1 <?xml version="1.0" encoding="utf-8"?>
3 /* //device/apps/common/AndroidManifest.xml
5 ** Copyright 2006, The Android Open Source Project
7 ** Licensed under the Apache License, Version 2.0 (the "License");
8 ** you may not use this file except in compliance with the License.
9 ** You may obtain a copy of the License at
11 ** http://www.apache.org/licenses/LICENSE-2.0
13 ** Unless required by applicable law or agreed to in writing, software
14 ** distributed under the License is distributed on an "AS IS" BASIS,
15 ** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16 ** See the License for the specific language governing permissions and
17 ** limitations under the License.
20 <manifest xmlns:android="http://schemas.android.com/apk/res/android"
21 package="android" coreApp="true" android:sharedUserId="android.uid.system"
22 android:sharedUserLabel="@string/android_system_label">
24 <!-- ================================================ -->
25 <!-- Special broadcasts that only the system can send -->
26 <!-- ================================================ -->
29 <protected-broadcast android:name="android.intent.action.SCREEN_OFF" />
30 <protected-broadcast android:name="android.intent.action.SCREEN_ON" />
31 <protected-broadcast android:name="android.intent.action.USER_PRESENT" />
32 <protected-broadcast android:name="android.intent.action.TIME_SET" />
33 <protected-broadcast android:name="android.intent.action.TIME_TICK" />
34 <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" />
35 <protected-broadcast android:name="android.intent.action.DATE_CHANGED" />
36 <protected-broadcast android:name="android.intent.action.PRE_BOOT_COMPLETED" />
37 <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" />
38 <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" />
39 <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" />
40 <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" />
41 <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" />
42 <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" />
43 <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" />
44 <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" />
45 <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" />
46 <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" />
47 <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" />
48 <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" />
49 <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" />
50 <protected-broadcast android:name="android.intent.action.PACKAGES_SUSPENDED" />
51 <protected-broadcast android:name="android.intent.action.PACKAGES_UNSUSPENDED" />
52 <protected-broadcast android:name="android.intent.action.ACTION_PREFERRED_ACTIVITY_CHANGED" />
53 <protected-broadcast android:name="android.intent.action.UID_REMOVED" />
54 <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" />
55 <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" />
56 <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" />
57 <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" />
58 <protected-broadcast android:name="android.intent.action.BATTERY_LOW" />
59 <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" />
60 <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" />
61 <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" />
62 <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" />
63 <protected-broadcast android:name="android.intent.action.CHARGING" />
64 <protected-broadcast android:name="android.intent.action.DISCHARGING" />
65 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" />
66 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" />
67 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" />
68 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" />
69 <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" />
70 <protected-broadcast android:name="android.intent.action.REBOOT" />
71 <protected-broadcast android:name="android.intent.action.DOCK_EVENT" />
72 <protected-broadcast android:name="android.intent.action.THERMAL_EVENT" />
73 <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" />
74 <protected-broadcast android:name="android.intent.action.USER_ADDED" />
75 <protected-broadcast android:name="android.intent.action.USER_REMOVED" />
76 <protected-broadcast android:name="android.intent.action.USER_STARTING" />
77 <protected-broadcast android:name="android.intent.action.USER_STARTED" />
78 <protected-broadcast android:name="android.intent.action.USER_STOPPING" />
79 <protected-broadcast android:name="android.intent.action.USER_STOPPED" />
80 <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" />
81 <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" />
82 <protected-broadcast android:name="android.intent.action.USER_SWITCHED" />
83 <protected-broadcast android:name="android.intent.action.USER_INITIALIZE" />
84 <protected-broadcast android:name="android.intent.action.INTENT_FILTER_NEEDS_VERIFICATION" />
85 <protected-broadcast android:name="android.intent.action.OVERLAY_ADDED" />
86 <protected-broadcast android:name="android.intent.action.OVERLAY_CHANGED" />
87 <protected-broadcast android:name="android.intent.action.OVERLAY_REMOVED" />
88 <protected-broadcast android:name="android.intent.action.OVERLAY_PRIORITY_CHANGED" />
90 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED" />
91 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGING" />
92 <protected-broadcast android:name="android.os.action.DEVICE_IDLE_MODE_CHANGED" />
93 <protected-broadcast android:name="android.os.action.POWER_SAVE_WHITELIST_CHANGED" />
94 <protected-broadcast android:name="android.os.action.POWER_SAVE_TEMP_WHITELIST_CHANGED" />
95 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED_INTERNAL" />
97 <!-- @deprecated This is rarely used and will be phased out soon. -->
98 <protected-broadcast android:name="android.os.action.SCREEN_BRIGHTNESS_BOOST_CHANGED" />
100 <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" />
101 <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" />
102 <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" />
103 <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" />
104 <protected-broadcast android:name="android.app.action.NEXT_ALARM_CLOCK_CHANGED" />
106 <protected-broadcast android:name="android.app.action.BUGREPORT_SHARING_DECLINED" />
107 <protected-broadcast android:name="android.app.action.BUGREPORT_FAILED" />
108 <protected-broadcast android:name="android.app.action.BUGREPORT_SHARE" />
109 <protected-broadcast android:name="android.app.action.SHOW_DEVICE_MONITORING_DIALOG" />
111 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" />
112 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" />
113 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" />
114 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" />
115 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_HOST_RESTORED" />
116 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_RESTORED" />
118 <protected-broadcast android:name="android.os.action.SETTING_RESTORED" />
120 <protected-broadcast android:name="android.app.backup.intent.RUN" />
121 <protected-broadcast android:name="android.app.backup.intent.CLEAR" />
122 <protected-broadcast android:name="android.app.backup.intent.INIT" />
124 <protected-broadcast android:name="android.bluetooth.intent.DISCOVERABLE_TIMEOUT" />
125 <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" />
126 <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" />
127 <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" />
128 <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" />
129 <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" />
130 <protected-broadcast android:name="android.bluetooth.adapter.action.BLUETOOTH_ADDRESS_CHANGED" />
131 <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" />
132 <protected-broadcast android:name="android.bluetooth.device.action.UUID" />
133 <protected-broadcast android:name="android.bluetooth.device.action.MAS_INSTANCE" />
134 <protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" />
135 <protected-broadcast android:name="android.bluetooth.device.action.FOUND" />
136 <protected-broadcast android:name="android.bluetooth.device.action.DISAPPEARED" />
137 <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" />
138 <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" />
139 <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" />
140 <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" />
141 <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" />
142 <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" />
143 <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" />
144 <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" />
145 <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" />
146 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" />
147 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" />
148 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" />
149 <protected-broadcast android:name="android.bluetooth.device.action.SDP_RECORD" />
150 <protected-broadcast android:name="android.bluetooth.device.action.BATTERY_LEVEL_CHANGED" />
151 <protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" />
152 <protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" />
154 android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" />
156 android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" />
158 android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" />
160 android:name="android.bluetooth.headset.action.HF_INDICATORS_VALUE_CHANGED" />
162 android:name="android.bluetooth.headsetclient.profile.action.CONNECTION_STATE_CHANGED" />
164 android:name="android.bluetooth.headsetclient.profile.action.AUDIO_STATE_CHANGED" />
166 android:name="android.bluetooth.headsetclient.profile.action.AG_EVENT" />
168 android:name="android.bluetooth.headsetclient.profile.action.AG_CALL_CHANGED" />
170 android:name="android.bluetooth.headsetclient.profile.action.RESULT" />
172 android:name="android.bluetooth.headsetclient.profile.action.LAST_VTAG" />
174 android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" />
176 android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" />
178 android:name="android.bluetooth.a2dp.profile.action.CODEC_CONFIG_CHANGED" />
180 android:name="android.bluetooth.a2dp-sink.profile.action.CONNECTION_STATE_CHANGED" />
182 android:name="android.bluetooth.a2dp-sink.profile.action.PLAYING_STATE_CHANGED" />
184 android:name="android.bluetooth.a2dp-sink.profile.action.AUDIO_CONFIG_CHANGED" />
186 android:name="android.bluetooth.avrcp-controller.profile.action.CONNECTION_STATE_CHANGED" />
188 android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" />
190 android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" />
192 android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" />
194 android:name="android.bluetooth.inputhost.profile.action.CONNECTION_STATE_CHANGED" />
196 android:name="android.bluetooth.map.profile.action.CONNECTION_STATE_CHANGED" />
197 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.CONNECTION_STATE_CHANGED" />
198 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_RECEIVED" />
199 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_SENT_SUCCESSFULLY" />
200 <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_DELIVERED_SUCCESSFULLY" />
202 android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_SENT" />
204 android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_DELIVERY" />
206 android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" />
207 <protected-broadcast android:name="android.bluetooth.pbap.intent.action.PBAP_STATE_CHANGED" />
208 <protected-broadcast android:name="android.bluetooth.pbap.profile.action.CONNECTION_STATE_CHANGED" />
209 <protected-broadcast android:name="android.bluetooth.sap.profile.action.CONNECTION_STATE_CHANGED" />
210 <protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" />
211 <protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" />
212 <protected-broadcast android:name="android.btopp.intent.action.LIST" />
213 <protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" />
214 <protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" />
215 <protected-broadcast android:name="android.btopp.intent.action.CONFIRM" />
216 <protected-broadcast android:name="android.btopp.intent.action.HIDE" />
217 <protected-broadcast android:name="android.btopp.intent.action.RETRY" />
218 <protected-broadcast android:name="android.btopp.intent.action.OPEN" />
219 <protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" />
220 <protected-broadcast android:name="android.btopp.intent.action.TRANSFER_COMPLETE" />
221 <protected-broadcast android:name="android.btopp.intent.action.ACCEPT" />
222 <protected-broadcast android:name="android.btopp.intent.action.DECLINE" />
223 <protected-broadcast android:name="com.android.bluetooth.gatt.REFRESH_BATCHED_SCAN" />
224 <protected-broadcast android:name="com.android.bluetooth.pbap.authchall" />
225 <protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" />
226 <protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" />
227 <protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" />
228 <protected-broadcast android:name="com.android.bluetooth.sap.USER_CONFIRM_TIMEOUT" />
229 <protected-broadcast android:name="com.android.bluetooth.sap.action.DISCONNECT_ACTION" />
231 <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" />
233 <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" />
234 <protected-broadcast android:name="android.hardware.usb.action.USB_PORT_CHANGED" />
235 <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" />
236 <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_DETACHED" />
237 <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" />
238 <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" />
240 <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" />
241 <protected-broadcast android:name="android.media.action.HDMI_AUDIO_PLUG" />
243 <protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" />
244 <protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" />
245 <protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" />
246 <protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" />
247 <protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" />
248 <protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" />
249 <protected-broadcast android:name="android.media.MASTER_MONO_CHANGED_ACTION" />
250 <protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" />
251 <protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" />
253 <protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" />
254 <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" />
255 <protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" />
256 <protected-broadcast android:name="android.intent.action.MEDIA_NOFS" />
257 <protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" />
258 <protected-broadcast android:name="android.intent.action.MEDIA_SHARED" />
259 <protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" />
260 <protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" />
261 <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" />
262 <protected-broadcast android:name="android.intent.action.MEDIA_EJECT" />
264 <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL" />
265 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" />
266 <!-- @deprecated. Only {@link android.net.ConnectivityManager.CONNECTIVITY_ACTION} is sent. -->
267 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" />
268 <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" />
269 <protected-broadcast android:name="android.net.conn.RESTRICT_BACKGROUND_CHANGED" />
270 <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" />
271 <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" />
273 <protected-broadcast android:name="android.net.nsd.STATE_CHANGED" />
275 <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" />
276 <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" />
277 <protected-broadcast android:name="com.android.nfc.action.LLCP_UP" />
278 <protected-broadcast android:name="com.android.nfc.action.LLCP_DOWN" />
279 <protected-broadcast android:name="com.android.nfc.cardemulation.action.CLOSE_TAP_DIALOG" />
280 <protected-broadcast android:name="com.android.nfc.handover.action.ALLOW_CONNECT" />
281 <protected-broadcast android:name="com.android.nfc.handover.action.DENY_CONNECT" />
282 <protected-broadcast android:name="com.android.nfc.handover.action.TIMEOUT_CONNECT" />
283 <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" />
284 <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" />
285 <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" />
286 <!-- For NFC to BT handover -->
287 <protected-broadcast android:name="android.btopp.intent.action.WHITELIST_DEVICE" />
288 <protected-broadcast android:name="android.btopp.intent.action.STOP_HANDOVER_TRANSFER" />
289 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND" />
290 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND_MULTIPLE" />
291 <protected-broadcast android:name="com.android.nfc.handover.action.CANCEL_HANDOVER_TRANSFER" />
293 <protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" />
294 <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" />
296 <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" />
298 <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" />
299 <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" />
300 <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" />
302 <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" />
303 <protected-broadcast android:name="com.android.server.WifiManager.action.START_PNO" />
304 <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" />
305 <protected-broadcast android:name="com.android.server.WifiManager.action.DEVICE_IDLE" />
306 <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_ACCEPTED" />
307 <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_DECLINED" />
308 <protected-broadcast android:name="com.android.internal.action.EUICC_FACTORY_RESET" />
309 <protected-broadcast android:name="com.android.server.usb.ACTION_OPEN_IN_APPS" />
310 <protected-broadcast android:name="com.android.server.am.DELETE_DUMPHEAP" />
311 <protected-broadcast android:name="com.android.server.net.action.SNOOZE_WARNING" />
312 <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.USER_DISMISSED_NOTIFICATION" />
313 <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.CONNECT_TO_NETWORK" />
314 <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.PICK_WIFI_NETWORK" />
315 <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.PICK_NETWORK_AFTER_FAILURE" />
316 <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" />
317 <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" />
318 <protected-broadcast android:name="android.net.wifi.WIFI_CREDENTIAL_CHANGED" />
319 <protected-broadcast android:name="android.net.wifi.WIFI_SCAN_AVAILABLE" />
320 <protected-broadcast android:name="android.net.wifi.aware.action.WIFI_AWARE_STATE_CHANGED" />
321 <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" />
322 <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" />
323 <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" />
324 <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" />
325 <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" />
326 <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_DEAUTH_IMMINENT" />
327 <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_ICON" />
328 <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_OSU_PROVIDERS_LIST" />
329 <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_SUBSCRIPTION_REMEDIATION" />
330 <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" />
331 <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" />
332 <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" />
333 <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" />
334 <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" />
335 <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" />
336 <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" />
337 <protected-broadcast android:name="android.net.wifi.p2p.PERSISTENT_GROUPS_CHANGED" />
338 <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" />
339 <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" />
340 <protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" />
342 android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" />
343 <protected-broadcast android:name="android.net.scoring.SCORE_NETWORKS" />
344 <protected-broadcast android:name="android.net.scoring.SCORER_CHANGED" />
345 <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" />
346 <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" />
347 <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" />
348 <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" />
349 <protected-broadcast android:name="android.intent.action.APPLICATION_RESTRICTIONS_CHANGED" />
352 <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" />
353 <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" />
355 <protected-broadcast android:name="com.android.server.ACTION_TRIGGER_IDLE" />
357 <protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" />
359 <protected-broadcast android:name="android.intent.action.PHONE_STATE" />
361 <protected-broadcast android:name="android.intent.action.SUB_DEFAULT_CHANGED" />
363 <protected-broadcast android:name="android.location.GPS_ENABLED_CHANGE" />
364 <protected-broadcast android:name="android.location.PROVIDERS_CHANGED" />
365 <protected-broadcast android:name="android.location.MODE_CHANGED" />
366 <protected-broadcast android:name="android.location.GPS_FIX_CHANGE" />
367 <protected-broadcast android:name="android.net.proxy.PAC_REFRESH" />
369 <protected-broadcast android:name="android.telecom.action.DEFAULT_DIALER_CHANGED" />
370 <protected-broadcast android:name="android.provider.action.DEFAULT_SMS_PACKAGE_CHANGED" />
371 <protected-broadcast android:name="android.intent.action.CONTENT_CHANGED" />
372 <protected-broadcast android:name="android.provider.Telephony.MMS_DOWNLOADED" />
375 android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" />
377 <!-- Defined in RestrictionsManager -->
379 android:name="android.intent.action.PERMISSION_RESPONSE_RECEIVED" />
380 <!-- Defined in RestrictionsManager -->
382 <protected-broadcast android:name="android.intent.action.REQUEST_PERMISSION" />
383 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_STARTED" />
384 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
385 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_PROGRESS" />
386 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
388 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_DATA_SUBSCRIPTION_CHANGED" />
389 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_VOICE_SUBSCRIPTION_CHANGED" />
390 <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_CONTENT_CHANGE" />
391 <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_RECORD_UPDATED" />
393 <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_DONE" />
394 <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_FAILED" />
396 <protected-broadcast android:name="android.internal.policy.action.BURN_IN_PROTECTION" />
397 <protected-broadcast android:name="android.app.action.SYSTEM_UPDATE_POLICY_CHANGED" />
398 <protected-broadcast android:name="android.app.action.DEVICE_OWNER_CHANGED" />
401 <protected-broadcast android:name="android.intent.action.ANR" />
402 <protected-broadcast android:name="android.intent.action.CALL" />
403 <protected-broadcast android:name="android.intent.action.CALL_PRIVILEGED" />
404 <protected-broadcast android:name="android.intent.action.DROPBOX_ENTRY_ADDED" />
405 <protected-broadcast android:name="android.intent.action.INPUT_METHOD_CHANGED" />
406 <protected-broadcast android:name="android.intent.action.internal_sim_state_changed" />
407 <protected-broadcast android:name="android.intent.action.LOCKED_BOOT_COMPLETED" />
408 <protected-broadcast android:name="android.intent.action.PRECISE_CALL_STATE" />
409 <protected-broadcast android:name="android.intent.action.PRECISE_DATA_CONNECTION_STATE_CHANGED" />
410 <protected-broadcast android:name="android.intent.action.SUBSCRIPTION_PHONE_STATE" />
411 <protected-broadcast android:name="android.intent.action.USER_INFO_CHANGED" />
412 <protected-broadcast android:name="android.intent.action.USER_UNLOCKED" />
413 <protected-broadcast android:name="android.intent.action.WALLPAPER_CHANGED" />
415 <protected-broadcast android:name="android.app.action.DEVICE_POLICY_MANAGER_STATE_CHANGED" />
416 <protected-broadcast android:name="android.app.action.CHOOSE_PRIVATE_KEY_ALIAS" />
417 <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLED" />
418 <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLE_REQUESTED" />
419 <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_ENABLED" />
420 <protected-broadcast android:name="android.app.action.LOCK_TASK_ENTERING" />
421 <protected-broadcast android:name="android.app.action.LOCK_TASK_EXITING" />
422 <protected-broadcast android:name="android.app.action.NOTIFY_PENDING_SYSTEM_UPDATE" />
423 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_CHANGED" />
424 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_EXPIRING" />
425 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_FAILED" />
426 <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_SUCCEEDED" />
427 <protected-broadcast android:name="com.android.server.ACTION_EXPIRED_PASSWORD_NOTIFICATION" />
429 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_ADDED" />
430 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNLOCKED" />
431 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_REMOVED" />
433 <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_STATE_CHANGED" />
434 <protected-broadcast android:name="com.android.bluetooth.map.USER_CONFIRM_TIMEOUT" />
435 <protected-broadcast android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_SENT" />
436 <protected-broadcast android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_DELIVERY" />
437 <protected-broadcast android:name="android.content.jobscheduler.JOB_DELAY_EXPIRED" />
438 <protected-broadcast android:name="android.content.syncmanager.SYNC_ALARM" />
439 <protected-broadcast android:name="android.media.INTERNAL_RINGER_MODE_CHANGED_ACTION" />
440 <protected-broadcast android:name="android.media.STREAM_DEVICES_CHANGED_ACTION" />
441 <protected-broadcast android:name="android.media.STREAM_MUTE_CHANGED_ACTION" />
442 <protected-broadcast android:name="android.net.sip.SIP_SERVICE_UP" />
443 <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" />
444 <protected-broadcast android:name="android.os.action.CHARGING" />
445 <protected-broadcast android:name="android.os.action.DISCHARGING" />
446 <protected-broadcast android:name="android.search.action.SEARCHABLES_CHANGED" />
447 <protected-broadcast android:name="android.security.STORAGE_CHANGED" />
448 <protected-broadcast android:name="android.security.action.TRUST_STORE_CHANGED" />
449 <protected-broadcast android:name="android.security.action.KEYCHAIN_CHANGED" />
450 <protected-broadcast android:name="android.security.action.KEY_ACCESS_CHANGED" />
451 <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_REGISTERED" />
452 <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_UNREGISTERED" />
453 <protected-broadcast android:name="android.telecom.action.SHOW_MISSED_CALLS_NOTIFICATION" />
454 <protected-broadcast android:name="android.telephony.action.CARRIER_CONFIG_CHANGED" />
455 <protected-broadcast android:name="android.telephony.action.DEFAULT_SUBSCRIPTION_CHANGED" />
456 <protected-broadcast android:name="android.telephony.action.DEFAULT_SMS_SUBSCRIPTION_CHANGED" />
457 <protected-broadcast android:name="android.telephony.action.SHOW_VOICEMAIL_NOTIFICATION" />
459 <protected-broadcast android:name="com.android.bluetooth.btservice.action.ALARM_WAKEUP" />
460 <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_POLL" />
461 <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_UPDATED" />
462 <protected-broadcast android:name="com.android.server.NetworkTimeUpdateService.action.POLL" />
463 <protected-broadcast android:name="com.android.server.telecom.intent.action.CALLS_ADD_ENTRY" />
464 <protected-broadcast android:name="com.android.settings.location.MODE_CHANGING" />
465 <protected-broadcast android:name="com.android.settings.bluetooth.ACTION_DISMISS_PAIRING" />
467 <protected-broadcast android:name="NotificationManagerService.TIMEOUT" />
468 <protected-broadcast android:name="ScheduleConditionProvider.EVALUATE" />
469 <protected-broadcast android:name="EventConditionProvider.EVALUATE" />
470 <protected-broadcast android:name="SnoozeHelper.EVALUATE" />
471 <protected-broadcast android:name="wifi_scan_available" />
473 <protected-broadcast android:name="action.cne.started" />
474 <protected-broadcast android:name="android.content.jobscheduler.JOB_DEADLINE_EXPIRED" />
475 <protected-broadcast android:name="android.intent.action.ACTION_UNSOL_RESPONSE_OEM_HOOK_RAW" />
476 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_SUPL" />
477 <protected-broadcast android:name="android.os.action.ACTION_EFFECTS_SUPPRESSOR_CHANGED" />
478 <protected-broadcast android:name="android.os.action.LIGHT_DEVICE_IDLE_MODE_CHANGED" />
479 <protected-broadcast android:name="android.os.storage.action.VOLUME_STATE_CHANGED" />
480 <protected-broadcast android:name="android.os.storage.action.DISK_SCANNED" />
481 <protected-broadcast android:name="com.android.server.action.UPDATE_TWILIGHT_STATE" />
482 <protected-broadcast android:name="com.android.server.action.RESET_TWILIGHT_AUTO" />
483 <protected-broadcast android:name="com.android.server.device_idle.STEP_IDLE_STATE" />
484 <protected-broadcast android:name="com.android.server.device_idle.STEP_LIGHT_IDLE_STATE" />
485 <protected-broadcast android:name="com.android.server.Wifi.action.TOGGLE_PNO" />
486 <protected-broadcast android:name="intent.action.ACTION_RF_BAND_INFO" />
487 <protected-broadcast android:name="android.intent.action.MEDIA_RESOURCE_GRANTED" />
488 <protected-broadcast android:name="android.app.action.NETWORK_LOGS_AVAILABLE" />
489 <protected-broadcast android:name="android.app.action.SECURITY_LOGS_AVAILABLE" />
491 <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED" />
492 <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED_INTERNAL" />
493 <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_CHANGED" />
494 <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_ACCESS_GRANTED_CHANGED" />
495 <protected-broadcast android:name="android.os.action.ACTION_EFFECTS_SUPPRESSOR_CHANGED" />
497 <protected-broadcast android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS" />
498 <protected-broadcast android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS" />
500 <protected-broadcast android:name="android.intent.action.DYNAMIC_SENSOR_CHANGED" />
502 <protected-broadcast android:name="android.intent.action.ACTION_RADIO_OFF" />
504 <protected-broadcast android:name="android.accounts.LOGIN_ACCOUNTS_CHANGED" />
505 <protected-broadcast android:name="android.accounts.action.ACCOUNT_REMOVED" />
506 <protected-broadcast android:name="android.accounts.action.VISIBLE_ACCOUNTS_CHANGED" />
508 <protected-broadcast android:name="com.android.sync.SYNC_CONN_STATUS_CHANGED" />
510 <protected-broadcast android:name="com.android.phone.SIP_INCOMING_CALL" />
511 <protected-broadcast android:name="com.android.phone.SIP_ADD_PHONE" />
512 <protected-broadcast android:name="com.android.phone.SIP_REMOVE_PHONE" />
513 <protected-broadcast android:name="com.android.phone.SIP_CALL_OPTION_CHANGED" />
515 <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_CONNECTED" />
516 <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_DISCONNECTED" />
518 <protected-broadcast android:name="android.bluetooth.input.profile.action.HANDSHAKE" />
519 <protected-broadcast android:name="android.bluetooth.input.profile.action.REPORT" />
521 <protected-broadcast android:name="android.intent.action.TWILIGHT_CHANGED" />
523 <protected-broadcast android:name="com.android.server.fingerprint.ACTION_LOCKOUT_RESET" />
524 <protected-broadcast android:name="android.net.wifi.PASSPOINT_ICON_RECEIVED" />
525 <protected-broadcast android:name="com.android.server.notification.CountdownConditionProvider" />
527 <protected-broadcast android:name="com.android.internal.location.ALARM_WAKEUP" />
528 <protected-broadcast android:name="com.android.internal.location.ALARM_TIMEOUT" />
529 <protected-broadcast android:name="android.intent.action.GLOBAL_BUTTON" />
531 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_AVAILABLE" />
532 <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNAVAILABLE" />
533 <protected-broadcast android:name="com.android.server.pm.DISABLE_QUIET_MODE_AFTER_UNLOCK" />
535 <protected-broadcast android:name="com.android.server.retaildemo.ACTION_RESET_DEMO" />
537 <protected-broadcast android:name="android.intent.action.DEVICE_LOCKED_CHANGED" />
540 <!-- TODO: temporary broadcast used by AutoFillManagerServiceImpl; will be removed -->
541 <protected-broadcast android:name="com.android.internal.autofill.action.REQUEST_AUTOFILL" />
542 <protected-broadcast android:name="android.app.action.APPLICATION_DELEGATION_SCOPES_CHANGED" />
543 <protected-broadcast android:name="com.android.server.wm.ACTION_REVOKE_SYSTEM_ALERT_WINDOW_PERMISSION" />
544 <protected-broadcast android:name="android.media.tv.action.PARENTAL_CONTROLS_ENABLED_CHANGED" />
546 <protected-broadcast android:name="android.content.pm.action.SESSION_COMMITTED" />
547 <protected-broadcast android:name="android.os.action.USER_RESTRICTIONS_CHANGED" />
548 <protected-broadcast android:name="android.media.tv.action.PREVIEW_PROGRAM_ADDED_TO_WATCH_NEXT" />
549 <protected-broadcast android:name="android.media.tv.action.PREVIEW_PROGRAM_BROWSABLE_DISABLED" />
550 <protected-broadcast android:name="android.media.tv.action.WATCH_NEXT_PROGRAM_BROWSABLE_DISABLED" />
551 <protected-broadcast android:name="android.media.tv.action.CHANNEL_BROWSABLE_REQUESTED" />
552 <protected-broadcast android:name="com.android.server.InputMethodManagerService.SHOW_INPUT_METHOD_PICKER" />
554 <!-- ====================================================================== -->
555 <!-- RUNTIME PERMISSIONS -->
556 <!-- ====================================================================== -->
559 <!-- ====================================================================== -->
560 <!-- Permissions for accessing user's contacts including personal profile -->
561 <!-- ====================================================================== -->
564 <!-- Used for runtime permissions related to contacts and profiles on this
566 <permission-group android:name="android.permission-group.CONTACTS"
567 android:icon="@drawable/perm_group_contacts"
568 android:label="@string/permgrouplab_contacts"
569 android:description="@string/permgroupdesc_contacts"
570 android:priority="100" />
572 <!-- Allows an application to read the user's contacts data.
573 <p>Protection level: dangerous
575 <permission android:name="android.permission.READ_CONTACTS"
576 android:permissionGroup="android.permission-group.CONTACTS"
577 android:label="@string/permlab_readContacts"
578 android:description="@string/permdesc_readContacts"
579 android:protectionLevel="dangerous" />
581 <!-- Allows an application to write the user's contacts data.
582 <p>Protection level: dangerous
584 <permission android:name="android.permission.WRITE_CONTACTS"
585 android:permissionGroup="android.permission-group.CONTACTS"
586 android:label="@string/permlab_writeContacts"
587 android:description="@string/permdesc_writeContacts"
588 android:protectionLevel="dangerous" />
590 <!-- ====================================================================== -->
591 <!-- Permissions for accessing user's calendar -->
592 <!-- ====================================================================== -->
595 <!-- Used for runtime permissions related to user's calendar. -->
596 <permission-group android:name="android.permission-group.CALENDAR"
597 android:icon="@drawable/perm_group_calendar"
598 android:label="@string/permgrouplab_calendar"
599 android:description="@string/permgroupdesc_calendar"
600 android:priority="200" />
602 <!-- Allows an application to read the user's calendar data.
603 <p>Protection level: dangerous
605 <permission android:name="android.permission.READ_CALENDAR"
606 android:permissionGroup="android.permission-group.CALENDAR"
607 android:label="@string/permlab_readCalendar"
608 android:description="@string/permdesc_readCalendar"
609 android:protectionLevel="dangerous" />
611 <!-- Allows an application to write the user's calendar data.
612 <p>Protection level: dangerous
614 <permission android:name="android.permission.WRITE_CALENDAR"
615 android:permissionGroup="android.permission-group.CALENDAR"
616 android:label="@string/permlab_writeCalendar"
617 android:description="@string/permdesc_writeCalendar"
618 android:protectionLevel="dangerous" />
620 <!-- ====================================================================== -->
621 <!-- Permissions for accessing and modifying user's SMS messages -->
622 <!-- ====================================================================== -->
625 <!-- Used for runtime permissions related to user's SMS messages. -->
626 <permission-group android:name="android.permission-group.SMS"
627 android:icon="@drawable/perm_group_sms"
628 android:label="@string/permgrouplab_sms"
629 android:description="@string/permgroupdesc_sms"
630 android:priority="300" />
632 <!-- Allows an application to send SMS messages.
633 <p>Protection level: dangerous
635 <permission android:name="android.permission.SEND_SMS"
636 android:permissionGroup="android.permission-group.SMS"
637 android:label="@string/permlab_sendSms"
638 android:description="@string/permdesc_sendSms"
639 android:permissionFlags="costsMoney"
640 android:protectionLevel="dangerous" />
642 <!-- Allows an application to receive SMS messages.
643 <p>Protection level: dangerous
645 <permission android:name="android.permission.RECEIVE_SMS"
646 android:permissionGroup="android.permission-group.SMS"
647 android:label="@string/permlab_receiveSms"
648 android:description="@string/permdesc_receiveSms"
649 android:protectionLevel="dangerous"/>
651 <!-- Allows an application to read SMS messages.
652 <p>Protection level: dangerous
654 <permission android:name="android.permission.READ_SMS"
655 android:permissionGroup="android.permission-group.SMS"
656 android:label="@string/permlab_readSms"
657 android:description="@string/permdesc_readSms"
658 android:protectionLevel="dangerous" />
660 <!-- Allows an application to receive WAP push messages.
661 <p>Protection level: dangerous
663 <permission android:name="android.permission.RECEIVE_WAP_PUSH"
664 android:permissionGroup="android.permission-group.SMS"
665 android:label="@string/permlab_receiveWapPush"
666 android:description="@string/permdesc_receiveWapPush"
667 android:protectionLevel="dangerous" />
669 <!-- Allows an application to monitor incoming MMS messages.
670 <p>Protection level: dangerous
672 <permission android:name="android.permission.RECEIVE_MMS"
673 android:permissionGroup="android.permission-group.SMS"
674 android:label="@string/permlab_receiveMms"
675 android:description="@string/permdesc_receiveMms"
676 android:protectionLevel="dangerous" />
678 <!-- Allows an application to read previously received cell broadcast
679 messages and to register a content observer to get notifications when
680 a cell broadcast has been received and added to the database. For
681 emergency alerts, the database is updated immediately after the
682 alert dialog and notification sound/vibration/speech are presented.
683 The "read" column is then updated after the user dismisses the alert.
684 This enables supplementary emergency assistance apps to start loading
685 additional emergency information (if Internet access is available)
686 when the alert is first received, and to delay presenting the info
687 to the user until after the initial alert dialog is dismissed.
688 <p>Protection level: dangerous
689 @hide Pending API council approval -->
690 <permission android:name="android.permission.READ_CELL_BROADCASTS"
691 android:permissionGroup="android.permission-group.SMS"
692 android:label="@string/permlab_readCellBroadcasts"
693 android:description="@string/permdesc_readCellBroadcasts"
694 android:protectionLevel="dangerous" />
696 <!-- ====================================================================== -->
697 <!-- Permissions for accessing external storage -->
698 <!-- ====================================================================== -->
701 <!-- Used for runtime permissions related to the shared external storage. -->
702 <permission-group android:name="android.permission-group.STORAGE"
703 android:icon="@drawable/perm_group_storage"
704 android:label="@string/permgrouplab_storage"
705 android:description="@string/permgroupdesc_storage"
706 android:priority="900" />
708 <!-- Allows an application to read from external storage.
709 <p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly
710 granted this permission.</p>
711 <p>This permission is enforced starting in API level 19. Before API level 19, this
712 permission is not enforced and all apps still have access to read from external storage.
713 You can test your app with the permission enforced by enabling <em>Protect USB
714 storage</em> under Developer options in the Settings app on a device running Android 4.1 or
716 <p>Also starting in API level 19, this permission is <em>not</em> required to
717 read/write files in your application-specific directories returned by
718 {@link android.content.Context#getExternalFilesDir} and
719 {@link android.content.Context#getExternalCacheDir}.
720 <p class="note"><strong>Note:</strong> If <em>both</em> your <a
721 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
722 minSdkVersion}</a> and <a
723 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
724 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
725 grants your app this permission. If you don't need this permission, be sure your <a
726 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
727 targetSdkVersion}</a> is 4 or higher.
728 <p>Protection level: dangerous
730 <permission android:name="android.permission.READ_EXTERNAL_STORAGE"
731 android:permissionGroup="android.permission-group.STORAGE"
732 android:label="@string/permlab_sdcardRead"
733 android:description="@string/permdesc_sdcardRead"
734 android:protectionLevel="dangerous" />
736 <!-- Allows an application to write to external storage.
737 <p class="note"><strong>Note:</strong> If <em>both</em> your <a
738 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
739 minSdkVersion}</a> and <a
740 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
741 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
742 grants your app this permission. If you don't need this permission, be sure your <a
743 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
744 targetSdkVersion}</a> is 4 or higher.
745 <p>Starting in API level 19, this permission is <em>not</em> required to
746 read/write files in your application-specific directories returned by
747 {@link android.content.Context#getExternalFilesDir} and
748 {@link android.content.Context#getExternalCacheDir}.
749 <p>Protection level: dangerous
751 <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE"
752 android:permissionGroup="android.permission-group.STORAGE"
753 android:label="@string/permlab_sdcardWrite"
754 android:description="@string/permdesc_sdcardWrite"
755 android:protectionLevel="dangerous" />
757 <!-- ====================================================================== -->
758 <!-- Permissions for accessing the device location -->
759 <!-- ====================================================================== -->
762 <!-- Used for permissions that allow accessing the device location. -->
763 <permission-group android:name="android.permission-group.LOCATION"
764 android:icon="@drawable/perm_group_location"
765 android:label="@string/permgrouplab_location"
766 android:description="@string/permgroupdesc_location"
767 android:priority="400" />
769 <!-- Allows an app to access precise location.
770 Alternatively, you might want {@link #ACCESS_COARSE_LOCATION}.
771 <p>Protection level: dangerous
773 <permission android:name="android.permission.ACCESS_FINE_LOCATION"
774 android:permissionGroup="android.permission-group.LOCATION"
775 android:label="@string/permlab_accessFineLocation"
776 android:description="@string/permdesc_accessFineLocation"
777 android:protectionLevel="dangerous|instant" />
779 <!-- Allows an app to access approximate location.
780 Alternatively, you might want {@link #ACCESS_FINE_LOCATION}.
781 <p>Protection level: dangerous
783 <permission android:name="android.permission.ACCESS_COARSE_LOCATION"
784 android:permissionGroup="android.permission-group.LOCATION"
785 android:label="@string/permlab_accessCoarseLocation"
786 android:description="@string/permdesc_accessCoarseLocation"
787 android:protectionLevel="dangerous|instant" />
789 <!-- ====================================================================== -->
790 <!-- Permissions for accessing the device telephony -->
791 <!-- ====================================================================== -->
794 <!-- Used for permissions that are associated telephony features. -->
795 <permission-group android:name="android.permission-group.PHONE"
796 android:icon="@drawable/perm_group_phone_calls"
797 android:label="@string/permgrouplab_phone"
798 android:description="@string/permgroupdesc_phone"
799 android:priority="500" />
801 <!-- Allows read only access to phone state, including the phone number of the device,
802 current cellular network information, the status of any ongoing calls, and a list of any
803 {@link android.telecom.PhoneAccount}s registered on the device.
804 <p class="note"><strong>Note:</strong> If <em>both</em> your <a
805 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
806 minSdkVersion}</a> and <a
807 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
808 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
809 grants your app this permission. If you don't need this permission, be sure your <a
810 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
811 targetSdkVersion}</a> is 4 or higher.
812 <p>Protection level: dangerous
814 <permission android:name="android.permission.READ_PHONE_STATE"
815 android:permissionGroup="android.permission-group.PHONE"
816 android:label="@string/permlab_readPhoneState"
817 android:description="@string/permdesc_readPhoneState"
818 android:protectionLevel="dangerous" />
820 <!-- Allows read access to the device's phone number(s). This is a subset of the capabilities
821 granted by {@link #READ_PHONE_STATE} but is exposed to instant applications.
822 <p>Protection level: dangerous-->
823 <permission android:name="android.permission.READ_PHONE_NUMBERS"
824 android:permissionGroup="android.permission-group.PHONE"
825 android:label="@string/permlab_readPhoneNumbers"
826 android:description="@string/permdesc_readPhoneNumbers"
827 android:protectionLevel="dangerous|instant" />
829 <!-- Allows an application to initiate a phone call without going through
830 the Dialer user interface for the user to confirm the call.
831 <p>Protection level: dangerous
833 <permission android:name="android.permission.CALL_PHONE"
834 android:permissionGroup="android.permission-group.PHONE"
835 android:permissionFlags="costsMoney"
836 android:label="@string/permlab_callPhone"
837 android:description="@string/permdesc_callPhone"
838 android:protectionLevel="dangerous" />
840 <!-- Allows an application to access the IMS call service: making and
842 <p>Protection level: signature|privileged
845 <permission android:name="android.permission.ACCESS_IMS_CALL_SERVICE"
846 android:permissionGroup="android.permission-group.PHONE"
847 android:label="@string/permlab_accessImsCallService"
848 android:description="@string/permdesc_accessImsCallService"
849 android:protectionLevel="signature|privileged" />
851 <!-- Allows an application to read the user's call log.
852 <p class="note"><strong>Note:</strong> If your app uses the
853 {@link #READ_CONTACTS} permission and <em>both</em> your <a
854 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
855 minSdkVersion}</a> and <a
856 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
857 targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
858 grants your app this permission. If you don't need this permission, be sure your <a
859 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
860 targetSdkVersion}</a> is 16 or higher.</p>
861 <p>Protection level: dangerous
863 <permission android:name="android.permission.READ_CALL_LOG"
864 android:permissionGroup="android.permission-group.PHONE"
865 android:label="@string/permlab_readCallLog"
866 android:description="@string/permdesc_readCallLog"
867 android:protectionLevel="dangerous" />
869 <!-- Allows an application to write (but not read) the user's
871 <p class="note"><strong>Note:</strong> If your app uses the
872 {@link #WRITE_CONTACTS} permission and <em>both</em> your <a
873 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
874 minSdkVersion}</a> and <a
875 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
876 targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
877 grants your app this permission. If you don't need this permission, be sure your <a
878 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
879 targetSdkVersion}</a> is 16 or higher.</p>
880 <p>Protection level: dangerous
882 <permission android:name="android.permission.WRITE_CALL_LOG"
883 android:permissionGroup="android.permission-group.PHONE"
884 android:label="@string/permlab_writeCallLog"
885 android:description="@string/permdesc_writeCallLog"
886 android:protectionLevel="dangerous" />
888 <!-- Allows an application to add voicemails into the system.
889 <p>Protection level: dangerous
891 <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL"
892 android:permissionGroup="android.permission-group.PHONE"
893 android:label="@string/permlab_addVoicemail"
894 android:description="@string/permdesc_addVoicemail"
895 android:protectionLevel="dangerous" />
897 <!-- Allows an application to use SIP service.
898 <p>Protection level: dangerous
900 <permission android:name="android.permission.USE_SIP"
901 android:permissionGroup="android.permission-group.PHONE"
902 android:description="@string/permdesc_use_sip"
903 android:label="@string/permlab_use_sip"
904 android:protectionLevel="dangerous"/>
906 <!-- Allows an application to see the number being dialed during an outgoing
907 call with the option to redirect the call to a different number or
908 abort the call altogether.
909 <p>Protection level: dangerous
911 <permission android:name="android.permission.PROCESS_OUTGOING_CALLS"
912 android:permissionGroup="android.permission-group.PHONE"
913 android:label="@string/permlab_processOutgoingCalls"
914 android:description="@string/permdesc_processOutgoingCalls"
915 android:protectionLevel="dangerous" />
918 <!-- Allows the app to answer an incoming phone call.
919 <p>Protection level: dangerous
921 <permission android:name="android.permission.ANSWER_PHONE_CALLS"
922 android:permissionGroup="android.permission-group.PHONE"
923 android:label="@string/permlab_answerPhoneCalls"
924 android:description="@string/permdesc_answerPhoneCalls"
925 android:protectionLevel="dangerous|runtime" />
927 <!-- Allows a calling application which manages it own calls through the self-managed
928 {@link android.telecom.ConnectionService} APIs. See
929 {@link android.telecom.PhoneAccount#CAPABILITY_SELF_MANAGED for more information on the
930 self-managed ConnectionService APIs.
931 <p>Protection level: normal
933 <permission android:name="android.permission.MANAGE_OWN_CALLS"
934 android:label="@string/permlab_manageOwnCalls"
935 android:description="@string/permdesc_manageOwnCalls"
936 android:protectionLevel="normal" />
938 <!-- ====================================================================== -->
939 <!-- Permissions for accessing the device microphone -->
940 <!-- ====================================================================== -->
943 <!-- Used for permissions that are associated with accessing
944 microphone audio from the device. Note that phone calls also capture audio
945 but are in a separate (more visible) permission group. -->
946 <permission-group android:name="android.permission-group.MICROPHONE"
947 android:icon="@drawable/perm_group_microphone"
948 android:label="@string/permgrouplab_microphone"
949 android:description="@string/permgroupdesc_microphone"
950 android:priority="600" />
952 <!-- Allows an application to record audio.
953 <p>Protection level: dangerous
955 <permission android:name="android.permission.RECORD_AUDIO"
956 android:permissionGroup="android.permission-group.MICROPHONE"
957 android:label="@string/permlab_recordAudio"
958 android:description="@string/permdesc_recordAudio"
959 android:protectionLevel="dangerous|instant"/>
961 <!-- ====================================================================== -->
962 <!-- Permissions for accessing the UCE Service -->
963 <!-- ====================================================================== -->
965 <!-- @hide Allows an application to Access UCE-Presence.
966 <p>Protection level: signature|privileged
968 <permission android:name="android.permission.ACCESS_UCE_PRESENCE_SERVICE"
969 android:permissionGroup="android.permission-group.PHONE"
970 android:protectionLevel="signature|privileged"/>
972 <!-- @hide Allows an application to Access UCE-OPTIONS.
973 <p>Protection level: signature|privileged
975 <permission android:name="android.permission.ACCESS_UCE_OPTIONS_SERVICE"
976 android:permissionGroup="android.permission-group.PHONE"
977 android:protectionLevel="signature|privileged"/>
981 <!-- ====================================================================== -->
982 <!-- Permissions for accessing the device camera -->
983 <!-- ====================================================================== -->
986 <!-- Used for permissions that are associated with accessing
987 camera or capturing images/video from the device. -->
988 <permission-group android:name="android.permission-group.CAMERA"
989 android:icon="@drawable/perm_group_camera"
990 android:label="@string/permgrouplab_camera"
991 android:description="@string/permgroupdesc_camera"
992 android:priority="700" />
994 <!-- Required to be able to access the camera device.
995 <p>This will automatically enforce the <a
996 href="{@docRoot}guide/topics/manifest/uses-feature-element.html">
997 <uses-feature>}</a> manifest element for <em>all</em> camera features.
998 If you do not require all camera features or can properly operate if a camera
999 is not available, then you must modify your manifest as appropriate in order to
1000 install on devices that don't support all camera features.</p>
1001 <p>Protection level: dangerous
1003 <permission android:name="android.permission.CAMERA"
1004 android:permissionGroup="android.permission-group.CAMERA"
1005 android:label="@string/permlab_camera"
1006 android:description="@string/permdesc_camera"
1007 android:protectionLevel="dangerous|instant" />
1010 <!-- ====================================================================== -->
1011 <!-- Permissions for accessing the device sensors -->
1012 <!-- ====================================================================== -->
1015 <!-- Used for permissions that are associated with accessing
1016 camera or capturing images/video from the device. -->
1017 <permission-group android:name="android.permission-group.SENSORS"
1018 android:icon="@drawable/perm_group_sensors"
1019 android:label="@string/permgrouplab_sensors"
1020 android:description="@string/permgroupdesc_sensors"
1021 android:priority="800" />
1023 <!-- Allows an application to access data from sensors that the user uses to
1024 measure what is happening inside his/her body, such as heart rate.
1025 <p>Protection level: dangerous -->
1026 <permission android:name="android.permission.BODY_SENSORS"
1027 android:permissionGroup="android.permission-group.SENSORS"
1028 android:label="@string/permlab_bodySensors"
1029 android:description="@string/permdesc_bodySensors"
1030 android:protectionLevel="dangerous" />
1032 <!-- Allows an app to use fingerprint hardware.
1033 <p>Protection level: normal
1035 <permission android:name="android.permission.USE_FINGERPRINT"
1036 android:permissionGroup="android.permission-group.SENSORS"
1037 android:label="@string/permlab_useFingerprint"
1038 android:description="@string/permdesc_useFingerprint"
1039 android:protectionLevel="normal" />
1041 <!-- ====================================================================== -->
1042 <!-- REMOVED PERMISSIONS -->
1043 <!-- ====================================================================== -->
1045 <!-- @hide We need to keep this around for backwards compatibility -->
1046 <permission android:name="android.permission.READ_PROFILE"
1047 android:protectionLevel="normal"
1048 android:permissionFlags="removed"/>
1050 <!-- @hide We need to keep this around for backwards compatibility -->
1051 <permission android:name="android.permission.WRITE_PROFILE"
1052 android:protectionLevel="normal"
1053 android:permissionFlags="removed"/>
1055 <!-- @hide We need to keep this around for backwards compatibility -->
1056 <permission android:name="android.permission.READ_SOCIAL_STREAM"
1057 android:protectionLevel="normal"
1058 android:permissionFlags="removed"/>
1060 <!-- @hide We need to keep this around for backwards compatibility -->
1061 <permission android:name="android.permission.WRITE_SOCIAL_STREAM"
1062 android:protectionLevel="normal"
1063 android:permissionFlags="removed"/>
1065 <!-- @hide We need to keep this around for backwards compatibility -->
1066 <permission android:name="android.permission.READ_USER_DICTIONARY"
1067 android:protectionLevel="normal"
1068 android:permissionFlags="removed"/>
1070 <!-- @hide We need to keep this around for backwards compatibility -->
1071 <permission android:name="android.permission.WRITE_USER_DICTIONARY"
1072 android:protectionLevel="normal"
1073 android:permissionFlags="removed"/>
1075 <!-- @hide We need to keep this around for backwards compatibility -->
1076 <permission android:name="android.permission.WRITE_SMS"
1077 android:protectionLevel="normal"
1078 android:permissionFlags="removed"/>
1080 <!-- @hide We need to keep this around for backwards compatibility -->
1081 <permission android:name="com.android.browser.permission.READ_HISTORY_BOOKMARKS"
1082 android:protectionLevel="normal"
1083 android:permissionFlags="removed"/>
1085 <!-- @hide We need to keep this around for backwards compatibility -->
1086 <permission android:name="com.android.browser.permission.WRITE_HISTORY_BOOKMARKS"
1087 android:protectionLevel="normal"
1088 android:permissionFlags="removed"/>
1090 <!-- @hide We need to keep this around for backwards compatibility -->
1091 <permission android:name="android.permission.AUTHENTICATE_ACCOUNTS"
1092 android:protectionLevel="normal"
1093 android:permissionFlags="removed"/>
1095 <!-- @hide We need to keep this around for backwards compatibility -->
1096 <permission android:name="android.permission.MANAGE_ACCOUNTS"
1097 android:protectionLevel="normal"
1098 android:permissionFlags="removed"/>
1100 <!-- @hide We need to keep this around for backwards compatibility -->
1101 <permission android:name="android.permission.USE_CREDENTIALS"
1102 android:protectionLevel="normal"
1103 android:permissionFlags="removed"/>
1105 <!-- @hide We need to keep this around for backwards compatibility -->
1106 <permission android:name="android.permission.SUBSCRIBED_FEEDS_READ"
1107 android:protectionLevel="normal"
1108 android:permissionFlags="removed"/>
1110 <!-- @hide We need to keep this around for backwards compatibility -->
1111 <permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE"
1112 android:protectionLevel="normal"
1113 android:permissionFlags="removed"/>
1115 <!-- @hide We need to keep this around for backwards compatibility -->
1116 <permission android:name="android.permission.FLASHLIGHT"
1117 android:protectionLevel="normal"
1118 android:permissionFlags="removed"/>
1120 <!-- ====================================================================== -->
1121 <!-- INSTALL PERMISSIONS -->
1122 <!-- ====================================================================== -->
1124 <!-- ================================== -->
1125 <!-- Permissions for accessing messages -->
1126 <!-- ================================== -->
1129 <!-- @SystemApi Allows an application (Phone) to send a request to other applications
1130 to handle the respond-via-message action during incoming calls.
1131 <p>Not for use by third-party applications. -->
1132 <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE"
1133 android:protectionLevel="signature|privileged" />
1135 <!-- @SystemApi Allows an application to send SMS to premium shortcodes without user permission.
1136 <p>Not for use by third-party applications.
1138 <permission android:name="android.permission.SEND_SMS_NO_CONFIRMATION"
1139 android:protectionLevel="signature|privileged" />
1141 <!-- Allows an application to filter carrier specific sms.
1143 <permission android:name="android.permission.CARRIER_FILTER_SMS"
1144 android:protectionLevel="signature|privileged" />
1146 <!-- @SystemApi Allows an application to receive emergency cell broadcast messages,
1147 to record or display them to the user.
1148 <p>Not for use by third-party applications.
1150 <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST"
1151 android:protectionLevel="signature|privileged" />
1153 <!-- Allows an application to monitor incoming Bluetooth MAP messages, to record
1154 or perform processing on them. -->
1156 <permission android:name="android.permission.RECEIVE_BLUETOOTH_MAP"
1157 android:protectionLevel="signature|privileged" />
1159 <!-- @SystemApi @hide Allows an application to execute contacts directory search.
1160 This should only be used by ContactsProvider.
1161 <p>Not for use by third-party applications. -->
1162 <permission android:name="android.permission.BIND_DIRECTORY_SEARCH"
1163 android:protectionLevel="signature|privileged" />
1165 <!-- @SystemApi @hide Allows an application to modify cell broadcasts through the content provider.
1166 <p>Not for use by third-party applications. -->
1167 <permission android:name="android.permission.MODIFY_CELL_BROADCASTS"
1168 android:protectionLevel="signature|privileged" />
1170 <!-- =============================================================== -->
1171 <!-- Permissions for setting the device alarm -->
1172 <!-- =============================================================== -->
1175 <!-- Allows an application to broadcast an Intent to set an alarm for the user.
1176 <p>Protection level: normal
1178 <permission android:name="com.android.alarm.permission.SET_ALARM"
1179 android:label="@string/permlab_setAlarm"
1180 android:description="@string/permdesc_setAlarm"
1181 android:protectionLevel="normal" />
1183 <!-- =============================================================== -->
1184 <!-- Permissions for accessing the user voicemail -->
1185 <!-- =============================================================== -->
1188 <!-- Allows an application to modify and remove existing voicemails in the system.
1189 <p>Protection level: signature|privileged
1191 <permission android:name="com.android.voicemail.permission.WRITE_VOICEMAIL"
1192 android:protectionLevel="signature|privileged" />
1194 <!-- Allows an application to read voicemails in the system.
1195 <p>Protection level: signature|privileged
1197 <permission android:name="com.android.voicemail.permission.READ_VOICEMAIL"
1198 android:protectionLevel="signature|privileged" />
1200 <!-- ======================================= -->
1201 <!-- Permissions for accessing location info -->
1202 <!-- ======================================= -->
1205 <!-- Allows an application to access extra location provider commands.
1206 <p>Protection level: normal
1208 <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS"
1209 android:label="@string/permlab_accessLocationExtraCommands"
1210 android:description="@string/permdesc_accessLocationExtraCommands"
1211 android:protectionLevel="normal" />
1213 <!-- @SystemApi Allows an application to install a location provider into the Location Manager.
1214 <p>Not for use by third-party applications. -->
1215 <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER"
1216 android:protectionLevel="signature|privileged" />
1218 <!-- @SystemApi @hide Allows HDMI-CEC service to access device and configuration files.
1219 This should only be used by HDMI-CEC service.
1221 <permission android:name="android.permission.HDMI_CEC"
1222 android:protectionLevel="signature|privileged" />
1224 <!-- @SystemApi Allows an application to use location features in hardware,
1225 such as the geofencing api.
1226 <p>Not for use by third-party applications. -->
1227 <permission android:name="android.permission.LOCATION_HARDWARE"
1228 android:protectionLevel="signature|privileged" />
1229 <uses-permission android:name="android.permission.LOCATION_HARDWARE"/>
1231 <!-- @SystemApi Allows an application to create mock location providers for testing.
1232 <p>Protection level: signature
1235 <permission android:name="android.permission.ACCESS_MOCK_LOCATION"
1236 android:protectionLevel="signature" />
1238 <!-- ======================================= -->
1239 <!-- Permissions for accessing networks -->
1240 <!-- ======================================= -->
1243 <!-- Allows applications to open network sockets.
1244 <p>Protection level: normal
1246 <permission android:name="android.permission.INTERNET"
1247 android:description="@string/permdesc_createNetworkSockets"
1248 android:label="@string/permlab_createNetworkSockets"
1249 android:protectionLevel="normal|instant" />
1251 <!-- Allows applications to access information about networks.
1252 <p>Protection level: normal
1254 <permission android:name="android.permission.ACCESS_NETWORK_STATE"
1255 android:description="@string/permdesc_accessNetworkState"
1256 android:label="@string/permlab_accessNetworkState"
1257 android:protectionLevel="normal|instant" />
1259 <!-- Allows applications to access information about Wi-Fi networks.
1260 <p>Protection level: normal
1262 <permission android:name="android.permission.ACCESS_WIFI_STATE"
1263 android:description="@string/permdesc_accessWifiState"
1264 android:label="@string/permlab_accessWifiState"
1265 android:protectionLevel="normal" />
1267 <!-- Allows applications to change Wi-Fi connectivity state.
1268 <p>Protection level: normal
1270 <permission android:name="android.permission.CHANGE_WIFI_STATE"
1271 android:description="@string/permdesc_changeWifiState"
1272 android:label="@string/permlab_changeWifiState"
1273 android:protectionLevel="normal" />
1275 <!-- @SystemApi @hide Allows applications to read Wi-Fi credential.
1276 <p>Not for use by third-party applications. -->
1277 <permission android:name="android.permission.READ_WIFI_CREDENTIAL"
1278 android:protectionLevel="signature|privileged" />
1280 <!-- @SystemApi @hide Allows applications to change tether state and run
1281 tether carrier provisioning.
1282 <p>Not for use by third-party applications. -->
1283 <permission android:name="android.permission.TETHER_PRIVILEGED"
1284 android:protectionLevel="signature|privileged" />
1286 <!-- @SystemApi @hide Allow system apps to receive broadcast
1287 when a wifi network credential is changed.
1288 <p>Not for use by third-party applications. -->
1289 <permission android:name="android.permission.RECEIVE_WIFI_CREDENTIAL_CHANGE"
1290 android:protectionLevel="signature|privileged" />
1292 <!-- @SystemApi @hide Allows an application to modify any wifi configuration, even if created
1293 by another application. Once reconfigured the original creator cannot make any further
1295 <p>Not for use by third-party applications. -->
1296 <permission android:name="android.permission.OVERRIDE_WIFI_CONFIG"
1297 android:protectionLevel="signature|privileged" />
1300 <permission android:name="android.permission.ACCESS_WIMAX_STATE"
1301 android:description="@string/permdesc_accessWimaxState"
1302 android:label="@string/permlab_accessWimaxState"
1303 android:protectionLevel="normal" />
1306 <permission android:name="android.permission.CHANGE_WIMAX_STATE"
1307 android:description="@string/permdesc_changeWimaxState"
1308 android:label="@string/permlab_changeWimaxState"
1309 android:protectionLevel="normal" />
1311 <!-- Allows applications to act as network scorers. @hide @SystemApi-->
1312 <permission android:name="android.permission.SCORE_NETWORKS"
1313 android:protectionLevel="signature|privileged" />
1315 <!-- Allows applications to request network
1316 recommendations and scores from the NetworkScoreService.
1317 <p>Not for use by third-party applications. @hide -->
1318 <permission android:name="android.permission.REQUEST_NETWORK_SCORES"
1319 android:protectionLevel="signature|setup" />
1321 <!-- Allows network stack services (Connectivity and Wifi) to coordinate
1322 <p>Not for use by third-party or privileged applications.
1323 @hide This should only be used by Connectivity and Wifi Services.
1325 <permission android:name="android.permission.NETWORK_STACK"
1326 android:protectionLevel="signature" />
1328 <!-- Allows Settings and SystemUI to call methods in Networking services
1329 <p>Not for use by third-party or privileged applications.
1330 @hide This should only be used by Settings and SystemUI.
1332 <permission android:name="android.permission.NETWORK_SETTINGS"
1333 android:protectionLevel="signature" />
1335 <!-- #SystemApi @hide Allows applications to access information about LoWPAN interfaces.
1336 <p>Not for use by third-party applications. -->
1337 <permission android:name="android.permission.ACCESS_LOWPAN_STATE"
1338 android:protectionLevel="signature|privileged" />
1340 <!-- #SystemApi @hide Allows applications to change LoWPAN connectivity state.
1341 <p>Not for use by third-party applications. -->
1342 <permission android:name="android.permission.CHANGE_LOWPAN_STATE"
1343 android:protectionLevel="signature|privileged" />
1345 <!-- #SystemApi @hide Allows applications to read LoWPAN credential.
1346 <p>Not for use by third-party applications. -->
1347 <permission android:name="android.permission.READ_LOWPAN_CREDENTIAL"
1348 android:protectionLevel="signature|privileged" />
1350 <!-- #SystemApi @hide Allows a service to register or unregister
1351 new LoWPAN interfaces.
1352 <p>Not for use by third-party applications. -->
1353 <permission android:name="android.permission.MANAGE_LOWPAN_INTERFACES"
1354 android:protectionLevel="signature|privileged" />
1356 <!-- ======================================= -->
1357 <!-- Permissions for short range, peripheral networks -->
1358 <!-- ======================================= -->
1361 <!-- Allows applications to connect to paired bluetooth devices.
1362 <p>Protection level: normal
1364 <permission android:name="android.permission.BLUETOOTH"
1365 android:description="@string/permdesc_bluetooth"
1366 android:label="@string/permlab_bluetooth"
1367 android:protectionLevel="normal" />
1369 <!-- Allows applications to discover and pair bluetooth devices.
1370 <p>Protection level: normal
1372 <permission android:name="android.permission.BLUETOOTH_ADMIN"
1373 android:description="@string/permdesc_bluetoothAdmin"
1374 android:label="@string/permlab_bluetoothAdmin"
1375 android:protectionLevel="normal" />
1377 <!-- @SystemApi Allows applications to pair bluetooth devices without user interaction, and to
1378 allow or disallow phonebook access or message access.
1379 This is not available to third party applications. -->
1380 <permission android:name="android.permission.BLUETOOTH_PRIVILEGED"
1381 android:protectionLevel="signature|privileged" />
1383 <!-- Control access to email providers exclusively for Bluetooth
1386 <permission android:name="android.permission.BLUETOOTH_MAP"
1387 android:protectionLevel="signature" />
1389 <!-- Allows bluetooth stack to access files
1390 @hide This should only be used by Bluetooth apk.
1392 <permission android:name="android.permission.BLUETOOTH_STACK"
1393 android:protectionLevel="signature" />
1395 <!-- Allows applications to perform I/O operations over NFC.
1396 <p>Protection level: normal
1398 <permission android:name="android.permission.NFC"
1399 android:description="@string/permdesc_nfc"
1400 android:label="@string/permlab_nfc"
1401 android:protectionLevel="normal" />
1403 <!-- @SystemApi Allows an internal user to use privileged ConnectivityManager APIs.
1405 <permission android:name="android.permission.CONNECTIVITY_INTERNAL"
1406 android:protectionLevel="signature|privileged" />
1408 <!-- @SystemApi Allows an internal user to use restricted Networks.
1410 <permission android:name="android.permission.CONNECTIVITY_USE_RESTRICTED_NETWORKS"
1411 android:protectionLevel="signature|privileged" />
1413 <!-- Allows a system application to access hardware packet offload capabilities.
1415 <permission android:name="android.permission.PACKET_KEEPALIVE_OFFLOAD"
1416 android:protectionLevel="signature|privileged" />
1420 <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE"
1421 android:protectionLevel="signature|privileged" />
1423 <!-- @SystemApi Allows access to the loop radio (Android@Home mesh network) device.
1425 <permission android:name="android.permission.LOOP_RADIO"
1426 android:protectionLevel="signature|privileged" />
1428 <!-- Allows sending and receiving handover transfer status from Wifi and Bluetooth
1430 <permission android:name="android.permission.NFC_HANDOVER_STATUS"
1431 android:protectionLevel="signature|privileged" />
1433 <!-- ================================== -->
1434 <!-- Permissions for accessing accounts -->
1435 <!-- ================================== -->
1438 <!-- Allows access to the list of accounts in the Accounts Service.
1440 <p class="note"><strong>Note:</strong> Beginning with Android 6.0 (API level
1441 23), if an app shares the signature of the authenticator that manages an
1442 account, it does not need <code>"GET_ACCOUNTS"</code> permission to read
1443 information about that account. On Android 5.1 and lower, all apps need
1444 <code>"GET_ACCOUNTS"</code> permission to read information about any
1447 <p>Protection level: dangerous
1449 <permission android:name="android.permission.GET_ACCOUNTS"
1450 android:permissionGroup="android.permission-group.CONTACTS"
1451 android:protectionLevel="dangerous"
1452 android:description="@string/permdesc_getAccounts"
1453 android:label="@string/permlab_getAccounts" />
1454 <uses-permission android:name="android.permission.GET_ACCOUNTS"/>
1456 <!-- @SystemApi Allows applications to call into AccountAuthenticators.
1457 <p>Not for use by third-party applications. -->
1458 <permission android:name="android.permission.ACCOUNT_MANAGER"
1459 android:protectionLevel="signature" />
1461 <!-- ================================== -->
1462 <!-- Permissions for accessing hardware that may effect battery life-->
1463 <!-- ================================== -->
1466 <!-- Allows applications to enter Wi-Fi Multicast mode.
1467 <p>Protection level: normal
1469 <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE"
1470 android:description="@string/permdesc_changeWifiMulticastState"
1471 android:label="@string/permlab_changeWifiMulticastState"
1472 android:protectionLevel="normal" />
1474 <!-- Allows access to the vibrator.
1475 <p>Protection level: normal
1477 <permission android:name="android.permission.VIBRATE"
1478 android:label="@string/permlab_vibrate"
1479 android:description="@string/permdesc_vibrate"
1480 android:protectionLevel="normal|instant" />
1482 <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen
1484 <p>Protection level: normal
1486 <permission android:name="android.permission.WAKE_LOCK"
1487 android:label="@string/permlab_wakeLock"
1488 android:description="@string/permdesc_wakeLock"
1489 android:protectionLevel="normal|instant" />
1491 <!-- Allows using the device's IR transmitter, if available.
1492 <p>Protection level: normal
1494 <permission android:name="android.permission.TRANSMIT_IR"
1495 android:label="@string/permlab_transmitIr"
1496 android:description="@string/permdesc_transmitIr"
1497 android:protectionLevel="normal" />
1499 <!-- ==================================================== -->
1500 <!-- Permissions related to changing audio settings -->
1501 <!-- ==================================================== -->
1504 <!-- Allows an application to modify global audio settings.
1505 <p>Protection level: normal
1507 <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS"
1508 android:label="@string/permlab_modifyAudioSettings"
1509 android:description="@string/permdesc_modifyAudioSettings"
1510 android:protectionLevel="normal" />
1512 <!-- ================================== -->
1513 <!-- Permissions for accessing hardware -->
1514 <!-- ================================== -->
1517 <!-- @SystemApi Allows an application to manage preferences and permissions for USB devices
1519 <permission android:name="android.permission.MANAGE_USB"
1520 android:protectionLevel="signature|privileged" />
1522 <!-- @SystemApi Allows an application to access the MTP USB kernel driver.
1523 For use only by the device side MTP implementation.
1525 <permission android:name="android.permission.ACCESS_MTP"
1526 android:protectionLevel="signature|privileged" />
1528 <!-- @SystemApi Allows access to hardware peripherals. Intended only for hardware testing.
1529 <p>Not for use by third-party applications.
1532 <permission android:name="android.permission.HARDWARE_TEST"
1533 android:protectionLevel="signature" />
1535 <!-- @SystemApi Allows access to Broadcast Radio
1536 @hide This is not a third-party API (intended for system apps).-->
1537 <permission android:name="android.permission.ACCESS_BROADCAST_RADIO"
1538 android:protectionLevel="signature|privileged" />
1540 <!-- @deprecated @SystemApi Allows access to FM
1541 @hide This is not a third-party API (intended for system apps).-->
1542 <permission android:name="android.permission.ACCESS_FM_RADIO"
1543 android:protectionLevel="signature|privileged" />
1545 <!-- Allows access to configure network interfaces, configure/use IPSec, etc.
1547 <permission android:name="android.permission.NET_ADMIN"
1548 android:protectionLevel="signature" />
1550 <!-- Allows registration for remote audio playback. @hide -->
1551 <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK"
1552 android:protectionLevel="signature" />
1554 <!-- @SystemApi Allows TvInputService to access underlying TV input hardware such as
1555 built-in tuners and HDMI-in's.
1556 @hide This should only be used by OEM's TvInputService's.
1558 <permission android:name="android.permission.TV_INPUT_HARDWARE"
1559 android:protectionLevel="signature|privileged" />
1561 <!-- @SystemApi Allows to capture a frame of TV input hardware such as
1562 built-in tuners and HDMI-in's.
1563 @hide <p>Not for use by third-party applications.
1565 <permission android:name="android.permission.CAPTURE_TV_INPUT"
1566 android:protectionLevel="signature|privileged" />
1568 <!-- @hide Allows TvInputService to access DVB device.
1569 <p>Not for use by third-party applications. -->
1570 <permission android:name="android.permission.DVB_DEVICE"
1571 android:protectionLevel="signature|privileged" />
1573 <!-- @SystemApi Allows reading and enabling/disabling the OEM unlock allowed by carrier state
1574 @hide <p>Not for use by third-party applications. -->
1575 <permission android:name="android.permission.MANAGE_CARRIER_OEM_UNLOCK_STATE"
1576 android:protectionLevel="signature|privileged" />
1578 <!-- @SystemApi Allows reading and enabling/disabling the OEM unlock allowed by user state
1579 @hide <p>Not for use by third-party applications. -->
1580 <permission android:name="android.permission.MANAGE_USER_OEM_UNLOCK_STATE"
1581 android:protectionLevel="signature|privileged" />
1583 <!-- @SystemApi Allows reading the OEM unlock state
1584 @hide <p>Not for use by third-party applications. -->
1585 <permission android:name="android.permission.READ_OEM_UNLOCK_STATE"
1586 android:protectionLevel="signature|privileged" />
1588 <!-- @hide Allows enabling/disabling OEM unlock
1589 <p>Not for use by third-party applications. -->
1590 <permission android:name="android.permission.OEM_UNLOCK_STATE"
1591 android:protectionLevel="signature" />
1593 <!-- @hide Allows querying state of PersistentDataBlock
1594 <p>Not for use by third-party applications. -->
1595 <permission android:name="android.permission.ACCESS_PDB_STATE"
1596 android:protectionLevel="signature" />
1598 <!-- @hide Allows system update service to notify device owner about pending updates.
1599 <p>Not for use by third-party applications. -->
1600 <permission android:name="android.permission.NOTIFY_PENDING_SYSTEM_UPDATE"
1601 android:protectionLevel="signature|privileged" />
1603 <!-- =========================================== -->
1604 <!-- Permissions associated with camera and image capture -->
1605 <!-- =========================================== -->
1608 <!-- @SystemApi Allows disabling the transmit-indicator LED that is normally on when
1609 a camera is in use by an application.
1611 <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED"
1612 android:protectionLevel="signature|privileged" />
1614 <!-- Allows sending the camera service notifications about system-wide events.
1616 <permission android:name="android.permission.CAMERA_SEND_SYSTEM_EVENTS"
1617 android:protectionLevel="signature|privileged" />
1619 <!-- =========================================== -->
1620 <!-- Permissions associated with telephony state -->
1621 <!-- =========================================== -->
1624 <!-- @SystemApi Allows modification of the telephony state - power on, mmi, etc.
1625 Does not include placing calls.
1626 <p>Not for use by third-party applications. -->
1627 <permission android:name="android.permission.MODIFY_PHONE_STATE"
1628 android:protectionLevel="signature|privileged" />
1630 <!-- Allows read only access to precise phone state.
1631 @hide Pending API council approval -->
1632 <permission android:name="android.permission.READ_PRECISE_PHONE_STATE"
1633 android:protectionLevel="signature|privileged" />
1635 <!-- @SystemApi Allows read access to privileged phone state.
1636 @hide Used internally. -->
1637 <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE"
1638 android:protectionLevel="signature|privileged" />
1640 <!-- @SystemApi Protects the ability to register any PhoneAccount with
1641 PhoneAccount#CAPABILITY_SIM_SUBSCRIPTION. This capability indicates that the PhoneAccount
1642 corresponds to a device SIM.
1644 <permission android:name="android.permission.REGISTER_SIM_SUBSCRIPTION"
1645 android:protectionLevel="signature|privileged" />
1647 <!-- @SystemApi Protects the ability to register any PhoneAccount with
1648 PhoneAccount#CAPABILITY_CALL_PROVIDER.
1650 <permission android:name="android.permission.REGISTER_CALL_PROVIDER"
1651 android:protectionLevel="signature|privileged" />
1653 <!-- @SystemApi Protects the ability to register any PhoneAccount with
1654 PhoneAccount#CAPABILITY_CONNECTION_MANAGER
1656 <permission android:name="android.permission.REGISTER_CONNECTION_MANAGER"
1657 android:protectionLevel="signature|privileged" />
1659 <!-- Must be required by a {@link android.telecom.InCallService},
1660 to ensure that only the system can bind to it.
1661 <p>Protection level: signature|privileged
1663 <permission android:name="android.permission.BIND_INCALL_SERVICE"
1664 android:protectionLevel="signature|privileged" />
1666 <!-- Must be required by a link {@link android.telephony.VisualVoicemailService} to ensure that
1667 only the system can bind to it.
1668 <p>Protection level: signature|privileged
1671 android:name="android.permission.BIND_VISUAL_VOICEMAIL_SERVICE"
1672 android:protectionLevel="signature|privileged"/>
1674 <!-- Must be required by a {@link android.telecom.CallScreeningService},
1675 to ensure that only the system can bind to it.
1676 <p>Protection level: signature|privileged
1678 <permission android:name="android.permission.BIND_SCREENING_SERVICE"
1679 android:protectionLevel="signature|privileged" />
1681 <!-- Must be required by a {@link android.telecom.ConnectionService},
1682 to ensure that only the system can bind to it.
1683 @deprecated {@link android.telecom.ConnectionService}s should require
1684 android.permission.BIND_TELECOM_CONNECTION_SERVICE instead.
1687 <permission android:name="android.permission.BIND_CONNECTION_SERVICE"
1688 android:protectionLevel="signature|privileged" />
1690 <!-- Must be required by a {@link android.telecom.ConnectionService},
1691 to ensure that only the system can bind to it.
1692 <p>Protection level: signature|privileged
1694 <permission android:name="android.permission.BIND_TELECOM_CONNECTION_SERVICE"
1695 android:protectionLevel="signature|privileged" />
1697 <!-- @SystemApi Allows an application to control the in-call experience.
1699 <permission android:name="android.permission.CONTROL_INCALL_EXPERIENCE"
1700 android:protectionLevel="signature|privileged" />
1702 <!-- Allows an application to receive STK related commands.
1704 <permission android:name="android.permission.RECEIVE_STK_COMMANDS"
1705 android:protectionLevel="signature|privileged" />
1707 <!-- Allows an application to send EMBMS download intents to apps
1709 <permission android:name="android.permission.SEND_EMBMS_INTENTS"
1710 android:protectionLevel="signature|privileged" />
1712 <!-- Must be required by an ImsService to ensure that only the
1713 system can bind to it.
1714 <p>Protection level: signature|privileged
1718 <permission android:name="android.permission.BIND_IMS_SERVICE"
1719 android:protectionLevel="signature|privileged" />
1721 <!-- Allows an application to manage embedded subscriptions (those on a eUICC) through
1723 <p>Protection level: signature|privileged|development
1724 TODO(b/35851809): Mark this as a SystemApi and remove com. prefix.
1726 <permission android:name="com.android.permission.WRITE_EMBEDDED_SUBSCRIPTIONS"
1727 android:protectionLevel="signature|privileged|development" />
1729 <!-- Must be required by an EuiccService to ensure that only the system can bind to it.
1730 <p>Protection level: signature
1731 TODO(b/35851809): Mark this as a SystemApi and remove com. prefix.
1733 <permission android:name="com.android.permission.BIND_EUICC_SERVICE"
1734 android:protectionLevel="signature" />
1736 <!-- ================================== -->
1737 <!-- Permissions for sdcard interaction -->
1738 <!-- ================================== -->
1741 <!-- @SystemApi Allows an application to write to internal media storage
1743 <permission android:name="android.permission.WRITE_MEDIA_STORAGE"
1744 android:protectionLevel="signature|privileged" />
1746 <!-- Allows an application to manage access to documents, usually as part
1747 of a document picker.
1748 <p>This permission should <em>only</em> be requested by the platform
1749 document management app. This permission cannot be granted to
1751 <p>Protection level: signature
1753 <permission android:name="android.permission.MANAGE_DOCUMENTS"
1754 android:protectionLevel="signature" />
1756 <!-- @hide Allows an application to cache content.
1757 <p>Not for use by third-party applications.
1758 <p>Protection level: signature
1760 <permission android:name="android.permission.CACHE_CONTENT"
1761 android:protectionLevel="signature" />
1763 <!-- @SystemApi @hide
1764 Allows an application to aggressively allocate disk space.
1765 <p>Not for use by third-party applications.
1767 <permission android:name="android.permission.ALLOCATE_AGGRESSIVE"
1768 android:protectionLevel="signature|privileged" />
1770 <!-- ================================== -->
1771 <!-- Permissions for screenlock -->
1772 <!-- ================================== -->
1775 <!-- Allows applications to disable the keyguard if it is not secure.
1776 <p>Protection level: normal
1778 <permission android:name="android.permission.DISABLE_KEYGUARD"
1779 android:description="@string/permdesc_disableKeyguard"
1780 android:label="@string/permlab_disableKeyguard"
1781 android:protectionLevel="normal" />
1783 <!-- ================================== -->
1784 <!-- Permissions to access other installed applications -->
1785 <!-- ================================== -->
1788 <!-- @deprecated No longer enforced. -->
1789 <permission android:name="android.permission.GET_TASKS"
1790 android:label="@string/permlab_getTasks"
1791 android:description="@string/permdesc_getTasks"
1792 android:protectionLevel="normal" />
1794 <!-- New version of GET_TASKS that apps can request, since GET_TASKS doesn't really
1795 give access to task information. We need this new one because there are
1796 many existing apps that use add libraries and such that have validation
1797 code to ensure the app has requested the GET_TASKS permission by seeing
1798 if it has been granted the permission... if it hasn't, it kills the app
1799 with a message about being upset. So we need to have it continue to look
1800 like the app is getting that permission, even though it will never be
1801 checked, and new privileged apps can now request this one for real access.
1804 <permission android:name="android.permission.REAL_GET_TASKS"
1805 android:protectionLevel="signature|privileged" />
1807 <!-- Allows an application to start a task from a ActivityManager#RecentTaskInfo.
1809 <permission android:name="android.permission.START_TASKS_FROM_RECENTS"
1810 android:protectionLevel="signature|privileged" />
1812 <!-- @SystemApi @hide Allows an application to call APIs that allow it to do interactions
1813 across the users on the device, using singleton services and
1814 user-targeted broadcasts. This permission is not available to
1815 third party applications. -->
1816 <permission android:name="android.permission.INTERACT_ACROSS_USERS"
1817 android:protectionLevel="signature|privileged|development" />
1819 <!-- @SystemApi Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS}
1820 that removes restrictions on where broadcasts can be sent and allows other
1821 types of interactions
1823 <permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL"
1824 android:protectionLevel="signature|installer" />
1826 <!-- @SystemApi @hide Allows an application to call APIs that allow it to query and manage
1827 users on the device. This permission is not available to
1828 third party applications. -->
1829 <permission android:name="android.permission.MANAGE_USERS"
1830 android:protectionLevel="signature|privileged" />
1832 <!-- @hide Allows an application to create, remove users and get the list of
1833 users on the device. Applications holding this permission can only create restricted,
1834 guest, managed, demo, and ephemeral users. For creating other kind of users,
1835 {@link android.Manifest.permission#MANAGE_USERS} is needed.
1836 This permission is not available to third party applications. -->
1837 <permission android:name="android.permission.CREATE_USERS"
1838 android:protectionLevel="signature" />
1840 <!-- @hide Allows an application to set the profile owners and the device owner.
1841 This permission is not available to third party applications.-->
1842 <permission android:name="android.permission.MANAGE_PROFILE_AND_DEVICE_OWNERS"
1843 android:protectionLevel="signature"
1844 android:label="@string/permlab_manageProfileAndDeviceOwners"
1845 android:description="@string/permdesc_manageProfileAndDeviceOwners" />
1847 <!-- Allows an application to get full detailed information about
1848 recently running tasks, with full fidelity to the real state.
1850 <permission android:name="android.permission.GET_DETAILED_TASKS"
1851 android:protectionLevel="signature" />
1853 <!-- Allows an application to change the Z-order of tasks.
1854 <p>Protection level: normal
1856 <permission android:name="android.permission.REORDER_TASKS"
1857 android:label="@string/permlab_reorderTasks"
1858 android:description="@string/permdesc_reorderTasks"
1859 android:protectionLevel="normal" />
1861 <!-- @hide Allows an application to change to remove/kill tasks -->
1862 <permission android:name="android.permission.REMOVE_TASKS"
1863 android:protectionLevel="signature" />
1865 <!-- @SystemApi @hide Allows an application to create/manage/remove stacks -->
1866 <permission android:name="android.permission.MANAGE_ACTIVITY_STACKS"
1867 android:protectionLevel="signature|privileged" />
1869 <!-- @SystemApi @hide Allows an application to embed other activities -->
1870 <permission android:name="android.permission.ACTIVITY_EMBEDDING"
1871 android:protectionLevel="signature|privileged" />
1873 <!-- Allows an application to start any activity, regardless of permission
1874 protection or exported state.
1876 <permission android:name="android.permission.START_ANY_ACTIVITY"
1877 android:protectionLevel="signature" />
1879 <!-- @deprecated The {@link android.app.ActivityManager#restartPackage}
1880 API is no longer supported. -->
1881 <permission android:name="android.permission.RESTART_PACKAGES"
1882 android:label="@string/permlab_killBackgroundProcesses"
1883 android:description="@string/permdesc_killBackgroundProcesses"
1884 android:protectionLevel="normal" />
1886 <!-- Allows an application to call
1887 {@link android.app.ActivityManager#killBackgroundProcesses}.
1888 <p>Protection level: normal
1890 <permission android:name="android.permission.KILL_BACKGROUND_PROCESSES"
1891 android:label="@string/permlab_killBackgroundProcesses"
1892 android:description="@string/permdesc_killBackgroundProcesses"
1893 android:protectionLevel="normal" />
1895 <!-- @SystemApi @hide Allows an application to query process states and current
1896 OOM adjustment scores.
1897 <p>Not for use by third-party applications. -->
1898 <permission android:name="android.permission.GET_PROCESS_STATE_AND_OOM_SCORE"
1899 android:protectionLevel="signature|privileged|development" />
1901 <!-- Allows use of PendingIntent.getIntent().
1903 <permission android:name="android.permission.GET_INTENT_SENDER_INTENT"
1904 android:protectionLevel="signature" />
1906 <!-- ================================== -->
1907 <!-- Permissions affecting the display of other applications -->
1908 <!-- ================================== -->
1911 <!-- Allows an app to create windows using the type
1912 {@link android.view.WindowManager.LayoutParams#TYPE_APPLICATION_OVERLAY},
1913 shown on top of all other apps. Very few apps
1914 should use this permission; these windows are intended for
1915 system-level interaction with the user.
1917 <p class="note"><strong>Note:</strong> If the app
1918 targets API level 23 or higher, the app user must explicitly grant
1919 this permission to the app through a permission management screen. The app requests
1920 the user's approval by sending an intent with action
1921 {@link android.provider.Settings#ACTION_MANAGE_OVERLAY_PERMISSION}.
1922 The app can check whether it has this authorization by calling
1923 {@link android.provider.Settings#canDrawOverlays
1924 Settings.canDrawOverlays()}.
1925 <p>Protection level: signature -->
1926 <permission android:name="android.permission.SYSTEM_ALERT_WINDOW"
1927 android:label="@string/permlab_systemAlertWindow"
1928 android:description="@string/permdesc_systemAlertWindow"
1929 android:protectionLevel="signature|preinstalled|appop|pre23|development" />
1931 <!-- @deprecated Use {@link android.Manifest.permission#REQUEST_COMPANION_RUN_IN_BACKGROUND}
1934 <permission android:name="android.permission.RUN_IN_BACKGROUND"
1935 android:label="@string/permlab_runInBackground"
1936 android:description="@string/permdesc_runInBackground"
1937 android:protectionLevel="signature" />
1939 <!-- @deprecated Use
1940 {@link android.Manifest.permission#REQUEST_COMPANION_USE_DATA_IN_BACKGROUND}
1943 <permission android:name="android.permission.USE_DATA_IN_BACKGROUND"
1944 android:label="@string/permlab_useDataInBackground"
1945 android:description="@string/permdesc_useDataInBackground"
1946 android:protectionLevel="signature" />
1948 <!-- @hide Allows an application to set display offsets for the screen.
1949 This permission is not available to third party applications. -->
1950 <permission android:name="android.permission.SET_DISPLAY_OFFSET"
1951 android:protectionLevel="signature|privileged" />
1953 <!-- Allows a companion app to run in the background.
1954 <p>Protection level: normal
1956 <permission android:name="android.permission.REQUEST_COMPANION_RUN_IN_BACKGROUND"
1957 android:label="@string/permlab_runInBackground"
1958 android:description="@string/permdesc_runInBackground"
1959 android:protectionLevel="normal" />
1961 <!-- Allows a companion app to use data in the background.
1962 <p>Protection level: normal
1964 <permission android:name="android.permission.REQUEST_COMPANION_USE_DATA_IN_BACKGROUND"
1965 android:label="@string/permlab_useDataInBackground"
1966 android:description="@string/permdesc_useDataInBackground"
1967 android:protectionLevel="normal" />
1970 <!-- ================================== -->
1971 <!-- Permissions affecting the system wallpaper -->
1972 <!-- ================================== -->
1975 <!-- Allows applications to set the wallpaper.
1976 <p>Protection level: normal
1978 <permission android:name="android.permission.SET_WALLPAPER"
1979 android:label="@string/permlab_setWallpaper"
1980 android:description="@string/permdesc_setWallpaper"
1981 android:protectionLevel="normal" />
1983 <!-- Allows applications to set the wallpaper hints.
1984 <p>Protection level: normal
1986 <permission android:name="android.permission.SET_WALLPAPER_HINTS"
1987 android:label="@string/permlab_setWallpaperHints"
1988 android:description="@string/permdesc_setWallpaperHints"
1989 android:protectionLevel="normal" />
1991 <!-- Allow the app to read the system wallpaper image without
1992 holding the READ_EXTERNAL_STORAGE permission.
1993 <p>Not for use by third-party applications.
1997 <permission android:name="android.permission.READ_WALLPAPER_INTERNAL"
1998 android:protectionLevel="signature|privileged" />
2000 <!-- ============================================ -->
2001 <!-- Permissions for changing the system clock -->
2002 <!-- ============================================ -->
2005 <!-- @SystemApi Allows applications to set the system time.
2006 <p>Not for use by third-party applications. -->
2007 <permission android:name="android.permission.SET_TIME"
2008 android:protectionLevel="signature|privileged" />
2010 <!-- Allows applications to set the system time zone.
2011 <p>Not for use by third-party applications.
2013 <permission android:name="android.permission.SET_TIME_ZONE"
2014 android:label="@string/permlab_setTimeZone"
2015 android:description="@string/permdesc_setTimeZone"
2016 android:protectionLevel="signature|privileged" />
2018 <!-- ==================================================== -->
2019 <!-- Permissions related to changing status bar -->
2020 <!-- ==================================================== -->
2023 <!-- Allows an application to expand or collapse the status bar.
2024 <p>Protection level: normal
2026 <permission android:name="android.permission.EXPAND_STATUS_BAR"
2027 android:label="@string/permlab_expandStatusBar"
2028 android:description="@string/permdesc_expandStatusBar"
2029 android:protectionLevel="normal" />
2031 <!-- ============================================================== -->
2032 <!-- Permissions related to adding/removing shortcuts from Launcher -->
2033 <!-- ============================================================== -->
2036 <!-- Allows an application to install a shortcut in Launcher.
2037 <p>Protection level: normal
2039 <permission android:name="com.android.launcher.permission.INSTALL_SHORTCUT"
2040 android:label="@string/permlab_install_shortcut"
2041 android:description="@string/permdesc_install_shortcut"
2042 android:protectionLevel="normal"/>
2044 <!--This permission is no longer supported.
2046 <permission android:name="com.android.launcher.permission.UNINSTALL_SHORTCUT"
2047 android:label="@string/permlab_uninstall_shortcut"
2048 android:description="@string/permdesc_uninstall_shortcut"
2049 android:protectionLevel="normal"/>
2051 <!-- ==================================================== -->
2052 <!-- Permissions related to accessing sync settings -->
2053 <!-- ==================================================== -->
2056 <!-- Allows applications to read the sync settings.
2057 <p>Protection level: normal
2059 <permission android:name="android.permission.READ_SYNC_SETTINGS"
2060 android:description="@string/permdesc_readSyncSettings"
2061 android:label="@string/permlab_readSyncSettings"
2062 android:protectionLevel="normal" />
2064 <!-- Allows applications to write the sync settings.
2065 <p>Protection level: normal
2067 <permission android:name="android.permission.WRITE_SYNC_SETTINGS"
2068 android:description="@string/permdesc_writeSyncSettings"
2069 android:label="@string/permlab_writeSyncSettings"
2070 android:protectionLevel="normal" />
2072 <!-- Allows applications to read the sync stats.
2073 <p>Protection level: normal
2075 <permission android:name="android.permission.READ_SYNC_STATS"
2076 android:description="@string/permdesc_readSyncStats"
2077 android:label="@string/permlab_readSyncStats"
2078 android:protectionLevel="normal" />
2080 <!-- ============================================ -->
2081 <!-- Permissions for low-level system interaction -->
2082 <!-- ============================================ -->
2085 <!-- @SystemApi @hide Change the screen compatibility mode of applications -->
2086 <permission android:name="android.permission.SET_SCREEN_COMPATIBILITY"
2087 android:protectionLevel="signature" />
2089 <!-- @SystemApi Allows an application to modify the current configuration, such
2091 <permission android:name="android.permission.CHANGE_CONFIGURATION"
2092 android:protectionLevel="signature|privileged|development" />
2094 <!-- Allows an application to read or write the system settings.
2096 <p class="note"><strong>Note:</strong> If the app targets API level 23
2097 or higher, the app user
2098 must explicitly grant this permission to the app through a permission management screen.
2099 The app requests the user's approval by sending an intent with action
2100 {@link android.provider.Settings#ACTION_MANAGE_WRITE_SETTINGS}. The app
2101 can check whether it has this authorization by calling {@link
2102 android.provider.Settings.System#canWrite Settings.System.canWrite()}.
2104 <p>Protection level: signature
2106 <permission android:name="android.permission.WRITE_SETTINGS"
2107 android:label="@string/permlab_writeSettings"
2108 android:description="@string/permdesc_writeSettings"
2109 android:protectionLevel="signature|preinstalled|appop|pre23" />
2111 <!-- @SystemApi Allows an application to modify the Google service map.
2112 <p>Not for use by third-party applications. -->
2113 <permission android:name="android.permission.WRITE_GSERVICES"
2114 android:protectionLevel="signature|privileged" />
2116 <!-- @SystemApi Allows an application to call
2117 {@link android.app.ActivityManager#forceStopPackage}.
2119 <permission android:name="android.permission.FORCE_STOP_PACKAGES"
2120 android:protectionLevel="signature|privileged" />
2122 <!-- @SystemApi @hide Allows an application to retrieve the content of the active window
2123 An active window is the window that has fired an accessibility event. -->
2124 <permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT"
2125 android:protectionLevel="signature|privileged" />
2127 <!-- @SystemApi Modify the global animation scaling factor.
2128 <p>Not for use by third-party applications. -->
2129 <permission android:name="android.permission.SET_ANIMATION_SCALE"
2130 android:protectionLevel="signature|privileged|development" />
2132 <!-- @deprecated This functionality will be removed in the future; please do
2133 not use. Allow an application to make its activities persistent. -->
2134 <permission android:name="android.permission.PERSISTENT_ACTIVITY"
2135 android:label="@string/permlab_persistentActivity"
2136 android:description="@string/permdesc_persistentActivity"
2137 android:protectionLevel="normal" />
2139 <!-- Allows an application to find out the space used by any package.
2140 <p>Protection level: normal
2142 <permission android:name="android.permission.GET_PACKAGE_SIZE"
2143 android:label="@string/permlab_getPackageSize"
2144 android:description="@string/permdesc_getPackageSize"
2145 android:protectionLevel="normal" />
2147 <!-- @deprecated No longer useful, see
2148 {@link android.content.pm.PackageManager#addPackageToPreferred}
2150 <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS"
2151 android:protectionLevel="signature|verifier" />
2153 <!-- Allows an application to receive the
2154 {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is
2155 broadcast after the system finishes booting. If you don't
2156 request this permission, you will not receive the broadcast at
2157 that time. Though holding this permission does not have any
2158 security implications, it can have a negative impact on the
2159 user experience by increasing the amount of time it takes the
2160 system to start and allowing applications to have themselves
2161 running without the user being aware of them. As such, you must
2162 explicitly declare your use of this facility to make that visible
2164 <p>Protection level: normal
2166 <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED"
2167 android:label="@string/permlab_receiveBootCompleted"
2168 android:description="@string/permdesc_receiveBootCompleted"
2169 android:protectionLevel="normal" />
2171 <!-- Allows an application to broadcast sticky intents. These are
2172 broadcasts whose data is held by the system after being finished,
2173 so that clients can quickly retrieve that data without having
2174 to wait for the next broadcast.
2175 <p>Protection level: normal
2177 <permission android:name="android.permission.BROADCAST_STICKY"
2178 android:label="@string/permlab_broadcastSticky"
2179 android:description="@string/permdesc_broadcastSticky"
2180 android:protectionLevel="normal" />
2182 <!-- @SystemApi Allows mounting and unmounting file systems for removable storage.
2183 <p>Not for use by third-party applications.-->
2184 <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS"
2185 android:protectionLevel="signature|privileged" />
2187 <!-- @SystemApi Allows formatting file systems for removable storage.
2188 <p>Not for use by third-party applications. -->
2189 <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS"
2190 android:protectionLevel="signature|privileged" />
2193 <permission android:name="android.permission.STORAGE_INTERNAL"
2194 android:protectionLevel="signature" />
2196 <!-- Allows access to ASEC non-destructive API calls
2198 <permission android:name="android.permission.ASEC_ACCESS"
2199 android:protectionLevel="signature" />
2201 <!-- Allows creation of ASEC volumes
2203 <permission android:name="android.permission.ASEC_CREATE"
2204 android:protectionLevel="signature" />
2206 <!-- Allows destruction of ASEC volumes
2208 <permission android:name="android.permission.ASEC_DESTROY"
2209 android:protectionLevel="signature" />
2211 <!-- Allows mount / unmount of ASEC volumes
2213 <permission android:name="android.permission.ASEC_MOUNT_UNMOUNT"
2214 android:protectionLevel="signature" />
2216 <!-- Allows rename of ASEC volumes
2218 <permission android:name="android.permission.ASEC_RENAME"
2219 android:protectionLevel="signature" />
2221 <!-- @SystemApi Allows applications to write the apn settings.
2222 <p>Not for use by third-party applications. -->
2223 <permission android:name="android.permission.WRITE_APN_SETTINGS"
2224 android:protectionLevel="signature|privileged" />
2226 <!-- Allows applications to change network connectivity state.
2227 <p>Protection level: normal
2229 <permission android:name="android.permission.CHANGE_NETWORK_STATE"
2230 android:description="@string/permdesc_changeNetworkState"
2231 android:label="@string/permlab_changeNetworkState"
2232 android:protectionLevel="normal" />
2234 <!-- Allows an application to clear the caches of all installed
2235 applications on the device.
2236 <p>Protection level: signature|privileged
2238 <permission android:name="android.permission.CLEAR_APP_CACHE"
2239 android:protectionLevel="signature|privileged" />
2241 <!-- @SystemApi Allows an application to use any media decoder when decoding for playback
2243 <permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK"
2244 android:protectionLevel="signature|privileged" />
2246 <!-- @SystemApi Allows an application to install and/or uninstall CA certificates on
2249 <permission android:name="android.permission.MANAGE_CA_CERTIFICATES"
2250 android:protectionLevel="signature|privileged" />
2252 <!-- @SystemApi Allows an application to do certain operations needed for
2253 interacting with the recovery (system update) system.
2255 <permission android:name="android.permission.RECOVERY"
2256 android:protectionLevel="signature|privileged" />
2258 <!-- Allows the system to bind to an application's task services
2260 <permission android:name="android.permission.BIND_JOB_SERVICE"
2261 android:protectionLevel="signature" />
2262 <uses-permission android:name="android.permission.BIND_JOB_SERVICE"/>
2264 <!-- Allows an application to initiate configuration updates
2265 <p>An application requesting this permission is responsible for
2266 verifying the source and integrity of any update before passing
2267 it off to the various individual installer components
2269 <permission android:name="android.permission.UPDATE_CONFIG"
2270 android:protectionLevel="signature|privileged" />
2272 <!-- Allows a time zone rule updater application to request
2273 the system installs / uninstalls timezone rules.
2274 <p>An application requesting this permission is responsible for
2275 verifying the source and integrity of the update before passing
2276 it off to the installer components.
2277 @SystemApi @hide -->
2278 <permission android:name="android.permission.UPDATE_TIME_ZONE_RULES"
2279 android:protectionLevel="signature|privileged" />
2281 <!-- Must be required by a time zone rule updater application,
2282 to ensure that only the system can trigger it.
2284 <permission android:name="android.permission.TRIGGER_TIME_ZONE_RULES_CHECK"
2285 android:protectionLevel="signature" />
2286 <uses-permission android:name="android.permission.TRIGGER_TIME_ZONE_RULES_CHECK"/>
2288 <!-- Allows the system to reset throttling in shortcut manager.
2290 <permission android:name="android.permission.RESET_SHORTCUT_MANAGER_THROTTLING"
2291 android:protectionLevel="signature" />
2293 <!-- Allows the system to bind to the discovered Network Recommendation Service.
2294 @SystemApi @hide -->
2295 <permission android:name="android.permission.BIND_NETWORK_RECOMMENDATION_SERVICE"
2296 android:protectionLevel="signature" />
2297 <uses-permission android:name="android.permission.BIND_NETWORK_RECOMMENDATION_SERVICE"/>
2299 <!-- Allows an application to enable, disable and change priority of
2300 runtime resource overlays.
2302 <permission android:name="android.permission.CHANGE_OVERLAY_PACKAGES"
2303 android:protectionLevel="signature|privileged" />
2305 <!-- ========================================= -->
2306 <!-- Permissions for special development tools -->
2307 <!-- ========================================= -->
2310 <!-- @SystemApi Allows an application to read or write the secure system settings.
2311 <p>Not for use by third-party applications. -->
2312 <permission android:name="android.permission.WRITE_SECURE_SETTINGS"
2313 android:protectionLevel="signature|privileged|development" />
2315 <!-- @SystemApi Allows an application to retrieve state dump information from system services.
2316 <p>Not for use by third-party applications. -->
2317 <permission android:name="android.permission.DUMP"
2318 android:protectionLevel="signature|privileged|development" />
2320 <!-- @SystemApi Allows an application to read the low-level system log files.
2321 <p>Not for use by third-party applications, because
2322 Log entries can contain the user's private information. -->
2323 <permission android:name="android.permission.READ_LOGS"
2324 android:protectionLevel="signature|privileged|development" />
2326 <!-- @SystemApi Configure an application for debugging.
2327 <p>Not for use by third-party applications. -->
2328 <permission android:name="android.permission.SET_DEBUG_APP"
2329 android:protectionLevel="signature|privileged|development" />
2331 <!-- @SystemApi Allows an application to set the maximum number of (not needed)
2332 application processes that can be running.
2333 <p>Not for use by third-party applications. -->
2334 <permission android:name="android.permission.SET_PROCESS_LIMIT"
2335 android:protectionLevel="signature|privileged|development" />
2337 <!-- @SystemApi Allows an application to control whether activities are immediately
2338 finished when put in the background.
2339 <p>Not for use by third-party applications. -->
2340 <permission android:name="android.permission.SET_ALWAYS_FINISH"
2341 android:protectionLevel="signature|privileged|development" />
2343 <!-- @SystemApi Allow an application to request that a signal be sent to all persistent processes.
2344 <p>Not for use by third-party applications. -->
2345 <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES"
2346 android:protectionLevel="signature|privileged|development" />
2348 <!-- ==================================== -->
2349 <!-- Private permissions -->
2350 <!-- ==================================== -->
2353 <!-- @SystemApi Allows access to the list of accounts in the Accounts Service. -->
2354 <permission android:name="android.permission.GET_ACCOUNTS_PRIVILEGED"
2355 android:protectionLevel="signature|privileged" />
2357 <!-- Allows but does not guarantee access to user passwords at the conclusion of add account
2359 <permission android:name="android.permission.GET_PASSWORD"
2360 android:protectionLevel="signature" />
2362 <!-- @SystemApi Allows applications to RW to diagnostic resources.
2363 <p>Not for use by third-party applications. -->
2364 <permission android:name="android.permission.DIAGNOSTIC"
2365 android:protectionLevel="signature" />
2367 <!-- @SystemApi Allows an application to open, close, or disable the status bar
2369 <p>Not for use by third-party applications. -->
2370 <permission android:name="android.permission.STATUS_BAR"
2371 android:protectionLevel="signature|privileged" />
2373 <!-- Allows an application to be the status bar. Currently used only by SystemUI.apk
2375 <permission android:name="android.permission.STATUS_BAR_SERVICE"
2376 android:protectionLevel="signature" />
2378 <!-- Allows an application to bind to third party quick settings tiles.
2379 <p>Should only be requested by the System, should be required by
2380 TileService declarations.-->
2381 <permission android:name="android.permission.BIND_QUICK_SETTINGS_TILE"
2382 android:protectionLevel="signature" />
2384 <!-- @SystemApi Allows an application to force a BACK operation on whatever is the
2386 <p>Not for use by third-party applications.
2389 <permission android:name="android.permission.FORCE_BACK"
2390 android:protectionLevel="signature" />
2392 <!-- @SystemApi Allows an application to update device statistics.
2393 <p>Not for use by third-party applications. -->
2394 <permission android:name="android.permission.UPDATE_DEVICE_STATS"
2395 android:protectionLevel="signature|privileged" />
2397 <!-- @SystemApi @hide Allows an application to collect battery statistics -->
2398 <permission android:name="android.permission.GET_APP_OPS_STATS"
2399 android:protectionLevel="signature|privileged|development" />
2401 <!-- @SystemApi Allows an application to update application operation statistics. Not for
2402 use by third party apps.
2404 <permission android:name="android.permission.UPDATE_APP_OPS_STATS"
2405 android:protectionLevel="signature|privileged|installer" />
2407 <!-- @SystemApi Allows an application to update the user app op restrictions.
2408 Not for use by third party apps.
2410 <permission android:name="android.permission.MANAGE_APP_OPS_RESTRICTIONS"
2411 android:protectionLevel="signature|installer" />
2413 <!-- @SystemApi Allows an application to open windows that are for use by parts
2414 of the system user interface.
2415 <p>Not for use by third-party applications.
2418 <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW"
2419 android:protectionLevel="signature" />
2421 <!-- @SystemApi Allows an application to use
2422 {@link android.view.WindowManager.LayoutsParams#PRIVATE_FLAG_HIDE_NON_SYSTEM_OVERLAY_WINDOWS}
2423 to hide non-system-overlay windows.
2424 <p>Not for use by third-party applications.
2427 <permission android:name="android.permission.HIDE_NON_SYSTEM_OVERLAY_WINDOWS"
2428 android:protectionLevel="signature|installer" />
2430 <!-- @SystemApi Allows an application to manage (create, destroy,
2431 Z-order) application tokens in the window manager.
2432 <p>Not for use by third-party applications.
2435 <permission android:name="android.permission.MANAGE_APP_TOKENS"
2436 android:protectionLevel="signature" />
2438 <!-- Allows System UI to register listeners for events from Window Manager.
2440 <permission android:name="android.permission.REGISTER_WINDOW_MANAGER_LISTENERS"
2441 android:protectionLevel="signature" />
2443 <!-- @hide Allows the application to temporarily freeze the screen for a
2444 full-screen transition. -->
2445 <permission android:name="android.permission.FREEZE_SCREEN"
2446 android:protectionLevel="signature" />
2448 <!-- @SystemApi Allows an application to inject user events (keys, touch, trackball)
2449 into the event stream and deliver them to ANY window. Without this
2450 permission, you can only deliver events to windows in your own process.
2451 <p>Not for use by third-party applications.
2454 <permission android:name="android.permission.INJECT_EVENTS"
2455 android:protectionLevel="signature" />
2457 <!-- @hide Allows an application to register an input filter which filters the stream
2458 of user events (keys, touch, trackball) before they are dispatched to any window. -->
2459 <permission android:name="android.permission.FILTER_EVENTS"
2460 android:protectionLevel="signature" />
2462 <!-- @hide Allows an application to retrieve the window token from the accessibility manager. -->
2463 <permission android:name="android.permission.RETRIEVE_WINDOW_TOKEN"
2464 android:protectionLevel="signature" />
2466 <!-- @hide Allows an application to modify accessibility information from another app. -->
2467 <permission android:name="android.permission.MODIFY_ACCESSIBILITY_DATA"
2468 android:protectionLevel="signature" />
2470 <!-- @hide Allows an application to change the accessibility volume. -->
2471 <permission android:name="android.permission.CHANGE_ACCESSIBILITY_VOLUME"
2472 android:protectionLevel="signature" />
2474 <!-- @hide Allows an application to collect frame statistics -->
2475 <permission android:name="android.permission.FRAME_STATS"
2476 android:protectionLevel="signature" />
2478 <!-- @hide Allows an application to temporary enable accessibility on the device. -->
2479 <permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY"
2480 android:protectionLevel="signature" />
2482 <!-- @SystemApi Allows an application to watch and control how activities are
2483 started globally in the system. Only for is in debugging
2484 (usually the monkey command).
2485 <p>Not for use by third-party applications.
2488 <permission android:name="android.permission.SET_ACTIVITY_WATCHER"
2489 android:protectionLevel="signature" />
2491 <!-- @SystemApi Allows an application to call the activity manager shutdown() API
2492 to put the higher-level system there into a shutdown state.
2494 <permission android:name="android.permission.SHUTDOWN"
2495 android:protectionLevel="signature|privileged" />
2497 <!-- @SystemApi Allows an application to tell the activity manager to temporarily
2498 stop application switches, putting it into a special mode that
2499 prevents applications from immediately switching away from some
2500 critical UI such as the home screen.
2502 <permission android:name="android.permission.STOP_APP_SWITCHES"
2503 android:protectionLevel="signature|privileged" />
2505 <!-- @SystemApi Allows an application to retrieve private information about
2506 the current top activity, such as any assist context it can provide.
2507 <p>Not for use by third-party applications.
2510 <permission android:name="android.permission.GET_TOP_ACTIVITY_INFO"
2511 android:protectionLevel="signature" />
2513 <!-- Allows an application to retrieve the current state of keys and
2515 <p>Not for use by third-party applications.
2516 @deprecated The API that used this permission has been removed. -->
2517 <permission android:name="android.permission.READ_INPUT_STATE"
2518 android:protectionLevel="signature" />
2520 <!-- Must be required by an {@link android.inputmethodservice.InputMethodService},
2521 to ensure that only the system can bind to it.
2522 <p>Protection level: signature
2524 <permission android:name="android.permission.BIND_INPUT_METHOD"
2525 android:protectionLevel="signature" />
2527 <!-- Must be required by an {@link android.media.midi.MidiDeviceService},
2528 to ensure that only the system can bind to it.
2529 <p>Protection level: signature
2531 <permission android:name="android.permission.BIND_MIDI_DEVICE_SERVICE"
2532 android:protectionLevel="signature" />
2534 <!-- Must be required by an {@link android.accessibilityservice.AccessibilityService},
2535 to ensure that only the system can bind to it.
2536 <p>Protection level: signature
2538 <permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE"
2539 android:protectionLevel="signature" />
2541 <!-- Must be required by a {@link android.printservice.PrintService},
2542 to ensure that only the system can bind to it.
2543 <p>Protection level: signature
2545 <permission android:name="android.permission.BIND_PRINT_SERVICE"
2546 android:protectionLevel="signature" />
2548 <!-- Must be required by a {@link android.printservice.recommendation.RecommendationService},
2549 to ensure that only the system can bind to it.
2552 <p>Protection level: signature
2554 <permission android:name="android.permission.BIND_PRINT_RECOMMENDATION_SERVICE"
2555 android:protectionLevel="signature" />
2557 <!-- Allows applications to get the installed and enabled print services.
2560 <p>Protection level: signature|preinstalled
2562 <permission android:name="android.permission.READ_PRINT_SERVICES"
2563 android:protectionLevel="signature|preinstalled" />
2565 <!-- Allows applications to get the currently recommended print services for printers.
2568 <p>Protection level: signature|preinstalled
2570 <permission android:name="android.permission.READ_PRINT_SERVICE_RECOMMENDATIONS"
2571 android:protectionLevel="signature|preinstalled" />
2573 <!-- Must be required by a {@link android.nfc.cardemulation.HostApduService}
2574 or {@link android.nfc.cardemulation.OffHostApduService} to ensure that only
2575 the system can bind to it.
2576 <p>Protection level: signature
2578 <permission android:name="android.permission.BIND_NFC_SERVICE"
2579 android:protectionLevel="signature" />
2581 <!-- Must be required by the PrintSpooler to ensure that only the system can bind to it.
2583 <permission android:name="android.permission.BIND_PRINT_SPOOLER_SERVICE"
2584 android:protectionLevel="signature" />
2586 <!-- Must be required by the CompanionDeviceManager to ensure that only the system can bind to it.
2588 <permission android:name="android.permission.BIND_COMPANION_DEVICE_MANAGER_SERVICE"
2589 android:protectionLevel="signature" />
2591 <!-- @SystemApi Must be required by the RuntimePermissionPresenterService to ensure
2592 that only the system can bind to it.
2594 <permission android:name="android.permission.BIND_RUNTIME_PERMISSION_PRESENTER_SERVICE"
2595 android:protectionLevel="signature" />
2597 <!-- Must be required by a TextService (e.g. SpellCheckerService)
2598 to ensure that only the system can bind to it.
2599 <p>Protection level: signature
2601 <permission android:name="android.permission.BIND_TEXT_SERVICE"
2602 android:protectionLevel="signature" />
2604 <!-- Must be required by a {@link android.net.VpnService},
2605 to ensure that only the system can bind to it.
2606 <p>Protection level: signature
2608 <permission android:name="android.permission.BIND_VPN_SERVICE"
2609 android:protectionLevel="signature" />
2611 <!-- Must be required by a {@link android.service.wallpaper.WallpaperService},
2612 to ensure that only the system can bind to it.
2613 <p>Protection level: signature|privileged
2615 <permission android:name="android.permission.BIND_WALLPAPER"
2616 android:protectionLevel="signature|privileged" />
2618 <!-- Must be required by a {@link android.service.voice.VoiceInteractionService},
2619 to ensure that only the system can bind to it.
2620 <p>Protection level: signature
2622 <permission android:name="android.permission.BIND_VOICE_INTERACTION"
2623 android:protectionLevel="signature" />
2625 <!-- Must be required by a {@link android.service.autofill.AutofillService},
2626 to ensure that only the system can bind to it.
2627 <p>Protection level: signature
2629 <permission android:name="android.permission.BIND_AUTOFILL_SERVICE"
2630 android:protectionLevel="signature" />
2632 <!-- @hide TODO(b/37563972): remove once clients use BIND_AUTOFILL_SERVICE -->
2633 <permission android:name="android.permission.BIND_AUTOFILL"
2634 android:protectionLevel="signature" />
2636 <!-- Must be required by hotword enrollment application,
2637 to ensure that only the system can interact with it.
2638 @hide <p>Not for use by third-party applications.</p> -->
2639 <permission android:name="android.permission.MANAGE_VOICE_KEYPHRASES"
2640 android:protectionLevel="signature|privileged" />
2642 <!-- Must be required by a {@link com.android.media.remotedisplay.RemoteDisplayProvider},
2643 to ensure that only the system can bind to it.
2645 <permission android:name="android.permission.BIND_REMOTE_DISPLAY"
2646 android:protectionLevel="signature" />
2648 <!-- Must be required by a {@link android.media.tv.TvInputService}
2649 to ensure that only the system can bind to it.
2650 <p>Protection level: signature|privileged
2652 <permission android:name="android.permission.BIND_TV_INPUT"
2653 android:protectionLevel="signature|privileged" />
2656 Must be required by a {@link com.android.media.tv.remoteprovider.TvRemoteProvider}
2657 to ensure that only the system can bind to it.
2658 <p>Protection level: signature|privileged
2659 <p>Not for use by third-party applications. </p>
2661 <permission android:name="android.permission.BIND_TV_REMOTE_SERVICE"
2662 android:protectionLevel="signature|privileged" />
2665 Must be required for a virtual remote controller for TV.
2666 <p>Protection level: signature|privileged
2667 <p>Not for use by third-party applications. </p>
2669 <permission android:name="android.permission.TV_VIRTUAL_REMOTE_CONTROLLER"
2670 android:protectionLevel="signature|privileged" />
2672 <!-- Allows an application to change HDMI CEC active source.
2673 <p>Not for use by third-party applications.
2675 <permission android:name="android.permission.CHANGE_HDMI_CEC_ACTIVE_SOURCE"
2676 android:protectionLevel="signature|privileged" />
2678 <!-- @SystemApi Allows an application to modify parental controls
2679 <p>Not for use by third-party applications.
2681 <permission android:name="android.permission.MODIFY_PARENTAL_CONTROLS"
2682 android:protectionLevel="signature|privileged" />
2684 <!-- @SystemApi Allows an application to read TvContentRatingSystemInfo
2685 <p>Not for use by third-party applications.
2687 <permission android:name="android.permission.READ_CONTENT_RATING_SYSTEMS"
2688 android:protectionLevel="signature|privileged" />
2690 <!-- @SystemApi Allows an application to notify TV inputs by sending broadcasts.
2691 <p>Protection level: signature|privileged
2692 <p>Not for use by third-party applications.
2694 <permission android:name="android.permission.NOTIFY_TV_INPUTS"
2695 android:protectionLevel="signature|privileged" />
2697 <!-- Must be required by a {@link android.media.routing.MediaRouteService}
2698 to ensure that only the system can interact with it.
2700 <permission android:name="android.permission.BIND_ROUTE_PROVIDER"
2701 android:protectionLevel="signature" />
2703 <!-- Must be required by device administration receiver, to ensure that only the
2704 system can interact with it.
2705 <p>Protection level: signature
2707 <permission android:name="android.permission.BIND_DEVICE_ADMIN"
2708 android:protectionLevel="signature" />
2710 <!-- @SystemApi Required to add or remove another application as a device admin.
2711 <p>Not for use by third-party applications.
2713 <permission android:name="android.permission.MANAGE_DEVICE_ADMINS"
2714 android:protectionLevel="signature|privileged" />
2716 <!-- @SystemApi Allows low-level access to setting the orientation (actually
2717 rotation) of the screen.
2718 <p>Not for use by third-party applications.
2721 <permission android:name="android.permission.SET_ORIENTATION"
2722 android:protectionLevel="signature" />
2724 <!-- @SystemApi Allows low-level access to setting the pointer speed.
2725 <p>Not for use by third-party applications.
2728 <permission android:name="android.permission.SET_POINTER_SPEED"
2729 android:protectionLevel="signature" />
2731 <!-- Allows low-level access to setting input device calibration.
2732 <p>Not for use by normal applications.
2734 <permission android:name="android.permission.SET_INPUT_CALIBRATION"
2735 android:protectionLevel="signature" />
2737 <!-- Allows low-level access to setting the keyboard layout.
2738 <p>Not for use by third-party applications.
2740 <permission android:name="android.permission.SET_KEYBOARD_LAYOUT"
2741 android:protectionLevel="signature" />
2743 <!-- Allows an application to query tablet mode state and monitor changes
2745 <p>Not for use by third-party applications.
2747 <permission android:name="android.permission.TABLET_MODE"
2748 android:protectionLevel="signature" />
2750 <!-- Allows an application to request installing packages. Apps
2751 targeting APIs greater than 25 must hold this permission in
2752 order to use {@link android.content.Intent#ACTION_INSTALL_PACKAGE}.
2753 <p>Protection level: signature
2755 <permission android:name="android.permission.REQUEST_INSTALL_PACKAGES"
2756 android:label="@string/permlab_requestInstallPackages"
2757 android:description="@string/permdesc_requestInstallPackages"
2758 android:protectionLevel="signature|appop" />
2760 <!-- Allows an application to request deleting packages. Apps
2761 targeting APIs greater than 25 must hold this permission in
2762 order to use {@link android.content.Intent#ACTION_UNINSTALL_PACKAGE}.
2763 <p>Protection level: normal
2765 <permission android:name="android.permission.REQUEST_DELETE_PACKAGES"
2766 android:label="@string/permlab_requestDeletePackages"
2767 android:description="@string/permdesc_requestDeletePackages"
2768 android:protectionLevel="normal" />
2770 <!-- @SystemApi Allows an application to install packages.
2771 <p>Not for use by third-party applications. -->
2772 <permission android:name="android.permission.INSTALL_PACKAGES"
2773 android:protectionLevel="signature|privileged" />
2775 <!-- @SystemApi Allows an application to clear user data.
2776 <p>Not for use by third-party applications
2779 <permission android:name="android.permission.CLEAR_APP_USER_DATA"
2780 android:protectionLevel="signature|installer" />
2782 <!-- @hide Allows an application to get the URI permissions
2783 granted to another application.
2784 <p>Not for use by third-party applications
2786 <permission android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS"
2787 android:protectionLevel="signature" />
2789 <!-- @hide Allows an application to clear the URI permissions
2790 granted to another application.
2791 <p>Not for use by third-party applications
2794 android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS"
2795 android:protectionLevel="signature" />
2797 <!-- @SystemApi Allows an application to delete cache files.
2798 <p>Not for use by third-party applications. -->
2799 <permission android:name="android.permission.DELETE_CACHE_FILES"
2800 android:protectionLevel="signature|privileged" />
2802 <!-- @SystemApi Allows an application to delete packages.
2803 <p>Not for use by third-party applications.
2804 <p>Starting in {@link android.os.Build.VERSION_CODES#N}, user confirmation is requested
2805 when the application deleting the package is not the same application that installed the
2807 <permission android:name="android.permission.DELETE_PACKAGES"
2808 android:protectionLevel="signature|privileged" />
2810 <!-- @SystemApi Allows an application to move location of installed package.
2812 <permission android:name="android.permission.MOVE_PACKAGE"
2813 android:protectionLevel="signature|privileged" />
2815 <!-- @SystemApi Allows an application to change whether an application component (other than its own) is
2817 <p>Not for use by third-party applications. -->
2818 <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE"
2819 android:protectionLevel="signature|privileged" />
2821 <!-- @SystemApi Allows an application to grant specific permissions.
2823 <permission android:name="android.permission.GRANT_RUNTIME_PERMISSIONS"
2824 android:protectionLevel="signature|installer|verifier" />
2826 <!-- @SystemApi Allows an app that has this permission and the permissions to install packages
2827 to request certain runtime permissions to be granted at installation.
2829 <permission android:name="android.permission.INSTALL_GRANT_RUNTIME_PERMISSIONS"
2830 android:protectionLevel="signature|installer|verifier" />
2832 <!-- @SystemApi Allows an application to revoke specific permissions.
2834 <permission android:name="android.permission.REVOKE_RUNTIME_PERMISSIONS"
2835 android:protectionLevel="signature|installer|verifier" />
2837 <!-- @hide Allows an application to observe permission changes. -->
2838 <permission android:name="android.permission.OBSERVE_GRANT_REVOKE_PERMISSIONS"
2839 android:protectionLevel="signature|privileged" />
2841 <!-- Allows an application to manage the companion devices.
2843 <permission android:name="android.permission.MANAGE_COMPANION_DEVICES"
2844 android:protectionLevel="signature" />
2846 <!-- @SystemApi Allows an application to use SurfaceFlinger's low level features.
2847 <p>Not for use by third-party applications.
2850 <permission android:name="android.permission.ACCESS_SURFACE_FLINGER"
2851 android:protectionLevel="signature" />
2853 <!-- @SystemApi Allows an application to take screen shots and more generally
2854 get access to the frame buffer data.
2855 <p>Not for use by third-party applications. -->
2856 <permission android:name="android.permission.READ_FRAME_BUFFER"
2857 android:protectionLevel="signature|privileged" />
2859 <!-- Allows an application to use InputFlinger's low level features.
2861 <permission android:name="android.permission.ACCESS_INPUT_FLINGER"
2862 android:protectionLevel="signature" />
2864 <!-- Allows an application to disable/enable input devices.
2865 Could be used to prevent unwanted touch events
2866 on a touchscreen, for example during swimming or rain.
2868 <permission android:name="android.permission.DISABLE_INPUT_DEVICE"
2869 android:protectionLevel="signature" />
2871 <!-- Allows an application to configure and connect to Wifi displays
2873 <permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY"
2874 android:protectionLevel="signature" />
2876 <!-- Allows an application to control low-level features of Wifi displays
2877 such as opening an RTSP socket. This permission should only be used
2878 by the display manager.
2880 <permission android:name="android.permission.CONTROL_WIFI_DISPLAY"
2881 android:protectionLevel="signature" />
2883 <!-- Allows an application to control the color modes set for displays system-wide.
2884 <p>Not for use by third-party applications.</p>
2886 <permission android:name="android.permission.CONFIGURE_DISPLAY_COLOR_MODE"
2887 android:protectionLevel="signature" />
2889 <!-- @SystemApi Allows an application to control VPN.
2890 <p>Not for use by third-party applications.</p>
2892 <permission android:name="android.permission.CONTROL_VPN"
2893 android:protectionLevel="signature|privileged" />
2894 <uses-permission android:name="android.permission.CONTROL_VPN" />
2896 <!-- @SystemApi Allows an application to capture audio output.
2897 <p>Not for use by third-party applications.</p> -->
2898 <permission android:name="android.permission.CAPTURE_AUDIO_OUTPUT"
2899 android:protectionLevel="signature|privileged" />
2901 <!-- @SystemApi Allows an application to capture audio for hotword detection.
2902 <p>Not for use by third-party applications.</p>
2904 <permission android:name="android.permission.CAPTURE_AUDIO_HOTWORD"
2905 android:protectionLevel="signature|privileged" />
2907 <!-- @SystemApi Allows an application to modify audio routing and override policy decisions.
2908 <p>Not for use by third-party applications.</p>
2910 <permission android:name="android.permission.MODIFY_AUDIO_ROUTING"
2911 android:protectionLevel="signature|privileged" />
2913 <!-- @SystemApi Allows an application to capture video output.
2914 <p>Not for use by third-party applications.</p> -->
2915 <permission android:name="android.permission.CAPTURE_VIDEO_OUTPUT"
2916 android:protectionLevel="signature|privileged" />
2918 <!-- @SystemApi Allows an application to capture secure video output.
2919 <p>Not for use by third-party applications.</p> -->
2920 <permission android:name="android.permission.CAPTURE_SECURE_VIDEO_OUTPUT"
2921 android:protectionLevel="signature|privileged" />
2923 <!-- @SystemApi Allows an application to know what content is playing and control its playback.
2924 <p>Not for use by third-party applications due to privacy of media consumption</p> -->
2925 <permission android:name="android.permission.MEDIA_CONTENT_CONTROL"
2926 android:protectionLevel="signature|privileged" />
2928 <!-- @SystemApi @hide Allows an application to set the volume key long-press listener.
2929 <p>When it's set, the application will receive the volume key long-press event
2930 instead of changing volume.</p>
2931 <p>Not for use by third-party applications</p> -->
2932 <permission android:name="android.permission.SET_VOLUME_KEY_LONG_PRESS_LISTENER"
2933 android:protectionLevel="signature|privileged|development" />
2935 <!-- @SystemApi @hide Allows an application to set media key event listener.
2936 <p>When it's set, the application will receive the media key event before
2937 any other media sessions. If the event is handled by the listener, other sessions
2938 cannot get the event.</p>
2939 <p>Not for use by third-party applications</p> -->
2940 <permission android:name="android.permission.SET_MEDIA_KEY_LISTENER"
2941 android:protectionLevel="signature|privileged|development" />
2943 <!-- @SystemApi Required to be able to disable the device (very dangerous!).
2944 <p>Not for use by third-party applications.
2947 <permission android:name="android.permission.BRICK"
2948 android:protectionLevel="signature" />
2950 <!-- @SystemApi Required to be able to reboot the device.
2951 <p>Not for use by third-party applications. -->
2952 <permission android:name="android.permission.REBOOT"
2953 android:protectionLevel="signature|privileged" />
2955 <!-- @SystemApi Allows low-level access to power management.
2956 <p>Not for use by third-party applications.
2959 <permission android:name="android.permission.DEVICE_POWER"
2960 android:protectionLevel="signature" />
2962 <!-- Allows access to the PowerManager.userActivity function.
2963 <p>Not for use by third-party applications. @hide @SystemApi -->
2964 <permission android:name="android.permission.USER_ACTIVITY"
2965 android:protectionLevel="signature|privileged" />
2967 <!-- @hide Allows low-level access to tun tap driver -->
2968 <permission android:name="android.permission.NET_TUNNELING"
2969 android:protectionLevel="signature" />
2971 <!-- Run as a manufacturer test application, running as the root user.
2972 Only available when the device is running in manufacturer test mode.
2973 <p>Not for use by third-party applications.
2975 <permission android:name="android.permission.FACTORY_TEST"
2976 android:protectionLevel="signature" />
2978 <!-- Allows an application to broadcast a notification that an application
2979 package has been removed.
2980 <p>Not for use by third-party applications.
2982 <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED"
2983 android:protectionLevel="signature" />
2985 <!-- Allows an application to broadcast an SMS receipt notification.
2986 <p>Not for use by third-party applications.
2988 <permission android:name="android.permission.BROADCAST_SMS"
2989 android:protectionLevel="signature" />
2991 <!-- Allows an application to broadcast a WAP PUSH receipt notification.
2992 <p>Not for use by third-party applications.
2994 <permission android:name="android.permission.BROADCAST_WAP_PUSH"
2995 android:protectionLevel="signature" />
2997 <!-- @SystemApi Allows an application to broadcast privileged networking requests.
2998 <p>Not for use by third-party applications.
3000 @deprecated Use {@link android.Manifest.permission#REQUEST_NETWORK_SCORES} instead
3002 <permission android:name="android.permission.BROADCAST_NETWORK_PRIVILEGED"
3003 android:protectionLevel="signature|privileged" />
3005 <!-- @SystemApi Not for use by third-party applications. -->
3006 <permission android:name="android.permission.MASTER_CLEAR"
3007 android:protectionLevel="signature|privileged" />
3009 <!-- @SystemApi Allows an application to call any phone number, including emergency
3010 numbers, without going through the Dialer user interface for the user
3011 to confirm the call being placed.
3012 <p>Not for use by third-party applications. -->
3013 <permission android:name="android.permission.CALL_PRIVILEGED"
3014 android:protectionLevel="signature|privileged" />
3016 <!-- @SystemApi Allows an application to perform CDMA OTA provisioning @hide -->
3017 <permission android:name="android.permission.PERFORM_CDMA_PROVISIONING"
3018 android:protectionLevel="signature|privileged" />
3020 <!-- @SystemApi Allows an application to perform SIM Activation @hide -->
3021 <permission android:name="android.permission.PERFORM_SIM_ACTIVATION"
3022 android:protectionLevel="signature|privileged" />
3024 <!-- @SystemApi Allows enabling/disabling location update notifications from
3026 <p>Not for use by third-party applications. -->
3027 <permission android:name="android.permission.CONTROL_LOCATION_UPDATES"
3028 android:protectionLevel="signature|privileged" />
3030 <!-- @SystemApi Allows read/write access to the "properties" table in the checkin
3031 database, to change values that get uploaded.
3032 <p>Not for use by third-party applications. -->
3033 <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES"
3034 android:protectionLevel="signature|privileged" />
3036 <!-- @SystemApi Allows an application to collect component usage
3038 <p>Declaring the permission implies intention to use the API and the user of the
3039 device can grant permission through the Settings application. -->
3040 <permission android:name="android.permission.PACKAGE_USAGE_STATS"
3041 android:protectionLevel="signature|privileged|development|appop" />
3042 <uses-permission android:name="android.permission.PACKAGE_USAGE_STATS" />
3044 <!-- @hide Allows an application to change the app idle state of an app.
3045 <p>Not for use by third-party applications. -->
3046 <permission android:name="android.permission.CHANGE_APP_IDLE_STATE"
3047 android:protectionLevel="signature" />
3049 <!-- @hide @SystemApi Allows an application to temporarily whitelist an inactive app to
3050 access the network and acquire wakelocks.
3051 <p>Not for use by third-party applications. -->
3052 <permission android:name="android.permission.CHANGE_DEVICE_IDLE_TEMP_WHITELIST"
3053 android:protectionLevel="signature|privileged" />
3055 <!-- Permission an application must hold in order to use
3056 {@link android.provider.Settings#ACTION_REQUEST_IGNORE_BATTERY_OPTIMIZATIONS}.
3057 This is a normal permission: an app requesting it will always be granted the
3058 permission, without the user needing to approve or see it. -->
3059 <permission android:name="android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS"
3060 android:label="@string/permlab_requestIgnoreBatteryOptimizations"
3061 android:description="@string/permdesc_requestIgnoreBatteryOptimizations"
3062 android:protectionLevel="normal" />
3064 <!-- @SystemApi Allows an application to collect battery statistics -->
3065 <permission android:name="android.permission.BATTERY_STATS"
3066 android:protectionLevel="signature|privileged|development" />
3068 <!-- @SystemApi Allows an application to control the backup and restore process.
3069 <p>Not for use by third-party applications.
3070 @hide pending API council -->
3071 <permission android:name="android.permission.BACKUP"
3072 android:protectionLevel="signature|privileged" />
3074 <!-- Allows a package to launch the secure full-backup confirmation UI.
3075 ONLY the system process may hold this permission.
3077 <permission android:name="android.permission.CONFIRM_FULL_BACKUP"
3078 android:protectionLevel="signature" />
3080 <!-- @SystemApi Must be required by a {@link android.widget.RemoteViewsService},
3081 to ensure that only the system can bind to it. -->
3082 <permission android:name="android.permission.BIND_REMOTEVIEWS"
3083 android:protectionLevel="signature|privileged" />
3085 <!-- @SystemApi Allows an application to tell the AppWidget service which application
3086 can access AppWidget's data. The normal user flow is that a user
3087 picks an AppWidget to go into a particular host, thereby giving that
3088 host application access to the private data from the AppWidget app.
3089 An application that has this permission should honor that contract.
3090 <p>Not for use by third-party applications. -->
3091 <permission android:name="android.permission.BIND_APPWIDGET"
3092 android:protectionLevel="signature|privileged" />
3094 <!-- @SystemApi Private permission, to restrict who can bring up a dialog to add a new
3097 <permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET"
3098 android:protectionLevel="signature|privileged" />
3100 <!-- @SystemApi Internal permission allowing an application to query/set which
3101 applications can bind AppWidgets.
3103 <permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS"
3104 android:protectionLevel="signature|privileged" />
3106 <!-- Allows applications to change the background data setting.
3107 <p>Not for use by third-party applications.
3108 @hide pending API council -->
3109 <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING"
3110 android:protectionLevel="signature" />
3112 <!-- @SystemApi This permission can be used on content providers to allow the global
3113 search system to access their data. Typically it used when the
3114 provider has some permissions protecting it (which global search
3115 would not be expected to hold), and added as a read-only permission
3116 to the path in the provider where global search queries are
3117 performed. This permission can not be held by regular applications;
3118 it is used by applications to protect themselves from everyone else
3119 besides global search. -->
3120 <permission android:name="android.permission.GLOBAL_SEARCH"
3121 android:protectionLevel="signature|privileged" />
3123 <!-- Internal permission protecting access to the global search
3124 system: ensures that only the system can access the provider
3125 to perform queries (since this otherwise provides unrestricted
3126 access to a variety of content providers), and to write the
3127 search statistics (to keep applications from gaming the source
3130 <permission android:name="android.permission.GLOBAL_SEARCH_CONTROL"
3131 android:protectionLevel="signature" />
3133 <!-- @SystemApi Internal permission to allows an application to read indexable data.
3135 <permission android:name="android.permission.READ_SEARCH_INDEXABLES"
3136 android:protectionLevel="signature|privileged" />
3138 <!-- @SystemApi Allows applications to set a live wallpaper.
3139 @hide XXX Change to signature once the picker is moved to its
3140 own apk as Ghod Intended. -->
3141 <permission android:name="android.permission.SET_WALLPAPER_COMPONENT"
3142 android:protectionLevel="signature|privileged" />
3144 <!-- @SystemApi Allows applications to read dream settings and dream state.
3146 <permission android:name="android.permission.READ_DREAM_STATE"
3147 android:protectionLevel="signature|privileged" />
3149 <!-- @SystemApi Allows applications to write dream settings, and start or stop dreaming.
3151 <permission android:name="android.permission.WRITE_DREAM_STATE"
3152 android:protectionLevel="signature|privileged" />
3154 <!-- @SystemApi Allow an application to read and write the cache partition.
3156 <permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM"
3157 android:protectionLevel="signature|privileged" />
3159 <!-- Must be required by default container service so that only
3160 the system can bind to it and use it to copy
3161 protected data to secure containers or files
3162 accessible to the system.
3164 <permission android:name="android.permission.COPY_PROTECTED_DATA"
3165 android:protectionLevel="signature" />
3167 <!-- @SystemApi Internal permission protecting access to the encryption methods
3170 <permission android:name="android.permission.CRYPT_KEEPER"
3171 android:protectionLevel="signature|privileged" />
3173 <!-- @SystemApi Allows an application to read historical network usage for
3174 specific networks and applications. @hide -->
3175 <permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY"
3176 android:protectionLevel="signature|privileged" />
3178 <!-- Allows an application to manage network policies (such as warning and disable
3179 limits) and to define application-specific rules. @hide -->
3180 <permission android:name="android.permission.MANAGE_NETWORK_POLICY"
3181 android:protectionLevel="signature" />
3183 <!-- @SystemApi @hide @deprecated use UPDATE_DEVICE_STATS instead -->
3184 <permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING"
3185 android:protectionLevel="signature|privileged" />
3187 <!-- @SystemApi @hide Allows an application to manage carrier subscription plans. -->
3188 <permission android:name="android.permission.MANAGE_SUBSCRIPTION_PLANS"
3189 android:protectionLevel="signature|privileged" />
3191 <!-- C2DM permission.
3192 @hide Used internally.
3194 <permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"
3195 android:protectionLevel="signature" />
3196 <uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/>
3198 <!-- @SystemApi @hide Package verifier needs to have this permission before the PackageManager will
3199 trust it to verify packages.
3201 <permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT"
3202 android:protectionLevel="signature|privileged" />
3204 <!-- Must be required by package verifier receiver, to ensure that only the
3205 system can interact with it.
3208 <permission android:name="android.permission.BIND_PACKAGE_VERIFIER"
3209 android:protectionLevel="signature" />
3211 <!-- @SystemApi @hide Intent filter verifier needs to have this permission before the
3212 PackageManager will trust it to verify intent filters.
3214 <permission android:name="android.permission.INTENT_FILTER_VERIFICATION_AGENT"
3215 android:protectionLevel="signature|privileged" />
3217 <!-- Must be required by intent filter verifier receiver, to ensure that only the
3218 system can interact with it.
3221 <permission android:name="android.permission.BIND_INTENT_FILTER_VERIFIER"
3222 android:protectionLevel="signature" />
3224 <!-- @SystemApi Allows applications to access serial ports via the SerialManager.
3226 <permission android:name="android.permission.SERIAL_PORT"
3227 android:protectionLevel="signature|privileged" />
3229 <!-- Allows the holder to access content providers from outside an ApplicationThread.
3230 This permission is enforced by the ActivityManagerService on the corresponding APIs,
3231 in particular ActivityManagerService#getContentProviderExternal(String) and
3232 ActivityManagerService#removeContentProviderExternal(String).
3235 <permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY"
3236 android:protectionLevel="signature" />
3238 <!-- @SystemApi Allows an application to hold an UpdateLock, recommending that a headless
3239 OTA reboot *not* occur while the lock is held.
3241 <permission android:name="android.permission.UPDATE_LOCK"
3242 android:protectionLevel="signature|privileged" />
3244 <!-- @SystemApi Allows an application to read the current set of notifications, including
3245 any metadata and intents attached.
3247 <permission android:name="android.permission.ACCESS_NOTIFICATIONS"
3248 android:protectionLevel="signature|privileged|appop" />
3250 <!-- Marker permission for applications that wish to access notification policy.
3251 <p>Protection level: normal
3253 <permission android:name="android.permission.ACCESS_NOTIFICATION_POLICY"
3254 android:description="@string/permdesc_access_notification_policy"
3255 android:label="@string/permlab_access_notification_policy"
3256 android:protectionLevel="normal" />
3258 <!-- Allows modification of do not disturb rules and policies. Only allowed for system
3261 <permission android:name="android.permission.MANAGE_NOTIFICATIONS"
3262 android:protectionLevel="signature" />
3264 <!-- Allows notifications to be colorized
3265 <p>Not for use by third-party applications. @hide -->
3266 <permission android:name="android.permission.USE_COLORIZED_NOTIFICATIONS"
3267 android:protectionLevel="signature|setup" />
3269 <!-- Allows access to keyguard secure storage. Only allowed for system processes.
3271 <permission android:name="android.permission.ACCESS_KEYGUARD_SECURE_STORAGE"
3272 android:protectionLevel="signature" />
3274 <!-- Allows managing (adding, removing) fingerprint templates. Reserved for the system. @hide -->
3275 <permission android:name="android.permission.MANAGE_FINGERPRINT"
3276 android:protectionLevel="signature|privileged" />
3278 <!-- Allows an app to reset fingerprint attempt counter. Reserved for the system. @hide -->
3279 <permission android:name="android.permission.RESET_FINGERPRINT_LOCKOUT"
3280 android:protectionLevel="signature" />
3282 <!-- Allows an application to control keyguard. Only allowed for system processes.
3284 <permission android:name="android.permission.CONTROL_KEYGUARD"
3285 android:protectionLevel="signature" />
3287 <!-- Allows an application to listen to trust changes. Only allowed for system processes.
3289 <permission android:name="android.permission.TRUST_LISTENER"
3290 android:protectionLevel="signature" />
3292 <!-- @SystemApi Allows an application to provide a trust agent.
3293 @hide For security reasons, this is a platform-only permission. -->
3294 <permission android:name="android.permission.PROVIDE_TRUST_AGENT"
3295 android:protectionLevel="signature|privileged" />
3297 <!-- Allows an application to launch the trust agent settings activity.
3299 <permission android:name="android.permission.LAUNCH_TRUST_AGENT_SETTINGS"
3300 android:protectionLevel="signature|privileged" />
3302 <!-- @SystemApi Must be required by an {@link
3303 android.service.trust.TrustAgentService},
3304 to ensure that only the system can bind to it.
3306 <permission android:name="android.permission.BIND_TRUST_AGENT"
3307 android:protectionLevel="signature" />
3309 <!-- Must be required by an {@link
3310 android.service.notification.NotificationListenerService},
3311 to ensure that only the system can bind to it.
3312 <p>Protection level: signature
3314 <permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE"
3315 android:protectionLevel="signature" />
3317 <!-- @SystemApi Must be required by an {@link
3318 android.service.notification.NotificationAssistantService} to ensure that only the system
3320 <p>Protection level: signature
3323 <permission android:name="android.permission.BIND_NOTIFICATION_ASSISTANT_SERVICE"
3324 android:protectionLevel="signature" />
3326 <!-- Must be required by a {@link
3327 android.service.chooser.ChooserTargetService}, to ensure that
3328 only the system can bind to it.
3329 <p>Protection level: signature
3331 <permission android:name="android.permission.BIND_CHOOSER_TARGET_SERVICE"
3332 android:protectionLevel="signature" />
3334 <!-- @SystemApi Must be held by services that extend
3335 {@link android.service.resolver.ResolverRankerService}.
3336 <p>Protection level: signature|privileged
3339 <permission android:name="android.permission.PROVIDE_RESOLVER_RANKER_SERVICE"
3340 android:protectionLevel="signature|privileged" />
3342 <!-- @SystemApi Must be required by services that extend
3343 {@link android.service.resolver.ResolverRankerService}, to ensure that only the system can
3345 <p>Protection level: signature
3348 <permission android:name="android.permission.BIND_RESOLVER_RANKER_SERVICE"
3349 android:protectionLevel="signature" />
3351 <!-- Must be required by a {@link
3352 android.service.notification.ConditionProviderService},
3353 to ensure that only the system can bind to it.
3354 <p>Protection level: signature
3356 <permission android:name="android.permission.BIND_CONDITION_PROVIDER_SERVICE"
3357 android:protectionLevel="signature" />
3359 <!-- Must be required by an {@link android.service.dreams.DreamService},
3360 to ensure that only the system can bind to it.
3361 <p>Protection level: signature
3363 <permission android:name="android.permission.BIND_DREAM_SERVICE"
3364 android:protectionLevel="signature" />
3366 <!-- Must be required by an {@link android.app.usage.CacheQuotaService} to ensure that only the
3367 system can bind to it.
3368 @hide This is not a third-party API (intended for OEMs and system apps).
3370 <permission android:name="android.permission.BIND_CACHE_QUOTA_SERVICE"
3371 android:protectionLevel="signature" />
3373 <!-- @SystemApi Allows an application to call into a carrier setup flow. It is up to the
3374 carrier setup application to enforce that this permission is required
3375 @hide This is not a third-party API (intended for OEMs and system apps). -->
3376 <permission android:name="android.permission.INVOKE_CARRIER_SETUP"
3377 android:protectionLevel="signature|privileged" />
3379 <!-- @SystemApi Allows an application to listen for network condition observations.
3380 @hide This is not a third-party API (intended for system apps). -->
3381 <permission android:name="android.permission.ACCESS_NETWORK_CONDITIONS"
3382 android:protectionLevel="signature|privileged" />
3384 <!-- @SystemApi Allows an application to provision and access DRM certificates
3385 @hide This is not a third-party API (intended for system apps). -->
3386 <permission android:name="android.permission.ACCESS_DRM_CERTIFICATES"
3387 android:protectionLevel="signature|privileged" />
3389 <!-- Api Allows an application to manage media projection sessions.
3390 @hide This is not a third-party API (intended for system apps). -->
3391 <permission android:name="android.permission.MANAGE_MEDIA_PROJECTION"
3392 android:protectionLevel="signature" />
3394 <!-- @SystemApi Allows an application to read install sessions
3395 @hide This is not a third-party API (intended for system apps). -->
3396 <permission android:name="android.permission.READ_INSTALL_SESSIONS"
3397 android:label="@string/permlab_readInstallSessions"
3398 android:description="@string/permdesc_readInstallSessions"
3399 android:protectionLevel="normal"/>
3401 <!-- @SystemApi Allows an application to remove DRM certificates
3402 @hide This is not a third-party API (intended for system apps). -->
3403 <permission android:name="android.permission.REMOVE_DRM_CERTIFICATES"
3404 android:protectionLevel="signature|privileged" />
3406 <!-- @deprecated Use {@link android.Manifest.permission#BIND_CARRIER_SERVICES} instead -->
3407 <permission android:name="android.permission.BIND_CARRIER_MESSAGING_SERVICE"
3408 android:protectionLevel="signature|privileged" />
3410 <!-- Allows an application to interact with the currently active
3411 {@link android.service.voice.VoiceInteractionService}.
3413 <permission android:name="android.permission.ACCESS_VOICE_INTERACTION_SERVICE"
3414 android:protectionLevel="signature" />
3416 <!-- The system process that is allowed to bind to services in carrier apps will
3417 have this permission. Carrier apps should use this permission to protect
3418 their services that only the system is allowed to bind to.
3419 <p>Protection level: signature|privileged
3421 <permission android:name="android.permission.BIND_CARRIER_SERVICES"
3422 android:label="@string/permlab_bindCarrierServices"
3423 android:description="@string/permdesc_bindCarrierServices"
3424 android:protectionLevel="signature|privileged" />
3426 <!-- Allows an application to query whether DO_NOT_ASK_CREDENTIALS_ON_BOOT
3429 <permission android:name="android.permission.QUERY_DO_NOT_ASK_CREDENTIALS_ON_BOOT"
3430 android:protectionLevel="signature" />
3432 <!-- @SystemApi Allows applications to kill UIDs.
3433 <p>Not for use by third-party applications.
3435 <permission android:name="android.permission.KILL_UID"
3436 android:protectionLevel="signature|installer" />
3438 <!-- @SystemApi Allows applications to read the local WiFi and Bluetooth MAC address.
3440 <permission android:name="android.permission.LOCAL_MAC_ADDRESS"
3441 android:protectionLevel="signature|privileged" />
3443 <!-- @SystemApi Allows access to MAC addresses of WiFi and Bluetooth peer devices.
3445 <permission android:name="android.permission.PEERS_MAC_ADDRESS"
3446 android:protectionLevel="signature|setup" />
3448 <!-- Allows the Nfc stack to dispatch Nfc messages to applications. Applications
3449 can use this permission to ensure incoming Nfc messages are from the Nfc stack
3450 and not simulated by another application.
3452 <permission android:name="android.permission.DISPATCH_NFC_MESSAGE"
3453 android:protectionLevel="signature|privileged" />
3455 <!-- @SystemApi Allows changing day / night mode when system is configured with
3456 config_lockDayNightMode set to true. If requesting app does not have permission,
3459 <permission android:name="android.permission.MODIFY_DAY_NIGHT_MODE"
3460 android:protectionLevel="signature|privileged" />
3462 <!-- The system process is explicitly the only one allowed to launch the
3463 confirmation UI for full backup/restore -->
3464 <uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/>
3466 <!-- Allows the holder to access and manage instant applications on the device.
3468 <permission android:name="android.permission.ACCESS_INSTANT_APPS"
3469 android:protectionLevel="signature|installer|verifier" />
3471 <!-- Allows the holder to view the instant applications on the device.
3473 <permission android:name="android.permission.VIEW_INSTANT_APPS"
3474 android:protectionLevel="signature|preinstalled" />
3476 <!-- Allows receiving the usage of media resource e.g. video/audio codec and
3479 <permission android:name="android.permission.RECEIVE_MEDIA_RESOURCE_USAGE"
3480 android:protectionLevel="signature|privileged" />
3482 <!-- Must be required by system/priv apps when accessing the sound trigger
3483 APIs given by {@link SoundTriggerManager}.
3484 @hide <p>Not for use by third-party applications.</p> -->
3485 <permission android:name="android.permission.MANAGE_SOUND_TRIGGER"
3486 android:protectionLevel="signature|privileged" />
3488 <!-- @SystemApi Allows trusted applications to dispatch managed provisioning message to Managed
3489 Provisioning app. If requesting app does not have permission, it will be ignored.
3491 <permission android:name="android.permission.DISPATCH_PROVISIONING_MESSAGE"
3492 android:protectionLevel="signature|privileged" />
3494 <!-- Allows the holder to read blocked numbers. See
3495 {@link android.provider.BlockedNumberContract}.
3497 <permission android:name="android.permission.READ_BLOCKED_NUMBERS"
3498 android:protectionLevel="signature" />
3500 <!-- Allows the holder to write blocked numbers. See
3501 {@link android.provider.BlockedNumberContract}.
3503 <permission android:name="android.permission.WRITE_BLOCKED_NUMBERS"
3504 android:protectionLevel="signature" />
3506 <!-- Must be required by an {@link android.service.vr.VrListenerService}, to ensure that only
3507 the system can bind to it.
3508 <p>Protection level: signature -->
3509 <permission android:name="android.permission.BIND_VR_LISTENER_SERVICE"
3510 android:protectionLevel="signature" />
3512 <!-- Must be required by system apps when accessing restricted VR APIs.
3515 <p>Protection level: signature -->
3516 <permission android:name="android.permission.RESTRICTED_VR_ACCESS"
3517 android:protectionLevel="signature|preinstalled" />
3519 <!-- Required to make calls to {@link android.service.vr.IVrManager}.
3521 <permission android:name="android.permission.ACCESS_VR_MANAGER"
3522 android:protectionLevel="signature" />
3524 <!-- Required to access VR-Mode state and state change events via {android.app.VrStateCallback}
3526 <permission android:name="android.permission.ACCESS_VR_STATE"
3527 android:protectionLevel="signature|preinstalled" />
3529 <!-- Allows an application to whitelist tasks during lock task mode
3530 @hide <p>Not for use by third-party applications.</p> -->
3531 <permission android:name="android.permission.UPDATE_LOCK_TASK_PACKAGES"
3532 android:protectionLevel="signature|setup" />
3534 <!-- @SystemApi Allows an application to replace the app name displayed alongside notifications
3535 in the N-release and later.
3536 @hide <p>Not for use by third-party applications.</p> -->
3537 <permission android:name="android.permission.SUBSTITUTE_NOTIFICATION_APP_NAME"
3538 android:protectionLevel="signature|privileged" />
3540 <!-- @SystemApi Allows an application to show notifications before the device is provisioned.
3541 @hide <p>Not for use by third-party applications.</p> -->
3542 <permission android:name="android.permission.NOTIFICATION_DURING_SETUP"
3543 android:protectionLevel="signature|privileged" />
3545 <!-- @SystemApi Allows an application to manage auto-fill sessions.
3546 @hide <p>Not for use by third-party applications.</p> -->
3547 <permission android:name="android.permission.MANAGE_AUTO_FILL"
3548 android:protectionLevel="signature" />
3550 <!-- Allows an app to set the theme overlay in /vendor/overlay
3552 @hide <p>Not for use by third-party applications.</p> -->
3553 <permission android:name="android.permission.MODIFY_THEME_OVERLAY"
3554 android:protectionLevel="signature" />
3556 <!-- Allows an instant app to create foreground services. -->
3557 <permission android:name="android.permission.INSTANT_APP_FOREGROUND_SERVICE"
3558 android:protectionLevel="signature|development|instant|appop" />
3560 <application android:process="system"
3561 android:persistent="true"
3562 android:hasCode="false"
3563 android:label="@string/android_system_label"
3564 android:allowClearUserData="false"
3565 android:backupAgent="com.android.server.backup.SystemBackupAgent"
3566 android:killAfterRestore="false"
3567 android:icon="@drawable/ic_launcher_android"
3568 android:supportsRtl="true"
3569 android:theme="@style/Theme.DeviceDefault.Light.DarkActionBar"
3570 android:defaultToDeviceProtectedStorage="true"
3571 android:directBootAware="true">
3572 <activity android:name="com.android.internal.app.ChooserActivity"
3573 android:theme="@style/Theme.DeviceDefault.Resolver"
3574 android:finishOnCloseSystemDialogs="true"
3575 android:excludeFromRecents="true"
3576 android:documentLaunchMode="never"
3577 android:relinquishTaskIdentity="true"
3578 android:configChanges="screenSize|smallestScreenSize|screenLayout|orientation|keyboard|keyboardHidden"
3579 android:process=":ui"
3580 android:visibleToInstantApps="true">
3582 <action android:name="android.intent.action.CHOOSER" />
3583 <category android:name="android.intent.category.DEFAULT" />
3584 <category android:name="android.intent.category.VOICE" />
3587 <activity android:name="com.android.internal.app.AccessibilityButtonChooserActivity"
3588 android:exported="false"
3589 android:theme="@style/Theme.DeviceDefault.Resolver"
3590 android:finishOnCloseSystemDialogs="true"
3591 android:excludeFromRecents="true"
3592 android:documentLaunchMode="never"
3593 android:relinquishTaskIdentity="true"
3594 android:configChanges="screenSize|smallestScreenSize|screenLayout|orientation|keyboard|keyboardHidden"
3595 android:process=":ui"
3596 android:visibleToInstantApps="true">
3598 <action android:name="com.android.internal.intent.action.CHOOSE_ACCESSIBILITY_BUTTON" />
3599 <category android:name="android.intent.category.DEFAULT" />
3602 <activity android:name="com.android.internal.app.IntentForwarderActivity"
3603 android:finishOnCloseSystemDialogs="true"
3604 android:theme="@style/Theme.NoDisplay"
3605 android:excludeFromRecents="true"
3606 android:label="@string/user_owner_label"
3607 android:exported="true"
3610 <activity-alias android:name="com.android.internal.app.ForwardIntentToParent"
3611 android:targetActivity="com.android.internal.app.IntentForwarderActivity"
3612 android:exported="true"
3613 android:label="@string/user_owner_label">
3615 <activity-alias android:name="com.android.internal.app.ForwardIntentToManagedProfile"
3616 android:targetActivity="com.android.internal.app.IntentForwarderActivity"
3617 android:icon="@drawable/ic_corp_icon"
3618 android:exported="true"
3619 android:label="@string/managed_profile_label">
3621 <activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity"
3622 android:theme="@style/Theme.DeviceDefault.Light.Dialog"
3623 android:label="@string/heavy_weight_switcher_title"
3624 android:finishOnCloseSystemDialogs="true"
3625 android:excludeFromRecents="true"
3626 android:process=":ui">
3628 <activity android:name="com.android.internal.app.PlatLogoActivity"
3629 android:theme="@style/Theme.Wallpaper.NoTitleBar.Fullscreen"
3630 android:configChanges="orientation|keyboardHidden"
3631 android:process=":ui">
3633 <activity android:name="com.android.internal.app.DisableCarModeActivity"
3634 android:theme="@style/Theme.NoDisplay"
3635 android:excludeFromRecents="true"
3636 android:process=":ui">
3638 <activity android:name="com.android.internal.app.DumpHeapActivity"
3639 android:theme="@style/Theme.Translucent.NoTitleBar"
3640 android:label="@string/dump_heap_title"
3641 android:finishOnCloseSystemDialogs="true"
3642 android:noHistory="true"
3643 android:excludeFromRecents="true"
3644 android:process=":ui">
3646 <provider android:name="com.android.server.am.DumpHeapProvider"
3647 android:authorities="com.android.server.heapdump"
3648 android:grantUriPermissions="true"
3649 android:multiprocess="false"
3650 android:singleUser="true" />
3652 <activity android:name="android.accounts.ChooseAccountActivity"
3653 android:excludeFromRecents="true"
3654 android:exported="true"
3655 android:theme="@style/Theme.DeviceDefault.Light.Dialog"
3656 android:label="@string/choose_account_label"
3657 android:process=":ui"
3658 android:visibleToInstantApps="true">
3661 <activity android:name="android.accounts.ChooseTypeAndAccountActivity"
3662 android:excludeFromRecents="true"
3663 android:exported="true"
3664 android:theme="@style/Theme.DeviceDefault.Light.Dialog"
3665 android:label="@string/choose_account_label"
3666 android:process=":ui"
3667 android:visibleToInstantApps="true">
3670 <activity android:name="android.accounts.ChooseAccountTypeActivity"
3671 android:excludeFromRecents="true"
3672 android:theme="@style/Theme.DeviceDefault.Light.Dialog"
3673 android:label="@string/choose_account_label"
3674 android:process=":ui"
3675 android:visibleToInstantApps="true">
3678 <activity android:name="android.accounts.CantAddAccountActivity"
3679 android:excludeFromRecents="true"
3680 android:exported="true"
3681 android:theme="@style/Theme.DeviceDefault.Light.Dialog.NoActionBar"
3682 android:process=":ui">
3685 <activity android:name="android.accounts.GrantCredentialsPermissionActivity"
3686 android:excludeFromRecents="true"
3687 android:exported="true"
3688 android:theme="@style/Theme.DeviceDefault.Light.DialogWhenLarge"
3689 android:process=":ui"
3690 android:visibleToInstantApps="true">
3693 <activity android:name="android.content.SyncActivityTooManyDeletes"
3694 android:theme="@style/Theme.DeviceDefault.Light.Dialog"
3695 android:label="@string/sync_too_many_deletes"
3696 android:process=":ui">
3699 <activity android:name="com.android.internal.app.ShutdownActivity"
3700 android:permission="android.permission.SHUTDOWN"
3701 android:theme="@style/Theme.NoDisplay"
3702 android:excludeFromRecents="true">
3704 <action android:name="com.android.internal.intent.action.REQUEST_SHUTDOWN" />
3705 <category android:name="android.intent.category.DEFAULT" />
3708 <action android:name="android.intent.action.REBOOT" />
3709 <category android:name="android.intent.category.DEFAULT" />
3713 <activity android:name="com.android.internal.app.NetInitiatedActivity"
3714 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert"
3715 android:excludeFromRecents="true"
3716 android:process=":ui">
3719 <activity android:name="com.android.internal.app.SystemUserHomeActivity"
3720 android:enabled="false"
3721 android:process=":ui"
3722 android:systemUserOnly="true"
3723 android:theme="@style/Theme.Translucent.NoTitleBar">
3724 <intent-filter android:priority="-100">
3725 <action android:name="android.intent.action.MAIN" />
3726 <category android:name="android.intent.category.HOME" />
3730 <!-- Activity to prompt user if it's ok to create a new user sandbox for a
3731 specified account. -->
3732 <activity android:name="com.android.internal.app.ConfirmUserCreationActivity"
3733 android:excludeFromRecents="true"
3734 android:process=":ui"
3735 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert">
3736 <intent-filter android:priority="1000">
3737 <action android:name="android.os.action.CREATE_USER" />
3738 <category android:name="android.intent.category.DEFAULT" />
3742 <activity android:name="com.android.internal.app.UnlaunchableAppActivity"
3743 android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert"
3744 android:excludeFromRecents="true"
3745 android:process=":ui">
3748 <activity android:name="com.android.settings.notification.NotificationAccessConfirmationActivity"
3749 android:theme="@android:style/Theme.DeviceDefault.Light.Dialog.Alert"
3750 android:excludeFromRecents="true">
3753 <receiver android:name="com.android.server.BootReceiver"
3754 android:systemUserOnly="true">
3755 <intent-filter android:priority="1000">
3756 <action android:name="android.intent.action.BOOT_COMPLETED" />
3760 <receiver android:name="com.android.server.updates.CertPinInstallReceiver"
3761 android:permission="android.permission.UPDATE_CONFIG">
3763 <action android:name="android.intent.action.UPDATE_PINS" />
3764 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3768 <receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver"
3769 android:permission="android.permission.UPDATE_CONFIG">
3771 <action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" />
3772 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3776 <receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver"
3777 android:permission="android.permission.UPDATE_CONFIG">
3779 <action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" />
3780 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3784 <receiver android:name="com.android.server.updates.ApnDbInstallReceiver"
3785 android:permission="android.permission.UPDATE_CONFIG">
3787 <action android:name="com.android.internal.intent.action.UPDATE_APN_DB" />
3788 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3792 <receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver"
3793 android:permission="android.permission.UPDATE_CONFIG">
3795 <action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" />
3796 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3800 <receiver android:name="com.android.server.updates.TzDataInstallReceiver"
3801 android:permission="android.permission.UPDATE_CONFIG">
3803 <action android:name="android.intent.action.UPDATE_TZDATA" />
3804 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3808 <receiver android:name="com.android.server.updates.CertificateTransparencyLogInstallReceiver"
3809 android:permission="android.permission.UPDATE_CONFIG">
3811 <action android:name="android.intent.action.UPDATE_CT_LOGS" />
3812 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3816 <receiver android:name="com.android.server.updates.LangIdInstallReceiver"
3817 android:permission="android.permission.UPDATE_CONFIG">
3819 <action android:name="android.intent.action.UPDATE_LANG_ID" />
3820 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3824 <receiver android:name="com.android.server.updates.SmartSelectionInstallReceiver"
3825 android:permission="android.permission.UPDATE_CONFIG">
3827 <action android:name="android.intent.action.UPDATE_SMART_SELECTION" />
3828 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3832 <receiver android:name="com.android.server.MasterClearReceiver"
3833 android:permission="android.permission.MASTER_CLEAR">
3835 android:priority="100" >
3836 <!-- For Checkin, Settings, etc.: action=FACTORY_RESET -->
3837 <action android:name="android.intent.action.FACTORY_RESET" />
3838 <!-- As above until all the references to the deprecated MASTER_CLEAR get updated to
3840 <action android:name="android.intent.action.MASTER_CLEAR" />
3842 <!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR -->
3843 <action android:name="com.google.android.c2dm.intent.RECEIVE" />
3844 <category android:name="android.intent.category.MASTER_CLEAR" />
3848 <service android:name="android.hardware.location.GeofenceHardwareService"
3849 android:permission="android.permission.LOCATION_HARDWARE"
3850 android:exported="false" />
3852 <service android:name="com.android.internal.backup.LocalTransportService"
3853 android:permission="android.permission.CONFIRM_FULL_BACKUP"
3854 android:exported="false">
3856 <action android:name="android.backup.TRANSPORT_HOST" />
3860 <service android:name="com.android.server.MountServiceIdler"
3861 android:exported="true"
3862 android:permission="android.permission.BIND_JOB_SERVICE" >
3865 <service android:name="com.android.server.backup.FullBackupJob"
3866 android:exported="true"
3867 android:permission="android.permission.BIND_JOB_SERVICE" >
3870 <service android:name="com.android.server.backup.KeyValueBackupJob"
3871 android:permission="android.permission.BIND_JOB_SERVICE" >
3874 <service android:name="com.android.server.content.SyncJobService"
3875 android:permission="android.permission.BIND_JOB_SERVICE" >
3878 <service android:name="com.android.server.pm.BackgroundDexOptService"
3879 android:exported="true"
3880 android:permission="android.permission.BIND_JOB_SERVICE">
3883 <service android:name="com.android.server.PruneInstantAppsJobService"
3884 android:permission="android.permission.BIND_JOB_SERVICE" >
3887 <service android:name="com.android.server.storage.DiskStatsLoggingService"
3888 android:permission="android.permission.BIND_JOB_SERVICE" >
3891 <service android:name="com.android.server.PreloadsFileCacheExpirationJobService"
3892 android:permission="android.permission.BIND_JOB_SERVICE" >
3895 <service android:name="com.android.server.camera.CameraStatsJobService"
3896 android:permission="android.permission.BIND_JOB_SERVICE" >
3899 <service android:name="com.android.server.timezone.TimeZoneUpdateIdler"
3900 android:permission="android.permission.BIND_JOB_SERVICE" >