal.app.NetInitiatedActivity"
3694 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert"
3695 android:excludeFromRecents="true"
3696 android:process=":ui">
3699 <activity android:name="com.android.internal.app.SystemUserHomeActivity"
3700 android:enabled="false"
3701 android:process=":ui"
3702 android:systemUserOnly="true"
3703 android:theme="@style/Theme.Translucent.NoTitleBar">
3704 <intent-filter android:priority="-100">
3705 <action android:name="android.intent.action.MAIN" />
3706 <category android:name="android.intent.category.HOME" />
3710 <!-- Activity to prompt user if it's ok to create a new user sandbox for a
3711 specified account. -->
3712 <activity android:name="com.android.internal.app.ConfirmUserCreationActivity"
3713 android:excludeFromRecents="true"
3714 android:process=":ui"
3715 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert">
3716 <intent-filter android:priority="1000">
3717 <action android:name="android.os.action.CREATE_USER" />
3718 <category android:name="android.intent.category.DEFAULT" />
3722 <activity android:name="com.android.internal.app.UnlaunchableAppActivity"
3723 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert"
3724 android:excludeFromRecents="true"
3725 android:process=":ui">
3728 <activity android:name="com.android.settings.notification.NotificationAccessConfirmationActivity"
3729 android:theme="@android:style/Theme.DeviceDefault.Light.Dialog.Alert"
3730 android:excludeFromRecents="true">
3733 <receiver android:name="com.android.server.BootReceiver"
3734 android:systemUserOnly="true">
3735 <intent-filter android:priority="1000">
3736 <action android:name="android.intent.action.BOOT_COMPLETED" />
3740 <receiver android:name="com.android.server.updates.CertPinInstallReceiver"
3741 android:permission="android.permission.UPDATE_CONFIG">
3743 <action android:name="android.intent.action.UPDATE_PINS" />
3744 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3748 <receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver"
3749 android:permission="android.permission.UPDATE_CONFIG">
3751 <action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" />
3752 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3756 <receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver"
3757 android:permission="android.permission.UPDATE_CONFIG">
3759 <action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" />
3760 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3764 <receiver android:name="com.android.server.updates.ApnDbInstallReceiver"
3765 android:permission="android.permission.UPDATE_CONFIG">
3767 <action android:name="com.android.internal.intent.action.UPDATE_APN_DB" />
3768 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3772 <receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver"
3773 android:permission="android.permission.UPDATE_CONFIG">
3775 <action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" />
3776 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3780 <receiver android:name="com.android.server.updates.TzDataInstallReceiver"
3781 android:permission="android.permission.UPDATE_CONFIG">
3783 <action android:name="android.intent.action.UPDATE_TZDATA" />
3784 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3788 <receiver android:name="com.android.server.updates.CertificateTransparencyLogInstallReceiver"
3789 android:permission="android.permission.UPDATE_CONFIG">
3791 <action android:name="android.intent.action.UPDATE_CT_LOGS" />
3792 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3796 <receiver android:name="com.android.server.updates.LangIdInstallReceiver"
3797 android:permission="android.permission.UPDATE_CONFIG">
3799 <action android:name="android.intent.action.UPDATE_LANG_ID" />
3800 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3804 <receiver android:name="com.android.server.updates.SmartSelectionInstallReceiver"
3805 android:permission="android.permission.UPDATE_CONFIG">
3807 <action android:name="android.intent.action.UPDATE_SMART_SELECTION" />
3808 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3812 <receiver android:name="com.android.server.MasterClearReceiver"
3813 android:permission="android.permission.MASTER_CLEAR">
3815 android:priority="100" >
3816 <!-- For Checkin, Settings, etc.: action=FACTORY_RESET -->
3817 <action android:name="android.intent.action.FACTORY_RESET" />
3818 <!-- As above until all the references to the deprecated MASTER_CLEAR get updated to
3820 <action android:name="android.intent.action.MASTER_CLEAR" />
3822 <!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR -->
3823 <action android:name="com.google.android.c2dm.intent.RECEIVE" />
3824 <category android:name="android.intent.category.MASTER_CLEAR" />
3828 <service android:name="android.hardware.location.GeofenceHardwareService"
3829 android:permission="android.permission.LOCATION_HARDWARE"
3830 android:exported="false" />
3832 <service android:name="com.android.internal.backup.LocalTransportService"
3833 android:permission="android.permission.CONFIRM_FULL_BACKUP"
3834 android:exported="false">
3836 <action android:name="android.backup.TRANSPORT_HOST" />
3840 <service android:name="com.android.server.MountServiceIdler"
3841 android:exported="true"
3842 android:permission="android.permission.BIND_JOB_SERVICE" >
3845 <service android:name="com.android.server.backup.FullBackupJob"
3846 android:exported="true"
3847 android:permission="android.permission.BIND_JOB_SERVICE" >
3850 <service android:name="com.android.server.backup.KeyValueBackupJob"
3851 android:permission="android.permission.BIND_JOB_SERVICE" >
3854 <service android:name="com.android.server.content.SyncJobService"
3855 android:permission="android.permission.BIND_JOB_SERVICE" >
3858 <service android:name="com.android.server.pm.BackgroundDexOptService"
3859 android:exported="true"
3860 android:permission="android.permission.BIND_JOB_SERVICE">
3863 <service android:name="com.android.server.PruneInstantAppsJobService"
3864 android:permission="android.permission.BIND_JOB_SERVICE" >
3867 <service android:name="com.android.server.storage.DiskStatsLoggingService"
3868 android:permission="android.permission.BIND_JOB_SERVICE" >
3871 <service android:name="com.android.server.PreloadsFileCacheExpirationJobService"
3872 android:permission="android.permission.BIND_JOB_SERVICE" >
3875 <service android:name="com.android.server.camera.CameraStatsJobService"
3876 android:permission="android.permission.BIND_JOB_SERVICE" >