1 <?xml version="1.0" encoding="utf-8"?>
3 /* //device/apps/common/AndroidManifest.xml
5 ** Copyright 2006, The Android Open Source Project
7 ** Licensed under the Apache License, Version 2.0 (the "License");
8 ** you may not use this file except in compliance with the License.
9 ** You may obtain a copy of the License at
11 ** http://www.apache.org/licenses/LICENSE-2.0
13 ** Unless required by applicable law or agreed to in writing, software
14 ** distributed under the License is distributed on an "AS IS" BASIS,
15 ** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16 ** See the License for the specific language governing permissions and
17 ** limitations under the License.
20 <manifest xmlns:android="http://schemas.android.com/apk/res/android"
21 package="android" coreApp="true" android:sharedUserId="android.uid.system"
22 android:sharedUserLabel="@string/android_system_label">
24 <!-- ================================================ -->
25 <!-- Special broadcasts that only the system can send -->
26 <!-- ================================================ -->
29 <protected-broadcast android:name="android.intent.action.SCREEN_OFF" />
30 <protected-broadcast android:name="android.intent.action.SCREEN_ON" />
31 <protected-broadcast android:name="android.intent.action.USER_PRESENT" />
32 <protected-broadcast android:name="android.intent.action.TIME_SET" />
33 <protected-broadcast android:name="android.intent.action.TIME_TICK" />
34 <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" />
35 <protected-broadcast android:name="android.intent.action.DATE_CHANGED" />
36 <protected-broadcast android:name="android.intent.action.PRE_BOOT_COMPLETED" />
37 <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" />
38 <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" />
39 <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" />
40 <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" />
41 <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" />
42 <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" />
43 <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" />
44 <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" />
45 <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" />
46 <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" />
47 <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" />
48 <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" />
49 <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" />
50 <protected-broadcast android:name="android.intent.action.PACKAGES_SUSPENDED" />
51 <protected-broadcast android:name="android.intent.action.PACKAGES_UNSUSPENDED" />
52 <protected-broadcast android:name="android.intent.action.ACTION_PREFERRED_ACTIVITY_CHANGED" />
53 <protected-broadcast android:name="android.intent.action.UID_REMOVED" />
54 <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" />
55 <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" />
56 <protected-broadcast android:name="android.intent.action.SPLIT_CONFIGURATION_CHANGED" />
57 <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" />
58 <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" />
59 <protected-broadcast android:name="android.intent.action.BATTERY_LEVEL_CHANGED" />
60 <protected-broadcast android:name="android.intent.action.BATTERY_LOW" />
61 <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" />
62 <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" />
63 <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" />
64 <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" />
65 <protected-broadcast android:name="android.intent.action.CHARGING" />
66 <protected-broadcast android:name="android.intent.action.DISCHARGING" />
67 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" />
68 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" />
69 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" />
70 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" />
71 <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" />
72 <protected-broadcast android:name="android.intent.action.REBOOT" />
73 <protected-broadcast android:name="android.intent.action.DOCK_EVENT" />
74 <protected-broadcast android:name="android.intent.action.THERMAL_EVENT" />
75 <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" />
76 <protected-broadcast android:name="android.intent.action.USER_ADDED" />
77 <protected-broadcast android:name="android.intent.action.USER_REMOVED" />
78 <protected-broadcast android:name="android.intent.action.USER_STARTING" />
79 <protected-broadcast android:name="android.intent.action.USER_STARTED" />
80 <protected-broadcast android:name="android.intent.action.USER_STOPPING" />
81 <protected-broadcast android:name="android.intent.action.USER_STOPPED" />
82 <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" />
83 <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" />
84 <protected-broadcast android:name="android.intent.action.USER_SWITCHED" />
85 <protected-broadcast android:name="android.intent.action.USER_INITIALIZE" />
86 <protected-broadcast android:name="android.intent.action.INTENT_FILTER_NEEDS_VERIFICATION" />
87 <protected-broadcast android:name="android.intent.action.OVERLAY_ADDED" />
88 <protected-broadcast android:name="android.intent.action.OVERLAY_CHANGED" />
89 <protected-broadcast android:name="android.intent.action.OVERLAY_REMOVED" />
90 <protected-broadcast android:name="android.intent.action.OVERLAY_PRIORITY_CHANGED" />
91 <protected-broadcast android:name="android.intent.action.USER_ACTIVITY_NOTIFICATION" />
92 <protected-broadcast android:name="android.intent.action.MY_PACKAGE_SUSPENDED" />
93 <protected-broadcast android:name="android.intent.action.MY_PACKAGE_UNSUSPENDED" />
95 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED" />
96 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGING" />
97 <protected-broadcast android:name="android.os.action.DEVICE_IDLE_MODE_CHANGED" />
98 <protected-broadcast android:name="android.os.action.POWER_SAVE_WHITELIST_CHANGED" />
99 <protected-broadcast android:name="android.os.action.POWER_SAVE_TEMP_WHITELIST_CHANGED" />
100 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED_INTERNAL" />
102 <!-- @deprecated This is rarely used and will be phased out soon. -->
103 <protected-broadcast android:name="android.os.action.SCREEN_BRIGHTNESS_BOOST_CHANGED" />
105 <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" />
106 <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" />
107 <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" />
108 <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" />
109 <protected-broadcast android:name="android.app.action.NEXT_ALARM_CLOCK_CHANGED" />
111 <protected-broadcast android:name="android.app.action.BUGREPORT_SHARING_DECLINED" />
112 <protected-broadcast android:name="android.app.action.BUGREPORT_FAILED" />
113 <protected-broadcast android:name="android.app.action.BUGREPORT_SHARE" />
114 <protected-broadcast android:name="android.app.action.SHOW_DEVICE_MONITORING_DIALOG" />
116 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" />
117 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" />
118 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" />
119 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" />
120 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_HOST_RESTORED" />
121 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_RESTORED" />
123 <protected-broadcast android:name="android.os.action.SETTING_RESTORED" />
125 <protected-broadcast android:name="android.app.backup.intent.RUN" />
126 <protected-broadcast android:name="android.app.backup.intent.CLEAR" />
127 <protected-broadcast android:name="android.app.backup.intent.INIT" />
129 <protected-broadcast android:name="android.bluetooth.intent.DISCOVERABLE_TIMEOUT" />
130 <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" />
131 <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" />
132 <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" />
133 <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" />
134 <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" />
135 <protected-broadcast android:name="android.bluetooth.adapter.action.BLUETOOTH_ADDRESS_CHANGED" />
136 <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" />
137 <protected-broadcast android:name="android.bluetooth.device.action.UUID" />
138 <protected-broadcast android:name="android.bluetooth.device.action.MAS_INSTANCE" />
139 <protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" />
140 <protected-broadcast android:name="android.bluetooth.device.action.FOUND" />
141 <protected-broadcast android:name="android.bluetooth.device.action.DISAPPEARED" />
142 <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" />
143 <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" />
144 <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" />
145 <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" />
146 <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" />
147 <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" />
148 <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" />
149 <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" />
150 <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" />
151 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" />
152 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" />
153 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" />
154 <protected-broadcast android:name="android.bluetooth.device.action.SDP_RECORD" />
155 <protected-broadcast android:name="android.bluetooth.device.action.BATTERY_LEVEL_CHANGED" />
156 <protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" />
157 <protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" />
159 android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" />
161 android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" />
163 android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" />
165 android:name="android.bluetooth.headset.action.HF_INDICATORS_VALUE_CHANGED" />
167 android:name="android.bluetooth.headset.profile.action.ACTIVE_DEVICE_CHANGED" />
169 android:name="android.bluetooth.headsetclient.profile.action.CONNECTION_STATE_CHANGED" />
171 android:name="android.bluetooth.headsetclient.profile.action.AUDIO_STATE_CHANGED" />
173 android:name="android.bluetooth.headsetclient.profile.action.AG_EVENT" />
175 android:name="android.bluetooth.headsetclient.profile.action.AG_CALL_CHANGED" />
177 android:name="android.bluetooth.headsetclient.profile.action.RESULT" />
179 android:name="android.bluetooth.headsetclient.profile.action.LAST_VTAG" />
181 android:name="android.bluetooth.hearingaid.profile.action.CONNECTION_STATE_CHANGED" />
183 android:name="android.bluetooth.hearingaid.profile.action.PLAYING_STATE_CHANGED" />
185 android:name="android.bluetooth.hearingaid.profile.action.ACTIVE_DEVICE_CHANGED" />
187 android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" />
189 android:name="android.bluetooth.a2dp.profile.action.ACTIVE_DEVICE_CHANGED" />
191 android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" />
193 android:name="android.bluetooth.a2dp.profile.action.CODEC_CONFIG_CHANGED" />
195 android:name="android.bluetooth.a2dp-sink.profile.action.CONNECTION_STATE_CHANGED" />
197 android:name="android.bluetooth.a2dp-sink.profile.action.PLAYING_STATE_CHANGED" />
199 android:name="android.bluetooth.a2dp-sink.profile.action.AUDIO_CONFIG_CHANGED" />
201 android:name="android.bluetooth.avrcp-controller.profile.action.BROWSE_CONNECTION_STATE_CHANGED" />
203 android:name="android.bluetooth.avrcp-controller.profile.action.CONNECTION_STATE_CHANGED" />
205 android:name="android.bluetooth.avrcp-controller.profile.action.FOLDER_LIST" />
207 android:name="android.bluetooth.avrcp-controller.profile.action.TRACK_EVENT" />
209 android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" />
211 android:name="android.bluetooth.input.profile.action.IDLE_TIME_CHANGED" />
213 android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" />
215 android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" />
217 android:name="android.bluetooth.hiddevice.profile.action.CONNECTION_STATE_CHANGED" />
219 android:name="android.bluetooth.map.profile.action.CONNECTION_STATE_CHANGED" />
220 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.CONNECTION_STATE_CHANGED" />
221 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_RECEIVED" />
222 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_SENT_SUCCESSFULLY" />
223 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_DELIVERED_SUCCESSFULLY" />
225 android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_SENT" />
227 android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_DELIVERY" />
229 android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" />
230 <protected-broadcast android:name="android.bluetooth.pbap.profile.action.CONNECTION_STATE_CHANGED" />
231 <protected-broadcast android:name="android.bluetooth.pbapclient.profile.action.CONNECTION_STATE_CHANGED" />
232 <protected-broadcast android:name="android.bluetooth.sap.profile.action.CONNECTION_STATE_CHANGED" />
233 <protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" />
234 <protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" />
235 <protected-broadcast android:name="android.btopp.intent.action.LIST" />
236 <protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" />
237 <protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" />
238 <protected-broadcast android:name="android.btopp.intent.action.CONFIRM" />
239 <protected-broadcast android:name="android.btopp.intent.action.HIDE" />
240 <protected-broadcast android:name="android.btopp.intent.action.RETRY" />
241 <protected-broadcast android:name="android.btopp.intent.action.OPEN" />
242 <protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" />
243 <protected-broadcast android:name="android.btopp.intent.action.TRANSFER_COMPLETE" />
244 <protected-broadcast android:name="android.btopp.intent.action.ACCEPT" />
245 <protected-broadcast android:name="android.btopp.intent.action.DECLINE" />
246 <protected-broadcast android:name="com.android.bluetooth.gatt.REFRESH_BATCHED_SCAN" />
247 <protected-broadcast android:name="com.android.bluetooth.pbap.authchall" />
248 <protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" />
249 <protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" />
250 <protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" />
251 <protected-broadcast android:name="com.android.bluetooth.sap.USER_CONFIRM_TIMEOUT" />
252 <protected-broadcast android:name="com.android.bluetooth.sap.action.DISCONNECT_ACTION" />
254 <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" />
256 <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" />
257 <protected-broadcast android:name="android.hardware.usb.action.USB_PORT_CHANGED" />
258 <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" />
259 <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_DETACHED" />
260 <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" />
261 <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" />
263 <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" />
264 <protected-broadcast android:name="android.media.action.HDMI_AUDIO_PLUG" />
266 <protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" />
267 <protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" />
268 <protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" />
269 <protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" />
270 <protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" />
271 <protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" />
272 <protected-broadcast android:name="android.media.MASTER_MONO_CHANGED_ACTION" />
273 <protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" />
274 <protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" />
276 <protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" />
277 <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" />
278 <protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" />
279 <protected-broadcast android:name="android.intent.action.MEDIA_NOFS" />
280 <protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" />
281 <protected-broadcast android:name="android.intent.action.MEDIA_SHARED" />
282 <protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" />
283 <protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" />
284 <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" />
285 <protected-broadcast android:name="android.intent.action.MEDIA_EJECT" />
287 <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL" />
288 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" />
289 <!-- @deprecated. Only {@link android.net.ConnectivityManager.CONNECTIVITY_ACTION} is sent. -->
290 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" />
291 <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" />
292 <protected-broadcast android:name="android.net.conn.RESTRICT_BACKGROUND_CHANGED" />
293 <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" />
294 <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" />
296 <protected-broadcast android:name="android.net.nsd.STATE_CHANGED" />
298 <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" />
299 <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" />
300 <protected-broadcast android:name="com.android.nfc.action.LLCP_UP" />
301 <protected-broadcast android:name="com.android.nfc.action.LLCP_DOWN" />
302 <protected-broadcast android:name="com.android.nfc.cardemulation.action.CLOSE_TAP_DIALOG" />
303 <protected-broadcast android:name="com.android.nfc.handover.action.ALLOW_CONNECT" />
304 <protected-broadcast android:name="com.android.nfc.handover.action.DENY_CONNECT" />
305 <protected-broadcast android:name="com.android.nfc.handover.action.TIMEOUT_CONNECT" />
306 <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" />
307 <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" />
308 <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" />
309 <!-- For NFC to BT handover -->
310 <protected-broadcast android:name="android.btopp.intent.action.WHITELIST_DEVICE" />
311 <protected-broadcast android:name="android.btopp.intent.action.STOP_HANDOVER_TRANSFER" />
312 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND" />
313 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND_MULTIPLE" />
314 <protected-broadcast android:name="com.android.nfc.handover.action.CANCEL_HANDOVER_TRANSFER" />
316 <protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" />
317 <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" />
319 <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" />
321 <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" />
322 <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" />
323 <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" />
325 <protected-broadcast android:name="com.android.server.stats.action.TRIGGER_COLLECTION" />
327 <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" />
328 <protected-broadcast android:name="com.android.server.WifiManager.action.START_PNO" />
329 <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" />
330 <protected-broadcast android:name="com.android.server.WifiManager.action.DEVICE_IDLE" />
331 <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_ACCEPTED" />
332 <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_DECLINED" />
333 <protected-broadcast android:name="com.android.internal.action.EUICC_FACTORY_RESET" />
334 <protected-broadcast android:name="com.android.server.usb.ACTION_OPEN_IN_APPS" />
335 <protected-broadcast android:name="com.android.server.am.DELETE_DUMPHEAP" />
336 <protected-broadcast android:name="com.android.server.net.action.SNOOZE_WARNING" />
337 <protected-broadcast android:name="com.android.server.net.action.SNOOZE_RAPID" />
338 <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.USER_DISMISSED_NOTIFICATION" />
339 <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.CONNECT_TO_NETWORK" />
340 <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.PICK_WIFI_NETWORK" />
341 <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.PICK_NETWORK_AFTER_FAILURE" />
342 <protected-broadcast android:name="com.android.server.wifi.wakeup.DISMISS_NOTIFICATION" />
343 <protected-broadcast android:name="com.android.server.wifi.wakeup.OPEN_WIFI_PREFERENCES" />
344 <protected-broadcast android:name="com.android.server.wifi.wakeup.OPEN_WIFI_SETTINGS" />
345 <protected-broadcast android:name="com.android.server.wifi.wakeup.TURN_OFF_WIFI_WAKE" />
346 <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" />
347 <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" />
348 <protected-broadcast android:name="android.net.wifi.WIFI_CREDENTIAL_CHANGED" />
349 <protected-broadcast android:name="android.net.wifi.WIFI_SCAN_AVAILABLE" />
350 <protected-broadcast android:name="android.net.wifi.aware.action.WIFI_AWARE_STATE_CHANGED" />
351 <protected-broadcast android:name="android.net.wifi.rtt.action.WIFI_RTT_STATE_CHANGED" />
352 <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" />
353 <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" />
354 <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" />
355 <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" />
356 <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" />
357 <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_DEAUTH_IMMINENT" />
358 <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_ICON" />
359 <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_OSU_PROVIDERS_LIST" />
360 <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_SUBSCRIPTION_REMEDIATION" />
361 <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" />
362 <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" />
363 <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" />
364 <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" />
365 <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" />
366 <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" />
367 <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" />
368 <protected-broadcast android:name="android.net.wifi.p2p.PERSISTENT_GROUPS_CHANGED" />
369 <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" />
370 <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" />
371 <protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" />
373 android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" />
374 <protected-broadcast android:name="android.net.scoring.SCORE_NETWORKS" />
375 <protected-broadcast android:name="android.net.scoring.SCORER_CHANGED" />
376 <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" />
377 <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" />
378 <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" />
379 <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" />
380 <protected-broadcast android:name="android.intent.action.APPLICATION_RESTRICTIONS_CHANGED" />
383 <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" />
384 <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" />
386 <protected-broadcast android:name="com.android.server.ACTION_TRIGGER_IDLE" />
388 <protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" />
390 <protected-broadcast android:name="android.intent.action.PHONE_STATE" />
392 <protected-broadcast android:name="android.intent.action.SUB_DEFAULT_CHANGED" />
394 <protected-broadcast android:name="android.location.GPS_ENABLED_CHANGE" />
395 <protected-broadcast android:name="android.location.PROVIDERS_CHANGED" />
396 <protected-broadcast android:name="android.location.MODE_CHANGED" />
397 <protected-broadcast android:name="android.location.GPS_FIX_CHANGE" />
398 <protected-broadcast android:name="android.net.proxy.PAC_REFRESH" />
400 <protected-broadcast android:name="android.telecom.action.DEFAULT_DIALER_CHANGED" />
401 <protected-broadcast android:name="android.provider.action.DEFAULT_SMS_PACKAGE_CHANGED" />
402 <protected-broadcast android:name="android.intent.action.CONTENT_CHANGED" />
403 <protected-broadcast android:name="android.provider.Telephony.MMS_DOWNLOADED" />
406 android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" />
408 <!-- Defined in RestrictionsManager -->
410 android:name="android.intent.action.PERMISSION_RESPONSE_RECEIVED" />
411 <!-- Defined in RestrictionsManager -->
413 <protected-broadcast android:name="android.intent.action.REQUEST_PERMISSION" />
414 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_STARTED" />
415 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
416 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_PROGRESS" />
417 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
419 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_DATA_SUBSCRIPTION_CHANGED" />
420 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_VOICE_SUBSCRIPTION_CHANGED" />
421 <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_CONTENT_CHANGE" />
422 <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_RECORD_UPDATED" />
424 <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_DONE" />
425 <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_FAILED" />
427 <protected-broadcast android:name="android.internal.policy.action.BURN_IN_PROTECTION" />
428 <protected-broadcast android:name="android.app.action.SYSTEM_UPDATE_POLICY_CHANGED" />
429 <protected-broadcast android:name="android.app.action.DEVICE_OWNER_CHANGED" />
430 <protected-broadcast android:name="android.app.action.MANAGED_USER_CREATED" />
433 <protected-broadcast android:name="android.intent.action.ANR" />
434 <protected-broadcast android:name="android.intent.action.CALL" />
435 <protected-broadcast android:name="android.intent.action.CALL_PRIVILEGED" />
436 <protected-broadcast android:name="android.intent.action.DROPBOX_ENTRY_ADDED" />
437 <protected-broadcast android:name="android.intent.action.INPUT_METHOD_CHANGED" />
438 <protected-broadcast android:name="android.intent.action.internal_sim_state_changed" />
439 <protected-broadcast android:name="android.intent.action.LOCKED_BOOT_COMPLETED" />
440 <protected-broadcast android:name="android.intent.action.PRECISE_CALL_STATE" />
441 <protected-broadcast android:name="android.intent.action.PRECISE_DATA_CONNECTION_STATE_CHANGED" />
442 <protected-broadcast android:name="android.intent.action.SUBSCRIPTION_PHONE_STATE" />
443 <protected-broadcast android:name="android.intent.action.USER_INFO_CHANGED" />
444 <protected-broadcast android:name="android.intent.action.USER_UNLOCKED" />
445 <protected-broadcast android:name="android.intent.action.WALLPAPER_CHANGED" />
447 <protected-broadcast android:name="android.app.action.DEVICE_POLICY_MANAGER_STATE_CHANGED" />
448 <protected-broadcast android:name="android.app.action.CHOOSE_PRIVATE_KEY_ALIAS" />
449 <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLED" />
450 <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLE_REQUESTED" />
451 <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_ENABLED" />
452 <protected-broadcast android:name="android.app.action.LOCK_TASK_ENTERING" />
453 <protected-broadcast android:name="android.app.action.LOCK_TASK_EXITING" />
454 <protected-broadcast android:name="android.app.action.NOTIFY_PENDING_SYSTEM_UPDATE" />
455 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_CHANGED" />
456 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_EXPIRING" />
457 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_FAILED" />
458 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_SUCCEEDED" />
459 <protected-broadcast android:name="com.android.server.ACTION_EXPIRED_PASSWORD_NOTIFICATION" />
461 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_ADDED" />
462 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNLOCKED" />
463 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_REMOVED" />
465 <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_STATE_CHANGED" />
466 <protected-broadcast android:name="com.android.bluetooth.map.USER_CONFIRM_TIMEOUT" />
467 <protected-broadcast android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_SENT" />
468 <protected-broadcast android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_DELIVERY" />
469 <protected-broadcast android:name="android.content.jobscheduler.JOB_DELAY_EXPIRED" />
470 <protected-broadcast android:name="android.content.syncmanager.SYNC_ALARM" />
471 <protected-broadcast android:name="android.media.INTERNAL_RINGER_MODE_CHANGED_ACTION" />
472 <protected-broadcast android:name="android.media.STREAM_DEVICES_CHANGED_ACTION" />
473 <protected-broadcast android:name="android.media.STREAM_MUTE_CHANGED_ACTION" />
474 <protected-broadcast android:name="android.net.sip.SIP_SERVICE_UP" />
475 <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" />
476 <protected-broadcast android:name="android.os.action.CHARGING" />
477 <protected-broadcast android:name="android.os.action.DISCHARGING" />
478 <protected-broadcast android:name="android.search.action.SEARCHABLES_CHANGED" />
479 <protected-broadcast android:name="android.security.STORAGE_CHANGED" />
480 <protected-broadcast android:name="android.security.action.TRUST_STORE_CHANGED" />
481 <protected-broadcast android:name="android.security.action.KEYCHAIN_CHANGED" />
482 <protected-broadcast android:name="android.security.action.KEY_ACCESS_CHANGED" />
483 <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_REGISTERED" />
484 <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_UNREGISTERED" />
485 <protected-broadcast android:name="android.telecom.action.SHOW_MISSED_CALLS_NOTIFICATION" />
486 <protected-broadcast android:name="android.telephony.action.CARRIER_CONFIG_CHANGED" />
487 <protected-broadcast android:name="android.telephony.action.DEFAULT_SUBSCRIPTION_CHANGED" />
488 <protected-broadcast android:name="android.telephony.action.DEFAULT_SMS_SUBSCRIPTION_CHANGED" />
489 <protected-broadcast android:name="android.telephony.action.SHOW_VOICEMAIL_NOTIFICATION" />
490 <protected-broadcast android:name="android.telephony.action.SUBSCRIPTION_PLANS_CHANGED" />
492 <protected-broadcast android:name="com.android.bluetooth.btservice.action.ALARM_WAKEUP" />
493 <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_POLL" />
494 <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_UPDATED" />
495 <protected-broadcast android:name="com.android.server.NetworkTimeUpdateService.action.POLL" />
496 <protected-broadcast android:name="com.android.server.telecom.intent.action.CALLS_ADD_ENTRY" />
497 <protected-broadcast android:name="com.android.settings.location.MODE_CHANGING" />
498 <protected-broadcast android:name="com.android.settings.bluetooth.ACTION_DISMISS_PAIRING" />
500 <protected-broadcast android:name="NotificationManagerService.TIMEOUT" />
501 <protected-broadcast android:name="ScheduleConditionProvider.EVALUATE" />
502 <protected-broadcast android:name="EventConditionProvider.EVALUATE" />
503 <protected-broadcast android:name="SnoozeHelper.EVALUATE" />
504 <protected-broadcast android:name="wifi_scan_available" />
506 <protected-broadcast android:name="action.cne.started" />
507 <protected-broadcast android:name="android.content.jobscheduler.JOB_DEADLINE_EXPIRED" />
508 <protected-broadcast android:name="android.intent.action.ACTION_UNSOL_RESPONSE_OEM_HOOK_RAW" />
509 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_SUPL" />
510 <protected-broadcast android:name="android.os.action.LIGHT_DEVICE_IDLE_MODE_CHANGED" />
511 <protected-broadcast android:name="android.os.storage.action.VOLUME_STATE_CHANGED" />
512 <protected-broadcast android:name="android.os.storage.action.DISK_SCANNED" />
513 <protected-broadcast android:name="com.android.server.action.UPDATE_TWILIGHT_STATE" />
514 <protected-broadcast android:name="com.android.server.action.RESET_TWILIGHT_AUTO" />
515 <protected-broadcast android:name="com.android.server.device_idle.STEP_IDLE_STATE" />
516 <protected-broadcast android:name="com.android.server.device_idle.STEP_LIGHT_IDLE_STATE" />
517 <protected-broadcast android:name="com.android.server.Wifi.action.TOGGLE_PNO" />
518 <protected-broadcast android:name="intent.action.ACTION_RF_BAND_INFO" />
519 <protected-broadcast android:name="android.intent.action.MEDIA_RESOURCE_GRANTED" />
520 <protected-broadcast android:name="android.app.action.NETWORK_LOGS_AVAILABLE" />
521 <protected-broadcast android:name="android.app.action.SECURITY_LOGS_AVAILABLE" />
523 <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED" />
524 <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED_INTERNAL" />
525 <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_CHANGED" />
526 <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_ACCESS_GRANTED_CHANGED" />
527 <protected-broadcast android:name="android.os.action.ACTION_EFFECTS_SUPPRESSOR_CHANGED" />
528 <protected-broadcast android:name="android.app.action.NOTIFICATION_CHANNEL_BLOCK_STATE_CHANGED" />
529 <protected-broadcast android:name="android.app.action.NOTIFICATION_CHANNEL_GROUP_BLOCK_STATE_CHANGED" />
530 <protected-broadcast android:name="android.app.action.APP_BLOCK_STATE_CHANGED" />
532 <protected-broadcast android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS" />
533 <protected-broadcast android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS" />
535 <protected-broadcast android:name="android.intent.action.DYNAMIC_SENSOR_CHANGED" />
537 <protected-broadcast android:name="android.intent.action.ACTION_RADIO_OFF" />
539 <protected-broadcast android:name="android.accounts.LOGIN_ACCOUNTS_CHANGED" />
540 <protected-broadcast android:name="android.accounts.action.ACCOUNT_REMOVED" />
541 <protected-broadcast android:name="android.accounts.action.VISIBLE_ACCOUNTS_CHANGED" />
543 <protected-broadcast android:name="com.android.sync.SYNC_CONN_STATUS_CHANGED" />
545 <protected-broadcast android:name="com.android.phone.SIP_INCOMING_CALL" />
546 <protected-broadcast android:name="com.android.phone.SIP_ADD_PHONE" />
547 <protected-broadcast android:name="com.android.phone.SIP_REMOVE_PHONE" />
548 <protected-broadcast android:name="com.android.phone.SIP_CALL_OPTION_CHANGED" />
550 <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_CONNECTED" />
551 <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_DISCONNECTED" />
553 <protected-broadcast android:name="android.bluetooth.input.profile.action.HANDSHAKE" />
554 <protected-broadcast android:name="android.bluetooth.input.profile.action.REPORT" />
556 <protected-broadcast android:name="android.intent.action.TWILIGHT_CHANGED" />
558 <protected-broadcast android:name="com.android.server.fingerprint.ACTION_LOCKOUT_RESET" />
559 <protected-broadcast android:name="android.net.wifi.PASSPOINT_ICON_RECEIVED" />
560 <protected-broadcast android:name="com.android.server.notification.CountdownConditionProvider" />
562 <protected-broadcast android:name="com.android.internal.location.ALARM_WAKEUP" />
563 <protected-broadcast android:name="com.android.internal.location.ALARM_TIMEOUT" />
564 <protected-broadcast android:name="android.intent.action.GLOBAL_BUTTON" />
566 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_AVAILABLE" />
567 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNAVAILABLE" />
568 <protected-broadcast android:name="com.android.server.pm.DISABLE_QUIET_MODE_AFTER_UNLOCK" />
570 <protected-broadcast android:name="com.android.server.retaildemo.ACTION_RESET_DEMO" />
572 <protected-broadcast android:name="android.intent.action.DEVICE_LOCKED_CHANGED" />
575 <protected-broadcast android:name="android.app.action.APPLICATION_DELEGATION_SCOPES_CHANGED" />
576 <protected-broadcast android:name="com.android.server.wm.ACTION_REVOKE_SYSTEM_ALERT_WINDOW_PERMISSION" />
577 <protected-broadcast android:name="android.media.tv.action.PARENTAL_CONTROLS_ENABLED_CHANGED" />
579 <protected-broadcast android:name="android.content.pm.action.SESSION_COMMITTED" />
580 <protected-broadcast android:name="android.os.action.USER_RESTRICTIONS_CHANGED" />
581 <protected-broadcast android:name="android.media.tv.action.PREVIEW_PROGRAM_ADDED_TO_WATCH_NEXT" />
582 <protected-broadcast android:name="android.media.tv.action.PREVIEW_PROGRAM_BROWSABLE_DISABLED" />
583 <protected-broadcast android:name="android.media.tv.action.WATCH_NEXT_PROGRAM_BROWSABLE_DISABLED" />
584 <protected-broadcast android:name="android.media.tv.action.CHANNEL_BROWSABLE_REQUESTED" />
585 <protected-broadcast android:name="com.android.server.InputMethodManagerService.SHOW_INPUT_METHOD_PICKER" />
587 <!-- Time zone rules update intents fired by the system server -->
588 <protected-broadcast android:name="com.android.intent.action.timezone.RULES_UPDATE_OPERATION" />
589 <protected-broadcast android:name="com.android.intent.action.timezone.TRIGGER_RULES_UPDATE_CHECK" />
591 <!-- Made protected in P (was introduced in JB-MR2) -->
592 <protected-broadcast android:name="android.intent.action.GET_RESTRICTION_ENTRIES" />
593 <protected-broadcast android:name="android.telephony.euicc.action.OTA_STATUS_CHANGED" />
596 <protected-broadcast android:name="android.app.action.PROFILE_OWNER_CHANGED" />
597 <protected-broadcast android:name="android.app.action.TRANSFER_OWNERSHIP_COMPLETE" />
598 <protected-broadcast android:name="android.app.action.AFFILIATED_PROFILE_TRANSFER_OWNERSHIP_COMPLETE" />
599 <protected-broadcast android:name="android.app.action.DATA_SHARING_RESTRICTION_CHANGED" />
600 <protected-broadcast android:name="android.app.action.STATSD_STARTED" />
602 <!-- For IdleController -->
603 <protected-broadcast android:name="android.intent.action.DOCK_IDLE" />
604 <protected-broadcast android:name="android.intent.action.DOCK_ACTIVE" />
606 <!-- ====================================================================== -->
607 <!-- RUNTIME PERMISSIONS -->
608 <!-- ====================================================================== -->
611 <!-- ====================================================================== -->
612 <!-- Permissions for accessing user's contacts including personal profile -->
613 <!-- ====================================================================== -->
616 <!-- Used for runtime permissions related to contacts and profiles on this
618 <permission-group android:name="android.permission-group.CONTACTS"
619 android:icon="@drawable/perm_group_contacts"
620 android:label="@string/permgrouplab_contacts"
621 android:description="@string/permgroupdesc_contacts"
622 android:request="@string/permgrouprequest_contacts"
623 android:priority="100" />
625 <!-- Allows an application to read the user's contacts data.
626 <p>Protection level: dangerous
628 <permission android:name="android.permission.READ_CONTACTS"
629 android:permissionGroup="android.permission-group.CONTACTS"
630 android:label="@string/permlab_readContacts"
631 android:description="@string/permdesc_readContacts"
632 android:protectionLevel="dangerous" />
634 <!-- Allows an application to write the user's contacts data.
635 <p>Protection level: dangerous
637 <permission android:name="android.permission.WRITE_CONTACTS"
638 android:permissionGroup="android.permission-group.CONTACTS"
639 android:label="@string/permlab_writeContacts"
640 android:description="@string/permdesc_writeContacts"
641 android:protectionLevel="dangerous" />
643 <!-- ====================================================================== -->
644 <!-- Permissions for accessing user's calendar -->
645 <!-- ====================================================================== -->
648 <!-- Used for runtime permissions related to user's calendar. -->
649 <permission-group android:name="android.permission-group.CALENDAR"
650 android:icon="@drawable/perm_group_calendar"
651 android:label="@string/permgrouplab_calendar"
652 android:description="@string/permgroupdesc_calendar"
653 android:request="@string/permgrouprequest_calendar"
654 android:priority="200" />
656 <!-- Allows an application to read the user's calendar data.
657 <p>Protection level: dangerous
659 <permission android:name="android.permission.READ_CALENDAR"
660 android:permissionGroup="android.permission-group.CALENDAR"
661 android:label="@string/permlab_readCalendar"
662 android:description="@string/permdesc_readCalendar"
663 android:protectionLevel="dangerous" />
665 <!-- Allows an application to write the user's calendar data.
666 <p>Protection level: dangerous
668 <permission android:name="android.permission.WRITE_CALENDAR"
669 android:permissionGroup="android.permission-group.CALENDAR"
670 android:label="@string/permlab_writeCalendar"
671 android:description="@string/permdesc_writeCalendar"
672 android:protectionLevel="dangerous" />
674 <!-- ====================================================================== -->
675 <!-- Permissions for accessing and modifying user's SMS messages -->
676 <!-- ====================================================================== -->
679 <!-- Used for runtime permissions related to user's SMS messages. -->
680 <permission-group android:name="android.permission-group.SMS"
681 android:icon="@drawable/perm_group_sms"
682 android:label="@string/permgrouplab_sms"
683 android:description="@string/permgroupdesc_sms"
684 android:request="@string/permgrouprequest_sms"
685 android:priority="300" />
687 <!-- Allows an application to send SMS messages.
688 <p>Protection level: dangerous
690 <permission android:name="android.permission.SEND_SMS"
691 android:permissionGroup="android.permission-group.SMS"
692 android:label="@string/permlab_sendSms"
693 android:description="@string/permdesc_sendSms"
694 android:permissionFlags="costsMoney"
695 android:protectionLevel="dangerous" />
697 <!-- Allows an application to receive SMS messages.
698 <p>Protection level: dangerous
700 <permission android:name="android.permission.RECEIVE_SMS"
701 android:permissionGroup="android.permission-group.SMS"
702 android:label="@string/permlab_receiveSms"
703 android:description="@string/permdesc_receiveSms"
704 android:protectionLevel="dangerous"/>
706 <!-- Allows an application to read SMS messages.
707 <p>Protection level: dangerous
709 <permission android:name="android.permission.READ_SMS"
710 android:permissionGroup="android.permission-group.SMS"
711 android:label="@string/permlab_readSms"
712 android:description="@string/permdesc_readSms"
713 android:protectionLevel="dangerous" />
715 <!-- Allows an application to receive WAP push messages.
716 <p>Protection level: dangerous
718 <permission android:name="android.permission.RECEIVE_WAP_PUSH"
719 android:permissionGroup="android.permission-group.SMS"
720 android:label="@string/permlab_receiveWapPush"
721 android:description="@string/permdesc_receiveWapPush"
722 android:protectionLevel="dangerous" />
724 <!-- Allows an application to monitor incoming MMS messages.
725 <p>Protection level: dangerous
727 <permission android:name="android.permission.RECEIVE_MMS"
728 android:permissionGroup="android.permission-group.SMS"
729 android:label="@string/permlab_receiveMms"
730 android:description="@string/permdesc_receiveMms"
731 android:protectionLevel="dangerous" />
733 <!-- Allows an application to read previously received cell broadcast
734 messages and to register a content observer to get notifications when
735 a cell broadcast has been received and added to the database. For
736 emergency alerts, the database is updated immediately after the
737 alert dialog and notification sound/vibration/speech are presented.
738 The "read" column is then updated after the user dismisses the alert.
739 This enables supplementary emergency assistance apps to start loading
740 additional emergency information (if Internet access is available)
741 when the alert is first received, and to delay presenting the info
742 to the user until after the initial alert dialog is dismissed.
743 <p>Protection level: dangerous
744 @hide Pending API council approval -->
745 <permission android:name="android.permission.READ_CELL_BROADCASTS"
746 android:permissionGroup="android.permission-group.SMS"
747 android:label="@string/permlab_readCellBroadcasts"
748 android:description="@string/permdesc_readCellBroadcasts"
749 android:protectionLevel="dangerous" />
751 <!-- ====================================================================== -->
752 <!-- Permissions for accessing external storage -->
753 <!-- ====================================================================== -->
756 <!-- Used for runtime permissions related to the shared external storage. -->
757 <permission-group android:name="android.permission-group.STORAGE"
758 android:icon="@drawable/perm_group_storage"
759 android:label="@string/permgrouplab_storage"
760 android:description="@string/permgroupdesc_storage"
761 android:request="@string/permgrouprequest_storage"
762 android:priority="900" />
764 <!-- Allows an application to read from external storage.
765 <p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly
766 granted this permission.</p>
767 <p>This permission is enforced starting in API level 19. Before API level 19, this
768 permission is not enforced and all apps still have access to read from external storage.
769 You can test your app with the permission enforced by enabling <em>Protect USB
770 storage</em> under Developer options in the Settings app on a device running Android 4.1 or
772 <p>Also starting in API level 19, this permission is <em>not</em> required to
773 read/write files in your application-specific directories returned by
774 {@link android.content.Context#getExternalFilesDir} and
775 {@link android.content.Context#getExternalCacheDir}.
776 <p class="note"><strong>Note:</strong> If <em>both</em> your <a
777 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
778 minSdkVersion}</a> and <a
779 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
780 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
781 grants your app this permission. If you don't need this permission, be sure your <a
782 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
783 targetSdkVersion}</a> is 4 or higher.
784 <p>Protection level: dangerous
786 <permission android:name="android.permission.READ_EXTERNAL_STORAGE"
787 android:permissionGroup="android.permission-group.STORAGE"
788 android:label="@string/permlab_sdcardRead"
789 android:description="@string/permdesc_sdcardRead"
790 android:protectionLevel="dangerous" />
792 <!-- Allows an application to write to external storage.
793 <p class="note"><strong>Note:</strong> If <em>both</em> your <a
794 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
795 minSdkVersion}</a> and <a
796 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
797 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
798 grants your app this permission. If you don't need this permission, be sure your <a
799 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
800 targetSdkVersion}</a> is 4 or higher.
801 <p>Starting in API level 19, this permission is <em>not</em> required to
802 read/write files in your application-specific directories returned by
803 {@link android.content.Context#getExternalFilesDir} and
804 {@link android.content.Context#getExternalCacheDir}.
805 <p>Protection level: dangerous
807 <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE"
808 android:permissionGroup="android.permission-group.STORAGE"
809 android:label="@string/permlab_sdcardWrite"
810 android:description="@string/permdesc_sdcardWrite"
811 android:protectionLevel="dangerous" />
813 <!-- ====================================================================== -->
814 <!-- Permissions for accessing the device location -->
815 <!-- ====================================================================== -->
818 <!-- Used for permissions that allow accessing the device location. -->
819 <permission-group android:name="android.permission-group.LOCATION"
820 android:icon="@drawable/perm_group_location"
821 android:label="@string/permgrouplab_location"
822 android:description="@string/permgroupdesc_location"
823 android:request="@string/permgrouprequest_location"
824 android:priority="400" />
826 <!-- Allows an app to access precise location.
827 Alternatively, you might want {@link #ACCESS_COARSE_LOCATION}.
828 <p>Protection level: dangerous
830 <permission android:name="android.permission.ACCESS_FINE_LOCATION"
831 android:permissionGroup="android.permission-group.LOCATION"
832 android:label="@string/permlab_accessFineLocation"
833 android:description="@string/permdesc_accessFineLocation"
834 android:protectionLevel="dangerous|instant" />
836 <!-- Allows an app to access approximate location.
837 Alternatively, you might want {@link #ACCESS_FINE_LOCATION}.
838 <p>Protection level: dangerous
840 <permission android:name="android.permission.ACCESS_COARSE_LOCATION"
841 android:permissionGroup="android.permission-group.LOCATION"
842 android:label="@string/permlab_accessCoarseLocation"
843 android:description="@string/permdesc_accessCoarseLocation"
844 android:protectionLevel="dangerous|instant" />
846 <!-- ====================================================================== -->
847 <!-- Permissions for accessing the call log -->
848 <!-- ====================================================================== -->
851 <!-- Used for permissions that are associated telephony features. -->
852 <permission-group android:name="android.permission-group.CALL_LOG"
853 android:icon="@drawable/perm_group_call_log"
854 android:label="@string/permgrouplab_calllog"
855 android:description="@string/permgroupdesc_calllog"
856 android:request="@string/permgrouprequest_calllog"
857 android:priority="450" />
859 <!-- Allows an application to access the IMS call service: making and
861 <p>Protection level: signature|privileged
864 <permission android:name="android.permission.ACCESS_IMS_CALL_SERVICE"
865 android:label="@string/permlab_accessImsCallService"
866 android:description="@string/permdesc_accessImsCallService"
867 android:protectionLevel="signature|privileged" />
869 <!-- Allows an application to read the user's call log.
870 <p class="note"><strong>Note:</strong> If your app uses the
871 {@link #READ_CONTACTS} permission and <em>both</em> your <a
872 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
873 minSdkVersion}</a> and <a
874 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
875 targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
876 grants your app this permission. If you don't need this permission, be sure your <a
877 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
878 targetSdkVersion}</a> is 16 or higher.</p>
879 <p>Protection level: dangerous
881 <permission android:name="android.permission.READ_CALL_LOG"
882 android:permissionGroup="android.permission-group.CALL_LOG"
883 android:label="@string/permlab_readCallLog"
884 android:description="@string/permdesc_readCallLog"
885 android:protectionLevel="dangerous" />
887 <!-- Allows an application to write (but not read) the user's
889 <p class="note"><strong>Note:</strong> If your app uses the
890 {@link #WRITE_CONTACTS} permission and <em>both</em> your <a
891 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
892 minSdkVersion}</a> and <a
893 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
894 targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
895 grants your app this permission. If you don't need this permission, be sure your <a
896 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
897 targetSdkVersion}</a> is 16 or higher.</p>
898 <p>Protection level: dangerous
900 <permission android:name="android.permission.WRITE_CALL_LOG"
901 android:permissionGroup="android.permission-group.CALL_LOG"
902 android:label="@string/permlab_writeCallLog"
903 android:description="@string/permdesc_writeCallLog"
904 android:protectionLevel="dangerous" />
906 <!-- Allows an application to see the number being dialed during an outgoing
907 call with the option to redirect the call to a different number or
908 abort the call altogether.
909 <p>Protection level: dangerous
911 <permission android:name="android.permission.PROCESS_OUTGOING_CALLS"
912 android:permissionGroup="android.permission-group.CALL_LOG"
913 android:label="@string/permlab_processOutgoingCalls"
914 android:description="@string/permdesc_processOutgoingCalls"
915 android:protectionLevel="dangerous" />
917 <!-- ====================================================================== -->
918 <!-- Permissions for accessing the device telephony -->
919 <!-- ====================================================================== -->
922 <!-- Used for permissions that are associated telephony features. -->
923 <permission-group android:name="android.permission-group.PHONE"
924 android:icon="@drawable/perm_group_phone_calls"
925 android:label="@string/permgrouplab_phone"
926 android:description="@string/permgroupdesc_phone"
927 android:request="@string/permgrouprequest_phone"
928 android:priority="500" />
930 <!-- Allows read only access to phone state, including the phone number of the device,
931 current cellular network information, the status of any ongoing calls, and a list of any
932 {@link android.telecom.PhoneAccount}s registered on the device.
933 <p class="note"><strong>Note:</strong> If <em>both</em> your <a
934 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
935 minSdkVersion}</a> and <a
936 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
937 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
938 grants your app this permission. If you don't need this permission, be sure your <a
939 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
940 targetSdkVersion}</a> is 4 or higher.
941 <p>Protection level: dangerous
943 <permission android:name="android.permission.READ_PHONE_STATE"
944 android:permissionGroup="android.permission-group.PHONE"
945 android:label="@string/permlab_readPhoneState"
946 android:description="@string/permdesc_readPhoneState"
947 android:protectionLevel="dangerous" />
949 <!-- Allows read access to the device's phone number(s). This is a subset of the capabilities
950 granted by {@link #READ_PHONE_STATE} but is exposed to instant applications.
951 <p>Protection level: dangerous-->
952 <permission android:name="android.permission.READ_PHONE_NUMBERS"
953 android:permissionGroup="android.permission-group.PHONE"
954 android:label="@string/permlab_readPhoneNumbers"
955 android:description="@string/permdesc_readPhoneNumbers"
956 android:protectionLevel="dangerous|instant" />
958 <!-- Allows an application to initiate a phone call without going through
959 the Dialer user interface for the user to confirm the call.
960 <p>Protection level: dangerous
962 <permission android:name="android.permission.CALL_PHONE"
963 android:permissionGroup="android.permission-group.PHONE"
964 android:permissionFlags="costsMoney"
965 android:label="@string/permlab_callPhone"
966 android:description="@string/permdesc_callPhone"
967 android:protectionLevel="dangerous" />
969 <!-- Allows an application to add voicemails into the system.
970 <p>Protection level: dangerous
972 <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL"
973 android:permissionGroup="android.permission-group.PHONE"
974 android:label="@string/permlab_addVoicemail"
975 android:description="@string/permdesc_addVoicemail"
976 android:protectionLevel="dangerous" />
978 <!-- Allows an application to use SIP service.
979 <p>Protection level: dangerous
981 <permission android:name="android.permission.USE_SIP"
982 android:permissionGroup="android.permission-group.PHONE"
983 android:description="@string/permdesc_use_sip"
984 android:label="@string/permlab_use_sip"
985 android:protectionLevel="dangerous"/>
987 <!-- Allows the app to answer an incoming phone call.
988 <p>Protection level: dangerous
990 <permission android:name="android.permission.ANSWER_PHONE_CALLS"
991 android:permissionGroup="android.permission-group.PHONE"
992 android:label="@string/permlab_answerPhoneCalls"
993 android:description="@string/permdesc_answerPhoneCalls"
994 android:protectionLevel="dangerous|runtime" />
996 <!-- Allows a calling application which manages it own calls through the self-managed
997 {@link android.telecom.ConnectionService} APIs. See
998 {@link android.telecom.PhoneAccount#CAPABILITY_SELF_MANAGED for more information on the
999 self-managed ConnectionService APIs.
1000 <p>Protection level: normal
1002 <permission android:name="android.permission.MANAGE_OWN_CALLS"
1003 android:label="@string/permlab_manageOwnCalls"
1004 android:description="@string/permdesc_manageOwnCalls"
1005 android:protectionLevel="normal" />
1007 <!-- Allows a calling app to continue a call which was started in another app. An example is a
1008 video calling app that wants to continue a voice call on the user's mobile network.<p>
1009 When the handover of a call from one app to another takes place, there are two devices
1010 which are involved in the handover; the initiating and receiving devices. The initiating
1011 device is where the request to handover the call was started, and the receiving device is
1012 where the handover request is confirmed by the other party.<p>
1013 This permission protects access to the
1014 {@link android.telecom.TelecomManager#acceptHandover(Uri, int, PhoneAccountHandle)} which
1015 the receiving side of the handover uses to accept a handover.
1016 <p>Protection level: dangerous
1018 <permission android:name="android.permission.ACCEPT_HANDOVER"
1019 android:permissionGroup="android.permission-group.PHONE"
1020 android.label="@string/permlab_acceptHandover"
1021 android:description="@string/permdesc_acceptHandovers"
1022 android:protectionLevel="dangerous" />
1024 <!-- ====================================================================== -->
1025 <!-- Permissions for accessing the device microphone -->
1026 <!-- ====================================================================== -->
1029 <!-- Used for permissions that are associated with accessing
1030 microphone audio from the device. Note that phone calls also capture audio
1031 but are in a separate (more visible) permission group. -->
1032 <permission-group android:name="android.permission-group.MICROPHONE"
1033 android:icon="@drawable/perm_group_microphone"
1034 android:label="@string/permgrouplab_microphone"
1035 android:description="@string/permgroupdesc_microphone"
1036 android:request="@string/permgrouprequest_microphone"
1037 android:priority="600" />
1039 <!-- Allows an application to record audio.
1040 <p>Protection level: dangerous
1042 <permission android:name="android.permission.RECORD_AUDIO"
1043 android:permissionGroup="android.permission-group.MICROPHONE"
1044 android:label="@string/permlab_recordAudio"
1045 android:description="@string/permdesc_recordAudio"
1046 android:protectionLevel="dangerous|instant"/>
1048 <!-- ====================================================================== -->
1049 <!-- Permissions for accessing the UCE Service -->
1050 <!-- ====================================================================== -->
1052 <!-- @hide Allows an application to Access UCE-Presence.
1053 <p>Protection level: signature|privileged
1055 <permission android:name="android.permission.ACCESS_UCE_PRESENCE_SERVICE"
1056 android:permissionGroup="android.permission-group.PHONE"
1057 android:protectionLevel="signature|privileged"/>
1059 <!-- @hide Allows an application to Access UCE-OPTIONS.
1060 <p>Protection level: signature|privileged
1062 <permission android:name="android.permission.ACCESS_UCE_OPTIONS_SERVICE"
1063 android:permissionGroup="android.permission-group.PHONE"
1064 android:protectionLevel="signature|privileged"/>
1068 <!-- ====================================================================== -->
1069 <!-- Permissions for accessing the device camera -->
1070 <!-- ====================================================================== -->
1073 <!-- Used for permissions that are associated with accessing
1074 camera or capturing images/video from the device. -->
1075 <permission-group android:name="android.permission-group.CAMERA"
1076 android:icon="@drawable/perm_group_camera"
1077 android:label="@string/permgrouplab_camera"
1078 android:description="@string/permgroupdesc_camera"
1079 android:request="@string/permgrouprequest_camera"
1080 android:priority="700" />
1082 <!-- Required to be able to access the camera device.
1083 <p>This will automatically enforce the <a
1084 href="{@docRoot}guide/topics/manifest/uses-feature-element.html">
1085 <uses-feature>}</a> manifest element for <em>all</em> camera features.
1086 If you do not require all camera features or can properly operate if a camera
1087 is not available, then you must modify your manifest as appropriate in order to
1088 install on devices that don't support all camera features.</p>
1089 <p>Protection level: dangerous
1091 <permission android:name="android.permission.CAMERA"
1092 android:permissionGroup="android.permission-group.CAMERA"
1093 android:label="@string/permlab_camera"
1094 android:description="@string/permdesc_camera"
1095 android:protectionLevel="dangerous|instant" />
1098 <!-- ====================================================================== -->
1099 <!-- Permissions for accessing the device sensors -->
1100 <!-- ====================================================================== -->
1103 <!-- Used for permissions that are associated with accessing
1104 body or environmental sensors. -->
1105 <permission-group android:name="android.permission-group.SENSORS"
1106 android:icon="@drawable/perm_group_sensors"
1107 android:label="@string/permgrouplab_sensors"
1108 android:description="@string/permgroupdesc_sensors"
1109 android:request="@string/permgrouprequest_sensors"
1110 android:priority="800" />
1112 <!-- Allows an application to access data from sensors that the user uses to
1113 measure what is happening inside his/her body, such as heart rate.
1114 <p>Protection level: dangerous -->
1115 <permission android:name="android.permission.BODY_SENSORS"
1116 android:permissionGroup="android.permission-group.SENSORS"
1117 android:label="@string/permlab_bodySensors"
1118 android:description="@string/permdesc_bodySensors"
1119 android:protectionLevel="dangerous" />
1121 <!-- Allows an app to use fingerprint hardware.
1122 <p>Protection level: normal
1123 @deprecated Applications should request {@link
1124 android.Manifest.permission#USE_BIOMETRIC} instead
1126 <permission android:name="android.permission.USE_FINGERPRINT"
1127 android:permissionGroup="android.permission-group.SENSORS"
1128 android:label="@string/permlab_useFingerprint"
1129 android:description="@string/permdesc_useFingerprint"
1130 android:protectionLevel="normal" />
1132 <!-- Allows an app to use device supported biometric modalities.
1133 <p>Protection level: normal
1135 <permission android:name="android.permission.USE_BIOMETRIC"
1136 android:permissionGroup="android.permission-group.SENSORS"
1137 android:label="@string/permlab_useBiometric"
1138 android:description="@string/permdesc_useBiometric"
1139 android:protectionLevel="normal" />
1141 <!-- ====================================================================== -->
1142 <!-- REMOVED PERMISSIONS -->
1143 <!-- ====================================================================== -->
1145 <!-- @hide We need to keep this around for backwards compatibility -->
1146 <permission android:name="android.permission.READ_PROFILE"
1147 android:protectionLevel="normal"
1148 android:permissionFlags="removed"/>
1150 <!-- @hide We need to keep this around for backwards compatibility -->
1151 <permission android:name="android.permission.WRITE_PROFILE"
1152 android:protectionLevel="normal"
1153 android:permissionFlags="removed"/>
1155 <!-- @hide We need to keep this around for backwards compatibility -->
1156 <permission android:name="android.permission.READ_SOCIAL_STREAM"
1157 android:protectionLevel="normal"
1158 android:permissionFlags="removed"/>
1160 <!-- @hide We need to keep this around for backwards compatibility -->
1161 <permission android:name="android.permission.WRITE_SOCIAL_STREAM"
1162 android:protectionLevel="normal"
1163 android:permissionFlags="removed"/>
1165 <!-- @hide We need to keep this around for backwards compatibility -->
1166 <permission android:name="android.permission.READ_USER_DICTIONARY"
1167 android:protectionLevel="normal"
1168 android:permissionFlags="removed"/>
1170 <!-- @hide We need to keep this around for backwards compatibility -->
1171 <permission android:name="android.permission.WRITE_USER_DICTIONARY"
1172 android:protectionLevel="normal"
1173 android:permissionFlags="removed"/>
1175 <!-- @hide We need to keep this around for backwards compatibility -->
1176 <permission android:name="android.permission.WRITE_SMS"
1177 android:protectionLevel="normal"
1178 android:permissionFlags="removed"/>
1180 <!-- @hide We need to keep this around for backwards compatibility -->
1181 <permission android:name="com.android.browser.permission.READ_HISTORY_BOOKMARKS"
1182 android:protectionLevel="normal"
1183 android:permissionFlags="removed"/>
1185 <!-- @hide We need to keep this around for backwards compatibility -->
1186 <permission android:name="com.android.browser.permission.WRITE_HISTORY_BOOKMARKS"
1187 android:protectionLevel="normal"
1188 android:permissionFlags="removed"/>
1190 <!-- @hide We need to keep this around for backwards compatibility -->
1191 <permission android:name="android.permission.AUTHENTICATE_ACCOUNTS"
1192 android:protectionLevel="normal"
1193 android:permissionFlags="removed"/>
1195 <!-- @hide We need to keep this around for backwards compatibility -->
1196 <permission android:name="android.permission.MANAGE_ACCOUNTS"
1197 android:protectionLevel="normal"
1198 android:permissionFlags="removed"/>
1200 <!-- @hide We need to keep this around for backwards compatibility -->
1201 <permission android:name="android.permission.USE_CREDENTIALS"
1202 android:protectionLevel="normal"
1203 android:permissionFlags="removed"/>
1205 <!-- @hide We need to keep this around for backwards compatibility -->
1206 <permission android:name="android.permission.SUBSCRIBED_FEEDS_READ"
1207 android:protectionLevel="normal"
1208 android:permissionFlags="removed"/>
1210 <!-- @hide We need to keep this around for backwards compatibility -->
1211 <permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE"
1212 android:protectionLevel="normal"
1213 android:permissionFlags="removed"/>
1215 <!-- @hide We need to keep this around for backwards compatibility -->
1216 <permission android:name="android.permission.FLASHLIGHT"
1217 android:protectionLevel="normal"
1218 android:permissionFlags="removed"/>
1220 <!-- ====================================================================== -->
1221 <!-- INSTALL PERMISSIONS -->
1222 <!-- ====================================================================== -->
1224 <!-- ================================== -->
1225 <!-- Permissions for accessing messages -->
1226 <!-- ================================== -->
1229 <!-- @SystemApi Allows an application (Phone) to send a request to other applications
1230 to handle the respond-via-message action during incoming calls.
1231 <p>Not for use by third-party applications. -->
1232 <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE"
1233 android:protectionLevel="signature|privileged" />
1235 <!-- @SystemApi Allows an application to send SMS to premium shortcodes without user permission.
1236 <p>Not for use by third-party applications.
1238 <permission android:name="android.permission.SEND_SMS_NO_CONFIRMATION"
1239 android:protectionLevel="signature|privileged" />
1241 <!-- Allows an application to filter carrier specific sms.
1243 <permission android:name="android.permission.CARRIER_FILTER_SMS"
1244 android:protectionLevel="signature|privileged" />
1246 <!-- @SystemApi Allows an application to receive emergency cell broadcast messages,
1247 to record or display them to the user.
1248 <p>Not for use by third-party applications.
1250 <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST"
1251 android:protectionLevel="signature|privileged" />
1253 <!-- Allows an application to monitor incoming Bluetooth MAP messages, to record
1254 or perform processing on them. -->
1256 <permission android:name="android.permission.RECEIVE_BLUETOOTH_MAP"
1257 android:protectionLevel="signature|privileged" />
1259 <!-- @SystemApi @hide Allows an application to execute contacts directory search.
1260 This should only be used by ContactsProvider.
1261 <p>Not for use by third-party applications. -->
1262 <permission android:name="android.permission.BIND_DIRECTORY_SEARCH"
1263 android:protectionLevel="signature|privileged" />
1265 <!-- @SystemApi @hide Allows an application to modify cell broadcasts through the content provider.
1266 <p>Not for use by third-party applications. -->
1267 <permission android:name="android.permission.MODIFY_CELL_BROADCASTS"
1268 android:protectionLevel="signature|privileged" />
1270 <!-- =============================================================== -->
1271 <!-- Permissions for setting the device alarm -->
1272 <!-- =============================================================== -->
1275 <!-- Allows an application to broadcast an Intent to set an alarm for the user.
1276 <p>Protection level: normal
1278 <permission android:name="com.android.alarm.permission.SET_ALARM"
1279 android:label="@string/permlab_setAlarm"
1280 android:description="@string/permdesc_setAlarm"
1281 android:protectionLevel="normal" />
1283 <!-- =============================================================== -->
1284 <!-- Permissions for accessing the user voicemail -->
1285 <!-- =============================================================== -->
1288 <!-- Allows an application to modify and remove existing voicemails in the system.
1289 <p>Protection level: signature|privileged
1291 <permission android:name="com.android.voicemail.permission.WRITE_VOICEMAIL"
1292 android:protectionLevel="signature|privileged" />
1294 <!-- Allows an application to read voicemails in the system.
1295 <p>Protection level: signature|privileged
1297 <permission android:name="com.android.voicemail.permission.READ_VOICEMAIL"
1298 android:protectionLevel="signature|privileged" />
1300 <!-- ======================================= -->
1301 <!-- Permissions for accessing location info -->
1302 <!-- ======================================= -->
1305 <!-- Allows an application to access extra location provider commands.
1306 <p>Protection level: normal
1308 <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS"
1309 android:label="@string/permlab_accessLocationExtraCommands"
1310 android:description="@string/permdesc_accessLocationExtraCommands"
1311 android:protectionLevel="normal" />
1313 <!-- @SystemApi Allows an application to install a location provider into the Location Manager.
1314 <p>Not for use by third-party applications. -->
1315 <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER"
1316 android:protectionLevel="signature|privileged" />
1318 <!-- @SystemApi @hide Allows HDMI-CEC service to access device and configuration files.
1319 This should only be used by HDMI-CEC service.
1321 <permission android:name="android.permission.HDMI_CEC"
1322 android:protectionLevel="signature|privileged" />
1324 <!-- @SystemApi Allows an application to use location features in hardware,
1325 such as the geofencing api.
1326 <p>Not for use by third-party applications. -->
1327 <permission android:name="android.permission.LOCATION_HARDWARE"
1328 android:protectionLevel="signature|privileged" />
1329 <uses-permission android:name="android.permission.LOCATION_HARDWARE"/>
1331 <!-- @SystemApi Allows an application to create mock location providers for testing.
1332 <p>Protection level: signature
1335 <permission android:name="android.permission.ACCESS_MOCK_LOCATION"
1336 android:protectionLevel="signature" />
1338 <!-- ======================================= -->
1339 <!-- Permissions for accessing networks -->
1340 <!-- ======================================= -->
1343 <!-- Allows applications to open network sockets.
1344 <p>Protection level: normal
1346 <permission android:name="android.permission.INTERNET"
1347 android:description="@string/permdesc_createNetworkSockets"
1348 android:label="@string/permlab_createNetworkSockets"
1349 android:protectionLevel="normal|instant" />
1351 <!-- Allows applications to access information about networks.
1352 <p>Protection level: normal
1354 <permission android:name="android.permission.ACCESS_NETWORK_STATE"
1355 android:description="@string/permdesc_accessNetworkState"
1356 android:label="@string/permlab_accessNetworkState"
1357 android:protectionLevel="normal|instant" />
1359 <!-- Allows applications to access information about Wi-Fi networks.
1360 <p>Protection level: normal
1362 <permission android:name="android.permission.ACCESS_WIFI_STATE"
1363 android:description="@string/permdesc_accessWifiState"
1364 android:label="@string/permlab_accessWifiState"
1365 android:protectionLevel="normal" />
1367 <!-- Allows applications to change Wi-Fi connectivity state.
1368 <p>Protection level: normal
1370 <permission android:name="android.permission.CHANGE_WIFI_STATE"
1371 android:description="@string/permdesc_changeWifiState"
1372 android:label="@string/permlab_changeWifiState"
1373 android:protectionLevel="normal" />
1375 <!-- @SystemApi @hide Allows apps to create and manage IPsec tunnels.
1376 <p>Only granted to applications that are currently bound by the
1377 system for creating and managing IPsec-based interfaces.
1379 <permission android:name="android.permission.MANAGE_IPSEC_TUNNELS"
1380 android:protectionLevel="signature|appop" />
1382 <!-- @SystemApi @hide Allows applications to read Wi-Fi credential.
1383 <p>Not for use by third-party applications. -->
1384 <permission android:name="android.permission.READ_WIFI_CREDENTIAL"
1385 android:protectionLevel="signature|privileged" />
1387 <!-- @SystemApi @hide Allows applications to change tether state and run
1388 tether carrier provisioning.
1389 <p>Not for use by third-party applications. -->
1390 <permission android:name="android.permission.TETHER_PRIVILEGED"
1391 android:protectionLevel="signature|privileged" />
1393 <!-- @SystemApi @hide Allow system apps to receive broadcast
1394 when a wifi network credential is changed.
1395 <p>Not for use by third-party applications. -->
1396 <permission android:name="android.permission.RECEIVE_WIFI_CREDENTIAL_CHANGE"
1397 android:protectionLevel="signature|privileged" />
1399 <!-- @SystemApi @hide Allows an application to modify any wifi configuration, even if created
1400 by another application. Once reconfigured the original creator cannot make any further
1402 <p>Not for use by third-party applications. -->
1403 <permission android:name="android.permission.OVERRIDE_WIFI_CONFIG"
1404 android:protectionLevel="signature|privileged" />
1407 <permission android:name="android.permission.ACCESS_WIMAX_STATE"
1408 android:description="@string/permdesc_accessWimaxState"
1409 android:label="@string/permlab_accessWimaxState"
1410 android:protectionLevel="normal" />
1413 <permission android:name="android.permission.CHANGE_WIMAX_STATE"
1414 android:description="@string/permdesc_changeWimaxState"
1415 android:label="@string/permlab_changeWimaxState"
1416 android:protectionLevel="normal" />
1418 <!-- Allows applications to act as network scorers. @hide @SystemApi-->
1419 <permission android:name="android.permission.SCORE_NETWORKS"
1420 android:protectionLevel="signature|privileged" />
1422 <!-- Allows applications to request network
1423 recommendations and scores from the NetworkScoreService.
1424 <p>Not for use by third-party applications. @hide -->
1425 <permission android:name="android.permission.REQUEST_NETWORK_SCORES"
1426 android:protectionLevel="signature|setup" />
1428 <!-- Allows network stack services (Connectivity and Wifi) to coordinate
1429 <p>Not for use by third-party or privileged applications.
1430 @hide This should only be used by Connectivity and Wifi Services.
1432 <permission android:name="android.permission.NETWORK_STACK"
1433 android:protectionLevel="signature" />
1435 <!-- Allows Settings and SystemUI to call methods in Networking services
1436 <p>Not for use by third-party or privileged applications.
1437 @hide This should only be used by Settings and SystemUI.
1439 <permission android:name="android.permission.NETWORK_SETTINGS"
1440 android:protectionLevel="signature" />
1442 <!-- Allows SetupWizard to call methods in Networking services
1443 <p>Not for use by any other third-party or privileged applications.
1444 @hide This should only be used by SetupWizard.
1446 <permission android:name="android.permission.NETWORK_SETUP_WIZARD"
1447 android:protectionLevel="signature|setup" />
1449 <!-- #SystemApi @hide Allows applications to access information about LoWPAN interfaces.
1450 <p>Not for use by third-party applications. -->
1451 <permission android:name="android.permission.ACCESS_LOWPAN_STATE"
1452 android:protectionLevel="signature|privileged" />
1454 <!-- #SystemApi @hide Allows applications to change LoWPAN connectivity state.
1455 <p>Not for use by third-party applications. -->
1456 <permission android:name="android.permission.CHANGE_LOWPAN_STATE"
1457 android:protectionLevel="signature|privileged" />
1459 <!-- #SystemApi @hide Allows applications to read LoWPAN credential.
1460 <p>Not for use by third-party applications. -->
1461 <permission android:name="android.permission.READ_LOWPAN_CREDENTIAL"
1462 android:protectionLevel="signature|privileged" />
1464 <!-- #SystemApi @hide Allows a service to register or unregister
1465 new LoWPAN interfaces.
1466 <p>Not for use by third-party applications. -->
1467 <permission android:name="android.permission.MANAGE_LOWPAN_INTERFACES"
1468 android:protectionLevel="signature|privileged" />
1470 <!-- @hide Allows internal management of Wi-Fi connectivity state when on
1471 permission review mode.
1472 <p>Not for use by third-party applications. -->
1473 <permission android:name="android.permission.MANAGE_WIFI_WHEN_PERMISSION_REVIEW_REQUIRED"
1474 android:protectionLevel="signature" />
1476 <!-- #SystemApi @hide Allows an app to bypass Private DNS.
1477 <p>Not for use by third-party applications.
1478 TODO: publish as system API in next API release. -->
1479 <permission android:name="android.permission.NETWORK_BYPASS_PRIVATE_DNS"
1480 android:protectionLevel="signature" />
1482 <!-- ======================================= -->
1483 <!-- Permissions for short range, peripheral networks -->
1484 <!-- ======================================= -->
1487 <!-- Allows applications to connect to paired bluetooth devices.
1488 <p>Protection level: normal
1490 <permission android:name="android.permission.BLUETOOTH"
1491 android:description="@string/permdesc_bluetooth"
1492 android:label="@string/permlab_bluetooth"
1493 android:protectionLevel="normal" />
1495 <!-- @SystemApi Allows an application to suspend other apps, which will prevent the user
1496 from using them until they are unsuspended.
1499 <permission android:name="android.permission.SUSPEND_APPS"
1500 android:protectionLevel="signature|privileged" />
1502 <!-- Allows applications to discover and pair bluetooth devices.
1503 <p>Protection level: normal
1505 <permission android:name="android.permission.BLUETOOTH_ADMIN"
1506 android:description="@string/permdesc_bluetoothAdmin"
1507 android:label="@string/permlab_bluetoothAdmin"
1508 android:protectionLevel="normal" />
1510 <!-- @SystemApi Allows applications to pair bluetooth devices without user interaction, and to
1511 allow or disallow phonebook access or message access.
1512 This is not available to third party applications. -->
1513 <permission android:name="android.permission.BLUETOOTH_PRIVILEGED"
1514 android:protectionLevel="signature|privileged" />
1516 <!-- Control access to email providers exclusively for Bluetooth
1519 <permission android:name="android.permission.BLUETOOTH_MAP"
1520 android:protectionLevel="signature" />
1522 <!-- Allows bluetooth stack to access files
1523 @hide This should only be used by Bluetooth apk.
1525 <permission android:name="android.permission.BLUETOOTH_STACK"
1526 android:protectionLevel="signature" />
1528 <!-- Allows applications to perform I/O operations over NFC.
1529 <p>Protection level: normal
1531 <permission android:name="android.permission.NFC"
1532 android:description="@string/permdesc_nfc"
1533 android:label="@string/permlab_nfc"
1534 android:protectionLevel="normal" />
1536 <!-- Allows applications to receive NFC transaction events.
1537 <p>Protection level: normal
1539 <permission android:name="android.permission.NFC_TRANSACTION_EVENT"
1540 android:protectionLevel="normal" />
1542 <!-- @SystemApi Allows an internal user to use privileged ConnectivityManager APIs.
1544 <permission android:name="android.permission.CONNECTIVITY_INTERNAL"
1545 android:protectionLevel="signature|privileged" />
1547 <!-- @SystemApi Allows an internal user to use restricted Networks.
1549 <permission android:name="android.permission.CONNECTIVITY_USE_RESTRICTED_NETWORKS"
1550 android:protectionLevel="signature|privileged" />
1552 <!-- Allows a system application to access hardware packet offload capabilities.
1554 <permission android:name="android.permission.PACKET_KEEPALIVE_OFFLOAD"
1555 android:protectionLevel="signature|privileged" />
1559 <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE"
1560 android:protectionLevel="signature|privileged" />
1562 <!-- @SystemApi Allows access to the loop radio (Android@Home mesh network) device.
1564 <permission android:name="android.permission.LOOP_RADIO"
1565 android:protectionLevel="signature|privileged" />
1567 <!-- Allows sending and receiving handover transfer status from Wifi and Bluetooth
1569 <permission android:name="android.permission.NFC_HANDOVER_STATUS"
1570 android:protectionLevel="signature|privileged" />
1572 <!-- @hide Allows internal management of Bluetooth state when on permission review mode.
1573 <p>Not for use by third-party applications. -->
1574 <permission android:name="android.permission.MANAGE_BLUETOOTH_WHEN_PERMISSION_REVIEW_REQUIRED"
1575 android:protectionLevel="signature" />
1577 <!-- ================================== -->
1578 <!-- Permissions for accessing accounts -->
1579 <!-- ================================== -->
1582 <!-- Allows access to the list of accounts in the Accounts Service.
1584 <p class="note"><strong>Note:</strong> Beginning with Android 6.0 (API level
1585 23), if an app shares the signature of the authenticator that manages an
1586 account, it does not need <code>"GET_ACCOUNTS"</code> permission to read
1587 information about that account. On Android 5.1 and lower, all apps need
1588 <code>"GET_ACCOUNTS"</code> permission to read information about any
1591 <p>Protection level: dangerous
1593 <permission android:name="android.permission.GET_ACCOUNTS"
1594 android:permissionGroup="android.permission-group.CONTACTS"
1595 android:protectionLevel="dangerous"
1596 android:description="@string/permdesc_getAccounts"
1597 android:label="@string/permlab_getAccounts" />
1598 <uses-permission android:name="android.permission.GET_ACCOUNTS"/>
1600 <!-- @SystemApi Allows applications to call into AccountAuthenticators.
1601 <p>Not for use by third-party applications. -->
1602 <permission android:name="android.permission.ACCOUNT_MANAGER"
1603 android:protectionLevel="signature" />
1605 <!-- ================================== -->
1606 <!-- Permissions for accessing hardware that may effect battery life-->
1607 <!-- ================================== -->
1610 <!-- Allows applications to enter Wi-Fi Multicast mode.
1611 <p>Protection level: normal
1613 <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE"
1614 android:description="@string/permdesc_changeWifiMulticastState"
1615 android:label="@string/permlab_changeWifiMulticastState"
1616 android:protectionLevel="normal" />
1618 <!-- Allows access to the vibrator.
1619 <p>Protection level: normal
1621 <permission android:name="android.permission.VIBRATE"
1622 android:label="@string/permlab_vibrate"
1623 android:description="@string/permdesc_vibrate"
1624 android:protectionLevel="normal|instant" />
1626 <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen
1628 <p>Protection level: normal
1630 <permission android:name="android.permission.WAKE_LOCK"
1631 android:label="@string/permlab_wakeLock"
1632 android:description="@string/permdesc_wakeLock"
1633 android:protectionLevel="normal|instant" />
1635 <!-- Allows using the device's IR transmitter, if available.
1636 <p>Protection level: normal
1638 <permission android:name="android.permission.TRANSMIT_IR"
1639 android:label="@string/permlab_transmitIr"
1640 android:description="@string/permdesc_transmitIr"
1641 android:protectionLevel="normal" />
1643 <!-- ==================================================== -->
1644 <!-- Permissions related to changing audio settings -->
1645 <!-- ==================================================== -->
1648 <!-- Allows an application to modify global audio settings.
1649 <p>Protection level: normal
1651 <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS"
1652 android:label="@string/permlab_modifyAudioSettings"
1653 android:description="@string/permdesc_modifyAudioSettings"
1654 android:protectionLevel="normal" />
1656 <!-- ================================== -->
1657 <!-- Permissions for accessing hardware -->
1658 <!-- ================================== -->
1661 <!-- @SystemApi Allows an application to manage preferences and permissions for USB devices
1663 <permission android:name="android.permission.MANAGE_USB"
1664 android:protectionLevel="signature|privileged" />
1666 <!-- @SystemApi Allows an application to access the MTP USB kernel driver.
1667 For use only by the device side MTP implementation.
1669 <permission android:name="android.permission.ACCESS_MTP"
1670 android:protectionLevel="signature|privileged" />
1672 <!-- @SystemApi Allows access to hardware peripherals. Intended only for hardware testing.
1673 <p>Not for use by third-party applications.
1676 <permission android:name="android.permission.HARDWARE_TEST"
1677 android:protectionLevel="signature" />
1679 <!-- @SystemApi Allows access to Broadcast Radio
1680 @hide This is not a third-party API (intended for system apps).-->
1681 <permission android:name="android.permission.ACCESS_BROADCAST_RADIO"
1682 android:protectionLevel="signature|privileged" />
1684 <!-- @deprecated @SystemApi Allows access to FM
1685 @hide This is not a third-party API (intended for system apps).-->
1686 <permission android:name="android.permission.ACCESS_FM_RADIO"
1687 android:protectionLevel="signature|privileged" />
1689 <!-- Allows access to configure network interfaces, configure/use IPSec, etc.
1691 <permission android:name="android.permission.NET_ADMIN"
1692 android:protectionLevel="signature" />
1694 <!-- Allows registration for remote audio playback. @hide -->
1695 <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK"
1696 android:protectionLevel="signature" />
1698 <!-- @SystemApi Allows TvInputService to access underlying TV input hardware such as
1699 built-in tuners and HDMI-in's.
1700 @hide This should only be used by OEM's TvInputService's.
1702 <permission android:name="android.permission.TV_INPUT_HARDWARE"
1703 android:protectionLevel="signature|privileged" />
1705 <!-- @SystemApi Allows to capture a frame of TV input hardware such as
1706 built-in tuners and HDMI-in's.
1707 @hide <p>Not for use by third-party applications.
1709 <permission android:name="android.permission.CAPTURE_TV_INPUT"
1710 android:protectionLevel="signature|privileged" />
1712 <!-- @hide Allows TvInputService to access DVB device.
1713 <p>Not for use by third-party applications. -->
1714 <permission android:name="android.permission.DVB_DEVICE"
1715 android:protectionLevel="signature|privileged" />
1717 <!-- @SystemApi Allows reading and enabling/disabling the OEM unlock allowed by carrier state
1718 @hide <p>Not for use by third-party applications. -->
1719 <permission android:name="android.permission.MANAGE_CARRIER_OEM_UNLOCK_STATE"
1720 android:protectionLevel="signature|privileged" />
1722 <!-- @SystemApi Allows reading and enabling/disabling the OEM unlock allowed by user state
1723 @hide <p>Not for use by third-party applications. -->
1724 <permission android:name="android.permission.MANAGE_USER_OEM_UNLOCK_STATE"
1725 android:protectionLevel="signature|privileged" />
1727 <!-- @SystemApi Allows reading the OEM unlock state
1728 @hide <p>Not for use by third-party applications. -->
1729 <permission android:name="android.permission.READ_OEM_UNLOCK_STATE"
1730 android:protectionLevel="signature|privileged" />
1732 <!-- @hide Allows enabling/disabling OEM unlock
1733 <p>Not for use by third-party applications. -->
1734 <permission android:name="android.permission.OEM_UNLOCK_STATE"
1735 android:protectionLevel="signature" />
1737 <!-- @hide Allows querying state of PersistentDataBlock
1738 <p>Not for use by third-party applications. -->
1739 <permission android:name="android.permission.ACCESS_PDB_STATE"
1740 android:protectionLevel="signature" />
1742 <!-- Allows testing if a passwords is forbidden by the admins.
1743 @hide <p>Not for use by third-party applications. -->
1744 <permission android:name="android.permission.TEST_BLACKLISTED_PASSWORD"
1745 android:protectionLevel="signature" />
1747 <!-- @hide Allows system update service to notify device owner about pending updates.
1748 <p>Not for use by third-party applications. -->
1749 <permission android:name="android.permission.NOTIFY_PENDING_SYSTEM_UPDATE"
1750 android:protectionLevel="signature|privileged" />
1752 <!-- =========================================== -->
1753 <!-- Permissions associated with camera and image capture -->
1754 <!-- =========================================== -->
1757 <!-- @SystemApi Allows disabling the transmit-indicator LED that is normally on when
1758 a camera is in use by an application.
1760 <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED"
1761 android:protectionLevel="signature|privileged" />
1763 <!-- Allows sending the camera service notifications about system-wide events.
1765 <permission android:name="android.permission.CAMERA_SEND_SYSTEM_EVENTS"
1766 android:protectionLevel="signature|privileged" />
1768 <!-- =========================================== -->
1769 <!-- Permissions associated with telephony state -->
1770 <!-- =========================================== -->
1773 <!-- @SystemApi Allows modification of the telephony state - power on, mmi, etc.
1774 Does not include placing calls.
1775 <p>Not for use by third-party applications. -->
1776 <permission android:name="android.permission.MODIFY_PHONE_STATE"
1777 android:protectionLevel="signature|privileged" />
1779 <!-- Allows read only access to precise phone state.
1780 @hide Pending API council approval -->
1781 <permission android:name="android.permission.READ_PRECISE_PHONE_STATE"
1782 android:protectionLevel="signature|privileged" />
1784 <!-- @SystemApi Allows read access to privileged phone state.
1785 @hide Used internally. -->
1786 <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE"
1787 android:protectionLevel="signature|privileged" />
1789 <!-- @SystemApi Protects the ability to register any PhoneAccount with
1790 PhoneAccount#CAPABILITY_SIM_SUBSCRIPTION. This capability indicates that the PhoneAccount
1791 corresponds to a device SIM.
1793 <permission android:name="android.permission.REGISTER_SIM_SUBSCRIPTION"
1794 android:protectionLevel="signature|privileged" />
1796 <!-- @SystemApi Protects the ability to register any PhoneAccount with
1797 PhoneAccount#CAPABILITY_CALL_PROVIDER.
1799 <permission android:name="android.permission.REGISTER_CALL_PROVIDER"
1800 android:protectionLevel="signature|privileged" />
1802 <!-- @SystemApi Protects the ability to register any PhoneAccount with
1803 PhoneAccount#CAPABILITY_CONNECTION_MANAGER
1805 <permission android:name="android.permission.REGISTER_CONNECTION_MANAGER"
1806 android:protectionLevel="signature|privileged" />
1808 <!-- Must be required by a {@link android.telecom.InCallService},
1809 to ensure that only the system can bind to it.
1810 <p>Protection level: signature|privileged
1812 <permission android:name="android.permission.BIND_INCALL_SERVICE"
1813 android:protectionLevel="signature|privileged" />
1815 <!-- Must be required by a link {@link android.telephony.VisualVoicemailService} to ensure that
1816 only the system can bind to it.
1817 <p>Protection level: signature|privileged
1820 android:name="android.permission.BIND_VISUAL_VOICEMAIL_SERVICE"
1821 android:protectionLevel="signature|privileged"/>
1823 <!-- Must be required by a {@link android.telecom.CallScreeningService},
1824 to ensure that only the system can bind to it.
1825 <p>Protection level: signature|privileged
1827 <permission android:name="android.permission.BIND_SCREENING_SERVICE"
1828 android:protectionLevel="signature|privileged" />
1830 <!-- Must be required by a {@link android.telecom.ConnectionService},
1831 to ensure that only the system can bind to it.
1832 @deprecated {@link android.telecom.ConnectionService}s should require
1833 android.permission.BIND_TELECOM_CONNECTION_SERVICE instead.
1836 <permission android:name="android.permission.BIND_CONNECTION_SERVICE"
1837 android:protectionLevel="signature|privileged" />
1839 <!-- Must be required by a {@link android.telecom.ConnectionService},
1840 to ensure that only the system can bind to it.
1841 <p>Protection level: signature|privileged
1843 <permission android:name="android.permission.BIND_TELECOM_CONNECTION_SERVICE"
1844 android:protectionLevel="signature|privileged" />
1846 <!-- @SystemApi Allows an application to control the in-call experience.
1848 <permission android:name="android.permission.CONTROL_INCALL_EXPERIENCE"
1849 android:protectionLevel="signature|privileged" />
1851 <!-- Allows an application to receive STK related commands.
1853 <permission android:name="android.permission.RECEIVE_STK_COMMANDS"
1854 android:protectionLevel="signature|privileged" />
1856 <!-- Allows an application to send EMBMS download intents to apps
1858 <permission android:name="android.permission.SEND_EMBMS_INTENTS"
1859 android:protectionLevel="signature|privileged" />
1862 <!-- Allows internal management of the sensor framework
1864 <permission android:name="android.permission.MANAGE_SENSORS"
1865 android:protectionLevel="signature" />
1867 <!-- Must be required by an ImsService to ensure that only the
1868 system can bind to it.
1869 <p>Protection level: signature|privileged|vendorPrivileged
1873 <permission android:name="android.permission.BIND_IMS_SERVICE"
1874 android:protectionLevel="signature|privileged|vendorPrivileged" />
1876 <!-- Must be required by a telephony data service to ensure that only the
1877 system can bind to it.
1878 <p>Protection level: signature
1882 <permission android:name="android.permission.BIND_TELEPHONY_DATA_SERVICE"
1883 android:protectionLevel="signature" />
1885 <!-- Must be required by a NetworkService to ensure that only the
1886 system can bind to it.
1887 <p>Protection level: signature
1891 <permission android:name="android.permission.BIND_TELEPHONY_NETWORK_SERVICE"
1892 android:protectionLevel="signature" />
1894 <!-- @SystemApi Allows an application to manage embedded subscriptions (those on a eUICC)
1895 through EuiccManager APIs.
1896 <p>Protection level: signature|privileged|development
1899 <permission android:name="android.permission.WRITE_EMBEDDED_SUBSCRIPTIONS"
1900 android:protectionLevel="signature|privileged|development" />
1902 <!-- @SystemApi Must be required by an EuiccService to ensure that only the system can bind to
1904 <p>Protection level: signature
1907 <permission android:name="android.permission.BIND_EUICC_SERVICE"
1908 android:protectionLevel="signature" />
1910 <!-- ================================== -->
1911 <!-- Permissions for sdcard interaction -->
1912 <!-- ================================== -->
1915 <!-- @SystemApi Allows an application to write to internal media storage
1917 <permission android:name="android.permission.WRITE_MEDIA_STORAGE"
1918 android:protectionLevel="signature|privileged" />
1920 <!-- Allows an application to manage access to documents, usually as part
1921 of a document picker.
1922 <p>This permission should <em>only</em> be requested by the platform
1923 document management app. This permission cannot be granted to
1925 <p>Protection level: signature
1927 <permission android:name="android.permission.MANAGE_DOCUMENTS"
1928 android:protectionLevel="signature" />
1930 <!-- @hide Allows an application to cache content.
1931 <p>Not for use by third-party applications.
1932 <p>Protection level: signature
1934 <permission android:name="android.permission.CACHE_CONTENT"
1935 android:protectionLevel="signature" />
1937 <!-- @SystemApi @hide
1938 Allows an application to aggressively allocate disk space.
1939 <p>Not for use by third-party applications.
1941 <permission android:name="android.permission.ALLOCATE_AGGRESSIVE"
1942 android:protectionLevel="signature|privileged" />
1944 <!-- @SystemApi @hide
1945 Allows an application to use reserved disk space.
1946 <p>Not for use by third-party applications. Should only be requested by
1947 apps that provide core system functionality, to ensure system stability
1948 when disk is otherwise completely full.
1950 <permission android:name="android.permission.USE_RESERVED_DISK"
1951 android:protectionLevel="signature|privileged" />
1953 <!-- ================================== -->
1954 <!-- Permissions for screenlock -->
1955 <!-- ================================== -->
1958 <!-- Allows applications to disable the keyguard if it is not secure.
1959 <p>Protection level: normal
1961 <permission android:name="android.permission.DISABLE_KEYGUARD"
1962 android:description="@string/permdesc_disableKeyguard"
1963 android:label="@string/permlab_disableKeyguard"
1964 android:protectionLevel="normal" />
1966 <!-- ================================== -->
1967 <!-- Permissions to access other installed applications -->
1968 <!-- ================================== -->
1971 <!-- @deprecated No longer enforced. -->
1972 <permission android:name="android.permission.GET_TASKS"
1973 android:label="@string/permlab_getTasks"
1974 android:description="@string/permdesc_getTasks"
1975 android:protectionLevel="normal" />
1977 <!-- New version of GET_TASKS that apps can request, since GET_TASKS doesn't really
1978 give access to task information. We need this new one because there are
1979 many existing apps that use add libraries and such that have validation
1980 code to ensure the app has requested the GET_TASKS permission by seeing
1981 if it has been granted the permission... if it hasn't, it kills the app
1982 with a message about being upset. So we need to have it continue to look
1983 like the app is getting that permission, even though it will never be
1984 checked, and new privileged apps can now request this one for real access.
1987 <permission android:name="android.permission.REAL_GET_TASKS"
1988 android:protectionLevel="signature|privileged" />
1990 <!-- Allows an application to start a task from a ActivityManager#RecentTaskInfo.
1992 <permission android:name="android.permission.START_TASKS_FROM_RECENTS"
1993 android:protectionLevel="signature|privileged" />
1995 <!-- @SystemApi @hide Allows an application to call APIs that allow it to do interactions
1996 across the users on the device, using singleton services and
1997 user-targeted broadcasts. This permission is not available to
1998 third party applications. -->
1999 <permission android:name="android.permission.INTERACT_ACROSS_USERS"
2000 android:protectionLevel="signature|privileged|development" />
2002 <!-- @SystemApi Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS}
2003 that removes restrictions on where broadcasts can be sent and allows other
2004 types of interactions
2006 <permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL"
2007 android:protectionLevel="signature|installer" />
2009 <!-- @SystemApi @hide Allows an application to call APIs that allow it to query and manage
2010 users on the device. This permission is not available to
2011 third party applications. -->
2012 <permission android:name="android.permission.MANAGE_USERS"
2013 android:protectionLevel="signature|privileged" />
2015 <!-- @hide Allows an application to create, remove users and get the list of
2016 users on the device. Applications holding this permission can only create restricted,
2017 guest, managed, demo, and ephemeral users. For creating other kind of users,
2018 {@link android.Manifest.permission#MANAGE_USERS} is needed.
2019 This permission is not available to third party applications. -->
2020 <permission android:name="android.permission.CREATE_USERS"
2021 android:protectionLevel="signature" />
2023 <!-- @hide Allows an application to set the profile owners and the device owner.
2024 This permission is not available to third party applications.-->
2025 <permission android:name="android.permission.MANAGE_PROFILE_AND_DEVICE_OWNERS"
2026 android:protectionLevel="signature"
2027 android:label="@string/permlab_manageProfileAndDeviceOwners"
2028 android:description="@string/permdesc_manageProfileAndDeviceOwners" />
2030 <!-- Allows an application to get full detailed information about
2031 recently running tasks, with full fidelity to the real state.
2033 <permission android:name="android.permission.GET_DETAILED_TASKS"
2034 android:protectionLevel="signature" />
2036 <!-- Allows an application to change the Z-order of tasks.
2037 <p>Protection level: normal
2039 <permission android:name="android.permission.REORDER_TASKS"
2040 android:label="@string/permlab_reorderTasks"
2041 android:description="@string/permdesc_reorderTasks"
2042 android:protectionLevel="normal" />
2044 <!-- @hide Allows an application to change to remove/kill tasks -->
2045 <permission android:name="android.permission.REMOVE_TASKS"
2046 android:protectionLevel="signature" />
2048 <!-- @SystemApi @TestApi @hide Allows an application to create/manage/remove stacks -->
2049 <permission android:name="android.permission.MANAGE_ACTIVITY_STACKS"
2050 android:protectionLevel="signature|privileged|development" />
2052 <!-- @SystemApi @TestApi @hide Allows an application to embed other activities -->
2053 <permission android:name="android.permission.ACTIVITY_EMBEDDING"
2054 android:protectionLevel="signature|privileged|development" />
2056 <!-- Allows an application to start any activity, regardless of permission
2057 protection or exported state.
2059 <permission android:name="android.permission.START_ANY_ACTIVITY"
2060 android:protectionLevel="signature" />
2062 <!-- @SystemApi Must be required by activities that handle the intent action
2063 {@link Intent#ACTION_SEND_SHOW_SUSPENDED_APP_DETAILS}. This is for use by apps that
2064 hold {@link Manifest.permission#SUSPEND_APPS} to interact with the system.
2065 <p>Not for use by third-party applications.
2067 <permission android:name="android.permission.SEND_SHOW_SUSPENDED_APP_DETAILS"
2068 android:protectionLevel="signature" />
2069 <uses-permission android:name="android.permission.SEND_SHOW_SUSPENDED_APP_DETAILS" />
2071 <!-- @deprecated The {@link android.app.ActivityManager#restartPackage}
2072 API is no longer supported. -->
2073 <permission android:name="android.permission.RESTART_PACKAGES"
2074 android:label="@string/permlab_killBackgroundProcesses"
2075 android:description="@string/permdesc_killBackgroundProcesses"
2076 android:protectionLevel="normal" />
2078 <!-- Allows an application to call
2079 {@link android.app.ActivityManager#killBackgroundProcesses}.
2080 <p>Protection level: normal
2082 <permission android:name="android.permission.KILL_BACKGROUND_PROCESSES"
2083 android:label="@string/permlab_killBackgroundProcesses"
2084 android:description="@string/permdesc_killBackgroundProcesses"
2085 android:protectionLevel="normal" />
2087 <!-- @SystemApi @hide Allows an application to query process states and current
2088 OOM adjustment scores.
2089 <p>Not for use by third-party applications. -->
2090 <permission android:name="android.permission.GET_PROCESS_STATE_AND_OOM_SCORE"
2091 android:protectionLevel="signature|privileged|development" />
2093 <!-- Allows use of PendingIntent.getIntent().
2095 <permission android:name="android.permission.GET_INTENT_SENDER_INTENT"
2096 android:protectionLevel="signature" />
2098 <!-- ================================== -->
2099 <!-- Permissions affecting the display of other applications -->
2100 <!-- ================================== -->
2103 <!-- Allows an app to create windows using the type
2104 {@link android.view.WindowManager.LayoutParams#TYPE_APPLICATION_OVERLAY},
2105 shown on top of all other apps. Very few apps
2106 should use this permission; these windows are intended for
2107 system-level interaction with the user.
2109 <p class="note"><strong>Note:</strong> If the app
2110 targets API level 23 or higher, the app user must explicitly grant
2111 this permission to the app through a permission management screen. The app requests
2112 the user's approval by sending an intent with action
2113 {@link android.provider.Settings#ACTION_MANAGE_OVERLAY_PERMISSION}.
2114 The app can check whether it has this authorization by calling
2115 {@link android.provider.Settings#canDrawOverlays
2116 Settings.canDrawOverlays()}.
2117 <p>Protection level: signature -->
2118 <permission android:name="android.permission.SYSTEM_ALERT_WINDOW"
2119 android:label="@string/permlab_systemAlertWindow"
2120 android:description="@string/permdesc_systemAlertWindow"
2121 android:protectionLevel="signature|preinstalled|appop|pre23|development" />
2123 <!-- @deprecated Use {@link android.Manifest.permission#REQUEST_COMPANION_RUN_IN_BACKGROUND}
2126 <permission android:name="android.permission.RUN_IN_BACKGROUND"
2127 android:label="@string/permlab_runInBackground"
2128 android:description="@string/permdesc_runInBackground"
2129 android:protectionLevel="signature" />
2131 <!-- @deprecated Use
2132 {@link android.Manifest.permission#REQUEST_COMPANION_USE_DATA_IN_BACKGROUND}
2135 <permission android:name="android.permission.USE_DATA_IN_BACKGROUND"
2136 android:label="@string/permlab_useDataInBackground"
2137 android:description="@string/permdesc_useDataInBackground"
2138 android:protectionLevel="signature" />
2140 <!-- @hide Allows an application to set display offsets for the screen.
2141 This permission is not available to third party applications. -->
2142 <permission android:name="android.permission.SET_DISPLAY_OFFSET"
2143 android:protectionLevel="signature|privileged" />
2145 <!-- Allows a companion app to run in the background.
2146 <p>Protection level: normal
2148 <permission android:name="android.permission.REQUEST_COMPANION_RUN_IN_BACKGROUND"
2149 android:label="@string/permlab_runInBackground"
2150 android:description="@string/permdesc_runInBackground"
2151 android:protectionLevel="normal" />
2153 <!-- Allows a companion app to use data in the background.
2154 <p>Protection level: normal
2156 <permission android:name="android.permission.REQUEST_COMPANION_USE_DATA_IN_BACKGROUND"
2157 android:label="@string/permlab_useDataInBackground"
2158 android:description="@string/permdesc_useDataInBackground"
2159 android:protectionLevel="normal" />
2162 <!-- ================================== -->
2163 <!-- Permissions affecting the system wallpaper -->
2164 <!-- ================================== -->
2167 <!-- Allows applications to set the wallpaper.
2168 <p>Protection level: normal
2170 <permission android:name="android.permission.SET_WALLPAPER"
2171 android:label="@string/permlab_setWallpaper"
2172 android:description="@string/permdesc_setWallpaper"
2173 android:protectionLevel="normal" />
2175 <!-- Allows applications to set the wallpaper hints.
2176 <p>Protection level: normal
2178 <permission android:name="android.permission.SET_WALLPAPER_HINTS"
2179 android:label="@string/permlab_setWallpaperHints"
2180 android:description="@string/permdesc_setWallpaperHints"
2181 android:protectionLevel="normal" />
2183 <!-- Allow the app to read the system wallpaper image without
2184 holding the READ_EXTERNAL_STORAGE permission.
2185 <p>Not for use by third-party applications.
2189 <permission android:name="android.permission.READ_WALLPAPER_INTERNAL"
2190 android:protectionLevel="signature|privileged" />
2192 <!-- ============================================ -->
2193 <!-- Permissions for changing the system clock -->
2194 <!-- ============================================ -->
2197 <!-- @SystemApi Allows applications to set the system time.
2198 <p>Not for use by third-party applications. -->
2199 <permission android:name="android.permission.SET_TIME"
2200 android:protectionLevel="signature|privileged" />
2202 <!-- Allows applications to set the system time zone.
2203 <p>Not for use by third-party applications.
2205 <permission android:name="android.permission.SET_TIME_ZONE"
2206 android:label="@string/permlab_setTimeZone"
2207 android:description="@string/permdesc_setTimeZone"
2208 android:protectionLevel="signature|privileged" />
2210 <!-- ==================================================== -->
2211 <!-- Permissions related to changing status bar -->
2212 <!-- ==================================================== -->
2215 <!-- Allows an application to expand or collapse the status bar.
2216 <p>Protection level: normal
2218 <permission android:name="android.permission.EXPAND_STATUS_BAR"
2219 android:label="@string/permlab_expandStatusBar"
2220 android:description="@string/permdesc_expandStatusBar"
2221 android:protectionLevel="normal" />
2223 <!-- ============================================================== -->
2224 <!-- Permissions related to adding/removing shortcuts from Launcher -->
2225 <!-- ============================================================== -->
2228 <!-- Allows an application to install a shortcut in Launcher.
2229 <p>In Android O (API level 26) and higher, the <code>INSTALL_SHORTCUT</code> broadcast no
2230 longer has any effect on your app because it's a private, implicit
2231 broadcast. Instead, you should create an app shortcut by using the
2232 {@link android.content.pm.ShortcutManager#requestPinShortcut requestPinShortcut()}
2233 method from the {@link android.content.pm.ShortcutManager} class.
2234 <p>Protection level: normal
2236 <permission android:name="com.android.launcher.permission.INSTALL_SHORTCUT"
2237 android:label="@string/permlab_install_shortcut"
2238 android:description="@string/permdesc_install_shortcut"
2239 android:protectionLevel="normal"/>
2241 <!--This permission is no longer supported.
2243 <permission android:name="com.android.launcher.permission.UNINSTALL_SHORTCUT"
2244 android:label="@string/permlab_uninstall_shortcut"
2245 android:description="@string/permdesc_uninstall_shortcut"
2246 android:protectionLevel="normal"/>
2248 <!-- ==================================================== -->
2249 <!-- Permissions related to accessing sync settings -->
2250 <!-- ==================================================== -->
2253 <!-- Allows applications to read the sync settings.
2254 <p>Protection level: normal
2256 <permission android:name="android.permission.READ_SYNC_SETTINGS"
2257 android:description="@string/permdesc_readSyncSettings"
2258 android:label="@string/permlab_readSyncSettings"
2259 android:protectionLevel="normal" />
2261 <!-- Allows applications to write the sync settings.
2262 <p>Protection level: normal
2264 <permission android:name="android.permission.WRITE_SYNC_SETTINGS"
2265 android:description="@string/permdesc_writeSyncSettings"
2266 android:label="@string/permlab_writeSyncSettings"
2267 android:protectionLevel="normal" />
2269 <!-- Allows applications to read the sync stats.
2270 <p>Protection level: normal
2272 <permission android:name="android.permission.READ_SYNC_STATS"
2273 android:description="@string/permdesc_readSyncStats"
2274 android:label="@string/permlab_readSyncStats"
2275 android:protectionLevel="normal" />
2277 <!-- ============================================ -->
2278 <!-- Permissions for low-level system interaction -->
2279 <!-- ============================================ -->
2282 <!-- @SystemApi @hide Change the screen compatibility mode of applications -->
2283 <permission android:name="android.permission.SET_SCREEN_COMPATIBILITY"
2284 android:protectionLevel="signature" />
2286 <!-- @SystemApi Allows an application to modify the current configuration, such
2288 <permission android:name="android.permission.CHANGE_CONFIGURATION"
2289 android:protectionLevel="signature|privileged|development" />
2291 <!-- Allows an application to read or write the system settings.
2293 <p class="note"><strong>Note:</strong> If the app targets API level 23
2294 or higher, the app user
2295 must explicitly grant this permission to the app through a permission management screen.
2296 The app requests the user's approval by sending an intent with action
2297 {@link android.provider.Settings#ACTION_MANAGE_WRITE_SETTINGS}. The app
2298 can check whether it has this authorization by calling {@link
2299 android.provider.Settings.System#canWrite Settings.System.canWrite()}.
2301 <p>Protection level: signature
2303 <permission android:name="android.permission.WRITE_SETTINGS"
2304 android:label="@string/permlab_writeSettings"
2305 android:description="@string/permdesc_writeSettings"
2306 android:protectionLevel="signature|preinstalled|appop|pre23" />
2308 <!-- @SystemApi Allows an application to modify the Google service map.
2309 <p>Not for use by third-party applications. -->
2310 <permission android:name="android.permission.WRITE_GSERVICES"
2311 android:protectionLevel="signature|privileged" />
2313 <!-- @SystemApi Allows an application to call
2314 {@link android.app.ActivityManager#forceStopPackage}.
2316 <permission android:name="android.permission.FORCE_STOP_PACKAGES"
2317 android:protectionLevel="signature|privileged" />
2319 <!-- @SystemApi @hide Allows an application to retrieve the content of the active window
2320 An active window is the window that has fired an accessibility event. -->
2321 <permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT"
2322 android:protectionLevel="signature|privileged" />
2324 <!-- @SystemApi Modify the global animation scaling factor.
2325 <p>Not for use by third-party applications. -->
2326 <permission android:name="android.permission.SET_ANIMATION_SCALE"
2327 android:protectionLevel="signature|privileged|development" />
2329 <!-- @deprecated This functionality will be removed in the future; please do
2330 not use. Allow an application to make its activities persistent. -->
2331 <permission android:name="android.permission.PERSISTENT_ACTIVITY"
2332 android:label="@string/permlab_persistentActivity"
2333 android:description="@string/permdesc_persistentActivity"
2334 android:protectionLevel="normal" />
2336 <!-- Allows an application to find out the space used by any package.
2337 <p>Protection level: normal
2339 <permission android:name="android.permission.GET_PACKAGE_SIZE"
2340 android:label="@string/permlab_getPackageSize"
2341 android:description="@string/permdesc_getPackageSize"
2342 android:protectionLevel="normal" />
2344 <!-- @deprecated No longer useful, see
2345 {@link android.content.pm.PackageManager#addPackageToPreferred}
2347 <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS"
2348 android:protectionLevel="signature|verifier" />
2350 <!-- Allows an application to receive the
2351 {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is
2352 broadcast after the system finishes booting. If you don't
2353 request this permission, you will not receive the broadcast at
2354 that time. Though holding this permission does not have any
2355 security implications, it can have a negative impact on the
2356 user experience by increasing the amount of time it takes the
2357 system to start and allowing applications to have themselves
2358 running without the user being aware of them. As such, you must
2359 explicitly declare your use of this facility to make that visible
2361 <p>Protection level: normal
2363 <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED"
2364 android:label="@string/permlab_receiveBootCompleted"
2365 android:description="@string/permdesc_receiveBootCompleted"
2366 android:protectionLevel="normal" />
2368 <!-- Allows an application to broadcast sticky intents. These are
2369 broadcasts whose data is held by the system after being finished,
2370 so that clients can quickly retrieve that data without having
2371 to wait for the next broadcast.
2372 <p>Protection level: normal
2374 <permission android:name="android.permission.BROADCAST_STICKY"
2375 android:label="@string/permlab_broadcastSticky"
2376 android:description="@string/permdesc_broadcastSticky"
2377 android:protectionLevel="normal" />
2379 <!-- @SystemApi Allows mounting and unmounting file systems for removable storage.
2380 <p>Not for use by third-party applications.-->
2381 <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS"
2382 android:protectionLevel="signature|privileged" />
2384 <!-- @SystemApi Allows formatting file systems for removable storage.
2385 <p>Not for use by third-party applications. -->
2386 <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS"
2387 android:protectionLevel="signature|privileged" />
2390 <permission android:name="android.permission.STORAGE_INTERNAL"
2391 android:protectionLevel="signature" />
2393 <!-- Allows access to ASEC non-destructive API calls
2395 <permission android:name="android.permission.ASEC_ACCESS"
2396 android:protectionLevel="signature" />
2398 <!-- Allows creation of ASEC volumes
2400 <permission android:name="android.permission.ASEC_CREATE"
2401 android:protectionLevel="signature" />
2403 <!-- Allows destruction of ASEC volumes
2405 <permission android:name="android.permission.ASEC_DESTROY"
2406 android:protectionLevel="signature" />
2408 <!-- Allows mount / unmount of ASEC volumes
2410 <permission android:name="android.permission.ASEC_MOUNT_UNMOUNT"
2411 android:protectionLevel="signature" />
2413 <!-- Allows rename of ASEC volumes
2415 <permission android:name="android.permission.ASEC_RENAME"
2416 android:protectionLevel="signature" />
2418 <!-- @SystemApi Allows applications to write the apn settings.
2419 <p>Not for use by third-party applications. -->
2420 <permission android:name="android.permission.WRITE_APN_SETTINGS"
2421 android:protectionLevel="signature|privileged" />
2423 <!-- Allows applications to change network connectivity state.
2424 <p>Protection level: normal
2426 <permission android:name="android.permission.CHANGE_NETWORK_STATE"
2427 android:description="@string/permdesc_changeNetworkState"
2428 android:label="@string/permlab_changeNetworkState"
2429 android:protectionLevel="normal" />
2431 <!-- Allows an application to clear the caches of all installed
2432 applications on the device.
2433 <p>Protection level: signature|privileged
2435 <permission android:name="android.permission.CLEAR_APP_CACHE"
2436 android:protectionLevel="signature|privileged" />
2438 <!-- @SystemApi Allows an application to use any media decoder when decoding for playback
2440 <permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK"
2441 android:protectionLevel="signature|privileged" />
2443 <!-- @SystemApi Allows an application to install and/or uninstall CA certificates on
2446 <permission android:name="android.permission.MANAGE_CA_CERTIFICATES"
2447 android:protectionLevel="signature|privileged" />
2449 <!-- @SystemApi Allows an application to do certain operations needed for
2450 interacting with the recovery (system update) system.
2452 <permission android:name="android.permission.RECOVERY"
2453 android:protectionLevel="signature|privileged" />
2455 <!-- @SystemApi Allows an application to read system update info.
2457 <permission android:name="android.permission.READ_SYSTEM_UPDATE_INFO"
2458 android:protectionLevel="signature" />
2460 <!-- Allows the system to bind to an application's task services
2462 <permission android:name="android.permission.BIND_JOB_SERVICE"
2463 android:protectionLevel="signature" />
2464 <uses-permission android:name="android.permission.BIND_JOB_SERVICE"/>
2466 <!-- Allows an application to initiate configuration updates
2467 <p>An application requesting this permission is responsible for
2468 verifying the source and integrity of any update before passing
2469 it off to the various individual installer components
2471 <permission android:name="android.permission.UPDATE_CONFIG"
2472 android:protectionLevel="signature|privileged" />
2474 <!-- Allows an application to query the current time zone rules state
2476 @SystemApi @hide -->
2477 <permission android:name="android.permission.QUERY_TIME_ZONE_RULES"
2478 android:protectionLevel="signature|privileged" />
2480 <!-- Allows a time zone rule updater application to request
2481 the system installs / uninstalls timezone rules.
2482 <p>An application requesting this permission is responsible for
2483 verifying the source and integrity of the update before passing
2484 it off to the installer components.
2485 @SystemApi @hide -->
2486 <permission android:name="android.permission.UPDATE_TIME_ZONE_RULES"
2487 android:protectionLevel="signature|privileged" />
2489 <!-- Must be required by a time zone rule updater application,
2490 to ensure that only the system can trigger it.
2492 <permission android:name="android.permission.TRIGGER_TIME_ZONE_RULES_CHECK"
2493 android:protectionLevel="signature" />
2494 <uses-permission android:name="android.permission.TRIGGER_TIME_ZONE_RULES_CHECK"/>
2496 <!-- Allows the system to reset throttling in shortcut manager.
2498 <permission android:name="android.permission.RESET_SHORTCUT_MANAGER_THROTTLING"
2499 android:protectionLevel="signature" />
2501 <!-- Allows the system to bind to the discovered Network Recommendation Service.
2502 @SystemApi @hide -->
2503 <permission android:name="android.permission.BIND_NETWORK_RECOMMENDATION_SERVICE"
2504 android:protectionLevel="signature" />
2505 <uses-permission android:name="android.permission.BIND_NETWORK_RECOMMENDATION_SERVICE"/>
2507 <!-- Allows an application to enable, disable and change priority of
2508 runtime resource overlays.
2510 <permission android:name="android.permission.CHANGE_OVERLAY_PACKAGES"
2511 android:protectionLevel="signature|privileged" />
2513 <!-- ========================================= -->
2514 <!-- Permissions for special development tools -->
2515 <!-- ========================================= -->
2518 <!-- @SystemApi Allows an application to read or write the secure system settings.
2519 <p>Not for use by third-party applications. -->
2520 <permission android:name="android.permission.WRITE_SECURE_SETTINGS"
2521 android:protectionLevel="signature|privileged|development" />
2523 <!-- @SystemApi Allows an application to retrieve state dump information from system services.
2524 <p>Not for use by third-party applications. -->
2525 <permission android:name="android.permission.DUMP"
2526 android:protectionLevel="signature|privileged|development" />
2528 <!-- @SystemApi Allows an application to read the low-level system log files.
2529 <p>Not for use by third-party applications, because
2530 Log entries can contain the user's private information. -->
2531 <permission android:name="android.permission.READ_LOGS"
2532 android:protectionLevel="signature|privileged|development" />
2534 <!-- @SystemApi Configure an application for debugging.
2535 <p>Not for use by third-party applications. -->
2536 <permission android:name="android.permission.SET_DEBUG_APP"
2537 android:protectionLevel="signature|privileged|development" />
2539 <!-- @SystemApi Allows an application to set the maximum number of (not needed)
2540 application processes that can be running.
2541 <p>Not for use by third-party applications. -->
2542 <permission android:name="android.permission.SET_PROCESS_LIMIT"
2543 android:protectionLevel="signature|privileged|development" />
2545 <!-- @SystemApi Allows an application to control whether activities are immediately
2546 finished when put in the background.
2547 <p>Not for use by third-party applications. -->
2548 <permission android:name="android.permission.SET_ALWAYS_FINISH"
2549 android:protectionLevel="signature|privileged|development" />
2551 <!-- @SystemApi Allow an application to request that a signal be sent to all persistent processes.
2552 <p>Not for use by third-party applications. -->
2553 <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES"
2554 android:protectionLevel="signature|privileged|development" />
2556 <!-- ==================================== -->
2557 <!-- Private permissions -->
2558 <!-- ==================================== -->
2561 <!-- @SystemApi Allows access to the list of accounts in the Accounts Service. -->
2562 <permission android:name="android.permission.GET_ACCOUNTS_PRIVILEGED"
2563 android:protectionLevel="signature|privileged" />
2565 <!-- Allows but does not guarantee access to user passwords at the conclusion of add account
2567 <permission android:name="android.permission.GET_PASSWORD"
2568 android:protectionLevel="signature" />
2570 <!-- @SystemApi Allows applications to RW to diagnostic resources.
2571 <p>Not for use by third-party applications. -->
2572 <permission android:name="android.permission.DIAGNOSTIC"
2573 android:protectionLevel="signature" />
2575 <!-- @SystemApi Allows an application to open, close, or disable the status bar
2577 <p>Not for use by third-party applications. -->
2578 <permission android:name="android.permission.STATUS_BAR"
2579 android:protectionLevel="signature|privileged" />
2581 <!-- Allows an application to be the status bar. Currently used only by SystemUI.apk
2583 <permission android:name="android.permission.STATUS_BAR_SERVICE"
2584 android:protectionLevel="signature" />
2586 <!-- Allows an application to bind to third party quick settings tiles.
2587 <p>Should only be requested by the System, should be required by
2588 TileService declarations.-->
2589 <permission android:name="android.permission.BIND_QUICK_SETTINGS_TILE"
2590 android:protectionLevel="signature" />
2592 <!-- @SystemApi Allows an application to force a BACK operation on whatever is the
2594 <p>Not for use by third-party applications.
2597 <permission android:name="android.permission.FORCE_BACK"
2598 android:protectionLevel="signature" />
2600 <!-- @SystemApi Allows an application to update device statistics.
2601 <p>Not for use by third-party applications. -->
2602 <permission android:name="android.permission.UPDATE_DEVICE_STATS"
2603 android:protectionLevel="signature|privileged" />
2605 <!-- @SystemApi @hide Allows an application to collect application operation statistics.
2606 Not for use by third party apps. -->
2607 <permission android:name="android.permission.GET_APP_OPS_STATS"
2608 android:protectionLevel="signature|privileged|development" />
2610 <!-- @SystemApi Allows an application to update application operation statistics. Not for
2611 use by third party apps.
2613 <permission android:name="android.permission.UPDATE_APP_OPS_STATS"
2614 android:protectionLevel="signature|privileged|installer" />
2616 <!-- @SystemApi Allows an application to update the user app op restrictions.
2617 Not for use by third party apps.
2619 <permission android:name="android.permission.MANAGE_APP_OPS_RESTRICTIONS"
2620 android:protectionLevel="signature|installer" />
2622 <!-- Allows an application to update the user app op modes.
2623 Not for use by third party apps.
2625 <permission android:name="android.permission.MANAGE_APP_OPS_MODES"
2626 android:protectionLevel="signature|installer|verifier" />
2628 <!-- @SystemApi Allows an application to open windows that are for use by parts
2629 of the system user interface.
2630 <p>Not for use by third-party applications.
2633 <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW"
2634 android:protectionLevel="signature" />
2636 <!-- @SystemApi Allows an application to use
2637 {@link android.view.WindowManager.LayoutsParams#PRIVATE_FLAG_HIDE_NON_SYSTEM_OVERLAY_WINDOWS}
2638 to hide non-system-overlay windows.
2639 <p>Not for use by third-party applications.
2642 <permission android:name="android.permission.HIDE_NON_SYSTEM_OVERLAY_WINDOWS"
2643 android:protectionLevel="signature|installer" />
2645 <!-- @SystemApi Allows an application to manage (create, destroy,
2646 Z-order) application tokens in the window manager.
2647 <p>Not for use by third-party applications.
2650 <permission android:name="android.permission.MANAGE_APP_TOKENS"
2651 android:protectionLevel="signature" />
2653 <!-- Allows System UI to register listeners for events from Window Manager.
2655 <permission android:name="android.permission.REGISTER_WINDOW_MANAGER_LISTENERS"
2656 android:protectionLevel="signature" />
2658 <!-- @hide Allows the application to temporarily freeze the screen for a
2659 full-screen transition. -->
2660 <permission android:name="android.permission.FREEZE_SCREEN"
2661 android:protectionLevel="signature" />
2663 <!-- @SystemApi Allows an application to inject user events (keys, touch, trackball)
2664 into the event stream and deliver them to ANY window. Without this
2665 permission, you can only deliver events to windows in your own process.
2666 <p>Not for use by third-party applications.
2669 <permission android:name="android.permission.INJECT_EVENTS"
2670 android:protectionLevel="signature" />
2672 <!-- @hide Allows an application to register an input filter which filters the stream
2673 of user events (keys, touch, trackball) before they are dispatched to any window. -->
2674 <permission android:name="android.permission.FILTER_EVENTS"
2675 android:protectionLevel="signature" />
2677 <!-- @hide Allows an application to retrieve the window token from the accessibility manager. -->
2678 <permission android:name="android.permission.RETRIEVE_WINDOW_TOKEN"
2679 android:protectionLevel="signature" />
2681 <!-- @hide Allows an application to modify accessibility information from another app. -->
2682 <permission android:name="android.permission.MODIFY_ACCESSIBILITY_DATA"
2683 android:protectionLevel="signature" />
2685 <!-- @hide Allows an application to change the accessibility volume. -->
2686 <permission android:name="android.permission.CHANGE_ACCESSIBILITY_VOLUME"
2687 android:protectionLevel="signature" />
2689 <!-- @hide Allows an application to collect frame statistics -->
2690 <permission android:name="android.permission.FRAME_STATS"
2691 android:protectionLevel="signature" />
2693 <!-- @hide Allows an application to temporary enable accessibility on the device. -->
2694 <permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY"
2695 android:protectionLevel="signature" />
2697 <!-- @SystemApi Allows an application to watch and control how activities are
2698 started globally in the system. Only for is in debugging
2699 (usually the monkey command).
2700 <p>Not for use by third-party applications.
2703 <permission android:name="android.permission.SET_ACTIVITY_WATCHER"
2704 android:protectionLevel="signature" />
2706 <!-- @SystemApi Allows an application to call the activity manager shutdown() API
2707 to put the higher-level system there into a shutdown state.
2709 <permission android:name="android.permission.SHUTDOWN"
2710 android:protectionLevel="signature|privileged" />
2712 <!-- @SystemApi Allows an application to tell the activity manager to temporarily
2713 stop application switches, putting it into a special mode that
2714 prevents applications from immediately switching away from some
2715 critical UI such as the home screen.
2717 <permission android:name="android.permission.STOP_APP_SWITCHES"
2718 android:protectionLevel="signature|privileged" />
2720 <!-- @SystemApi Allows an application to retrieve private information about
2721 the current top activity, such as any assist context it can provide.
2722 <p>Not for use by third-party applications.
2725 <permission android:name="android.permission.GET_TOP_ACTIVITY_INFO"
2726 android:protectionLevel="signature" />
2728 <!-- Allows an application to retrieve the current state of keys and
2730 <p>Not for use by third-party applications.
2731 @deprecated The API that used this permission has been removed. -->
2732 <permission android:name="android.permission.READ_INPUT_STATE"
2733 android:protectionLevel="signature" />
2735 <!-- Must be required by an {@link android.inputmethodservice.InputMethodService},
2736 to ensure that only the system can bind to it.
2737 <p>Protection level: signature
2739 <permission android:name="android.permission.BIND_INPUT_METHOD"
2740 android:protectionLevel="signature" />
2742 <!-- Must be required by an {@link android.media.midi.MidiDeviceService},
2743 to ensure that only the system can bind to it.
2744 <p>Protection level: signature
2746 <permission android:name="android.permission.BIND_MIDI_DEVICE_SERVICE"
2747 android:protectionLevel="signature" />
2749 <!-- Must be required by an {@link android.accessibilityservice.AccessibilityService},
2750 to ensure that only the system can bind to it.
2751 <p>Protection level: signature
2753 <permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE"
2754 android:protectionLevel="signature" />
2756 <!-- Must be required by a {@link android.printservice.PrintService},
2757 to ensure that only the system can bind to it.
2758 <p>Protection level: signature
2760 <permission android:name="android.permission.BIND_PRINT_SERVICE"
2761 android:protectionLevel="signature" />
2763 <!-- Must be required by a {@link android.printservice.recommendation.RecommendationService},
2764 to ensure that only the system can bind to it.
2767 <p>Protection level: signature
2769 <permission android:name="android.permission.BIND_PRINT_RECOMMENDATION_SERVICE"
2770 android:protectionLevel="signature" />
2772 <!-- Allows applications to get the installed and enabled print services.
2775 <p>Protection level: signature|preinstalled
2777 <permission android:name="android.permission.READ_PRINT_SERVICES"
2778 android:protectionLevel="signature|preinstalled" />
2780 <!-- Allows applications to get the currently recommended print services for printers.
2783 <p>Protection level: signature|preinstalled
2785 <permission android:name="android.permission.READ_PRINT_SERVICE_RECOMMENDATIONS"
2786 android:protectionLevel="signature|preinstalled" />
2788 <!-- Must be required by a {@link android.nfc.cardemulation.HostApduService}
2789 or {@link android.nfc.cardemulation.OffHostApduService} to ensure that only
2790 the system can bind to it.
2791 <p>Protection level: signature
2793 <permission android:name="android.permission.BIND_NFC_SERVICE"
2794 android:protectionLevel="signature" />
2796 <!-- Must be required by the PrintSpooler to ensure that only the system can bind to it.
2798 <permission android:name="android.permission.BIND_PRINT_SPOOLER_SERVICE"
2799 android:protectionLevel="signature" />
2801 <!-- Must be required by the CompanionDeviceManager to ensure that only the system can bind to it.
2803 <permission android:name="android.permission.BIND_COMPANION_DEVICE_MANAGER_SERVICE"
2804 android:protectionLevel="signature" />
2806 <!-- @SystemApi Must be required by the RuntimePermissionPresenterService to ensure
2807 that only the system can bind to it.
2809 <permission android:name="android.permission.BIND_RUNTIME_PERMISSION_PRESENTER_SERVICE"
2810 android:protectionLevel="signature" />
2812 <!-- Must be required by a TextService (e.g. SpellCheckerService)
2813 to ensure that only the system can bind to it.
2814 <p>Protection level: signature
2816 <permission android:name="android.permission.BIND_TEXT_SERVICE"
2817 android:protectionLevel="signature" />
2819 <!-- Must be required by a {@link android.net.VpnService},
2820 to ensure that only the system can bind to it.
2821 <p>Protection level: signature
2823 <permission android:name="android.permission.BIND_VPN_SERVICE"
2824 android:protectionLevel="signature" />
2826 <!-- Must be required by a {@link android.service.wallpaper.WallpaperService},
2827 to ensure that only the system can bind to it.
2828 <p>Protection level: signature|privileged
2830 <permission android:name="android.permission.BIND_WALLPAPER"
2831 android:protectionLevel="signature|privileged" />
2833 <!-- Must be required by a {@link android.service.voice.VoiceInteractionService},
2834 to ensure that only the system can bind to it.
2835 <p>Protection level: signature
2837 <permission android:name="android.permission.BIND_VOICE_INTERACTION"
2838 android:protectionLevel="signature" />
2840 <!-- Must be required by a {@link android.service.autofill.AutofillService},
2841 to ensure that only the system can bind to it.
2842 <p>Protection level: signature
2844 <permission android:name="android.permission.BIND_AUTOFILL_SERVICE"
2845 android:protectionLevel="signature" />
2847 <!-- Alternative version of android.permission.BIND_AUTOFILL_FIELD_CLASSIFICATION_SERVICE.
2848 This permission was renamed during the O previews but it was supported on the final O
2849 release, so we need to carry it over.
2850 <p>Protection level: signature
2853 <permission android:name="android.permission.BIND_AUTOFILL"
2854 android:protectionLevel="signature" />
2856 <!-- Must be required by an {@link android.service.autofill.AutofillFieldClassificationService}
2857 to ensure that only the system can bind to it.
2858 @hide This is not a third-party API (intended for OEMs and system apps).
2860 <permission android:name="android.permission.BIND_AUTOFILL_FIELD_CLASSIFICATION_SERVICE"
2861 android:protectionLevel="signature" />
2863 <!-- Must be required by a android.service.textclassifier.TextClassifierService,
2864 to ensure that only the system can bind to it.
2865 @SystemApi @hide This is not a third-party API (intended for OEMs and system apps).
2866 <p>Protection level: signature
2868 <permission android:name="android.permission.BIND_TEXTCLASSIFIER_SERVICE"
2869 android:protectionLevel="signature" />
2871 <!-- Must be required by hotword enrollment application,
2872 to ensure that only the system can interact with it.
2873 @hide <p>Not for use by third-party applications.</p> -->
2874 <permission android:name="android.permission.MANAGE_VOICE_KEYPHRASES"
2875 android:protectionLevel="signature|privileged" />
2877 <!-- Must be required by a {@link com.android.media.remotedisplay.RemoteDisplayProvider},
2878 to ensure that only the system can bind to it.
2880 <permission android:name="android.permission.BIND_REMOTE_DISPLAY"
2881 android:protectionLevel="signature" />
2883 <!-- Must be required by a {@link android.media.tv.TvInputService}
2884 to ensure that only the system can bind to it.
2885 <p>Protection level: signature|privileged
2887 <permission android:name="android.permission.BIND_TV_INPUT"
2888 android:protectionLevel="signature|privileged" />
2891 Must be required by a {@link com.android.media.tv.remoteprovider.TvRemoteProvider}
2892 to ensure that only the system can bind to it.
2893 <p>Protection level: signature|privileged
2894 <p>Not for use by third-party applications. </p>
2896 <permission android:name="android.permission.BIND_TV_REMOTE_SERVICE"
2897 android:protectionLevel="signature|privileged" />
2900 Must be required for a virtual remote controller for TV.
2901 <p>Protection level: signature|privileged
2902 <p>Not for use by third-party applications. </p>
2904 <permission android:name="android.permission.TV_VIRTUAL_REMOTE_CONTROLLER"
2905 android:protectionLevel="signature|privileged" />
2907 <!-- Allows an application to change HDMI CEC active source.
2908 <p>Not for use by third-party applications.
2910 <permission android:name="android.permission.CHANGE_HDMI_CEC_ACTIVE_SOURCE"
2911 android:protectionLevel="signature|privileged" />
2913 <!-- @SystemApi Allows an application to modify parental controls
2914 <p>Not for use by third-party applications.
2916 <permission android:name="android.permission.MODIFY_PARENTAL_CONTROLS"
2917 android:protectionLevel="signature|privileged" />
2919 <!-- @SystemApi Allows an application to read TvContentRatingSystemInfo
2920 <p>Not for use by third-party applications.
2922 <permission android:name="android.permission.READ_CONTENT_RATING_SYSTEMS"
2923 android:protectionLevel="signature|privileged" />
2925 <!-- @SystemApi Allows an application to notify TV inputs by sending broadcasts.
2926 <p>Protection level: signature|privileged
2927 <p>Not for use by third-party applications.
2929 <permission android:name="android.permission.NOTIFY_TV_INPUTS"
2930 android:protectionLevel="signature|privileged" />
2932 <!-- Must be required by a {@link android.media.routing.MediaRouteService}
2933 to ensure that only the system can interact with it.
2935 <permission android:name="android.permission.BIND_ROUTE_PROVIDER"
2936 android:protectionLevel="signature" />
2938 <!-- Must be required by device administration receiver, to ensure that only the
2939 system can interact with it.
2940 <p>Protection level: signature
2942 <permission android:name="android.permission.BIND_DEVICE_ADMIN"
2943 android:protectionLevel="signature" />
2945 <!-- @SystemApi Required to add or remove another application as a device admin.
2946 <p>Not for use by third-party applications.
2948 <permission android:name="android.permission.MANAGE_DEVICE_ADMINS"
2949 android:protectionLevel="signature|privileged" />
2951 <!-- @SystemApi Allows low-level access to setting the orientation (actually
2952 rotation) of the screen.
2953 <p>Not for use by third-party applications.
2956 <permission android:name="android.permission.SET_ORIENTATION"
2957 android:protectionLevel="signature" />
2959 <!-- @SystemApi Allows low-level access to setting the pointer speed.
2960 <p>Not for use by third-party applications.
2963 <permission android:name="android.permission.SET_POINTER_SPEED"
2964 android:protectionLevel="signature" />
2966 <!-- Allows low-level access to setting input device calibration.
2967 <p>Not for use by normal applications.
2969 <permission android:name="android.permission.SET_INPUT_CALIBRATION"
2970 android:protectionLevel="signature" />
2972 <!-- Allows low-level access to setting the keyboard layout.
2973 <p>Not for use by third-party applications.
2975 <permission android:name="android.permission.SET_KEYBOARD_LAYOUT"
2976 android:protectionLevel="signature" />
2978 <!-- Allows an application to query tablet mode state and monitor changes
2980 <p>Not for use by third-party applications.
2982 <permission android:name="android.permission.TABLET_MODE"
2983 android:protectionLevel="signature" />
2985 <!-- Allows an application to request installing packages. Apps
2986 targeting APIs greater than 25 must hold this permission in
2987 order to use {@link android.content.Intent#ACTION_INSTALL_PACKAGE}.
2988 <p>Protection level: signature
2990 <permission android:name="android.permission.REQUEST_INSTALL_PACKAGES"
2991 android:label="@string/permlab_requestInstallPackages"
2992 android:description="@string/permdesc_requestInstallPackages"
2993 android:protectionLevel="signature|appop" />
2995 <!-- Allows an application to request deleting packages. Apps
2996 targeting APIs {@link android.os.Build.VERSION_CODES#P} or greater must hold this
2997 permission in order to use {@link android.content.Intent#ACTION_UNINSTALL_PACKAGE} or
2998 {@link android.content.pm.PackageInstaller#uninstall}.
2999 <p>Protection level: normal
3001 <permission android:name="android.permission.REQUEST_DELETE_PACKAGES"
3002 android:label="@string/permlab_requestDeletePackages"
3003 android:description="@string/permdesc_requestDeletePackages"
3004 android:protectionLevel="normal" />
3006 <!-- @SystemApi Allows an application to install packages.
3007 <p>Not for use by third-party applications. -->
3008 <permission android:name="android.permission.INSTALL_PACKAGES"
3009 android:protectionLevel="signature|privileged" />
3011 <!-- @SystemApi Allows an application to install self updates. This is a limited version
3012 of {@link android.Manifest.permission#INSTALL_PACKAGES}.
3013 <p>Not for use by third-party applications.
3016 <permission android:name="android.permission.INSTALL_SELF_UPDATES"
3017 android:protectionLevel="signature|privileged" />
3019 <!-- @SystemApi Allows an application to install updates. This is a limited version
3020 of {@link android.Manifest.permission#INSTALL_PACKAGES}.
3021 <p>Not for use by third-party applications.
3024 <permission android:name="android.permission.INSTALL_PACKAGE_UPDATES"
3025 android:protectionLevel="signature|privileged" />
3027 <!-- @SystemApi Allows an application to clear user data.
3028 <p>Not for use by third-party applications
3031 <permission android:name="android.permission.CLEAR_APP_USER_DATA"
3032 android:protectionLevel="signature|installer" />
3034 <!-- @hide Allows an application to get the URI permissions
3035 granted to another application.
3036 <p>Not for use by third-party applications
3038 <permission android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS"
3039 android:protectionLevel="signature" />
3041 <!-- @hide Allows an application to clear the URI permissions
3042 granted to another application.
3043 <p>Not for use by third-party applications
3046 android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS"
3047 android:protectionLevel="signature" />
3050 Allows an application to change the status of Scoped Access Directory requests granted or
3051 rejected by the user.
3052 <p>This permission should <em>only</em> be requested by the platform
3053 settings app. This permission cannot be granted to third-party apps.
3054 <p>Protection level: signature
3057 android:name="android.permission.MANAGE_SCOPED_ACCESS_DIRECTORY_PERMISSIONS"
3058 android:protectionLevel="signature" />
3061 Allows an application to change the status of a persistable URI permission granted
3062 to another application.
3063 <p>This permission should <em>only</em> be requested by the platform
3064 settings app. This permission cannot be granted to third-party apps.
3065 <p>Protection level: signature
3067 <permission android:name="android.permission.FORCE_PERSISTABLE_URI_PERMISSIONS"
3068 android:protectionLevel="signature" />
3070 <!-- @SystemApi Old permission for deleting an app's cache files, no longer used,
3071 but signals for us to quietly ignore calls instead of throwing an exception. -->
3072 <permission android:name="android.permission.DELETE_CACHE_FILES"
3073 android:protectionLevel="signature|privileged" />
3075 <!-- Allows an application to delete cache files.
3077 <permission android:name="android.permission.INTERNAL_DELETE_CACHE_FILES"
3078 android:protectionLevel="signature" />
3080 <!-- @SystemApi Allows an application to delete packages.
3081 <p>Not for use by third-party applications.
3082 <p>Starting in {@link android.os.Build.VERSION_CODES#N}, user confirmation is requested
3083 when the application deleting the package is not the same application that installed the
3085 <permission android:name="android.permission.DELETE_PACKAGES"
3086 android:protectionLevel="signature|privileged" />
3088 <!-- @SystemApi Allows an application to move location of installed package.
3090 <permission android:name="android.permission.MOVE_PACKAGE"
3091 android:protectionLevel="signature|privileged" />
3093 <!-- @SystemApi Allows an application to change whether an application component (other than its own) is
3095 <p>Not for use by third-party applications. -->
3096 <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE"
3097 android:protectionLevel="signature|privileged" />
3099 <!-- @SystemApi Allows an application to grant specific permissions.
3101 <permission android:name="android.permission.GRANT_RUNTIME_PERMISSIONS"
3102 android:protectionLevel="signature|installer|verifier" />
3104 <!-- @SystemApi Allows an app that has this permission and the permissions to install packages
3105 to request certain runtime permissions to be granted at installation.
3107 <permission android:name="android.permission.INSTALL_GRANT_RUNTIME_PERMISSIONS"
3108 android:protectionLevel="signature|installer|verifier" />
3110 <!-- @SystemApi Allows an application to revoke specific permissions.
3112 <permission android:name="android.permission.REVOKE_RUNTIME_PERMISSIONS"
3113 android:protectionLevel="signature|installer|verifier" />
3115 <!-- @hide Allows an application to observe permission changes. -->
3116 <permission android:name="android.permission.OBSERVE_GRANT_REVOKE_PERMISSIONS"
3117 android:protectionLevel="signature|privileged" />
3119 <!-- @SystemApi Allows an application to use SurfaceFlinger's low level features.
3120 <p>Not for use by third-party applications.
3123 <permission android:name="android.permission.ACCESS_SURFACE_FLINGER"
3124 android:protectionLevel="signature" />
3126 <!-- @SystemApi Allows an application to take screen shots and more generally
3127 get access to the frame buffer data.
3128 <p>Not for use by third-party applications. -->
3129 <permission android:name="android.permission.READ_FRAME_BUFFER"
3130 android:protectionLevel="signature|privileged" />
3132 <!-- Allows an application to use InputFlinger's low level features.
3134 <permission android:name="android.permission.ACCESS_INPUT_FLINGER"
3135 android:protectionLevel="signature" />
3137 <!-- Allows an application to disable/enable input devices.
3138 Could be used to prevent unwanted touch events
3139 on a touchscreen, for example during swimming or rain.
3141 <permission android:name="android.permission.DISABLE_INPUT_DEVICE"
3142 android:protectionLevel="signature" />
3144 <!-- Allows an application to configure and connect to Wifi displays
3146 <permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY"
3147 android:protectionLevel="signature" />
3149 <!-- Allows an application to control low-level features of Wifi displays
3150 such as opening an RTSP socket. This permission should only be used
3151 by the display manager.
3153 <permission android:name="android.permission.CONTROL_WIFI_DISPLAY"
3154 android:protectionLevel="signature" />
3156 <!-- Allows an application to control the color modes set for displays system-wide.
3157 <p>Not for use by third-party applications.</p>
3159 <permission android:name="android.permission.CONFIGURE_DISPLAY_COLOR_MODE"
3160 android:protectionLevel="signature" />
3162 <!-- Allows an application to control the color saturation of the display.
3165 <permission android:name="android.permission.CONTROL_DISPLAY_SATURATION"
3166 android:protectionLevel="signature|privileged" />
3168 <!-- Allows an application to collect usage infomation about brightness slider changes.
3169 <p>Not for use by third-party applications.</p>
3173 <permission android:name="android.permission.BRIGHTNESS_SLIDER_USAGE"
3174 android:protectionLevel="signature|privileged|development" />
3176 <!-- Allows an application to collect ambient light stats.
3177 <p>Not for use by third party applications.</p>
3180 <permission android:name="android.permission.ACCESS_AMBIENT_LIGHT_STATS"
3181 android:protectionLevel="signature|privileged|development" />
3183 <!-- Allows an application to modify the display brightness configuration
3187 <permission android:name="android.permission.CONFIGURE_DISPLAY_BRIGHTNESS"
3188 android:protectionLevel="signature|privileged|development" />
3190 <!-- Allows an application to control the system's display brightness
3192 <permission android:name="android.permission.CONTROL_DISPLAY_BRIGHTNESS"
3193 android:protectionLevel="signature" />
3195 <!-- @SystemApi Allows an application to control VPN.
3196 <p>Not for use by third-party applications.</p>
3198 <permission android:name="android.permission.CONTROL_VPN"
3199 android:protectionLevel="signature|privileged" />
3200 <uses-permission android:name="android.permission.CONTROL_VPN" />
3202 <!-- @SystemApi Allows an application to capture audio output.
3203 <p>Not for use by third-party applications.</p> -->
3204 <permission android:name="android.permission.CAPTURE_AUDIO_OUTPUT"
3205 android:protectionLevel="signature|privileged" />
3207 <!-- @SystemApi Allows an application to capture audio for hotword detection.
3208 <p>Not for use by third-party applications.</p>
3210 <permission android:name="android.permission.CAPTURE_AUDIO_HOTWORD"
3211 android:protectionLevel="signature|privileged" />
3213 <!-- @SystemApi Allows an application to modify audio routing and override policy decisions.
3214 <p>Not for use by third-party applications.</p>
3216 <permission android:name="android.permission.MODIFY_AUDIO_ROUTING"
3217 android:protectionLevel="signature|privileged" />
3219 <!-- @SystemApi Allows an application to capture video output.
3220 <p>Not for use by third-party applications.</p> -->
3221 <permission android:name="android.permission.CAPTURE_VIDEO_OUTPUT"
3222 android:protectionLevel="signature|privileged" />
3224 <!-- @SystemApi Allows an application to capture secure video output.
3225 <p>Not for use by third-party applications.</p> -->
3226 <permission android:name="android.permission.CAPTURE_SECURE_VIDEO_OUTPUT"
3227 android:protectionLevel="signature|privileged" />
3229 <!-- @SystemApi Allows an application to know what content is playing and control its playback.
3230 <p>Not for use by third-party applications due to privacy of media consumption</p> -->
3231 <permission android:name="android.permission.MEDIA_CONTENT_CONTROL"
3232 android:protectionLevel="signature|privileged" />
3234 <!-- @SystemApi @hide Allows an application to set the volume key long-press listener.
3235 <p>When it's set, the application will receive the volume key long-press event
3236 instead of changing volume.</p>
3237 <p>Not for use by third-party applications</p> -->
3238 <permission android:name="android.permission.SET_VOLUME_KEY_LONG_PRESS_LISTENER"
3239 android:protectionLevel="signature|privileged|development" />
3241 <!-- @SystemApi @hide Allows an application to set media key event listener.
3242 <p>When it's set, the application will receive the media key event before
3243 any other media sessions. If the event is handled by the listener, other sessions
3244 cannot get the event.</p>
3245 <p>Not for use by third-party applications</p> -->
3246 <permission android:name="android.permission.SET_MEDIA_KEY_LISTENER"
3247 android:protectionLevel="signature|privileged|development" />
3249 <!-- @SystemApi Required to be able to disable the device (very dangerous!).
3250 <p>Not for use by third-party applications.
3253 <permission android:name="android.permission.BRICK"
3254 android:protectionLevel="signature" />
3256 <!-- @SystemApi Required to be able to reboot the device.
3257 <p>Not for use by third-party applications. -->
3258 <permission android:name="android.permission.REBOOT"
3259 android:protectionLevel="signature|privileged" />
3261 <!-- @SystemApi Allows low-level access to power management.
3262 <p>Not for use by third-party applications.
3265 <permission android:name="android.permission.DEVICE_POWER"
3266 android:protectionLevel="signature" />
3268 <!-- Allows access to the PowerManager.userActivity function.
3269 <p>Not for use by third-party applications. @hide @SystemApi -->
3270 <permission android:name="android.permission.USER_ACTIVITY"
3271 android:protectionLevel="signature|privileged" />
3273 <!-- @hide Allows low-level access to tun tap driver -->
3274 <permission android:name="android.permission.NET_TUNNELING"
3275 android:protectionLevel="signature" />
3277 <!-- Run as a manufacturer test application, running as the root user.
3278 Only available when the device is running in manufacturer test mode.
3279 <p>Not for use by third-party applications.
3281 <permission android:name="android.permission.FACTORY_TEST"
3282 android:protectionLevel="signature" />
3284 <!-- Allows an application to broadcast a notification that an application
3285 package has been removed.
3286 <p>Not for use by third-party applications.
3288 <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED"
3289 android:protectionLevel="signature" />
3291 <!-- Allows an application to broadcast an SMS receipt notification.
3292 <p>Not for use by third-party applications.
3294 <permission android:name="android.permission.BROADCAST_SMS"
3295 android:protectionLevel="signature" />
3297 <!-- Allows an application to broadcast a WAP PUSH receipt notification.
3298 <p>Not for use by third-party applications.
3300 <permission android:name="android.permission.BROADCAST_WAP_PUSH"
3301 android:protectionLevel="signature" />
3303 <!-- @SystemApi Allows an application to broadcast privileged networking requests.
3304 <p>Not for use by third-party applications.
3306 @deprecated Use {@link android.Manifest.permission#REQUEST_NETWORK_SCORES} instead
3308 <permission android:name="android.permission.BROADCAST_NETWORK_PRIVILEGED"
3309 android:protectionLevel="signature|privileged" />
3311 <!-- @SystemApi Not for use by third-party applications. -->
3312 <permission android:name="android.permission.MASTER_CLEAR"
3313 android:protectionLevel="signature|privileged" />
3315 <!-- @SystemApi Allows an application to call any phone number, including emergency
3316 numbers, without going through the Dialer user interface for the user
3317 to confirm the call being placed.
3318 <p>Not for use by third-party applications. -->
3319 <permission android:name="android.permission.CALL_PRIVILEGED"
3320 android:protectionLevel="signature|privileged" />
3322 <!-- @SystemApi Allows an application to perform CDMA OTA provisioning @hide -->
3323 <permission android:name="android.permission.PERFORM_CDMA_PROVISIONING"
3324 android:protectionLevel="signature|privileged" />
3326 <!-- @SystemApi Allows an application to perform SIM Activation @hide -->
3327 <permission android:name="android.permission.PERFORM_SIM_ACTIVATION"
3328 android:protectionLevel="signature|privileged" />
3330 <!-- @SystemApi Allows enabling/disabling location update notifications from
3332 <p>Not for use by third-party applications. -->
3333 <permission android:name="android.permission.CONTROL_LOCATION_UPDATES"
3334 android:protectionLevel="signature|privileged" />
3336 <!-- @SystemApi Allows read/write access to the "properties" table in the checkin
3337 database, to change values that get uploaded.
3338 <p>Not for use by third-party applications. -->
3339 <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES"
3340 android:protectionLevel="signature|privileged" />
3342 <!-- @SystemApi Allows an application to collect component usage
3344 <p>Declaring the permission implies intention to use the API and the user of the
3345 device can grant permission through the Settings application. -->
3346 <permission android:name="android.permission.PACKAGE_USAGE_STATS"
3347 android:protectionLevel="signature|privileged|development|appop" />
3348 <uses-permission android:name="android.permission.PACKAGE_USAGE_STATS" />
3350 <!-- @hide @SystemApi Allows an application to observe usage time of apps. The app can register
3351 for callbacks when apps reach a certain usage time limit, etc. -->
3352 <permission android:name="android.permission.OBSERVE_APP_USAGE"
3353 android:protectionLevel="signature|privileged" />
3355 <!-- @hide @SystemApi Allows an application to change the app idle state of an app.
3356 <p>Not for use by third-party applications. -->
3357 <permission android:name="android.permission.CHANGE_APP_IDLE_STATE"
3358 android:protectionLevel="signature|privileged" />
3360 <!-- @hide @SystemApi Allows an application to temporarily whitelist an inactive app to
3361 access the network and acquire wakelocks.
3362 <p>Not for use by third-party applications. -->
3363 <permission android:name="android.permission.CHANGE_DEVICE_IDLE_TEMP_WHITELIST"
3364 android:protectionLevel="signature|privileged" />
3366 <!-- Permission an application must hold in order to use
3367 {@link android.provider.Settings#ACTION_REQUEST_IGNORE_BATTERY_OPTIMIZATIONS}.
3368 This is a normal permission: an app requesting it will always be granted the
3369 permission, without the user needing to approve or see it. -->
3370 <permission android:name="android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS"
3371 android:label="@string/permlab_requestIgnoreBatteryOptimizations"
3372 android:description="@string/permdesc_requestIgnoreBatteryOptimizations"
3373 android:protectionLevel="normal" />
3375 <!-- @SystemApi Allows an application to collect battery statistics -->
3376 <permission android:name="android.permission.BATTERY_STATS"
3377 android:protectionLevel="signature|privileged|development" />
3379 <!--Allows an application to manage statscompanion.
3380 <p>Not for use by third-party applications.
3382 <permission android:name="android.permission.STATSCOMPANION"
3383 android:protectionLevel="signature" />
3385 <!-- @SystemApi Allows an application to control the backup and restore process.
3386 <p>Not for use by third-party applications.
3387 @hide pending API council -->
3388 <permission android:name="android.permission.BACKUP"
3389 android:protectionLevel="signature|privileged" />
3391 <!-- @SystemApi Allows application to manage
3392 {@link android.security.keystore.recovery.RecoveryController}.
3393 <p>Not for use by third-party applications.
3395 <permission android:name="android.permission.RECOVER_KEYSTORE"
3396 android:protectionLevel="signature|privileged" />
3398 <!-- Allows a package to launch the secure full-backup confirmation UI.
3399 ONLY the system process may hold this permission.
3401 <permission android:name="android.permission.CONFIRM_FULL_BACKUP"
3402 android:protectionLevel="signature" />
3404 <!-- @SystemApi Must be required by a {@link android.widget.RemoteViewsService},
3405 to ensure that only the system can bind to it. -->
3406 <permission android:name="android.permission.BIND_REMOTEVIEWS"
3407 android:protectionLevel="signature|privileged" />
3409 <!-- @SystemApi Allows an application to tell the AppWidget service which application
3410 can access AppWidget's data. The normal user flow is that a user
3411 picks an AppWidget to go into a particular host, thereby giving that
3412 host application access to the private data from the AppWidget app.
3413 An application that has this permission should honor that contract.
3414 <p>Not for use by third-party applications. -->
3415 <permission android:name="android.permission.BIND_APPWIDGET"
3416 android:protectionLevel="signature|privileged" />
3418 <!-- @hide Allows sysui to manage user grants of slice permissions. -->
3419 <permission android:name="android.permission.MANAGE_SLICE_PERMISSIONS"
3420 android:protectionLevel="signature" />
3422 <!-- @SystemApi Private permission, to restrict who can bring up a dialog to add a new
3425 <permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET"
3426 android:protectionLevel="signature|privileged" />
3428 <!-- @SystemApi Internal permission allowing an application to query/set which
3429 applications can bind AppWidgets.
3431 <permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS"
3432 android:protectionLevel="signature|privileged" />
3434 <!-- Allows applications to change the background data setting.
3435 <p>Not for use by third-party applications.
3436 @hide pending API council -->
3437 <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING"
3438 android:protectionLevel="signature" />
3440 <!-- @SystemApi This permission can be used on content providers to allow the global
3441 search system to access their data. Typically it used when the
3442 provider has some permissions protecting it (which global search
3443 would not be expected to hold), and added as a read-only permission
3444 to the path in the provider where global search queries are
3445 performed. This permission can not be held by regular applications;
3446 it is used by applications to protect themselves from everyone else
3447 besides global search. -->
3448 <permission android:name="android.permission.GLOBAL_SEARCH"
3449 android:protectionLevel="signature|privileged" />
3451 <!-- Internal permission protecting access to the global search
3452 system: ensures that only the system can access the provider
3453 to perform queries (since this otherwise provides unrestricted
3454 access to a variety of content providers), and to write the
3455 search statistics (to keep applications from gaming the source
3458 <permission android:name="android.permission.GLOBAL_SEARCH_CONTROL"
3459 android:protectionLevel="signature" />
3461 <!-- @SystemApi Internal permission to allows an application to read indexable data.
3463 <permission android:name="android.permission.READ_SEARCH_INDEXABLES"
3464 android:protectionLevel="signature|privileged" />
3466 <!-- @SystemApi Internal permission to allows an application to bind to suggestion service.
3468 <permission android:name="android.permission.BIND_SETTINGS_SUGGESTIONS_SERVICE"
3469 android:protectionLevel="signature" />
3471 <!-- @SystemApi Allows applications to set a live wallpaper.
3472 @hide XXX Change to signature once the picker is moved to its
3473 own apk as Ghod Intended. -->
3474 <permission android:name="android.permission.SET_WALLPAPER_COMPONENT"
3475 android:protectionLevel="signature|privileged" />
3477 <!-- @SystemApi Allows applications to read dream settings and dream state.
3479 <permission android:name="android.permission.READ_DREAM_STATE"
3480 android:protectionLevel="signature|privileged" />
3482 <!-- @SystemApi Allows applications to write dream settings, and start or stop dreaming.
3484 <permission android:name="android.permission.WRITE_DREAM_STATE"
3485 android:protectionLevel="signature|privileged" />
3487 <!-- @SystemApi Allow an application to read and write the cache partition.
3489 <permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM"
3490 android:protectionLevel="signature|privileged" />
3492 <!-- Must be required by default container service so that only
3493 the system can bind to it and use it to copy
3494 protected data to secure containers or files
3495 accessible to the system.
3497 <permission android:name="android.permission.COPY_PROTECTED_DATA"
3498 android:protectionLevel="signature" />
3500 <!-- @SystemApi Internal permission protecting access to the encryption methods
3503 <permission android:name="android.permission.CRYPT_KEEPER"
3504 android:protectionLevel="signature|privileged" />
3506 <!-- @SystemApi Allows an application to read historical network usage for
3507 specific networks and applications. @hide -->
3508 <permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY"
3509 android:protectionLevel="signature|privileged" />
3511 <!-- Allows an application to manage network policies (such as warning and disable
3512 limits) and to define application-specific rules. @hide -->
3513 <permission android:name="android.permission.MANAGE_NETWORK_POLICY"
3514 android:protectionLevel="signature" />
3516 <!-- @SystemApi @hide @deprecated use UPDATE_DEVICE_STATS instead -->
3517 <permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING"
3518 android:protectionLevel="signature|privileged" />
3520 <!-- @SystemApi @hide Allows an application to manage carrier subscription plans. -->
3521 <permission android:name="android.permission.MANAGE_SUBSCRIPTION_PLANS"
3522 android:protectionLevel="signature|privileged" />
3524 <!-- C2DM permission.
3525 @hide Used internally.
3527 <permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"
3528 android:protectionLevel="signature" />
3529 <uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/>
3531 <!-- @SystemApi @hide Package verifier needs to have this permission before the PackageManager will
3532 trust it to verify packages.
3534 <permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT"
3535 android:protectionLevel="signature|privileged" />
3537 <!-- Must be required by package verifier receiver, to ensure that only the
3538 system can interact with it.
3541 <permission android:name="android.permission.BIND_PACKAGE_VERIFIER"
3542 android:protectionLevel="signature" />
3544 <!-- @SystemApi @hide Allows an application to mark other applications as harmful -->
3545 <permission android:name="android.permission.SET_HARMFUL_APP_WARNINGS"
3546 android:protectionLevel="signature|verifier" />
3548 <!-- @SystemApi @hide Intent filter verifier needs to have this permission before the
3549 PackageManager will trust it to verify intent filters.
3551 <permission android:name="android.permission.INTENT_FILTER_VERIFICATION_AGENT"
3552 android:protectionLevel="signature|privileged" />
3554 <!-- Must be required by intent filter verifier receiver, to ensure that only the
3555 system can interact with it.
3558 <permission android:name="android.permission.BIND_INTENT_FILTER_VERIFIER"
3559 android:protectionLevel="signature" />
3561 <!-- @SystemApi Allows applications to access serial ports via the SerialManager.
3563 <permission android:name="android.permission.SERIAL_PORT"
3564 android:protectionLevel="signature|privileged" />
3566 <!-- Allows the holder to access content providers from outside an ApplicationThread.
3567 This permission is enforced by the ActivityManagerService on the corresponding APIs,
3568 in particular ActivityManagerService#getContentProviderExternal(String) and
3569 ActivityManagerService#removeContentProviderExternal(String).
3572 <permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY"
3573 android:protectionLevel="signature" />
3575 <!-- @SystemApi Allows an application to hold an UpdateLock, recommending that a headless
3576 OTA reboot *not* occur while the lock is held.
3578 <permission android:name="android.permission.UPDATE_LOCK"
3579 android:protectionLevel="signature|privileged" />
3581 <!-- @SystemApi Allows an application to read the current set of notifications, including
3582 any metadata and intents attached.
3584 <permission android:name="android.permission.ACCESS_NOTIFICATIONS"
3585 android:protectionLevel="signature|privileged|appop" />
3587 <!-- Marker permission for applications that wish to access notification policy.
3588 <p>Protection level: normal
3590 <permission android:name="android.permission.ACCESS_NOTIFICATION_POLICY"
3591 android:description="@string/permdesc_access_notification_policy"
3592 android:label="@string/permlab_access_notification_policy"
3593 android:protectionLevel="normal" />
3595 <!-- Allows modification of do not disturb rules and policies. Only allowed for system
3598 <permission android:name="android.permission.MANAGE_NOTIFICATIONS"
3599 android:protectionLevel="signature" />
3601 <!-- Allows notifications to be colorized
3602 <p>Not for use by third-party applications. @hide -->
3603 <permission android:name="android.permission.USE_COLORIZED_NOTIFICATIONS"
3604 android:protectionLevel="signature|setup" />
3606 <!-- Allows access to keyguard secure storage. Only allowed for system processes.
3608 <permission android:name="android.permission.ACCESS_KEYGUARD_SECURE_STORAGE"
3609 android:protectionLevel="signature" />
3611 <!-- Allows managing (adding, removing) fingerprint templates. Reserved for the system. @hide -->
3612 <permission android:name="android.permission.MANAGE_FINGERPRINT"
3613 android:protectionLevel="signature|privileged" />
3615 <!-- Allows an app to reset fingerprint attempt counter. Reserved for the system. @hide -->
3616 <permission android:name="android.permission.RESET_FINGERPRINT_LOCKOUT"
3617 android:protectionLevel="signature" />
3619 <!-- Allows an application to control keyguard. Only allowed for system processes.
3621 <permission android:name="android.permission.CONTROL_KEYGUARD"
3622 android:protectionLevel="signature" />
3624 <!-- Allows an application to listen to trust changes. Only allowed for system processes.
3626 <permission android:name="android.permission.TRUST_LISTENER"
3627 android:protectionLevel="signature" />
3629 <!-- @SystemApi Allows an application to provide a trust agent.
3630 @hide For security reasons, this is a platform-only permission. -->
3631 <permission android:name="android.permission.PROVIDE_TRUST_AGENT"
3632 android:protectionLevel="signature|privileged" />
3634 <!-- @SystemApi Allows an application to show a message
3635 on the keyguard when asking to dismiss it.
3636 @hide For security reasons, this is a platform-only permission. -->
3637 <permission android:name="android.permission.SHOW_KEYGUARD_MESSAGE"
3638 android:protectionLevel="signature|privileged" />
3640 <!-- Allows an application to launch the trust agent settings activity.
3642 <permission android:name="android.permission.LAUNCH_TRUST_AGENT_SETTINGS"
3643 android:protectionLevel="signature|privileged" />
3645 <!-- @SystemApi Must be required by an {@link
3646 android.service.trust.TrustAgentService},
3647 to ensure that only the system can bind to it.
3649 <permission android:name="android.permission.BIND_TRUST_AGENT"
3650 android:protectionLevel="signature" />
3652 <!-- Must be required by an {@link
3653 android.service.notification.NotificationListenerService},
3654 to ensure that only the system can bind to it.
3655 <p>Protection level: signature
3657 <permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE"
3658 android:protectionLevel="signature" />
3660 <!-- @SystemApi Must be required by an {@link
3661 android.service.notification.NotificationAssistantService} to ensure that only the system
3663 <p>Protection level: signature
3666 <permission android:name="android.permission.BIND_NOTIFICATION_ASSISTANT_SERVICE"
3667 android:protectionLevel="signature" />
3669 <!-- Must be required by a {@link
3670 android.service.chooser.ChooserTargetService}, to ensure that
3671 only the system can bind to it.
3672 <p>Protection level: signature
3674 <permission android:name="android.permission.BIND_CHOOSER_TARGET_SERVICE"
3675 android:protectionLevel="signature" />
3677 <!-- @SystemApi Must be held by services that extend
3678 {@link android.service.resolver.ResolverRankerService}.
3679 <p>Protection level: signature|privileged
3682 <permission android:name="android.permission.PROVIDE_RESOLVER_RANKER_SERVICE"
3683 android:protectionLevel="signature|privileged" />
3685 <!-- @SystemApi Must be required by services that extend
3686 {@link android.service.resolver.ResolverRankerService}, to ensure that only the system can
3688 <p>Protection level: signature
3691 <permission android:name="android.permission.BIND_RESOLVER_RANKER_SERVICE"
3692 android:protectionLevel="signature" />
3694 <!-- Must be required by a {@link
3695 android.service.notification.ConditionProviderService},
3696 to ensure that only the system can bind to it.
3697 <p>Protection level: signature
3699 <permission android:name="android.permission.BIND_CONDITION_PROVIDER_SERVICE"
3700 android:protectionLevel="signature" />
3702 <!-- Must be required by an {@link android.service.dreams.DreamService},
3703 to ensure that only the system can bind to it.
3704 <p>Protection level: signature
3706 <permission android:name="android.permission.BIND_DREAM_SERVICE"
3707 android:protectionLevel="signature" />
3709 <!-- Must be required by an {@link android.app.usage.CacheQuotaService} to ensure that only the
3710 system can bind to it.
3711 @hide This is not a third-party API (intended for OEMs and system apps).
3713 <permission android:name="android.permission.BIND_CACHE_QUOTA_SERVICE"
3714 android:protectionLevel="signature" />
3716 <!-- @SystemApi Allows an application to call into a carrier setup flow. It is up to the
3717 carrier setup application to enforce that this permission is required
3718 @hide This is not a third-party API (intended for OEMs and system apps). -->
3719 <permission android:name="android.permission.INVOKE_CARRIER_SETUP"
3720 android:protectionLevel="signature|privileged" />
3722 <!-- @SystemApi Allows an application to listen for network condition observations.
3723 @hide This is not a third-party API (intended for system apps). -->
3724 <permission android:name="android.permission.ACCESS_NETWORK_CONDITIONS"
3725 android:protectionLevel="signature|privileged" />
3727 <!-- @SystemApi Allows an application to provision and access DRM certificates
3728 @hide This is not a third-party API (intended for system apps). -->
3729 <permission android:name="android.permission.ACCESS_DRM_CERTIFICATES"
3730 android:protectionLevel="signature|privileged" />
3732 <!-- Api Allows an application to manage media projection sessions.
3733 @hide This is not a third-party API (intended for system apps). -->
3734 <permission android:name="android.permission.MANAGE_MEDIA_PROJECTION"
3735 android:protectionLevel="signature" />
3737 <!-- @SystemApi Allows an application to read install sessions
3738 @hide This is not a third-party API (intended for system apps). -->
3739 <permission android:name="android.permission.READ_INSTALL_SESSIONS"
3740 android:label="@string/permlab_readInstallSessions"
3741 android:description="@string/permdesc_readInstallSessions"
3742 android:protectionLevel="normal"/>
3744 <!-- @SystemApi Allows an application to remove DRM certificates
3745 @hide This is not a third-party API (intended for system apps). -->
3746 <permission android:name="android.permission.REMOVE_DRM_CERTIFICATES"
3747 android:protectionLevel="signature|privileged" />
3749 <!-- @deprecated Use {@link android.Manifest.permission#BIND_CARRIER_SERVICES} instead -->
3750 <permission android:name="android.permission.BIND_CARRIER_MESSAGING_SERVICE"
3751 android:protectionLevel="signature|privileged" />
3753 <!-- Allows an application to interact with the currently active
3754 {@link android.service.voice.VoiceInteractionService}.
3756 <permission android:name="android.permission.ACCESS_VOICE_INTERACTION_SERVICE"
3757 android:protectionLevel="signature" />
3759 <!-- The system process that is allowed to bind to services in carrier apps will
3760 have this permission. Carrier apps should use this permission to protect
3761 their services that only the system is allowed to bind to.
3762 <p>Protection level: signature|privileged
3764 <permission android:name="android.permission.BIND_CARRIER_SERVICES"
3765 android:label="@string/permlab_bindCarrierServices"
3766 android:description="@string/permdesc_bindCarrierServices"
3767 android:protectionLevel="signature|privileged" />
3769 <!-- Allows an application to query whether DO_NOT_ASK_CREDENTIALS_ON_BOOT
3772 <permission android:name="android.permission.QUERY_DO_NOT_ASK_CREDENTIALS_ON_BOOT"
3773 android:protectionLevel="signature" />
3775 <!-- @SystemApi Allows applications to kill UIDs.
3776 <p>Not for use by third-party applications.
3778 <permission android:name="android.permission.KILL_UID"
3779 android:protectionLevel="signature|installer" />
3781 <!-- @SystemApi Allows applications to read the local WiFi and Bluetooth MAC address.
3783 <permission android:name="android.permission.LOCAL_MAC_ADDRESS"
3784 android:protectionLevel="signature|privileged" />
3785 <uses-permission android:name="android.permission.LOCAL_MAC_ADDRESS"/>
3787 <!-- @SystemApi Allows access to MAC addresses of WiFi and Bluetooth peer devices.
3789 <permission android:name="android.permission.PEERS_MAC_ADDRESS"
3790 android:protectionLevel="signature|setup" />
3792 <!-- Allows the Nfc stack to dispatch Nfc messages to applications. Applications
3793 can use this permission to ensure incoming Nfc messages are from the Nfc stack
3794 and not simulated by another application.
3796 <permission android:name="android.permission.DISPATCH_NFC_MESSAGE"
3797 android:protectionLevel="signature|privileged" />
3799 <!-- @SystemApi Allows changing day / night mode when system is configured with
3800 config_lockDayNightMode set to true. If requesting app does not have permission,
3803 <permission android:name="android.permission.MODIFY_DAY_NIGHT_MODE"
3804 android:protectionLevel="signature|privileged" />
3806 <!-- The system process is explicitly the only one allowed to launch the
3807 confirmation UI for full backup/restore -->
3808 <uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/>
3810 <!-- Allows the holder to access and manage instant applications on the device.
3812 <permission android:name="android.permission.ACCESS_INSTANT_APPS"
3813 android:protectionLevel="signature|installer|verifier" />
3814 <uses-permission android:name="android.permission.ACCESS_INSTANT_APPS"/>
3816 <!-- Allows the holder to view the instant applications on the device.
3818 <permission android:name="android.permission.VIEW_INSTANT_APPS"
3819 android:protectionLevel="signature|preinstalled" />
3821 <!-- Allows the holder to manage whether the system can bind to services
3822 provided by instant apps. This permission is intended to protect
3823 test/development fucntionality and should be used only in such cases.
3825 <permission android:name="android.permission.MANAGE_BIND_INSTANT_SERVICE"
3826 android:protectionLevel="signature" />
3828 <!-- Allows receiving the usage of media resource e.g. video/audio codec and
3831 <permission android:name="android.permission.RECEIVE_MEDIA_RESOURCE_USAGE"
3832 android:protectionLevel="signature|privileged" />
3834 <!-- Must be required by system/priv apps when accessing the sound trigger
3835 APIs given by {@link SoundTriggerManager}.
3838 <permission android:name="android.permission.MANAGE_SOUND_TRIGGER"
3839 android:protectionLevel="signature|privileged" />
3841 <!-- Must be required by system/priv apps implementing sound trigger detection services
3844 <permission android:name="android.permission.BIND_SOUND_TRIGGER_DETECTION_SERVICE"
3845 android:protectionLevel="signature" />
3847 <!-- @SystemApi Allows trusted applications to dispatch managed provisioning message to Managed
3848 Provisioning app. If requesting app does not have permission, it will be ignored.
3850 <permission android:name="android.permission.DISPATCH_PROVISIONING_MESSAGE"
3851 android:protectionLevel="signature|privileged" />
3853 <!-- Allows the holder to read blocked numbers. See
3854 {@link android.provider.BlockedNumberContract}.
3856 <permission android:name="android.permission.READ_BLOCKED_NUMBERS"
3857 android:protectionLevel="signature" />
3859 <!-- Allows the holder to write blocked numbers. See
3860 {@link android.provider.BlockedNumberContract}.
3862 <permission android:name="android.permission.WRITE_BLOCKED_NUMBERS"
3863 android:protectionLevel="signature" />
3865 <!-- Must be required by an {@link android.service.vr.VrListenerService}, to ensure that only
3866 the system can bind to it.
3867 <p>Protection level: signature -->
3868 <permission android:name="android.permission.BIND_VR_LISTENER_SERVICE"
3869 android:protectionLevel="signature" />
3871 <!-- Must be required by system apps when accessing restricted VR APIs.
3874 <p>Protection level: signature -->
3875 <permission android:name="android.permission.RESTRICTED_VR_ACCESS"
3876 android:protectionLevel="signature|preinstalled" />
3878 <!-- Required to make calls to {@link android.service.vr.IVrManager}.
3880 <permission android:name="android.permission.ACCESS_VR_MANAGER"
3881 android:protectionLevel="signature" />
3883 <!-- Required to access VR-Mode state and state change events via {android.app.VrStateCallback}
3885 <permission android:name="android.permission.ACCESS_VR_STATE"
3886 android:protectionLevel="signature|preinstalled" />
3888 <!-- Allows an application to whitelist tasks during lock task mode
3889 @hide <p>Not for use by third-party applications.</p> -->
3890 <permission android:name="android.permission.UPDATE_LOCK_TASK_PACKAGES"
3891 android:protectionLevel="signature|setup" />
3893 <!-- @SystemApi Allows an application to replace the app name displayed alongside notifications
3894 in the N-release and later.
3895 @hide <p>Not for use by third-party applications.</p> -->
3896 <permission android:name="android.permission.SUBSTITUTE_NOTIFICATION_APP_NAME"
3897 android:protectionLevel="signature|privileged" />
3899 <!-- @SystemApi Allows an application to show notifications before the device is provisioned.
3900 @hide <p>Not for use by third-party applications.</p> -->
3901 <permission android:name="android.permission.NOTIFICATION_DURING_SETUP"
3902 android:protectionLevel="signature|privileged" />
3904 <!-- @SystemApi Allows an application to manage auto-fill sessions.
3905 @hide <p>Not for use by third-party applications.</p> -->
3906 <permission android:name="android.permission.MANAGE_AUTO_FILL"
3907 android:protectionLevel="signature" />
3909 <!-- Allows an app to set the theme overlay in /vendor/overlay
3911 @hide <p>Not for use by third-party applications.</p> -->
3912 <permission android:name="android.permission.MODIFY_THEME_OVERLAY"
3913 android:protectionLevel="signature" />
3915 <!-- Allows an instant app to create foreground services. -->
3916 <permission android:name="android.permission.INSTANT_APP_FOREGROUND_SERVICE"
3917 android:protectionLevel="signature|development|instant|appop" />
3919 <!-- Allows a regular application to use {@link android.app.Service#startForeground
3920 Service.startForeground}.
3921 <p>Protection level: normal
3923 <permission android:name="android.permission.FOREGROUND_SERVICE"
3924 android:description="@string/permdesc_foregroundService"
3925 android:label="@string/permlab_foregroundService"
3926 android:protectionLevel="normal|instant" />
3928 <!-- @SystemApi Allows to access all app shortcuts.
3930 <permission android:name="android.permission.ACCESS_SHORTCUTS"
3931 android:protectionLevel="signature|textClassifier" />
3933 <!-- @SystemApi Allows unlimited calls to shortcut mutation APIs.
3935 <permission android:name="android.permission.UNLIMITED_SHORTCUTS_API_CALLS"
3936 android:protectionLevel="signature|textClassifier" />
3938 <!-- @SystemApi Allows an application to read the runtime profiles of other apps.
3939 @hide <p>Not for use by third-party applications. -->
3940 <permission android:name="android.permission.READ_RUNTIME_PROFILES"
3941 android:protectionLevel="signature|privileged" />
3943 <!-- @hide Allows audio policy management. -->
3944 <permission android:name="android.permission.MANAGE_AUDIO_POLICY"
3945 android:protectionLevel="signature" />
3947 <!-- @SystemApi Allows an application to turn on / off quiet mode.
3948 @hide <p>Not for use by third-party applications. -->
3949 <permission android:name="android.permission.MODIFY_QUIET_MODE"
3950 android:protectionLevel="signature|privileged" />
3952 <!-- Allows internal management of the camera framework
3954 <permission android:name="android.permission.MANAGE_CAMERA"
3955 android:protectionLevel="signature" />
3957 <!-- Allows an application to control remote animations. See
3958 {@link ActivityOptions#makeRemoteAnimation}
3959 @hide <p>Not for use by third-party applications. -->
3960 <permission android:name="android.permission.CONTROL_REMOTE_APP_TRANSITION_ANIMATIONS"
3961 android:protectionLevel="signature|privileged" />
3963 <!-- Allows an application to watch changes and/or active state of app ops.
3964 @hide <p>Not for use by third-party applications. -->
3965 <permission android:name="android.permission.WATCH_APPOPS"
3966 android:protectionLevel="signature" />
3968 <!-- Allows an application to directly open the "Open by default" page inside a package's
3970 @hide <p>Not for use by third-party applications. -->
3971 <permission android:name="android.permission.OPEN_APPLICATION_DETAILS_OPEN_BY_DEFAULT_PAGE"
3972 android:protectionLevel="signature" />
3974 <!-- Allows hidden API checks to be disabled when starting a process.
3975 @hide <p>Not for use by third-party applications. -->
3976 <permission android:name="android.permission.DISABLE_HIDDEN_API_CHECKS"
3977 android:protectionLevel="signature" />
3979 <application android:process="system"
3980 android:persistent="true"
3981 android:hasCode="false"
3982 android:label="@string/android_system_label"
3983 android:allowClearUserData="false"
3984 android:backupAgent="com.android.server.backup.SystemBackupAgent"
3985 android:killAfterRestore="false"
3986 android:icon="@drawable/ic_launcher_android"
3987 android:supportsRtl="true"
3988 android:theme="@style/Theme.DeviceDefault.Light.DarkActionBar"
3989 android:defaultToDeviceProtectedStorage="true"
3990 android:directBootAware="true">
3991 <activity android:name="com.android.internal.app.ChooserActivity"
3992 android:theme="@style/Theme.DeviceDefault.Resolver"
3993 android:finishOnCloseSystemDialogs="true"
3994 android:excludeFromRecents="true"
3995 android:documentLaunchMode="never"
3996 android:relinquishTaskIdentity="true"
3997 android:configChanges="screenSize|smallestScreenSize|screenLayout|orientation|keyboard|keyboardHidden"
3998 android:process=":ui"
3999 android:visibleToInstantApps="true">
4001 <action android:name="android.intent.action.CHOOSER" />
4002 <category android:name="android.intent.category.DEFAULT" />
4003 <category android:name="android.intent.category.VOICE" />
4006 <activity android:name="com.android.internal.app.AccessibilityButtonChooserActivity"
4007 android:exported="false"
4008 android:theme="@style/Theme.DeviceDefault.Resolver"
4009 android:finishOnCloseSystemDialogs="true"
4010 android:excludeFromRecents="true"
4011 android:documentLaunchMode="never"
4012 android:relinquishTaskIdentity="true"
4013 android:configChanges="screenSize|smallestScreenSize|screenLayout|orientation|keyboard|keyboardHidden"
4014 android:process=":ui"
4015 android:visibleToInstantApps="true">
4017 <action android:name="com.android.internal.intent.action.CHOOSE_ACCESSIBILITY_BUTTON" />
4018 <category android:name="android.intent.category.DEFAULT" />
4021 <activity android:name="com.android.internal.app.IntentForwarderActivity"
4022 android:finishOnCloseSystemDialogs="true"
4023 android:theme="@style/Theme.NoDisplay"
4024 android:excludeFromRecents="true"
4025 android:label="@string/user_owner_label"
4026 android:exported="true"
4027 android:visibleToInstantApps="true"
4030 <activity-alias android:name="com.android.internal.app.ForwardIntentToParent"
4031 android:targetActivity="com.android.internal.app.IntentForwarderActivity"
4032 android:exported="true"
4033 android:label="@string/user_owner_label">
4035 <activity-alias android:name="com.android.internal.app.ForwardIntentToManagedProfile"
4036 android:targetActivity="com.android.internal.app.IntentForwarderActivity"
4037 android:icon="@drawable/ic_corp_badge"
4038 android:exported="true"
4039 android:label="@string/managed_profile_label">
4041 <activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity"
4042 android:theme="@style/Theme.DeviceDefault.Light.Dialog"
4043 android:label="@string/heavy_weight_switcher_title"
4044 android:finishOnCloseSystemDialogs="true"
4045 android:excludeFromRecents="true"
4046 android:process=":ui">
4048 <activity android:name="com.android.internal.app.PlatLogoActivity"
4049 android:theme="@style/Theme.Wallpaper.NoTitleBar.Fullscreen"
4050 android:configChanges="orientation|keyboardHidden"
4051 android:process=":ui">
4053 <activity android:name="com.android.internal.app.DisableCarModeActivity"
4054 android:theme="@style/Theme.NoDisplay"
4055 android:excludeFromRecents="true"
4056 android:process=":ui">
4058 <activity android:name="com.android.internal.app.DumpHeapActivity"
4059 android:theme="@style/Theme.Translucent.NoTitleBar"
4060 android:label="@string/dump_heap_title"
4061 android:finishOnCloseSystemDialogs="true"
4062 android:noHistory="true"
4063 android:excludeFromRecents="true"
4064 android:process=":ui">
4066 <provider android:name="com.android.server.am.DumpHeapProvider"
4067 android:authorities="com.android.server.heapdump"
4068 android:grantUriPermissions="true"
4069 android:multiprocess="false"
4070 android:singleUser="true" />
4072 <activity android:name="android.accounts.ChooseAccountActivity"
4073 android:excludeFromRecents="true"
4074 android:exported="true"
4075 android:theme="@style/Theme.DeviceDefault.Light.Dialog"
4076 android:label="@string/choose_account_label"
4077 android:process=":ui"
4078 android:visibleToInstantApps="true">
4081 <activity android:name="android.accounts.ChooseTypeAndAccountActivity"
4082 android:excludeFromRecents="true"
4083 android:exported="true"
4084 android:theme="@style/Theme.DeviceDefault.Light.Dialog"
4085 android:label="@string/choose_account_label"
4086 android:process=":ui"
4087 android:visibleToInstantApps="true">
4090 <activity android:name="android.accounts.ChooseAccountTypeActivity"
4091 android:excludeFromRecents="true"
4092 android:theme="@style/Theme.DeviceDefault.Light.Dialog"
4093 android:label="@string/choose_account_label"
4094 android:process=":ui"
4095 android:visibleToInstantApps="true">
4098 <activity android:name="android.accounts.CantAddAccountActivity"
4099 android:excludeFromRecents="true"
4100 android:exported="true"
4101 android:theme="@style/Theme.DeviceDefault.Light.Dialog.NoActionBar"
4102 android:process=":ui">
4105 <activity android:name="android.accounts.GrantCredentialsPermissionActivity"
4106 android:excludeFromRecents="true"
4107 android:exported="true"
4108 android:theme="@style/Theme.DeviceDefault.Light.DialogWhenLarge"
4109 android:process=":ui"
4110 android:visibleToInstantApps="true">
4113 <activity android:name="android.content.SyncActivityTooManyDeletes"
4114 android:theme="@style/Theme.DeviceDefault.Light.Dialog"
4115 android:label="@string/sync_too_many_deletes"
4116 android:process=":ui">
4119 <activity android:name="com.android.internal.app.ShutdownActivity"
4120 android:permission="android.permission.SHUTDOWN"
4121 android:theme="@style/Theme.NoDisplay"
4122 android:excludeFromRecents="true">
4124 <action android:name="com.android.internal.intent.action.REQUEST_SHUTDOWN" />
4125 <category android:name="android.intent.category.DEFAULT" />
4128 <action android:name="android.intent.action.REBOOT" />
4129 <category android:name="android.intent.category.DEFAULT" />
4133 <activity android:name="com.android.internal.app.NetInitiatedActivity"
4134 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert"
4135 android:excludeFromRecents="true"
4136 android:process=":ui">
4139 <activity android:name="com.android.internal.app.SystemUserHomeActivity"
4140 android:enabled="false"
4141 android:process=":ui"
4142 android:systemUserOnly="true"
4143 android:theme="@style/Theme.Translucent.NoTitleBar">
4144 <intent-filter android:priority="-100">
4145 <action android:name="android.intent.action.MAIN" />
4146 <category android:name="android.intent.category.HOME" />
4150 <!-- Activity to prompt user if it's ok to create a new user sandbox for a
4151 specified account. -->
4152 <activity android:name="com.android.internal.app.ConfirmUserCreationActivity"
4153 android:excludeFromRecents="true"
4154 android:process=":ui"
4155 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert">
4156 <intent-filter android:priority="1000">
4157 <action android:name="android.os.action.CREATE_USER" />
4158 <category android:name="android.intent.category.DEFAULT" />
4162 <activity android:name="com.android.internal.app.SuspendedAppActivity"
4163 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert"
4164 android:excludeFromRecents="true"
4165 android:process=":ui">
4168 <activity android:name="com.android.internal.app.UnlaunchableAppActivity"
4169 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert"
4170 android:excludeFromRecents="true"
4171 android:process=":ui">
4174 <activity android:name="com.android.settings.notification.NotificationAccessConfirmationActivity"
4175 android:theme="@android:style/Theme.DeviceDefault.Light.Dialog.Alert"
4176 android:excludeFromRecents="true">
4179 <activity android:name="com.android.internal.app.HarmfulAppWarningActivity"
4180 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert"
4181 android:excludeFromRecents="true"
4182 android:process=":ui"
4183 android:label="@string/harmful_app_warning_title"
4184 android:exported="false">
4187 <receiver android:name="com.android.server.BootReceiver"
4188 android:systemUserOnly="true">
4189 <intent-filter android:priority="1000">
4190 <action android:name="android.intent.action.BOOT_COMPLETED" />
4194 <receiver android:name="com.android.server.updates.CertPinInstallReceiver"
4195 android:permission="android.permission.UPDATE_CONFIG">
4197 <action android:name="android.intent.action.UPDATE_PINS" />
4198 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
4202 <receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver"
4203 android:permission="android.permission.UPDATE_CONFIG">
4205 <action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" />
4206 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
4210 <receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver"
4211 android:permission="android.permission.UPDATE_CONFIG">
4213 <action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" />
4214 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
4218 <receiver android:name="com.android.server.updates.NetworkWatchlistInstallReceiver"
4219 android:permission="android.permission.UPDATE_CONFIG">
4221 <action android:name="android.intent.action.UPDATE_NETWORK_WATCHLIST" />
4222 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
4226 <receiver android:name="com.android.server.updates.ApnDbInstallReceiver"
4227 android:permission="android.permission.UPDATE_CONFIG">
4229 <action android:name="com.android.internal.intent.action.UPDATE_APN_DB" />
4230 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
4234 <receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver"
4235 android:permission="android.permission.UPDATE_CONFIG">
4237 <action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" />
4238 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
4242 <receiver android:name="com.android.server.updates.CertificateTransparencyLogInstallReceiver"
4243 android:permission="android.permission.UPDATE_CONFIG">
4245 <action android:name="android.intent.action.UPDATE_CT_LOGS" />
4246 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
4250 <receiver android:name="com.android.server.updates.LangIdInstallReceiver"
4251 android:permission="android.permission.UPDATE_CONFIG">
4253 <action android:name="android.intent.action.UPDATE_LANG_ID" />
4254 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
4258 <receiver android:name="com.android.server.updates.SmartSelectionInstallReceiver"
4259 android:permission="android.permission.UPDATE_CONFIG">
4261 <action android:name="android.intent.action.UPDATE_SMART_SELECTION" />
4262 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
4266 <receiver android:name="com.android.server.updates.CarrierIdInstallReceiver"
4267 android:permission="android.permission.UPDATE_CONFIG">
4269 <action android:name="android.os.action.UPDATE_CARRIER_ID_DB" />
4270 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
4274 <receiver android:name="com.android.server.MasterClearReceiver"
4275 android:permission="android.permission.MASTER_CLEAR">
4277 android:priority="100" >
4278 <!-- For Checkin, Settings, etc.: action=FACTORY_RESET -->
4279 <action android:name="android.intent.action.FACTORY_RESET" />
4280 <!-- As above until all the references to the deprecated MASTER_CLEAR get updated to
4282 <action android:name="android.intent.action.MASTER_CLEAR" />
4284 <!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR -->
4285 <action android:name="com.google.android.c2dm.intent.RECEIVE" />
4286 <category android:name="android.intent.category.MASTER_CLEAR" />
4290 <receiver android:name="com.android.server.stats.StatsCompanionService$AnomalyAlarmReceiver"
4291 android:permission="android.permission.STATSCOMPANION"
4292 android:exported="false">
4295 <receiver android:name="com.android.server.stats.StatsCompanionService$PullingAlarmReceiver"
4296 android:permission="android.permission.STATSCOMPANION"
4297 android:exported="false">
4300 <receiver android:name="com.android.server.stats.StatsCompanionService$PeriodicAlarmReceiver"
4301 android:permission="android.permission.STATSCOMPANION"
4302 android:exported="false">
4305 <service android:name="android.hardware.location.GeofenceHardwareService"
4306 android:permission="android.permission.LOCATION_HARDWARE"
4307 android:exported="false" />
4309 <service android:name="com.android.internal.backup.LocalTransportService"
4310 android:permission="android.permission.CONFIRM_FULL_BACKUP"
4311 android:exported="false">
4313 <action android:name="android.backup.TRANSPORT_HOST" />
4317 <service android:name="com.android.server.MountServiceIdler"
4318 android:exported="true"
4319 android:permission="android.permission.BIND_JOB_SERVICE" >
4322 <service android:name="com.android.server.backup.FullBackupJob"
4323 android:exported="true"
4324 android:permission="android.permission.BIND_JOB_SERVICE" >
4327 <service android:name="com.android.server.backup.KeyValueBackupJob"
4328 android:permission="android.permission.BIND_JOB_SERVICE" >
4331 <service android:name="com.android.server.content.SyncJobService"
4332 android:permission="android.permission.BIND_JOB_SERVICE" >
4335 <service android:name="com.android.server.pm.BackgroundDexOptService"
4336 android:exported="true"
4337 android:permission="android.permission.BIND_JOB_SERVICE">
4340 <service android:name="com.android.server.PruneInstantAppsJobService"
4341 android:permission="android.permission.BIND_JOB_SERVICE" >
4344 <service android:name="com.android.server.storage.DiskStatsLoggingService"
4345 android:permission="android.permission.BIND_JOB_SERVICE" >
4348 <service android:name="com.android.server.PreloadsFileCacheExpirationJobService"
4349 android:permission="android.permission.BIND_JOB_SERVICE" >
4352 <service android:name="com.android.server.camera.CameraStatsJobService"
4353 android:permission="android.permission.BIND_JOB_SERVICE" >
4356 <service android:name="com.android.server.timezone.TimeZoneUpdateIdler"
4357 android:permission="android.permission.BIND_JOB_SERVICE" >
4360 <service android:name="com.android.server.net.watchlist.ReportWatchlistJobService"
4361 android:permission="android.permission.BIND_JOB_SERVICE" >
4364 <service android:name="com.android.server.display.BrightnessIdleJob"
4365 android:permission="android.permission.BIND_JOB_SERVICE" >
4369 android:name="com.android.server.autofill.AutofillCompatAccessibilityService"
4370 android:permission="android.permission.BIND_ACCESSIBILITY_SERVICE"
4371 android:exported="true">
4373 android:name="android.accessibilityservice"
4374 android:resource="@xml/autofill_compat_accessibility_service" />