1 <?xml version="1.0" encoding="utf-8"?>
3 /* //device/apps/common/AndroidManifest.xml
5 ** Copyright 2006, The Android Open Source Project
7 ** Licensed under the Apache License, Version 2.0 (the "License");
8 ** you may not use this file except in compliance with the License.
9 ** You may obtain a copy of the License at
11 ** http://www.apache.org/licenses/LICENSE-2.0
13 ** Unless required by applicable law or agreed to in writing, software
14 ** distributed under the License is distributed on an "AS IS" BASIS,
15 ** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16 ** See the License for the specific language governing permissions and
17 ** limitations under the License.
20 <manifest xmlns:android="http://schemas.android.com/apk/res/android"
21 package="android" coreApp="true" android:sharedUserId="android.uid.system"
22 android:sharedUserLabel="@string/android_system_label">
24 <!-- ================================================ -->
25 <!-- Special broadcasts that only the system can send -->
26 <!-- ================================================ -->
29 <protected-broadcast android:name="android.intent.action.SCREEN_OFF" />
30 <protected-broadcast android:name="android.intent.action.SCREEN_ON" />
31 <protected-broadcast android:name="android.intent.action.USER_PRESENT" />
32 <protected-broadcast android:name="android.intent.action.TIME_SET" />
33 <protected-broadcast android:name="android.intent.action.TIME_TICK" />
34 <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" />
35 <protected-broadcast android:name="android.intent.action.DATE_CHANGED" />
36 <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" />
37 <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" />
38 <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" />
39 <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" />
40 <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" />
41 <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" />
42 <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" />
43 <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" />
44 <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" />
45 <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" />
46 <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" />
47 <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" />
48 <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" />
49 <protected-broadcast android:name="android.intent.action.UID_REMOVED" />
50 <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" />
51 <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" />
52 <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" />
53 <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" />
54 <protected-broadcast android:name="android.intent.action.BATTERY_LOW" />
55 <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" />
56 <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" />
57 <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" />
58 <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" />
59 <protected-broadcast android:name="android.intent.action.CHARGING" />
60 <protected-broadcast android:name="android.intent.action.DISCHARGING" />
61 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" />
62 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" />
63 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" />
64 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" />
65 <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" />
66 <protected-broadcast android:name="android.intent.action.REBOOT" />
67 <protected-broadcast android:name="android.intent.action.DOCK_EVENT" />
68 <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" />
69 <protected-broadcast android:name="android.intent.action.USER_ADDED" />
70 <protected-broadcast android:name="android.intent.action.USER_REMOVED" />
71 <protected-broadcast android:name="android.intent.action.USER_STARTING" />
72 <protected-broadcast android:name="android.intent.action.USER_STARTED" />
73 <protected-broadcast android:name="android.intent.action.USER_STOPPING" />
74 <protected-broadcast android:name="android.intent.action.USER_STOPPED" />
75 <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" />
76 <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" />
77 <protected-broadcast android:name="android.intent.action.USER_SWITCHED" />
78 <protected-broadcast android:name="android.intent.action.INTENT_FILTER_NEEDS_VERIFICATION" />
80 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED" />
81 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGING" />
83 <protected-broadcast android:name="android.os.action.SCREEN_BRIGHTNESS_BOOST_CHANGED" />
85 <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" />
86 <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" />
87 <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" />
88 <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" />
89 <protected-broadcast android:name="android.app.action.NEXT_ALARM_CLOCK_CHANGED" />
90 <protected-broadcast android:name="android.app.action.SEND_DEVICE_INITIALIZER_STATUS" />
92 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" />
93 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" />
94 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" />
95 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" />
96 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_HOST_RESTORED" />
97 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_RESTORED" />
99 <protected-broadcast android:name="android.os.action.SETTING_RESTORED" />
101 <protected-broadcast android:name="android.backup.intent.RUN" />
102 <protected-broadcast android:name="android.backup.intent.CLEAR" />
103 <protected-broadcast android:name="android.backup.intent.INIT" />
105 <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" />
106 <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" />
107 <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" />
108 <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" />
109 <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" />
110 <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" />
111 <protected-broadcast android:name="android.bluetooth.device.action.UUID" />
112 <protected-broadcast android:name="android.bluetooth.device.action.MAS_INSTANCE" />
113 <protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" />
114 <protected-broadcast android:name="android.bluetooth.device.action.FOUND" />
115 <protected-broadcast android:name="android.bluetooth.device.action.DISAPPEARED" />
116 <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" />
117 <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" />
118 <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" />
119 <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" />
120 <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" />
121 <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" />
122 <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" />
123 <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" />
124 <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" />
125 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" />
126 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" />
127 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" />
128 <protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" />
129 <protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" />
131 android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" />
133 android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" />
135 android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" />
137 android:name="android.bluetooth.headsetclient.profile.action.CONNECTION_STATE_CHANGED" />
139 android:name="android.bluetooth.headsetclient.profile.action.AUDIO_STATE_CHANGED" />
141 android:name="android.bluetooth.headsetclient.profile.action.AG_EVENT" />
143 android:name="android.bluetooth.headsetclient.profile.action.AG_CALL_CHANGED" />
145 android:name="android.bluetooth.headsetclient.profile.action.RESULT" />
147 android:name="android.bluetooth.headsetclient.profile.action.LAST_VTAG" />
149 android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" />
151 android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" />
153 android:name="android.bluetooth.a2dp-sink.profile.action.CONNECTION_STATE_CHANGED" />
155 android:name="android.bluetooth.a2dp-sink.profile.action.PLAYING_STATE_CHANGED" />
157 android:name="android.bluetooth.a2dp-sink.profile.action.AUDIO_CONFIG_CHANGED" />
159 android:name="android.bluetooth.avrcp-controller.profile.action.CONNECTION_STATE_CHANGED" />
161 android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" />
163 android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" />
165 android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" />
167 android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" />
168 <protected-broadcast android:name="android.bluetooth.pbap.intent.action.PBAP_STATE_CHANGED" />
169 <protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" />
170 <protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" />
171 <protected-broadcast android:name="android.btopp.intent.action.LIST" />
172 <protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" />
173 <protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" />
174 <protected-broadcast android:name="android.btopp.intent.action.CONFIRM" />
175 <protected-broadcast android:name="android.btopp.intent.action.HIDE" />
176 <protected-broadcast android:name="android.btopp.intent.action.RETRY" />
177 <protected-broadcast android:name="android.btopp.intent.action.OPEN" />
178 <protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" />
179 <protected-broadcast android:name="com.android.bluetooth.pbap.authchall" />
180 <protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" />
181 <protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" />
182 <protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" />
184 <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" />
186 <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" />
187 <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" />
188 <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" />
189 <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" />
190 <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" />
192 <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" />
193 <protected-broadcast android:name="android.media.action.HDMI_AUDIO_PLUG" />
195 <protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" />
196 <protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" />
197 <protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" />
198 <protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" />
199 <protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" />
200 <protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" />
201 <protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" />
202 <protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" />
204 <protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" />
205 <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" />
206 <protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" />
207 <protected-broadcast android:name="android.intent.action.MEDIA_NOFS" />
208 <protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" />
209 <protected-broadcast android:name="android.intent.action.MEDIA_SHARED" />
210 <protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" />
211 <protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" />
212 <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" />
213 <protected-broadcast android:name="android.intent.action.MEDIA_EJECT" />
215 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" />
216 <!-- @deprecated. Only {@link android.net.ConnectivityManager.CONNECTIVITY_ACTION} is sent. -->
217 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" />
218 <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" />
219 <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" />
220 <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" />
222 <protected-broadcast android:name="android.net.nsd.STATE_CHANGED" />
224 <protected-broadcast android:name="android.nfc.action.LLCP_LINK_STATE_CHANGED" />
225 <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" />
226 <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" />
227 <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" />
229 <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" />
231 <protected-broadcast android:name="android.nfc.cardemulation.action.REQUEST_SERVICE_RESOURCES" />
232 <protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" />
233 <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" />
235 <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" />
237 <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" />
238 <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" />
239 <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" />
240 <protected-broadcast android:name="android.intent.action.DATA_CONNECTION_CONNECTED_TO_PROVISIONING_APN" />
242 <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" />
243 <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" />
244 <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" />
245 <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" />
246 <protected-broadcast android:name="android.net.wifi.WIFI_CREDENTIAL_CHANGED" />
247 <protected-broadcast android:name="android.net.wifi.WIFI_SCAN_AVAILABLE" />
248 <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" />
249 <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" />
250 <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" />
251 <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" />
252 <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" />
253 <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" />
254 <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" />
255 <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" />
256 <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" />
257 <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" />
258 <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" />
259 <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" />
260 <protected-broadcast android:name="android.net.wifi.p2p.PERSISTENT_GROUPS_CHANGED" />
261 <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" />
262 <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" />
263 <protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" />
265 android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" />
266 <protected-broadcast android:name="android.net.scoring.SCORE_NETWORKS" />
267 <protected-broadcast android:name="android.net.scoring.SCORER_CHANGED" />
268 <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" />
269 <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" />
270 <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" />
271 <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" />
272 <protected-broadcast android:name="android.intent.action.APPLICATION_RESTRICTIONS_CHANGED" />
273 <protected-broadcast android:name="android.intent.action.BUGREPORT_FINISHED" />
275 <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" />
276 <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" />
278 <protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" />
280 <protected-broadcast android:name="android.intent.action.PHONE_STATE" />
282 <protected-broadcast android:name="android.intent.action.SUB_DEFAULT_CHANGED" />
284 <protected-broadcast android:name="android.location.GPS_ENABLED_CHANGE" />
285 <protected-broadcast android:name="android.location.PROVIDERS_CHANGED" />
286 <protected-broadcast android:name="android.location.MODE_CHANGED" />
287 <protected-broadcast android:name="android.location.GPS_FIX_CHANGE" />
288 <protected-broadcast android:name="android.net.proxy.PAC_REFRESH" />
291 android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" />
293 <!-- Defined in RestrictionsManager -->
295 android:name="android.intent.action.PERMISSION_RESPONSE_RECEIVED" />
296 <!-- Defined in RestrictionsManager -->
298 <protected-broadcast android:name="android.intent.action.REQUEST_PERMISSION" />
299 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_STARTED" />
300 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
301 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_PROGRESS" />
302 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
304 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_SUBSCRIPTION_CHANGED" />
305 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_SMS_SUBSCRIPTION_CHANGED" />
306 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_DATA_SUBSCRIPTION_CHANGED" />
307 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_VOICE_SUBSCRIPTION_CHANGED" />
308 <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_CONTENT_CHANGE" />
309 <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_RECORD_UPDATED" />
311 <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_DONE" />
312 <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_FAILED" />
314 <protected-broadcast android:name="android.internal.policy.action.BURN_IN_PROTECTION" />
315 <protected-broadcast android:name="android.service.persistentdata.action.WIPE_IF_ALLOWED" />
317 <protected-broadcast android:name="android.app.action.SYSTEM_UPDATE_POLICY_CHANGED" />
318 <!-- ====================================================================== -->
319 <!-- RUNTIME PERMISSIONS -->
320 <!-- ====================================================================== -->
323 <!-- ====================================================================== -->
324 <!-- Permissions for accessing user's contacts including personal profile -->
325 <!-- ====================================================================== -->
328 <!-- Used for runtime permissions related to user's contacts and profile. -->
329 <permission-group android:name="android.permission-group.CONTACTS"
330 android:icon="@drawable/perm_group_social_info"
331 android:label="@string/permgrouplab_contacts"
332 android:description="@string/permgroupdesc_contacts"
333 android:priority="100" />
335 <!-- Allows an application to read the user's contacts data. -->
336 <permission android:name="android.permission.READ_CONTACTS"
337 android:permissionGroup="android.permission-group.CONTACTS"
338 android:label="@string/permlab_readContacts"
339 android:description="@string/permdesc_readContacts"
340 android:protectionLevel="dangerous" />
342 <!-- Allows an application to write the user's contacts data. -->
343 <permission android:name="android.permission.WRITE_CONTACTS"
344 android:permissionGroup="android.permission-group.CONTACTS"
345 android:label="@string/permlab_writeContacts"
346 android:description="@string/permdesc_writeContacts"
347 android:protectionLevel="dangerous" />
349 <!-- Allows an application to read the user's personal profile data. -->
350 <permission android:name="android.permission.READ_PROFILE"
351 android:permissionGroup="android.permission-group.CONTACTS"
352 android:label="@string/permlab_readProfile"
353 android:description="@string/permdesc_readProfile"
354 android:protectionLevel="dangerous" />
356 <!-- Allows an application to write the user's personal profile data. -->
357 <permission android:name="android.permission.WRITE_PROFILE"
358 android:permissionGroup="android.permission-group.CONTACTS"
359 android:label="@string/permlab_writeProfile"
360 android:description="@string/permdesc_writeProfile"
361 android:protectionLevel="dangerous" />
363 <!-- ====================================================================== -->
364 <!-- Permissions for accessing user's calendar -->
365 <!-- ====================================================================== -->
368 <!-- Used for runtime permissions related to user's calendar. -->
369 <permission-group android:name="android.permission-group.CALENDAR"
370 android:icon="@drawable/perm_group_calendar"
371 android:label="@string/permgrouplab_calendar"
372 android:description="@string/permgroupdesc_calendar"
373 android:priority="200" />
375 <!-- Allows an application to read the user's calendar data. -->
376 <permission android:name="android.permission.READ_CALENDAR"
377 android:permissionGroup="android.permission-group.CALENDAR"
378 android:label="@string/permlab_readCalendar"
379 android:description="@string/permdesc_readCalendar"
380 android:protectionLevel="dangerous" />
382 <!-- Allows an application to write the user's calendar data. -->
383 <permission android:name="android.permission.WRITE_CALENDAR"
384 android:permissionGroup="android.permission-group.CALENDAR"
385 android:label="@string/permlab_writeCalendar"
386 android:description="@string/permdesc_writeCalendar"
387 android:protectionLevel="dangerous" />
389 <!-- ====================================================================== -->
390 <!-- Permissions for accessing and modifying user's SMS messages -->
391 <!-- ====================================================================== -->
394 <!-- Used for runtime permissions related to user's SMS messages. -->
395 <permission-group android:name="android.permission-group.SMS"
396 android:icon="@drawable/perm_group_messages"
397 android:label="@string/permgrouplab_sms"
398 android:description="@string/permgroupdesc_sms"
399 android:priority="300" />
401 <!-- Allows an application to send SMS messages. -->
402 <permission android:name="android.permission.SEND_SMS"
403 android:permissionGroup="android.permission-group.SMS"
404 android:label="@string/permlab_sendSms"
405 android:description="@string/permdesc_sendSms"
406 android:permissionFlags="costsMoney"
407 android:protectionLevel="dangerous" />
409 <!-- Allows an application to receive SMS messages. -->
410 <permission android:name="android.permission.RECEIVE_SMS"
411 android:permissionGroup="android.permission-group.SMS"
412 android:label="@string/permlab_receiveSms"
413 android:description="@string/permdesc_receiveSms"
414 android:protectionLevel="dangerous"/>
416 <!-- Allows an application to read SMS messages. -->
417 <permission android:name="android.permission.READ_SMS"
418 android:permissionGroup="android.permission-group.SMS"
419 android:label="@string/permlab_readSms"
420 android:description="@string/permdesc_readSms"
421 android:protectionLevel="dangerous" />
423 <!-- Allows an application to receive WAP push messages. -->
424 <permission android:name="android.permission.RECEIVE_WAP_PUSH"
425 android:permissionGroup="android.permission-group.SMS"
426 android:label="@string/permlab_receiveWapPush"
427 android:description="@string/permdesc_receiveWapPush"
428 android:protectionLevel="dangerous" />
430 <!-- Allows an application to monitor incoming MMS messages. -->
431 <permission android:name="android.permission.RECEIVE_MMS"
432 android:permissionGroup="android.permission-group.SMS"
433 android:label="@string/permlab_receiveMms"
434 android:description="@string/permdesc_receiveMms"
435 android:protectionLevel="dangerous" />
437 <!-- Allows an application to read previously received cell broadcast
438 messages and to register a content observer to get notifications when
439 a cell broadcast has been received and added to the database. For
440 emergency alerts, the database is updated immediately after the
441 alert dialog and notification sound/vibration/speech are presented.
442 The "read" column is then updated after the user dismisses the alert.
443 This enables supplementary emergency assistance apps to start loading
444 additional emergency information (if Internet access is available)
445 when the alert is first received, and to delay presenting the info
446 to the user until after the initial alert dialog is dismissed.
447 @hide Pending API council approval -->
448 <permission android:name="android.permission.READ_CELL_BROADCASTS"
449 android:permissionGroup="android.permission-group.SMS"
450 android:label="@string/permlab_readCellBroadcasts"
451 android:description="@string/permdesc_readCellBroadcasts"
452 android:protectionLevel="dangerous" />
454 <!-- =============================================================== -->
455 <!-- Permissions for accessing social info -->
456 <!-- =============================================================== -->
459 <!-- Used for permissions that provide access to the user's social connections,
460 such as contacts, call logs, social stream, etc. This includes
461 both reading and writing of this data (which should generally be
462 expressed as two distinct permissions). -->
464 <permission-group android:name="android.permission-group.SOCIAL_INFO"
465 android:label="@string/permgrouplab_socialInfo"
466 android:icon="@drawable/perm_group_social_info"
467 android:description="@string/permgroupdesc_socialInfo"
468 android:permissionGroupFlags="personalInfo"
469 android:priority="1200" />
471 <!-- Allows an application to read from the user's social stream.
472 @deprecated This functionality will be unsupported in the future; cursors returned
473 will be empty. Please do not use. -->
474 <permission android:name="android.permission.READ_SOCIAL_STREAM"
475 android:permissionGroup="android.permission-group.SOCIAL_INFO"
476 android:protectionLevel="dangerous"
477 android:label="@string/permlab_readSocialStream"
478 android:description="@string/permdesc_readSocialStream" />
480 <!-- Allows an application to write (but not read) the user's
482 @deprecated This functionality will be unsupported in the future; cursors returned
483 will be empty. Please do not use. -->
484 <permission android:name="android.permission.WRITE_SOCIAL_STREAM"
485 android:permissionGroup="android.permission-group.SOCIAL_INFO"
486 android:protectionLevel="dangerous"
487 android:label="@string/permlab_writeSocialStream"
488 android:description="@string/permdesc_writeSocialStream" />
490 <!-- ====================================================================== -->
491 <!-- Permissions for accessing the device location -->
492 <!-- ====================================================================== -->
495 <!-- Used for permissions that allow accessing the device location. -->
496 <permission-group android:name="android.permission-group.LOCATION"
497 android:icon="@drawable/perm_group_location"
498 android:label="@string/permgrouplab_location"
499 android:description="@string/permgroupdesc_location"
500 android:priority="400" />
502 <!-- Allows an app to access precise location. -->
503 <permission android:name="android.permission.ACCESS_FINE_LOCATION"
504 android:permissionGroup="android.permission-group.LOCATION"
505 android:label="@string/permlab_accessFineLocation"
506 android:description="@string/permdesc_accessFineLocation"
507 android:protectionLevel="dangerous" />
509 <!-- Allows an app to access approximate location. -->
510 <permission android:name="android.permission.ACCESS_COARSE_LOCATION"
511 android:permissionGroup="android.permission-group.LOCATION"
512 android:label="@string/permlab_accessCoarseLocation"
513 android:description="@string/permdesc_accessCoarseLocation"
514 android:protectionLevel="dangerous" />
516 <!-- ====================================================================== -->
517 <!-- Permissions for accessing the device telephony -->
518 <!-- ====================================================================== -->
521 <!-- Used for permissions that are associated telephony features. -->
522 <permission-group android:name="android.permission-group.PHONE"
523 android:icon="@drawable/perm_group_phone_calls"
524 android:label="@string/permgrouplab_phone"
525 android:description="@string/permgroupdesc_phone"
526 android:priority="500" />
528 <!-- Allows read only access to phone state.
529 <p class="note"><strong>Note:</strong> If <em>both</em> your <a
530 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
531 minSdkVersion}</a> and <a
532 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
533 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
534 grants your app this permission. If you don't need this permission, be sure your <a
535 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
536 targetSdkVersion}</a> is 4 or higher. -->
537 <permission android:name="android.permission.READ_PHONE_STATE"
538 android:permissionGroup="android.permission-group.PHONE"
539 android:label="@string/permlab_readPhoneState"
540 android:description="@string/permdesc_readPhoneState"
541 android:protectionLevel="dangerous" />
543 <!-- Allows an application to initiate a phone call without going through
544 the Dialer user interface for the user to confirm the call. -->
545 <permission android:name="android.permission.CALL_PHONE"
546 android:permissionGroup="android.permission-group.PHONE"
547 android:permissionFlags="costsMoney"
548 android:label="@string/permlab_callPhone"
549 android:description="@string/permdesc_callPhone"
550 android:protectionLevel="dangerous" />
552 <!-- Allows an application to read the user's call log.
553 <p class="note"><strong>Note:</strong> If your app uses the
554 {@link #READ_CONTACTS} permission and <em>both</em> your <a
555 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
556 minSdkVersion}</a> and <a
557 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
558 targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
559 grants your app this permission. If you don't need this permission, be sure your <a
560 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
561 targetSdkVersion}</a> is 16 or higher.</p> -->
562 <permission android:name="android.permission.READ_CALL_LOG"
563 android:permissionGroup="android.permission-group.PHONE"
564 android:label="@string/permlab_readCallLog"
565 android:description="@string/permdesc_readCallLog"
566 android:protectionLevel="dangerous" />
568 <!-- Allows an application to write (but not read) the user's
570 <p class="note"><strong>Note:</strong> If your app uses the
571 {@link #WRITE_CONTACTS} permission and <em>both</em> your <a
572 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
573 minSdkVersion}</a> and <a
574 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
575 targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
576 grants your app this permission. If you don't need this permission, be sure your <a
577 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
578 targetSdkVersion}</a> is 16 or higher.</p> -->
579 <permission android:name="android.permission.WRITE_CALL_LOG"
580 android:permissionGroup="android.permission-group.PHONE"
581 android:label="@string/permlab_writeCallLog"
582 android:description="@string/permdesc_writeCallLog"
583 android:protectionLevel="dangerous" />
585 <!-- Allows an application to add voicemails into the system. -->
586 <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL"
587 android:permissionGroup="android.permission-group.PHONE"
588 android:label="@string/permlab_addVoicemail"
589 android:description="@string/permdesc_addVoicemail"
590 android:protectionLevel="dangerous" />
592 <!-- Allows an application to use SIP service. -->
593 <permission android:name="android.permission.USE_SIP"
594 android:permissionGroup="android.permission-group.PHONE"
595 android:description="@string/permdesc_use_sip"
596 android:label="@string/permlab_use_sip"
597 android:protectionLevel="dangerous"/>
599 <!-- Allows an application to see the number being dialed during an outgoing
600 call with the option to redirect the call to a different number or
601 abort the call altogether. -->
602 <permission android:name="android.permission.PROCESS_OUTGOING_CALLS"
603 android:permissionGroup="android.permission-group.PHONE"
604 android:label="@string/permlab_processOutgoingCalls"
605 android:description="@string/permdesc_processOutgoingCalls"
606 android:protectionLevel="dangerous" />
608 <!-- ====================================================================== -->
609 <!-- Permissions for accessing the device microphone -->
610 <!-- ====================================================================== -->
613 <!-- Used for permissions that are associated with accessing
614 microphone audio from the device. Note that phone calls also capture audio
615 but are in a separate (more visible) permission group. -->
616 <permission-group android:name="android.permission-group.MICROPHONE"
617 android:icon="@drawable/perm_group_microphone"
618 android:label="@string/permgrouplab_microphone"
619 android:description="@string/permgroupdesc_microphone"
620 android:priority="600" />
622 <!-- Allows an application to record audio. -->
623 <permission android:name="android.permission.RECORD_AUDIO"
624 android:permissionGroup="android.permission-group.MICROPHONE"
625 android:label="@string/permlab_recordAudio"
626 android:description="@string/permdesc_recordAudio"
627 android:protectionLevel="dangerous"/>
629 <!-- ====================================================================== -->
630 <!-- Permissions for accessing the device camera -->
631 <!-- ====================================================================== -->
634 <!-- Used for permissions that are associated with accessing
635 camera or capturing images/video from the device. -->
636 <permission-group android:name="android.permission-group.CAMERA"
637 android:icon="@drawable/perm_group_camera"
638 android:label="@string/permgrouplab_camera"
639 android:description="@string/permgroupdesc_camera"
640 android:priority="700" />
642 <!-- Required to be able to access the camera device.
643 <p>This will automatically enforce the <a
644 href="{@docRoot}guide/topics/manifest/uses-feature-element.html">{@code
645 <uses-feature>}</a> manifest element for <em>all</em> camera features.
646 If you do not require all camera features or can properly operate if a camera
647 is not available, then you must modify your manifest as appropriate in order to
648 install on devices that don't support all camera features.</p> -->
649 <permission android:name="android.permission.CAMERA"
650 android:permissionGroup="android.permission-group.CAMERA"
651 android:label="@string/permlab_camera"
652 android:description="@string/permdesc_camera"
653 android:protectionLevel="dangerous" />
656 <!-- ====================================================================== -->
657 <!-- Permissions for accessing the device sensors -->
658 <!-- ====================================================================== -->
661 <!-- Used for permissions that are associated with accessing
662 camera or capturing images/video from the device. -->
663 <permission-group android:name="android.permission-group.SENSORS"
664 android:label="@string/permgrouplab_sensors"
665 android:description="@string/permgroupdesc_sensors"
666 android:priority="800" />
668 <!-- Allows an application to access data from sensors that the user uses to
669 measure what is happening inside his/her body, such as heart rate. -->
670 <permission android:name="android.permission.BODY_SENSORS"
671 android:permissionGroup="android.permission-group.SENSORS"
672 android:label="@string/permlab_bodySensors"
673 android:description="@string/permdesc_bodySensors"
674 android:protectionLevel="dangerous" />
676 <!-- Allows an app to use fingerprint hardware. -->
677 <permission android:name="android.permission.USE_FINGERPRINT"
678 android:label="@string/permlab_useFingerprint"
679 android:description="@string/permdesc_useFingerprint"
680 android:protectionLevel="dangerous" />
682 <!-- ====================================================================== -->
683 <!-- INSTALLTIME PERMISSIONS -->
684 <!-- ====================================================================== -->
686 <!-- ================================== -->
687 <!-- Permissions for accessing messages -->
688 <!-- ================================== -->
691 <!-- @SystemApi Allows an application (Phone) to send a request to other applications
692 to handle the respond-via-message action during incoming calls.
693 <p>Not for use by third-party applications. -->
694 <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE"
695 android:protectionLevel="signature|system" />
697 <!-- Allows an application to filter carrier specific sms.
699 <permission android:name="android.permission.CARRIER_FILTER_SMS"
700 android:protectionLevel="signature|system" />
702 <!-- @SystemApi Allows an application to receive emergency cell broadcast messages,
703 to record or display them to the user.
704 <p>Not for use by third-party applications.
705 @hide Pending API council approval -->
706 <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST"
707 android:protectionLevel="signature|system" />
709 <!-- Allows an application to monitor incoming Bluetooth MAP messages, to record
710 or perform processing on them. -->
712 <permission android:name="android.permission.RECEIVE_BLUETOOTH_MAP"
713 android:protectionLevel="signature|system" />
715 <!-- @SystemApi @hide Allows an application to execute contacts directory search.
716 This should only be used by ContactsProvider.
717 <p>Not for use by third-party applications. -->
718 <permission android:name="android.permission.BIND_DIRECTORY_SEARCH"
719 android:protectionLevel="signature|system" />
721 <!-- =============================================================== -->
722 <!-- Permissions for accessing the user dictionary-->
723 <!-- =============================================================== -->
726 <!-- Used for permissions that provide access to the user
727 calendar to create / view events.-->
728 <permission-group android:name="android.permission-group.USER_DICTIONARY"
729 android:label="@string/permgrouplab_dictionary"
730 android:icon="@drawable/perm_group_user_dictionary"
731 android:description="@string/permgroupdesc_dictionary"
732 android:permissionGroupFlags="personalInfo"
733 android:priority="1100" />
735 <!-- Allows an application to read the user dictionary. This should
736 really only be required by an IME, or a dictionary editor like
737 the Settings app. -->
738 <permission android:name="android.permission.READ_USER_DICTIONARY"
739 android:permissionGroup="android.permission-group.USER_DICTIONARY"
740 android:label="@string/permlab_readDictionary"
741 android:description="@string/permdesc_readDictionary"
742 android:protectionLevel="dangerous"/>
744 <!-- Allows an application to write to the user dictionary. -->
745 <permission android:name="android.permission.WRITE_USER_DICTIONARY"
746 android:permissionGroup="android.permission-group.USER_DICTIONARY"
747 android:label="@string/permlab_writeDictionary"
748 android:description="@string/permdesc_writeDictionary"
749 android:protectionLevel="normal"/>
751 <!-- =============================================================== -->
752 <!-- Permissions for accessing the user bookmarks -->
753 <!-- =============================================================== -->
756 <!-- Used for permissions that provide access to the user
757 bookmarks and browser history.-->
758 <permission-group android:name="android.permission-group.BOOKMARKS"
759 android:label="@string/permgrouplab_bookmarks"
760 android:icon="@drawable/perm_group_bookmarks"
761 android:description="@string/permgroupdesc_bookmarks"
762 android:permissionGroupFlags="personalInfo"
763 android:priority="1200" />
765 <!-- Allows an application to read (but not write) the user's
766 browsing history and bookmarks. -->
767 <permission android:name="com.android.browser.permission.READ_HISTORY_BOOKMARKS"
768 android:permissionGroup="android.permission-group.BOOKMARKS"
769 android:label="@string/permlab_readHistoryBookmarks"
770 android:description="@string/permdesc_readHistoryBookmarks"
771 android:protectionLevel="dangerous" />
773 <!-- Allows an application to write (but not read) the user's
774 browsing history and bookmarks. -->
775 <permission android:name="com.android.browser.permission.WRITE_HISTORY_BOOKMARKS"
776 android:permissionGroup="android.permission-group.BOOKMARKS"
777 android:label="@string/permlab_writeHistoryBookmarks"
778 android:description="@string/permdesc_writeHistoryBookmarks"
779 android:protectionLevel="dangerous" />
781 <!-- =============================================================== -->
782 <!-- Permissions for setting the device alarm -->
783 <!-- =============================================================== -->
786 <!-- Allows an application to broadcast an Intent to set an alarm for the user. -->
787 <permission android:name="com.android.alarm.permission.SET_ALARM"
788 android:label="@string/permlab_setAlarm"
789 android:description="@string/permdesc_setAlarm"
790 android:protectionLevel="normal" />
792 <!-- =============================================================== -->
793 <!-- Permissions for accessing the user voicemail -->
794 <!-- =============================================================== -->
797 <!-- Allows an application to modify and remove existing voicemails in the system -->
798 <permission android:name="com.android.voicemail.permission.WRITE_VOICEMAIL"
799 android:protectionLevel="system|signature" />
801 <!-- Allows an application to read voicemails in the system. -->
802 <permission android:name="com.android.voicemail.permission.READ_VOICEMAIL"
803 android:protectionLevel="system|signature" />
805 <!-- ======================================= -->
806 <!-- Permissions for accessing location info -->
807 <!-- ======================================= -->
810 <!-- Allows an application to access extra location provider commands -->
811 <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS"
812 android:label="@string/permlab_accessLocationExtraCommands"
813 android:description="@string/permdesc_accessLocationExtraCommands"
814 android:protectionLevel="normal" />
816 <!-- @SystemApi Allows an application to install a location provider into the Location Manager.
817 <p>Not for use by third-party applications. -->
818 <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER"
819 android:protectionLevel="signature|system" />
821 <!-- @SystemApi @hide Allows HDMI-CEC service to access device and configuration files.
822 This should only be used by HDMI-CEC service.
824 <permission android:name="android.permission.HDMI_CEC"
825 android:protectionLevel="signatureOrSystem" />
827 <!-- @SystemApi Allows an application to use location features in hardware,
828 such as the geofencing api.
829 <p>Not for use by third-party applications. -->
830 <permission android:name="android.permission.LOCATION_HARDWARE"
831 android:protectionLevel="signature|system" />
832 <uses-permission android:name="android.permission.LOCATION_HARDWARE"/>
834 <!-- Allows an application to create mock location providers for testing. -->
835 <permission android:name="android.permission.ACCESS_MOCK_LOCATION"
836 android:label="@string/permlab_accessMockLocation"
837 android:description="@string/permdesc_accessMockLocation"
838 android:protectionLevel="normal" />
840 <!-- ======================================= -->
841 <!-- Permissions for accessing networks -->
842 <!-- ======================================= -->
845 <!-- Allows applications to open network sockets. -->
846 <permission android:name="android.permission.INTERNET"
847 android:description="@string/permdesc_createNetworkSockets"
848 android:label="@string/permlab_createNetworkSockets"
849 android:protectionLevel="dangerous" />
851 <!-- Allows applications to access information about networks -->
852 <permission android:name="android.permission.ACCESS_NETWORK_STATE"
853 android:description="@string/permdesc_accessNetworkState"
854 android:label="@string/permlab_accessNetworkState"
855 android:protectionLevel="normal" />
857 <!-- Allows applications to access information about Wi-Fi networks -->
858 <permission android:name="android.permission.ACCESS_WIFI_STATE"
859 android:description="@string/permdesc_accessWifiState"
860 android:label="@string/permlab_accessWifiState"
861 android:protectionLevel="normal" />
863 <!-- Allows applications to change Wi-Fi connectivity state -->
864 <permission android:name="android.permission.CHANGE_WIFI_STATE"
865 android:description="@string/permdesc_changeWifiState"
866 android:label="@string/permlab_changeWifiState"
867 android:protectionLevel="dangerous" />
869 <!-- @SystemApi @hide Allows applications to read Wi-Fi credential.
870 <p>Not for use by third-party applications. -->
871 <permission android:name="android.permission.READ_WIFI_CREDENTIAL"
872 android:protectionLevel="signature|system" />
874 <!-- @SystemApi @hide Allow system apps to receive broadcast
875 when a wifi network credential is changed.
876 <p>Not for use by third-party applications. -->
877 <permission android:name="android.permission.RECEIVE_WIFI_CREDENTIAL_CHANGE"
878 android:protectionLevel="signature|system" />
880 <!-- @SystemApi @hide Allows an application to modify any wifi configuration, even if created
881 by another application. Once reconfigured the original creator cannot make any further
883 <p>Not for use by third-party applications. -->
884 <permission android:name="android.permission.OVERRIDE_WIFI_CONFIG"
885 android:protectionLevel="signature|system" />
888 <permission android:name="android.permission.ACCESS_WIMAX_STATE"
889 android:description="@string/permdesc_accessWimaxState"
890 android:label="@string/permlab_accessWimaxState"
891 android:protectionLevel="normal" />
894 <permission android:name="android.permission.CHANGE_WIMAX_STATE"
895 android:description="@string/permdesc_changeWimaxState"
896 android:label="@string/permlab_changeWimaxState"
897 android:protectionLevel="dangerous" />
899 <!-- Allows applications to act as network scorers. @hide @SystemApi-->
900 <permission android:name="android.permission.SCORE_NETWORKS"
901 android:protectionLevel="signature|system" />
903 <!-- ======================================= -->
904 <!-- Permissions for short range, peripheral networks -->
905 <!-- ======================================= -->
908 <!-- Allows applications to connect to paired bluetooth devices -->
909 <permission android:name="android.permission.BLUETOOTH"
910 android:description="@string/permdesc_bluetooth"
911 android:label="@string/permlab_bluetooth"
912 android:protectionLevel="dangerous" />
914 <!-- Allows applications to discover and pair bluetooth devices -->
915 <permission android:name="android.permission.BLUETOOTH_ADMIN"
916 android:description="@string/permdesc_bluetoothAdmin"
917 android:label="@string/permlab_bluetoothAdmin"
918 android:protectionLevel="dangerous" />
920 <!-- @SystemApi Allows applications to pair bluetooth devices without user interaction, and to
921 allow or disallow phonebook access or message access.
922 This is not available to third party applications. -->
923 <permission android:name="android.permission.BLUETOOTH_PRIVILEGED"
924 android:protectionLevel="system|signature" />
926 <!-- Control access to email providers exclusively for Bluetooth
929 <permission android:name="android.permission.BLUETOOTH_MAP"
930 android:protectionLevel="signature" />
932 <!-- Allows bluetooth stack to access files
933 @hide This should only be used by Bluetooth apk.
935 <permission android:name="android.permission.BLUETOOTH_STACK"
936 android:protectionLevel="signature" />
938 <!-- Allows applications to perform I/O operations over NFC -->
939 <permission android:name="android.permission.NFC"
940 android:description="@string/permdesc_nfc"
941 android:label="@string/permlab_nfc"
942 android:protectionLevel="dangerous" />
944 <!-- @SystemApi Allows an internal user to use privileged ConnectivityManager APIs.
946 <permission android:name="android.permission.CONNECTIVITY_INTERNAL"
947 android:protectionLevel="signature|system" />
951 <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE"
952 android:protectionLevel="signature|system" />
954 <!-- @SystemApi Allows access to the loop radio (Android@Home mesh network) device.
956 <permission android:name="android.permission.LOOP_RADIO"
957 android:protectionLevel="signature|system" />
959 <!-- Allows sending and receiving handover transfer status from Wifi and Bluetooth
961 <permission android:name="android.permission.NFC_HANDOVER_STATUS"
962 android:protectionLevel="signature|system" />
964 <!-- ================================== -->
965 <!-- Permissions for accessing accounts -->
966 <!-- ================================== -->
969 <!-- Permissions for direct access to the accounts managed
970 by the Account Manager. -->
971 <permission-group android:name="android.permission-group.ACCOUNTS"
972 android:label="@string/permgrouplab_accounts"
973 android:icon="@drawable/perm_group_accounts"
974 android:description="@string/permgroupdesc_accounts"
975 android:permissionGroupFlags="personalInfo"
976 android:priority="1000" />
978 <!-- Allows access to the list of accounts in the Accounts Service -->
979 <permission android:name="android.permission.GET_ACCOUNTS"
980 android:permissionGroup="android.permission-group.ACCOUNTS"
981 android:protectionLevel="normal"
982 android:description="@string/permdesc_getAccounts"
983 android:label="@string/permlab_getAccounts" />
985 <!-- Allows an application to act as an AccountAuthenticator for
986 the AccountManager -->
987 <permission android:name="android.permission.AUTHENTICATE_ACCOUNTS"
988 android:permissionGroup="android.permission-group.ACCOUNTS"
989 android:protectionLevel="dangerous"
990 android:label="@string/permlab_authenticateAccounts"
991 android:description="@string/permdesc_authenticateAccounts" />
993 <!-- Allows an application to request authtokens from the AccountManager -->
994 <permission android:name="android.permission.USE_CREDENTIALS"
995 android:permissionGroup="android.permission-group.ACCOUNTS"
996 android:protectionLevel="dangerous"
997 android:label="@string/permlab_useCredentials"
998 android:description="@string/permdesc_useCredentials" />
1000 <!-- Allows an application to manage the list of accounts in the AccountManager -->
1001 <permission android:name="android.permission.MANAGE_ACCOUNTS"
1002 android:permissionGroup="android.permission-group.ACCOUNTS"
1003 android:protectionLevel="dangerous"
1004 android:label="@string/permlab_manageAccounts"
1005 android:description="@string/permdesc_manageAccounts" />
1007 <!-- @SystemApi Allows applications to call into AccountAuthenticators.
1008 <p>Not for use by third-party applications. -->
1009 <permission android:name="android.permission.ACCOUNT_MANAGER"
1010 android:permissionGroup="android.permission-group.ACCOUNTS"
1011 android:protectionLevel="signature" />
1013 <!-- ================================== -->
1014 <!-- Permissions for accessing hardware that may effect battery life-->
1015 <!-- ================================== -->
1018 <!-- Allows applications to enter Wi-Fi Multicast mode -->
1019 <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE"
1020 android:description="@string/permdesc_changeWifiMulticastState"
1021 android:label="@string/permlab_changeWifiMulticastState"
1022 android:protectionLevel="dangerous" />
1024 <!-- Allows access to the vibrator -->
1025 <permission android:name="android.permission.VIBRATE"
1026 android:label="@string/permlab_vibrate"
1027 android:description="@string/permdesc_vibrate"
1028 android:protectionLevel="normal" />
1030 <!-- Allows access to the flashlight -->
1031 <permission android:name="android.permission.FLASHLIGHT"
1032 android:label="@string/permlab_flashlight"
1033 android:description="@string/permdesc_flashlight"
1034 android:protectionLevel="normal" />
1036 <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen
1038 <permission android:name="android.permission.WAKE_LOCK"
1039 android:label="@string/permlab_wakeLock"
1040 android:description="@string/permdesc_wakeLock"
1041 android:protectionLevel="normal" />
1043 <!-- Allows using the device's IR transmitter, if available -->
1044 <permission android:name="android.permission.TRANSMIT_IR"
1045 android:label="@string/permlab_transmitIr"
1046 android:description="@string/permdesc_transmitIr"
1047 android:protectionLevel="normal" />
1049 <!-- ==================================================== -->
1050 <!-- Permissions related to changing audio settings -->
1051 <!-- ==================================================== -->
1054 <!-- Allows an application to modify global audio settings -->
1055 <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS"
1056 android:label="@string/permlab_modifyAudioSettings"
1057 android:description="@string/permdesc_modifyAudioSettings"
1058 android:protectionLevel="normal" />
1060 <!-- ================================== -->
1061 <!-- Permissions for accessing hardware -->
1062 <!-- ================================== -->
1065 <!-- @SystemApi Allows an application to manage preferences and permissions for USB devices
1067 <permission android:name="android.permission.MANAGE_USB"
1068 android:protectionLevel="signature|system" />
1070 <!-- @SystemApi Allows an application to access the MTP USB kernel driver.
1071 For use only by the device side MTP implementation.
1073 <permission android:name="android.permission.ACCESS_MTP"
1074 android:protectionLevel="signature|system" />
1076 <!-- Allows access to hardware peripherals. Intended only for hardware testing.
1077 <p>Not for use by third-party applications. -->
1078 <permission android:name="android.permission.HARDWARE_TEST"
1079 android:protectionLevel="signature" />
1081 <!-- @SystemApi Allows access to FM
1082 @hide This is not a third-party API (intended for system apps).-->
1083 <permission android:name="android.permission.ACCESS_FM_RADIO"
1084 android:protectionLevel="signature|system" />
1086 <!-- Allows access to configure network interfaces, configure/use IPSec, etc.
1088 <permission android:name="android.permission.NET_ADMIN"
1089 android:protectionLevel="signature" />
1091 <!-- Allows registration for remote audio playback. @hide -->
1092 <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK"
1093 android:protectionLevel="signature" />
1095 <!-- @SystemApi Allows TvInputService to access underlying TV input hardware such as
1096 built-in tuners and HDMI-in's.
1097 @hide This should only be used by OEM's TvInputService's.
1099 <permission android:name="android.permission.TV_INPUT_HARDWARE"
1100 android:protectionLevel="signatureOrSystem" />
1102 <!-- @SystemApi Allows to capture a frame of TV input hardware such as
1103 built-in tuners and HDMI-in's.
1104 @hide <p>Not for use by third-party applications.
1106 <permission android:name="android.permission.CAPTURE_TV_INPUT"
1107 android:protectionLevel="signatureOrSystem" />
1109 <!-- @hide Allows enabling/disabling OEM unlock
1110 <p>Not for use by third-party applications. -->
1111 <permission android:name="android.permission.OEM_UNLOCK_STATE"
1112 android:protectionLevel="signature" />
1114 <!-- @hide Allows querying state of PersistentDataBlock
1115 <p>Not for use by third-party applications. -->
1116 <permission android:name="android.permission.ACCESS_PDB_STATE"
1117 android:protectionLevel="signature" />
1119 <!-- @hide Allows system update service to notify device owner about pending updates.
1120 <p>Not for use by third-party applications. -->
1121 <permission android:name="android.permission.NOTIFY_PENDING_SYSTEM_UPDATE"
1122 android:protectionLevel="signatureOrSystem" />
1124 <!-- =========================================== -->
1125 <!-- Permissions associated with camera and image capture -->
1126 <!-- =========================================== -->
1129 <!-- @SystemApi Allows disabling the transmit-indicator LED that is normally on when
1130 a camera is in use by an application.
1132 <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED"
1133 android:protectionLevel="signature|system" />
1135 <!-- Allows sending the camera service notifications about system-wide events.
1137 <permission android:name="android.permission.CAMERA_SEND_SYSTEM_EVENTS"
1138 android:protectionLevel="signature|system" />
1140 <!-- =========================================== -->
1141 <!-- Permissions associated with telephony state -->
1142 <!-- =========================================== -->
1145 <!-- @SystemApi Allows modification of the telephony state - power on, mmi, etc.
1146 Does not include placing calls.
1147 <p>Not for use by third-party applications. -->
1148 <permission android:name="android.permission.MODIFY_PHONE_STATE"
1149 android:protectionLevel="signature|system" />
1151 <!-- Allows read only access to precise phone state.
1152 @hide Pending API council approval -->
1153 <permission android:name="android.permission.READ_PRECISE_PHONE_STATE"
1154 android:protectionLevel="signature|system" />
1156 <!-- @SystemApi Allows read access to privileged phone state.
1157 @hide Used internally. -->
1158 <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE"
1159 android:protectionLevel="signature|system" />
1161 <!-- @SystemApi Protects the ability to register any PhoneAccount with
1162 PhoneAccount#CAPABILITY_SIM_SUBSCRIPTION. This capability indicates that the PhoneAccount
1163 corresponds to a device SIM.
1165 <permission android:name="android.permission.REGISTER_SIM_SUBSCRIPTION"
1166 android:protectionLevel="system|signature" />
1168 <!-- @SystemApi Protects the ability to register any PhoneAccount with
1169 PhoneAccount#CAPABILITY_CALL_PROVIDER.
1171 <permission android:name="android.permission.REGISTER_CALL_PROVIDER"
1172 android:protectionLevel="system|signature" />
1174 <!-- @SystemApi Protects the ability to register any PhoneAccount with
1175 PhoneAccount#CAPABILITY_CONNECTION_MANAGER
1177 <permission android:name="android.permission.REGISTER_CONNECTION_MANAGER"
1178 android:protectionLevel="system|signature" />
1180 <!-- @SystemApi Allows an application to bind to InCallService implementations.
1182 <permission android:name="android.permission.BIND_INCALL_SERVICE"
1183 android:protectionLevel="system|signature" />
1185 <!-- @SystemApi Allows an application to bind to ConnectionService implementations.
1187 <permission android:name="android.permission.BIND_CONNECTION_SERVICE"
1188 android:protectionLevel="system|signature" />
1190 <!-- @SystemApi Allows an application to control the in-call experience.
1192 <permission android:name="android.permission.CONTROL_INCALL_EXPERIENCE"
1193 android:protectionLevel="system|signature" />
1195 <!-- ================================== -->
1196 <!-- Permissions for sdcard interaction -->
1197 <!-- ================================== -->
1200 <!-- Allows an application to read from external storage.
1201 <p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly
1202 granted this permission.</p>
1203 <p>This permission is enforced starting in API level 19. Before API level 19, this
1204 permission is not enforced and all apps still have access to read from external storage.
1205 You can test your app with the permission enforced by enabling <em>Protect USB
1206 storage</em> under Developer options in the Settings app on a device running Android 4.1 or
1208 <p>Also starting in API level 19, this permission is <em>not</em> required to
1209 read/write files in your application-specific directories returned by
1210 {@link android.content.Context#getExternalFilesDir} and
1211 {@link android.content.Context#getExternalCacheDir}.
1212 <p class="note"><strong>Note:</strong> If <em>both</em> your <a
1213 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
1214 minSdkVersion}</a> and <a
1215 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1216 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
1217 grants your app this permission. If you don't need this permission, be sure your <a
1218 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1219 targetSdkVersion}</a> is 4 or higher.-->
1220 <permission android:name="android.permission.READ_EXTERNAL_STORAGE"
1221 android:label="@string/permlab_sdcardRead"
1222 android:description="@string/permdesc_sdcardRead"
1223 android:protectionLevel="normal" />
1225 <!-- Allows an application to write to external storage.
1226 <p class="note"><strong>Note:</strong> If <em>both</em> your <a
1227 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
1228 minSdkVersion}</a> and <a
1229 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1230 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
1231 grants your app this permission. If you don't need this permission, be sure your <a
1232 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1233 targetSdkVersion}</a> is 4 or higher.
1234 <p>Starting in API level 19, this permission is <em>not</em> required to
1235 read/write files in your application-specific directories returned by
1236 {@link android.content.Context#getExternalFilesDir} and
1237 {@link android.content.Context#getExternalCacheDir}. -->
1238 <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE"
1239 android:label="@string/permlab_sdcardWrite"
1240 android:description="@string/permdesc_sdcardWrite"
1241 android:protectionLevel="normal" />
1243 <!-- @SystemApi Allows an application to write to internal media storage
1245 <permission android:name="android.permission.WRITE_MEDIA_STORAGE"
1246 android:protectionLevel="signature|system" />
1248 <!-- Allows an application to manage access to documents, usually as part
1249 of a document picker. -->
1250 <permission android:name="android.permission.MANAGE_DOCUMENTS"
1251 android:protectionLevel="signature" />
1253 <!-- ================================== -->
1254 <!-- Permissions for screenlock -->
1255 <!-- ================================== -->
1258 <!-- Allows applications to disable the keyguard if it is not secure. -->
1259 <permission android:name="android.permission.DISABLE_KEYGUARD"
1260 android:description="@string/permdesc_disableKeyguard"
1261 android:label="@string/permlab_disableKeyguard"
1262 android:protectionLevel="dangerous" />
1264 <!-- ================================== -->
1265 <!-- Permissions to access other installed applications -->
1266 <!-- ================================== -->
1269 <!-- @deprecated No longer enforced. -->
1270 <permission android:name="android.permission.GET_TASKS"
1271 android:label="@string/permlab_getTasks"
1272 android:description="@string/permdesc_getTasks"
1273 android:protectionLevel="normal" />
1275 <!-- New version of GET_TASKS that apps can request, since GET_TASKS doesn't really
1276 give access to task information. We need this new one because there are
1277 many existing apps that use add libraries and such that have validation
1278 code to ensure the app has requested the GET_TASKS permission by seeing
1279 if it has been granted the permission... if it hasn't, it kills the app
1280 with a message about being upset. So we need to have it continue to look
1281 like the app is getting that permission, even though it will never be
1282 checked, and new privileged apps can now request this one for real access.
1285 <permission android:name="android.permission.REAL_GET_TASKS"
1286 android:protectionLevel="signature|system" />
1288 <!-- Allows an application to start a task from a ActivityManager#RecentTaskInfo.
1290 <permission android:name="android.permission.START_TASKS_FROM_RECENTS"
1291 android:protectionLevel="signature|system" />
1293 <!-- @SystemApi @hide Allows an application to call APIs that allow it to do interactions
1294 across the users on the device, using singleton services and
1295 user-targeted broadcasts. This permission is not available to
1296 third party applications. -->
1297 <permission android:name="android.permission.INTERACT_ACROSS_USERS"
1298 android:protectionLevel="signature|system|development" />
1300 <!-- @hide Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS}
1301 that removes restrictions on where broadcasts can be sent and allows other
1302 types of interactions. -->
1303 <permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL"
1304 android:protectionLevel="signature" />
1306 <!-- @SystemApi @hide Allows an application to call APIs that allow it to query and manage
1307 users on the device. This permission is not available to
1308 third party applications. -->
1309 <permission android:name="android.permission.MANAGE_USERS"
1310 android:protectionLevel="signature|system" />
1312 <!-- @hide Allows an application to set the profile owners and the device owner.
1313 This permission is not available to third party applications.-->
1314 <permission android:name="android.permission.MANAGE_PROFILE_AND_DEVICE_OWNERS"
1315 android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1316 android:protectionLevel="signature"
1317 android:label="@string/permlab_manageProfileAndDeviceOwners"
1318 android:description="@string/permdesc_manageProfileAndDeviceOwners" />
1320 <!-- Allows an application to get full detailed information about
1321 recently running tasks, with full fidelity to the real state.
1323 <permission android:name="android.permission.GET_DETAILED_TASKS"
1324 android:protectionLevel="signature" />
1326 <!-- Allows an application to change the Z-order of tasks -->
1327 <permission android:name="android.permission.REORDER_TASKS"
1328 android:label="@string/permlab_reorderTasks"
1329 android:description="@string/permdesc_reorderTasks"
1330 android:protectionLevel="normal" />
1332 <!-- @hide Allows an application to change to remove/kill tasks -->
1333 <permission android:name="android.permission.REMOVE_TASKS"
1334 android:protectionLevel="signature" />
1336 <!-- @SystemApi @hide Allows an application to create/manage/remove stacks -->
1337 <permission android:name="android.permission.MANAGE_ACTIVITY_STACKS"
1338 android:protectionLevel="signature|system" />
1340 <!-- Allows an application to start any activity, regardless of permission
1341 protection or exported state.
1343 <permission android:name="android.permission.START_ANY_ACTIVITY"
1344 android:protectionLevel="signature" />
1346 <!-- @deprecated The {@link android.app.ActivityManager#restartPackage}
1347 API is no longer supported. -->
1348 <permission android:name="android.permission.RESTART_PACKAGES"
1349 android:label="@string/permlab_killBackgroundProcesses"
1350 android:description="@string/permdesc_killBackgroundProcesses"
1351 android:protectionLevel="normal" />
1353 <!-- Allows an application to call
1354 {@link android.app.ActivityManager#killBackgroundProcesses}. -->
1355 <permission android:name="android.permission.KILL_BACKGROUND_PROCESSES"
1356 android:label="@string/permlab_killBackgroundProcesses"
1357 android:description="@string/permdesc_killBackgroundProcesses"
1358 android:protectionLevel="normal" />
1360 <!-- ================================== -->
1361 <!-- Permissions affecting the display of other applications -->
1362 <!-- ================================== -->
1365 <!-- Allows an application to open windows using the type
1366 {@link android.view.WindowManager.LayoutParams#TYPE_SYSTEM_ALERT},
1367 shown on top of all other applications. Very few applications
1368 should use this permission; these windows are intended for
1369 system-level interaction with the user. -->
1370 <permission android:name="android.permission.SYSTEM_ALERT_WINDOW"
1371 android:label="@string/permlab_systemAlertWindow"
1372 android:description="@string/permdesc_systemAlertWindow"
1373 android:protectionLevel="dangerous" />
1375 <!-- ================================== -->
1376 <!-- Permissions affecting the system wallpaper -->
1377 <!-- ================================== -->
1380 <!-- Allows applications to set the wallpaper -->
1381 <permission android:name="android.permission.SET_WALLPAPER"
1382 android:label="@string/permlab_setWallpaper"
1383 android:description="@string/permdesc_setWallpaper"
1384 android:protectionLevel="normal" />
1386 <!-- Allows applications to set the wallpaper hints -->
1387 <permission android:name="android.permission.SET_WALLPAPER_HINTS"
1388 android:label="@string/permlab_setWallpaperHints"
1389 android:description="@string/permdesc_setWallpaperHints"
1390 android:protectionLevel="normal" />
1392 <!-- ============================================ -->
1393 <!-- Permissions for changing the system clock -->
1394 <!-- ============================================ -->
1397 <!-- @SystemApi Allows applications to set the system time.
1398 <p>Not for use by third-party applications. -->
1399 <permission android:name="android.permission.SET_TIME"
1400 android:protectionLevel="signature|system" />
1402 <!-- Allows applications to set the system time zone -->
1403 <permission android:name="android.permission.SET_TIME_ZONE"
1404 android:label="@string/permlab_setTimeZone"
1405 android:description="@string/permdesc_setTimeZone"
1406 android:protectionLevel="normal" />
1408 <!-- ==================================================== -->
1409 <!-- Permissions related to changing status bar -->
1410 <!-- ==================================================== -->
1413 <!-- Allows an application to expand or collapse the status bar. -->
1414 <permission android:name="android.permission.EXPAND_STATUS_BAR"
1415 android:label="@string/permlab_expandStatusBar"
1416 android:description="@string/permdesc_expandStatusBar"
1417 android:protectionLevel="normal" />
1419 <!-- ============================================================== -->
1420 <!-- Permissions related to adding/removing shortcuts from Launcher -->
1421 <!-- ============================================================== -->
1424 <!-- Allows an application to install a shortcut in Launcher -->
1425 <permission android:name="com.android.launcher.permission.INSTALL_SHORTCUT"
1426 android:label="@string/permlab_install_shortcut"
1427 android:description="@string/permdesc_install_shortcut"
1428 android:protectionLevel="dangerous"/>
1430 <!-- Allows an application to uninstall a shortcut in Launcher -->
1431 <permission android:name="com.android.launcher.permission.UNINSTALL_SHORTCUT"
1432 android:label="@string/permlab_uninstall_shortcut"
1433 android:description="@string/permdesc_uninstall_shortcut"
1434 android:protectionLevel="dangerous"/>
1436 <!-- ==================================================== -->
1437 <!-- Permissions related to accessing sync settings -->
1438 <!-- ==================================================== -->
1441 <!-- Allows applications to read the sync settings -->
1442 <permission android:name="android.permission.READ_SYNC_SETTINGS"
1443 android:description="@string/permdesc_readSyncSettings"
1444 android:label="@string/permlab_readSyncSettings"
1445 android:protectionLevel="normal" />
1447 <!-- Allows applications to write the sync settings -->
1448 <permission android:name="android.permission.WRITE_SYNC_SETTINGS"
1449 android:description="@string/permdesc_writeSyncSettings"
1450 android:label="@string/permlab_writeSyncSettings"
1451 android:protectionLevel="normal" />
1453 <!-- Allows applications to read the sync stats -->
1454 <permission android:name="android.permission.READ_SYNC_STATS"
1455 android:description="@string/permdesc_readSyncStats"
1456 android:label="@string/permlab_readSyncStats"
1457 android:protectionLevel="normal" />
1460 <!-- ============================================ -->
1461 <!-- Permissions for low-level system interaction -->
1462 <!-- ============================================ -->
1465 <!-- @SystemApi @hide Change the screen compatibility mode of applications -->
1466 <permission android:name="android.permission.SET_SCREEN_COMPATIBILITY"
1467 android:protectionLevel="signature" />
1469 <!-- Allows an application to access all multi-user external storage @hide -->
1470 <permission android:name="android.permission.ACCESS_ALL_EXTERNAL_STORAGE"
1471 android:protectionLevel="signature" />
1473 <!-- @SystemApi Allows an application to modify the current configuration, such
1475 <permission android:name="android.permission.CHANGE_CONFIGURATION"
1476 android:protectionLevel="signature|system|development" />
1478 <!-- Allows an application to read or write the system settings. -->
1479 <permission android:name="android.permission.WRITE_SETTINGS"
1480 android:label="@string/permlab_writeSettings"
1481 android:description="@string/permdesc_writeSettings"
1482 android:protectionLevel="normal" />
1484 <!-- @SystemApi Allows an application to modify the Google service map.
1485 <p>Not for use by third-party applications. -->
1486 <permission android:name="android.permission.WRITE_GSERVICES"
1487 android:protectionLevel="signature|system" />
1489 <!-- @SystemApi Allows an application to call
1490 {@link android.app.ActivityManager#forceStopPackage}.
1492 <permission android:name="android.permission.FORCE_STOP_PACKAGES"
1493 android:protectionLevel="signature|system" />
1495 <!-- @SystemApi @hide Allows an application to retrieve the content of the active window
1496 An active window is the window that has fired an accessibility event. -->
1497 <permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT"
1498 android:protectionLevel="signature|system" />
1500 <!-- @SystemApi Modify the global animation scaling factor.
1501 <p>Not for use by third-party applications. -->
1502 <permission android:name="android.permission.SET_ANIMATION_SCALE"
1503 android:protectionLevel="signature|system|development" />
1505 <!-- @deprecated This functionality will be removed in the future; please do
1506 not use. Allow an application to make its activities persistent. -->
1507 <permission android:name="android.permission.PERSISTENT_ACTIVITY"
1508 android:label="@string/permlab_persistentActivity"
1509 android:description="@string/permdesc_persistentActivity"
1510 android:protectionLevel="normal" />
1512 <!-- Allows an application to find out the space used by any package. -->
1513 <permission android:name="android.permission.GET_PACKAGE_SIZE"
1514 android:label="@string/permlab_getPackageSize"
1515 android:description="@string/permdesc_getPackageSize"
1516 android:protectionLevel="normal" />
1518 <!-- @deprecated No longer useful, see
1519 {@link android.content.pm.PackageManager#addPackageToPreferred}
1521 <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS"
1522 android:protectionLevel="signature" />
1524 <!-- Allows an application to receive the
1525 {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is
1526 broadcast after the system finishes booting. If you don't
1527 request this permission, you will not receive the broadcast at
1528 that time. Though holding this permission does not have any
1529 security implications, it can have a negative impact on the
1530 user experience by increasing the amount of time it takes the
1531 system to start and allowing applications to have themselves
1532 running without the user being aware of them. As such, you must
1533 explicitly declare your use of this facility to make that visible
1535 <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED"
1536 android:label="@string/permlab_receiveBootCompleted"
1537 android:description="@string/permdesc_receiveBootCompleted"
1538 android:protectionLevel="normal" />
1540 <!-- Allows an application to broadcast sticky intents. These are
1541 broadcasts whose data is held by the system after being finished,
1542 so that clients can quickly retrieve that data without having
1543 to wait for the next broadcast. -->
1544 <permission android:name="android.permission.BROADCAST_STICKY"
1545 android:label="@string/permlab_broadcastSticky"
1546 android:description="@string/permdesc_broadcastSticky"
1547 android:protectionLevel="normal" />
1549 <!-- @SystemApi Allows mounting and unmounting file systems for removable storage.
1550 <p>Not for use by third-party applications.-->
1551 <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS"
1552 android:protectionLevel="system|signature" />
1554 <!-- @SystemApi Allows formatting file systems for removable storage.
1555 <p>Not for use by third-party applications. -->
1556 <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS"
1557 android:protectionLevel="system|signature" />
1559 <!-- Allows access to ASEC non-destructive API calls
1561 <permission android:name="android.permission.ASEC_ACCESS"
1562 android:protectionLevel="signature" />
1564 <!-- Allows creation of ASEC volumes
1566 <permission android:name="android.permission.ASEC_CREATE"
1567 android:protectionLevel="signature" />
1569 <!-- Allows destruction of ASEC volumes
1571 <permission android:name="android.permission.ASEC_DESTROY"
1572 android:protectionLevel="signature" />
1574 <!-- Allows mount / unmount of ASEC volumes
1576 <permission android:name="android.permission.ASEC_MOUNT_UNMOUNT"
1577 android:protectionLevel="signature" />
1579 <!-- Allows rename of ASEC volumes
1581 <permission android:name="android.permission.ASEC_RENAME"
1582 android:protectionLevel="signature" />
1584 <!-- @SystemApi Allows applications to write the apn settings.
1585 <p>Not for use by third-party applications. -->
1586 <permission android:name="android.permission.WRITE_APN_SETTINGS"
1587 android:protectionLevel="signature|system" />
1589 <!-- Allows an application to allow access the subscribed feeds ContentProvider.
1593 <permission android:name="android.permission.SUBSCRIBED_FEEDS_READ"
1594 android:label="@string/permlab_subscribedFeedsRead"
1595 android:description="@string/permdesc_subscribedFeedsRead"
1596 android:protectionLevel="normal" />
1602 <permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE"
1603 android:label="@string/permlab_subscribedFeedsWrite"
1604 android:description="@string/permdesc_subscribedFeedsWrite"
1605 android:protectionLevel="dangerous" />
1607 <!-- Allows applications to change network connectivity state -->
1608 <permission android:name="android.permission.CHANGE_NETWORK_STATE"
1609 android:description="@string/permdesc_changeNetworkState"
1610 android:label="@string/permlab_changeNetworkState"
1611 android:protectionLevel="normal" />
1613 <!-- Allows an application to clear the caches of all installed
1614 applications on the device. -->
1615 <permission android:name="android.permission.CLEAR_APP_CACHE"
1616 android:protectionLevel="dangerous" />
1618 <!-- @SystemApi Allows an application to use any media decoder when decoding for playback
1620 <permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK"
1621 android:protectionLevel="signature|system" />
1623 <!-- @SystemApi Allows an application to install and/or uninstall CA certificates on
1626 <permission android:name="android.permission.MANAGE_CA_CERTIFICATES"
1627 android:protectionLevel="signature|system" />
1629 <!-- @SystemApi Allows an application to do certain operations needed for
1630 interacting with the recovery (system update) system.
1632 <permission android:name="android.permission.RECOVERY"
1633 android:protectionLevel="signature|system" />
1635 <!-- Allows the system to bind to an application's task services
1637 <permission android:name="android.permission.BIND_JOB_SERVICE"
1638 android:protectionLevel="signature" />
1639 <uses-permission android:name="android.permission.BIND_JOB_SERVICE"/>
1641 <!-- Allows an application to initiate configuration updates
1642 <p>An application requesting this permission is responsible for
1643 verifying the source and integrity of any update before passing
1644 it off to the various individual installer components
1646 <permission android:name="android.permission.UPDATE_CONFIG"
1647 android:protectionLevel="signature|system" />
1649 <!-- ========================================= -->
1650 <!-- Permissions for special development tools -->
1651 <!-- ========================================= -->
1654 <!-- @SystemApi Allows an application to read or write the secure system settings.
1655 <p>Not for use by third-party applications. -->
1656 <permission android:name="android.permission.WRITE_SECURE_SETTINGS"
1657 android:protectionLevel="signature|system|development" />
1659 <!-- @SystemApi Allows an application to retrieve state dump information from system services.
1660 <p>Not for use by third-party applications. -->
1661 <permission android:name="android.permission.DUMP"
1662 android:protectionLevel="signature|system|development" />
1664 <!-- @SystemApi Allows an application to read the low-level system log files.
1665 <p>Not for use by third-party applications, because
1666 Log entries can contain the user's private information. -->
1667 <permission android:name="android.permission.READ_LOGS"
1668 android:protectionLevel="signature|system|development" />
1670 <!-- @SystemApi Configure an application for debugging.
1671 <p>Not for use by third-party applications. -->
1672 <permission android:name="android.permission.SET_DEBUG_APP"
1673 android:protectionLevel="signature|system|development" />
1675 <!-- @SystemApi Allows an application to set the maximum number of (not needed)
1676 application processes that can be running.
1677 <p>Not for use by third-party applications. -->
1678 <permission android:name="android.permission.SET_PROCESS_LIMIT"
1679 android:protectionLevel="signature|system|development" />
1681 <!-- @SystemApi Allows an application to control whether activities are immediately
1682 finished when put in the background.
1683 <p>Not for use by third-party applications. -->
1684 <permission android:name="android.permission.SET_ALWAYS_FINISH"
1685 android:protectionLevel="signature|system|development" />
1687 <!-- @SystemApi Allow an application to request that a signal be sent to all persistent processes.
1688 <p>Not for use by third-party applications. -->
1689 <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES"
1690 android:protectionLevel="signature|system|development" />
1692 <!-- ==================================== -->
1693 <!-- Private permissions -->
1694 <!-- ==================================== -->
1697 <!-- @SystemApi Allows applications to RW to diagnostic resources.
1698 <p>Not for use by third-party applications. -->
1699 <permission android:name="android.permission.DIAGNOSTIC"
1700 android:protectionLevel="signature" />
1702 <!-- @SystemApi Allows an application to open, close, or disable the status bar
1704 <p>Not for use by third-party applications. -->
1705 <permission android:name="android.permission.STATUS_BAR"
1706 android:protectionLevel="signature|system" />
1708 <!-- Allows an application to be the status bar. Currently used only by SystemUI.apk
1710 <permission android:name="android.permission.STATUS_BAR_SERVICE"
1711 android:protectionLevel="signature" />
1713 <!-- Allows an application to force a BACK operation on whatever is the
1715 <p>Not for use by third-party applications. -->
1716 <permission android:name="android.permission.FORCE_BACK"
1717 android:protectionLevel="signature" />
1719 <!-- @SystemApi Allows an application to update device statistics.
1720 <p>Not for use by third-party applications. -->
1721 <permission android:name="android.permission.UPDATE_DEVICE_STATS"
1722 android:protectionLevel="signature|system" />
1724 <!-- @SystemApi @hide Allows an application to collect battery statistics -->
1725 <permission android:name="android.permission.GET_APP_OPS_STATS"
1726 android:protectionLevel="signature|system|development" />
1728 <!-- @SystemApi Allows an application to update application operation statistics. Not for
1729 use by third party apps. @hide -->
1730 <permission android:name="android.permission.UPDATE_APP_OPS_STATS"
1731 android:protectionLevel="signature|system" />
1733 <!-- Allows an application to open windows that are for use by parts
1734 of the system user interface.
1735 <p>Not for use by third-party applications. -->
1736 <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW"
1737 android:protectionLevel="signature" />
1739 <!-- Allows an application to manage (create, destroy,
1740 Z-order) application tokens in the window manager.
1741 <p>Not for use by third-party applications. -->
1742 <permission android:name="android.permission.MANAGE_APP_TOKENS"
1743 android:protectionLevel="signature" />
1745 <!-- @hide Allows the application to temporarily freeze the screen for a
1746 full-screen transition. -->
1747 <permission android:name="android.permission.FREEZE_SCREEN"
1748 android:protectionLevel="signature" />
1750 <!-- Allows an application to inject user events (keys, touch, trackball)
1751 into the event stream and deliver them to ANY window. Without this
1752 permission, you can only deliver events to windows in your own process.
1753 <p>Not for use by third-party applications. -->
1754 <permission android:name="android.permission.INJECT_EVENTS"
1755 android:protectionLevel="signature" />
1757 <!-- @hide Allows an application to register an input filter which filters the stream
1758 of user events (keys, touch, trackball) before they are dispatched to any window. -->
1759 <permission android:name="android.permission.FILTER_EVENTS"
1760 android:protectionLevel="signature" />
1762 <!-- @hide Allows an application to retrieve the window token from the accessibility manager. -->
1763 <permission android:name="android.permission.RETRIEVE_WINDOW_TOKEN"
1764 android:protectionLevel="signature" />
1766 <!-- @hide Allows an application to collect frame statistics -->
1767 <permission android:name="android.permission.FRAME_STATS"
1768 android:protectionLevel="signature" />
1770 <!-- @hide Allows an application to temporary enable accessibility on the device. -->
1771 <permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY"
1772 android:protectionLevel="signature" />
1774 <!-- Allows an application to watch and control how activities are
1775 started globally in the system. Only for is in debugging
1776 (usually the monkey command).
1777 <p>Not for use by third-party applications. -->
1778 <permission android:name="android.permission.SET_ACTIVITY_WATCHER"
1779 android:protectionLevel="signature" />
1781 <!-- @SystemApi Allows an application to call the activity manager shutdown() API
1782 to put the higher-level system there into a shutdown state.
1784 <permission android:name="android.permission.SHUTDOWN"
1785 android:protectionLevel="signature|system" />
1787 <!-- @SystemApi Allows an application to tell the activity manager to temporarily
1788 stop application switches, putting it into a special mode that
1789 prevents applications from immediately switching away from some
1790 critical UI such as the home screen.
1792 <permission android:name="android.permission.STOP_APP_SWITCHES"
1793 android:protectionLevel="signature|system" />
1795 <!-- Allows an application to retrieve private information about
1796 the current top activity, such as any assist context it can provide.
1797 <p>Not for use by third-party applications. -->
1798 <permission android:name="android.permission.GET_TOP_ACTIVITY_INFO"
1799 android:protectionLevel="signature" />
1801 <!-- Allows an application to retrieve the current state of keys and
1803 <p>Not for use by third-party applications.
1804 @deprecated The API that used this permission has been removed. -->
1805 <permission android:name="android.permission.READ_INPUT_STATE"
1806 android:protectionLevel="signature" />
1808 <!-- Must be required by an {@link android.inputmethodservice.InputMethodService},
1809 to ensure that only the system can bind to it. -->
1810 <permission android:name="android.permission.BIND_INPUT_METHOD"
1811 android:protectionLevel="signature" />
1813 <!-- Must be required by an {@link android.accessibilityservice.AccessibilityService},
1814 to ensure that only the system can bind to it. -->
1815 <permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE"
1816 android:protectionLevel="signature" />
1818 <!-- Must be required by a {@link android.printservice.PrintService},
1819 to ensure that only the system can bind to it. -->
1820 <permission android:name="android.permission.BIND_PRINT_SERVICE"
1821 android:protectionLevel="signature" />
1823 <!-- Must be required by a {@link android.nfc.cardemulation.HostApduService}
1824 or {@link android.nfc.cardemulation.OffHostApduService} to ensure that only
1825 the system can bind to it. -->
1826 <permission android:name="android.permission.BIND_NFC_SERVICE"
1827 android:protectionLevel="signature" />
1829 <!-- Must be required by the PrintSpooler to ensure that only the system can bind to it.
1831 <permission android:name="android.permission.BIND_PRINT_SPOOLER_SERVICE"
1832 android:protectionLevel="signature" />
1834 <!-- Must be required by a TextService (e.g. SpellCheckerService)
1835 to ensure that only the system can bind to it. -->
1836 <permission android:name="android.permission.BIND_TEXT_SERVICE"
1837 android:protectionLevel="signature" />
1839 <!-- Must be required by a {@link android.net.VpnService},
1840 to ensure that only the system can bind to it. -->
1841 <permission android:name="android.permission.BIND_VPN_SERVICE"
1842 android:protectionLevel="signature" />
1844 <!-- Must be required by a {@link android.service.wallpaper.WallpaperService},
1845 to ensure that only the system can bind to it. -->
1846 <permission android:name="android.permission.BIND_WALLPAPER"
1847 android:protectionLevel="signature|system" />
1849 <!-- Must be required by a {@link android.service.voice.VoiceInteractionService},
1850 to ensure that only the system can bind to it. -->
1851 <permission android:name="android.permission.BIND_VOICE_INTERACTION"
1852 android:protectionLevel="signature" />
1854 <!-- Must be required by hotword enrollment application,
1855 to ensure that only the system can interact with it.
1856 @hide <p>Not for use by third-party applications.</p> -->
1857 <permission android:name="android.permission.MANAGE_VOICE_KEYPHRASES"
1858 android:protectionLevel="signature|system" />
1860 <!-- Must be required by a {@link com.android.media.remotedisplay.RemoteDisplayProvider},
1861 to ensure that only the system can bind to it.
1863 <permission android:name="android.permission.BIND_REMOTE_DISPLAY"
1864 android:protectionLevel="signature" />
1866 <!-- Must be required by a {@link android.media.tv.TvInputService}
1867 to ensure that only the system can bind to it. -->
1868 <permission android:name="android.permission.BIND_TV_INPUT"
1869 android:protectionLevel="signature|system" />
1871 <!-- @SystemApi Allows an application to modify parental controls
1872 <p>Not for use by third-party applications.
1874 <permission android:name="android.permission.MODIFY_PARENTAL_CONTROLS"
1875 android:protectionLevel="signature|system" />
1877 <!-- Must be required by a {@link android.media.routing.MediaRouteService}
1878 to ensure that only the system can interact with it.
1880 <permission android:name="android.permission.BIND_ROUTE_PROVIDER"
1881 android:protectionLevel="signature" />
1883 <!-- Must be required by device administration receiver, to ensure that only the
1884 system can interact with it. -->
1885 <permission android:name="android.permission.BIND_DEVICE_ADMIN"
1886 android:protectionLevel="signature" />
1888 <!-- @SystemApi Required to add or remove another application as a device admin.
1889 <p>Not for use by third-party applications.
1891 <permission android:name="android.permission.MANAGE_DEVICE_ADMINS"
1892 android:protectionLevel="signature|system" />
1894 <!-- Allows low-level access to setting the orientation (actually
1895 rotation) of the screen.
1896 <p>Not for use by third-party applications. -->
1897 <permission android:name="android.permission.SET_ORIENTATION"
1898 android:protectionLevel="signature" />
1900 <!-- Allows low-level access to setting the pointer speed.
1901 <p>Not for use by third-party applications. -->
1902 <permission android:name="android.permission.SET_POINTER_SPEED"
1903 android:protectionLevel="signature" />
1905 <!-- Allows low-level access to setting input device calibration.
1906 <p>Not for use by normal applications.
1908 <permission android:name="android.permission.SET_INPUT_CALIBRATION"
1909 android:protectionLevel="signature" />
1911 <!-- Allows low-level access to setting the keyboard layout.
1912 <p>Not for use by third-party applications.
1914 <permission android:name="android.permission.SET_KEYBOARD_LAYOUT"
1915 android:protectionLevel="signature" />
1917 <!-- @SystemApi Allows an application to install packages.
1918 <p>Not for use by third-party applications. -->
1919 <permission android:name="android.permission.INSTALL_PACKAGES"
1920 android:protectionLevel="signature|system" />
1922 <!-- Allows an application to clear user data.
1923 <p>Not for use by third-party applications. -->
1924 <permission android:name="android.permission.CLEAR_APP_USER_DATA"
1925 android:protectionLevel="signature" />
1927 <!-- @SystemApi Allows an application to delete cache files.
1928 <p>Not for use by third-party applications. -->
1929 <permission android:name="android.permission.DELETE_CACHE_FILES"
1930 android:protectionLevel="signature|system" />
1932 <!-- @SystemApi Allows an application to delete packages.
1933 <p>Not for use by third-party applications. -->
1934 <permission android:name="android.permission.DELETE_PACKAGES"
1935 android:protectionLevel="signature|system" />
1937 <!-- @SystemApi Allows an application to move location of installed package.
1939 <permission android:name="android.permission.MOVE_PACKAGE"
1940 android:protectionLevel="signature|system" />
1942 <!-- @SystemApi Allows an application to change whether an application component (other than its own) is
1944 <p>Not for use by third-party applications. -->
1945 <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE"
1946 android:protectionLevel="signature|system" />
1948 <!-- @hide Allows an application to grant or revoke specific permissions. -->
1949 <permission android:name="android.permission.GRANT_REVOKE_PERMISSIONS"
1950 android:protectionLevel="signature" />
1952 <!-- Allows an application to use SurfaceFlinger's low level features.
1953 <p>Not for use by third-party applications. -->
1954 <permission android:name="android.permission.ACCESS_SURFACE_FLINGER"
1955 android:protectionLevel="signature" />
1957 <!-- @SystemApi Allows an application to take screen shots and more generally
1958 get access to the frame buffer data.
1959 <p>Not for use by third-party applications. -->
1960 <permission android:name="android.permission.READ_FRAME_BUFFER"
1961 android:protectionLevel="signature|system" />
1963 <!-- Allows an application to use InputFlinger's low level features.
1965 <permission android:name="android.permission.ACCESS_INPUT_FLINGER"
1966 android:protectionLevel="signature" />
1968 <!-- Allows an application to configure and connect to Wifi displays
1970 <permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY"
1971 android:protectionLevel="signature" />
1973 <!-- Allows an application to control low-level features of Wifi displays
1974 such as opening an RTSP socket. This permission should only be used
1975 by the display manager.
1977 <permission android:name="android.permission.CONTROL_WIFI_DISPLAY"
1978 android:protectionLevel="signature" />
1980 <!-- @SystemApi Allows an application to control VPN.
1981 <p>Not for use by third-party applications.</p>
1983 <permission android:name="android.permission.CONTROL_VPN"
1984 android:protectionLevel="signature|system" />
1985 <uses-permission android:name="android.permission.CONTROL_VPN" />
1987 <!-- @SystemApi Allows an application to capture audio output.
1988 <p>Not for use by third-party applications.</p> -->
1989 <permission android:name="android.permission.CAPTURE_AUDIO_OUTPUT"
1990 android:protectionLevel="signature|system" />
1992 <!-- @SystemApi Allows an application to capture audio for hotword detection.
1993 <p>Not for use by third-party applications.</p>
1995 <permission android:name="android.permission.CAPTURE_AUDIO_HOTWORD"
1996 android:protectionLevel="signature|system" />
1998 <!-- @SystemApi Allows an application to modify audio routing and override policy decisions.
1999 <p>Not for use by third-party applications.</p>
2001 <permission android:name="android.permission.MODIFY_AUDIO_ROUTING"
2002 android:protectionLevel="signature|system" />
2004 <!-- @SystemApi Allows an application to capture video output.
2005 <p>Not for use by third-party applications.</p> -->
2006 <permission android:name="android.permission.CAPTURE_VIDEO_OUTPUT"
2007 android:protectionLevel="signature|system" />
2009 <!-- @SystemApi Allows an application to capture secure video output.
2010 <p>Not for use by third-party applications.</p> -->
2011 <permission android:name="android.permission.CAPTURE_SECURE_VIDEO_OUTPUT"
2012 android:protectionLevel="signature|system" />
2014 <!-- @SystemApi Allows an application to know what content is playing and control its playback.
2015 <p>Not for use by third-party applications due to privacy of media consumption</p> -->
2016 <permission android:name="android.permission.MEDIA_CONTENT_CONTROL"
2017 android:protectionLevel="signature|system" />
2019 <!-- Required to be able to disable the device (very dangerous!).
2020 <p>Not for use by third-party applications.. -->
2021 <permission android:name="android.permission.BRICK"
2022 android:protectionLevel="signature" />
2024 <!-- @SystemApi Required to be able to reboot the device.
2025 <p>Not for use by third-party applications. -->
2026 <permission android:name="android.permission.REBOOT"
2027 android:protectionLevel="signature|system" />
2029 <!-- Allows low-level access to power management.
2030 <p>Not for use by third-party applications. -->
2031 <permission android:name="android.permission.DEVICE_POWER"
2032 android:protectionLevel="signature" />
2034 <!-- Allows access to the PowerManager.userActivity function.
2035 <p>Not for use by third-party applications. @hide @SystemApi -->
2036 <permission android:name="android.permission.USER_ACTIVITY"
2037 android:protectionLevel="signature|system" />
2039 <!-- @hide Allows low-level access to tun tap driver -->
2040 <permission android:name="android.permission.NET_TUNNELING"
2041 android:protectionLevel="signature" />
2043 <!-- Run as a manufacturer test application, running as the root user.
2044 Only available when the device is running in manufacturer test mode.
2045 <p>Not for use by third-party applications. -->
2046 <permission android:name="android.permission.FACTORY_TEST"
2047 android:protectionLevel="signature" />
2049 <!-- Allows an application to broadcast a notification that an application
2050 package has been removed.
2051 <p>Not for use by third-party applications. -->
2052 <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED"
2053 android:protectionLevel="signature" />
2055 <!-- Allows an application to broadcast an SMS receipt notification.
2056 <p>Not for use by third-party applications. -->
2057 <permission android:name="android.permission.BROADCAST_SMS"
2058 android:protectionLevel="signature" />
2060 <!-- Allows an application to broadcast a WAP PUSH receipt notification.
2061 <p>Not for use by third-party applications. -->
2062 <permission android:name="android.permission.BROADCAST_WAP_PUSH"
2063 android:protectionLevel="signature" />
2065 <!-- @SystemApi Allows an application to broadcast privileged networking requests.
2066 <p>Not for use by third-party applications. @hide -->
2067 <permission android:name="android.permission.BROADCAST_NETWORK_PRIVILEGED"
2068 android:protectionLevel="signature|system" />
2070 <!-- @SystemApi Not for use by third-party applications. -->
2071 <permission android:name="android.permission.MASTER_CLEAR"
2072 android:protectionLevel="signature|system" />
2074 <!-- @SystemApi Allows an application to call any phone number, including emergency
2075 numbers, without going through the Dialer user interface for the user
2076 to confirm the call being placed.
2077 <p>Not for use by third-party applications. -->
2078 <permission android:name="android.permission.CALL_PRIVILEGED"
2079 android:protectionLevel="signature|system" />
2081 <!-- @SystemApi Allows an application to perform CDMA OTA provisioning @hide -->
2082 <permission android:name="android.permission.PERFORM_CDMA_PROVISIONING"
2083 android:protectionLevel="signature|system" />
2085 <!-- @SystemApi Allows an application to perform SIM Activation @hide -->
2086 <permission android:name="android.permission.PERFORM_SIM_ACTIVATION"
2087 android:protectionLevel="signature|system" />
2089 <!-- @SystemApi Allows enabling/disabling location update notifications from
2091 <p>Not for use by third-party applications. -->
2092 <permission android:name="android.permission.CONTROL_LOCATION_UPDATES"
2093 android:protectionLevel="signature|system" />
2095 <!-- @SystemApi Allows read/write access to the "properties" table in the checkin
2096 database, to change values that get uploaded.
2097 <p>Not for use by third-party applications. -->
2098 <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES"
2099 android:protectionLevel="signature|system" />
2101 <!-- @SystemApi Allows an application to collect component usage
2103 <p>Not for use by third-party applications. -->
2104 <permission android:name="android.permission.PACKAGE_USAGE_STATS"
2105 android:protectionLevel="signature|development|appop" />
2106 <uses-permission android:name="android.permission.PACKAGE_USAGE_STATS" />
2108 <!-- @hide Allows an application to change the app idle state of an app.
2109 <p>Not for use by third-party applications. -->
2110 <permission android:name="android.permission.CHANGE_APP_IDLE_STATE"
2111 android:protectionLevel="signature" />
2113 <!-- @SystemApi Allows an application to collect battery statistics -->
2114 <permission android:name="android.permission.BATTERY_STATS"
2115 android:protectionLevel="signature|system|development" />
2117 <!-- @SystemApi Allows an application to control the backup and restore process.
2118 <p>Not for use by third-party applications.
2119 @hide pending API council -->
2120 <permission android:name="android.permission.BACKUP"
2121 android:protectionLevel="signature|system" />
2123 <!-- Allows a package to launch the secure full-backup confirmation UI.
2124 ONLY the system process may hold this permission.
2126 <permission android:name="android.permission.CONFIRM_FULL_BACKUP"
2127 android:protectionLevel="signature" />
2129 <!-- @SystemApi Must be required by a {@link android.widget.RemoteViewsService},
2130 to ensure that only the system can bind to it. -->
2131 <permission android:name="android.permission.BIND_REMOTEVIEWS"
2132 android:protectionLevel="signature|system" />
2134 <!-- @SystemApi Allows an application to tell the AppWidget service which application
2135 can access AppWidget's data. The normal user flow is that a user
2136 picks an AppWidget to go into a particular host, thereby giving that
2137 host application access to the private data from the AppWidget app.
2138 An application that has this permission should honor that contract.
2139 <p>Not for use by third-party applications. -->
2140 <permission android:name="android.permission.BIND_APPWIDGET"
2141 android:protectionLevel="signature|system" />
2143 <!-- @SystemApi Private permission, to restrict who can bring up a dialog to add a new
2146 <permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET"
2147 android:protectionLevel="signature|system" />
2149 <!-- @SystemApi Internal permission allowing an application to query/set which
2150 applications can bind AppWidgets.
2152 <permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS"
2153 android:protectionLevel="signature|system" />
2155 <!-- Allows applications to change the background data setting.
2156 <p>Not for use by third-party applications.
2157 @hide pending API council -->
2158 <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING"
2159 android:protectionLevel="signature" />
2161 <!-- @SystemApi This permission can be used on content providers to allow the global
2162 search system to access their data. Typically it used when the
2163 provider has some permissions protecting it (which global search
2164 would not be expected to hold), and added as a read-only permission
2165 to the path in the provider where global search queries are
2166 performed. This permission can not be held by regular applications;
2167 it is used by applications to protect themselves from everyone else
2168 besides global search. -->
2169 <permission android:name="android.permission.GLOBAL_SEARCH"
2170 android:protectionLevel="signature|system" />
2172 <!-- Internal permission protecting access to the global search
2173 system: ensures that only the system can access the provider
2174 to perform queries (since this otherwise provides unrestricted
2175 access to a variety of content providers), and to write the
2176 search statistics (to keep applications from gaming the source
2179 <permission android:name="android.permission.GLOBAL_SEARCH_CONTROL"
2180 android:protectionLevel="signature" />
2182 <!-- @SystemApi Internal permission to allows an application to read indexable data.
2184 <permission android:name="android.permission.READ_SEARCH_INDEXABLES"
2185 android:protectionLevel="signature|system" />
2187 <!-- @SystemApi Allows applications to set a live wallpaper.
2188 @hide XXX Change to signature once the picker is moved to its
2189 own apk as Ghod Intended. -->
2190 <permission android:name="android.permission.SET_WALLPAPER_COMPONENT"
2191 android:protectionLevel="signature|system" />
2193 <!-- @SystemApi Allows applications to read dream settings and dream state.
2195 <permission android:name="android.permission.READ_DREAM_STATE"
2196 android:protectionLevel="signature|system" />
2198 <!-- @SystemApi Allows applications to write dream settings, and start or stop dreaming.
2200 <permission android:name="android.permission.WRITE_DREAM_STATE"
2201 android:protectionLevel="signature|system" />
2203 <!-- @SystemApi Allow an application to read and write the cache partition.
2205 <permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM"
2206 android:protectionLevel="signature|system" />
2208 <!-- Must be required by default container service so that only
2209 the system can bind to it and use it to copy
2210 protected data to secure containers or files
2211 accessible to the system.
2213 <permission android:name="android.permission.COPY_PROTECTED_DATA"
2214 android:protectionLevel="signature" />
2216 <!-- @SystemApi Internal permission protecting access to the encryption methods
2219 <permission android:name="android.permission.CRYPT_KEEPER"
2220 android:protectionLevel="signature|system" />
2222 <!-- @SystemApi Allows an application to read historical network usage for
2223 specific networks and applications. @hide -->
2224 <permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY"
2225 android:protectionLevel="signature|system" />
2227 <!-- Allows an application to manage network policies (such as warning and disable
2228 limits) and to define application-specific rules. @hide -->
2229 <permission android:name="android.permission.MANAGE_NETWORK_POLICY"
2230 android:protectionLevel="signature" />
2232 <!-- @SystemApi Allows an application to account its network traffic against other UIDs. Used
2233 by system services like download manager and media server. Not for use by
2234 third party apps. @hide -->
2235 <permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING"
2236 android:protectionLevel="signature|system" />
2238 <!-- C2DM permission.
2239 @hide Used internally.
2241 <permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"
2242 android:protectionLevel="signature" />
2243 <uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/>
2245 <!-- @SystemApi @hide Package verifier needs to have this permission before the PackageManager will
2246 trust it to verify packages.
2248 <permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT"
2249 android:protectionLevel="signature|system" />
2251 <!-- Must be required by package verifier receiver, to ensure that only the
2252 system can interact with it.
2255 <permission android:name="android.permission.BIND_PACKAGE_VERIFIER"
2256 android:protectionLevel="signature" />
2258 <!-- @SystemApi @hide Intent filter verifier needs to have this permission before the
2259 PackageManager will trust it to verify intent filters.
2261 <permission android:name="android.permission.INTENT_FILTER_VERIFICATION_AGENT"
2262 android:protectionLevel="signature|system" />
2264 <!-- Must be required by intent filter verifier receiver, to ensure that only the
2265 system can interact with it.
2268 <permission android:name="android.permission.BIND_INTENT_FILTER_VERIFIER"
2269 android:protectionLevel="signature" />
2271 <!-- @SystemApi Allows applications to access serial ports via the SerialManager.
2273 <permission android:name="android.permission.SERIAL_PORT"
2274 android:protectionLevel="signature|system" />
2276 <!-- Allows the holder to access content providers from outside an ApplicationThread.
2277 This permission is enforced by the ActivityManagerService on the corresponding APIs,
2278 in particular ActivityManagerService#getContentProviderExternal(String) and
2279 ActivityManagerService#removeContentProviderExternal(String).
2282 <permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY"
2283 android:protectionLevel="signature" />
2285 <!-- @SystemApi Allows an application to hold an UpdateLock, recommending that a headless
2286 OTA reboot *not* occur while the lock is held.
2288 <permission android:name="android.permission.UPDATE_LOCK"
2289 android:protectionLevel="signatureOrSystem" />
2291 <!-- @SystemApi Allows an application to read the current set of notifications, including
2292 any metadata and intents attached.
2294 <permission android:name="android.permission.ACCESS_NOTIFICATIONS"
2295 android:protectionLevel="signature|system" />
2297 <!-- Allows access to keyguard secure storage. Only allowed for system processes.
2299 <permission android:name="android.permission.ACCESS_KEYGUARD_SECURE_STORAGE"
2300 android:protectionLevel="signature" />
2302 <!-- Allows managing (adding, removing) fingerprint templates. Reserved for the system. @hide -->
2303 <permission android:name="android.permission.MANAGE_FINGERPRINT"
2304 android:protectionLevel="signature" />
2306 <!-- Allows an application to control keyguard. Only allowed for system processes.
2308 <permission android:name="android.permission.CONTROL_KEYGUARD"
2309 android:protectionLevel="signature" />
2311 <!-- Allows an application to listen to trust changes. Only allowed for system processes.
2313 <permission android:name="android.permission.TRUST_LISTENER"
2314 android:protectionLevel="signature" />
2316 <!-- @SystemApi Allows an application to provide a trust agent.
2317 @hide For security reasons, this is a platform-only permission. -->
2318 <permission android:name="android.permission.PROVIDE_TRUST_AGENT"
2319 android:protectionLevel="signatureOrSystem" />
2321 <!-- Allows an application to launch the trust agent settings activity.
2323 <permission android:name="android.permission.LAUNCH_TRUST_AGENT_SETTINGS"
2324 android:protectionLevel="signatureOrSystem" />
2326 <!-- @SystemApi Must be required by an {@link
2327 android.service.trust.TrustAgentService},
2328 to ensure that only the system can bind to it.
2330 <permission android:name="android.permission.BIND_TRUST_AGENT"
2331 android:protectionLevel="signature" />
2333 <!-- Must be required by an {@link
2334 android.service.notification.NotificationListenerService},
2335 to ensure that only the system can bind to it. -->
2336 <permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE"
2337 android:protectionLevel="signature" />
2339 <!-- Must be required by a {@link
2340 android.service.chooser.ChooserTargetService}, to ensure that
2341 only the system can bind to it. -->
2342 <permission android:name="android.permission.BIND_CHOOSER_TARGET_SERVICE"
2343 android:protectionLevel="signature" />
2345 <!-- @SystemApi Must be required by a {@link
2346 android.service.notification.ConditionProviderService},
2347 to ensure that only the system can bind to it.
2349 <permission android:name="android.permission.BIND_CONDITION_PROVIDER_SERVICE"
2350 android:protectionLevel="signature" />
2352 <!-- Must be required by a {@link android.media.routing.MediaRouteService},
2353 to ensure that only the system can bind to it. -->
2354 <permission android:name="android.permission.BIND_MEDIA_ROUTE_SERVICE"
2355 android:protectionLevel="signature" />
2357 <!-- Must be required by an {@link android.service.dreams.DreamService},
2358 to ensure that only the system can bind to it. -->
2359 <permission android:name="android.permission.BIND_DREAM_SERVICE"
2360 android:protectionLevel="signature" />
2362 <!-- @SystemApi Allows an application to call into a carrier setup flow. It is up to the
2363 carrier setup application to enforce that this permission is required
2364 @hide This is not a third-party API (intended for OEMs and system apps). -->
2365 <permission android:name="android.permission.INVOKE_CARRIER_SETUP"
2366 android:protectionLevel="signature|system" />
2368 <!-- @SystemApi Allows an application to listen for network condition observations.
2369 @hide This is not a third-party API (intended for system apps). -->
2370 <permission android:name="android.permission.ACCESS_NETWORK_CONDITIONS"
2371 android:protectionLevel="signature|system" />
2373 <!-- @SystemApi Allows an application to provision and access DRM certificates
2374 @hide This is not a third-party API (intended for system apps). -->
2375 <permission android:name="android.permission.ACCESS_DRM_CERTIFICATES"
2376 android:protectionLevel="signature|system" />
2378 <!-- Api Allows an application to manage media projection sessions.
2379 @hide This is not a third-party API (intended for system apps). -->
2380 <permission android:name="android.permission.MANAGE_MEDIA_PROJECTION"
2381 android:protectionLevel="signature" />
2383 <!-- @SystemApi Allows an application to read install sessions
2384 @hide This is not a third-party API (intended for system apps). -->
2385 <permission android:name="android.permission.READ_INSTALL_SESSIONS"
2386 android:label="@string/permlab_readInstallSessions"
2387 android:description="@string/permdesc_readInstallSessions"
2388 android:protectionLevel="normal"/>
2390 <!-- @SystemApi Allows an application to remove DRM certificates
2391 @hide This is not a third-party API (intended for system apps). -->
2392 <permission android:name="android.permission.REMOVE_DRM_CERTIFICATES"
2393 android:protectionLevel="signature|system" />
2395 <!-- Must be required by a {@link android.service.carrier.CarrierMessagingService}.
2396 Any service that filters for this intent must be a carrier privileged app. -->
2397 <permission android:name="android.permission.BIND_CARRIER_MESSAGING_SERVICE"
2398 android:protectionLevel="signature|system" />
2400 <!-- Allows an application to interact with the currently active
2401 {@link android.service.voice.VoiceInteractionService}.
2403 <permission android:name="android.permission.ACCESS_VOICE_INTERACTION_SERVICE"
2404 android:protectionLevel="signature" />
2406 <!-- Allows an app that has this permission and a permissions to install packages
2407 to request all runtime permissions to be granted at installation.
2409 <permission android:name="android.permission.INSTALL_GRANT_RUNTIME_PERMISSIONS"
2410 android:protectionLevel="signature" />
2412 <!-- Allows receiving status updates from a device initializer.
2413 @hide Not for use by third-party applications. -->
2414 <permission android:name="android.permission.RECEIVE_DEVICE_INITIALIZER_STATUS"
2415 android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2416 android:protectionLevel="signature" />
2418 <!-- The system process that pulls carrier configuration from carrier apps will
2419 have this permission. Carrier apps that provide
2420 {@link android.service.carrier.CarrierConfigService} should require this
2421 permission for clients binding to their service. -->
2422 <permission android:name="android.permission.BIND_CARRIER_CONFIG_SERVICE"
2423 android:label="@string/permlab_bindCarrierConfigService"
2424 android:description="@string/permdesc_bindCarrierConfigService"
2425 android:protectionLevel="signature|system" />
2427 <!-- Allows an application to query whether DO_NOT_ASK_CREDENTIALS_ON_BOOT
2430 <permission android:name="android.permission.QUERY_DO_NOT_ASK_CREDENTIALS_ON_BOOT"
2431 android:protectionLevel="signature" />
2433 <!-- The system process is explicitly the only one allowed to launch the
2434 confirmation UI for full backup/restore -->
2435 <uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/>
2437 <application android:process="system"
2438 android:persistent="true"
2439 android:hasCode="false"
2440 android:label="@string/android_system_label"
2441 android:allowClearUserData="false"
2442 android:backupAgent="com.android.server.backup.SystemBackupAgent"
2443 android:killAfterRestore="false"
2444 android:icon="@drawable/ic_launcher_android"
2445 android:supportsRtl="true">
2446 <activity android:name="com.android.internal.app.ChooserActivity"
2447 android:theme="@style/Theme.DeviceDefault.Resolver"
2448 android:finishOnCloseSystemDialogs="true"
2449 android:excludeFromRecents="true"
2450 android:documentLaunchMode="never"
2451 android:relinquishTaskIdentity="true"
2452 android:process=":ui">
2454 <action android:name="android.intent.action.CHOOSER" />
2455 <category android:name="android.intent.category.DEFAULT" />
2458 <activity android:name="com.android.internal.app.IntentForwarderActivity"
2459 android:finishOnCloseSystemDialogs="true"
2460 android:theme="@style/Theme.NoDisplay"
2461 android:excludeFromRecents="true"
2462 android:label="@string/user_owner_label"
2463 android:exported="true"
2466 <activity-alias android:name="com.android.internal.app.ForwardIntentToUserOwner"
2467 android:targetActivity="com.android.internal.app.IntentForwarderActivity"
2468 android:exported="true"
2469 android:label="@string/user_owner_label">
2471 <activity-alias android:name="com.android.internal.app.ForwardIntentToManagedProfile"
2472 android:targetActivity="com.android.internal.app.IntentForwarderActivity"
2473 android:icon="@drawable/ic_corp_icon"
2474 android:exported="true"
2475 android:label="@string/managed_profile_label">
2477 <activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity"
2478 android:theme="@style/Theme.Material.Light.Dialog"
2479 android:label="@string/heavy_weight_switcher_title"
2480 android:finishOnCloseSystemDialogs="true"
2481 android:excludeFromRecents="true"
2482 android:process=":ui">
2484 <activity android:name="com.android.internal.app.PlatLogoActivity"
2485 android:theme="@style/Theme.Wallpaper.NoTitleBar.Fullscreen"
2486 android:configChanges="orientation|keyboardHidden"
2487 android:process=":ui">
2489 <activity android:name="com.android.internal.app.DisableCarModeActivity"
2490 android:theme="@style/Theme.NoDisplay"
2491 android:excludeFromRecents="true"
2492 android:process=":ui">
2494 <activity android:name="com.android.internal.app.DumpHeapActivity"
2495 android:theme="@style/Theme.Translucent.NoTitleBar"
2496 android:label="@string/dump_heap_title"
2497 android:finishOnCloseSystemDialogs="true"
2498 android:noHistory="true"
2499 android:excludeFromRecents="true"
2500 android:process=":ui">
2502 <provider android:name="com.android.server.am.DumpHeapProvider"
2503 android:authorities="com.android.server.heapdump"
2504 android:grantUriPermissions="true"
2505 android:multiprocess="false"
2506 android:singleUser="true" />
2508 <activity android:name="android.accounts.ChooseAccountActivity"
2509 android:excludeFromRecents="true"
2510 android:exported="true"
2511 android:theme="@style/Theme.Material.Light.Dialog"
2512 android:label="@string/choose_account_label"
2513 android:process=":ui">
2516 <activity android:name="android.accounts.ChooseTypeAndAccountActivity"
2517 android:excludeFromRecents="true"
2518 android:exported="true"
2519 android:theme="@style/Theme.Material.Light.Dialog"
2520 android:label="@string/choose_account_label"
2521 android:process=":ui">
2524 <activity android:name="android.accounts.ChooseAccountTypeActivity"
2525 android:excludeFromRecents="true"
2526 android:theme="@style/Theme.Material.Light.Dialog"
2527 android:label="@string/choose_account_label"
2528 android:process=":ui">
2531 <activity android:name="android.accounts.CantAddAccountActivity"
2532 android:excludeFromRecents="true"
2533 android:exported="true"
2534 android:theme="@style/Theme.Material.Light.Dialog.NoActionBar"
2535 android:process=":ui">
2538 <activity android:name="android.accounts.GrantCredentialsPermissionActivity"
2539 android:excludeFromRecents="true"
2540 android:exported="true"
2541 android:theme="@style/Theme.Material.Light.DialogWhenLarge"
2542 android:process=":ui">
2545 <activity android:name="android.content.SyncActivityTooManyDeletes"
2546 android:theme="@style/Theme.Material.Light.Dialog"
2547 android:label="@string/sync_too_many_deletes"
2548 android:process=":ui">
2551 <activity android:name="com.android.internal.app.ShutdownActivity"
2552 android:permission="android.permission.SHUTDOWN"
2553 android:theme="@style/Theme.NoDisplay"
2554 android:excludeFromRecents="true">
2556 <action android:name="android.intent.action.ACTION_REQUEST_SHUTDOWN" />
2557 <category android:name="android.intent.category.DEFAULT" />
2560 <action android:name="android.intent.action.REBOOT" />
2561 <category android:name="android.intent.category.DEFAULT" />
2565 <activity android:name="com.android.internal.app.NetInitiatedActivity"
2566 android:theme="@style/Theme.Material.Light.Dialog.Alert"
2567 android:excludeFromRecents="true"
2568 android:process=":ui">
2571 <activity android:name="com.android.internal.app.RestrictionsPinActivity"
2572 android:theme="@style/Theme.Material.Light.Dialog.Alert"
2573 android:excludeFromRecents="true"
2574 android:windowSoftInputMode="adjustPan"
2575 android:process=":ui">
2576 <intent-filter android:priority="100">
2577 <action android:name="android.intent.action.RESTRICTIONS_CHALLENGE" />
2578 <category android:name="android.intent.category.DEFAULT" />
2582 <receiver android:name="com.android.server.BootReceiver"
2583 android:primaryUserOnly="true">
2584 <intent-filter android:priority="1000">
2585 <action android:name="android.intent.action.BOOT_COMPLETED" />
2589 <receiver android:name="com.android.server.updates.CertPinInstallReceiver"
2590 android:permission="android.permission.UPDATE_CONFIG">
2592 <action android:name="android.intent.action.UPDATE_PINS" />
2593 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
2597 <receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver"
2598 android:permission="android.permission.UPDATE_CONFIG">
2600 <action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" />
2601 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
2605 <receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver"
2606 android:permission="android.permission.UPDATE_CONFIG">
2608 <action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" />
2609 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
2613 <receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver"
2614 android:permission="android.permission.UPDATE_CONFIG">
2616 <action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" />
2617 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
2621 <receiver android:name="com.android.server.updates.TzDataInstallReceiver"
2622 android:permission="android.permission.UPDATE_CONFIG">
2624 <action android:name="android.intent.action.UPDATE_TZDATA" />
2625 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
2629 <receiver android:name="com.android.server.updates.SELinuxPolicyInstallReceiver"
2630 android:permission="android.permission.UPDATE_CONFIG">
2632 <action android:name="android.intent.action.UPDATE_SEPOLICY" />
2633 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
2637 <receiver android:name="com.android.server.MasterClearReceiver"
2638 android:permission="android.permission.MASTER_CLEAR">
2640 android:priority="100" >
2641 <!-- For Checkin, Settings, etc.: action=MASTER_CLEAR -->
2642 <action android:name="android.intent.action.MASTER_CLEAR" />
2644 <!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR -->
2645 <action android:name="com.google.android.c2dm.intent.RECEIVE" />
2646 <category android:name="android.intent.category.MASTER_CLEAR" />
2650 <service android:name="com.android.internal.os.storage.ExternalStorageFormatter"
2651 android:permission="android.permission.MASTER_CLEAR"
2652 android:exported="true" />
2654 <service android:name="android.hardware.location.GeofenceHardwareService"
2655 android:permission="android.permission.LOCATION_HARDWARE"
2656 android:exported="false" />
2658 <service android:name="com.android.internal.backup.LocalTransportService"
2659 android:permission="android.permission.CONFIRM_FULL_BACKUP"
2660 android:exported="false">
2662 <action android:name="android.backup.TRANSPORT_HOST" />
2666 <service android:name="com.android.server.MountServiceIdler"
2667 android:exported="true"
2668 android:permission="android.permission.BIND_JOB_SERVICE" >
2671 <service android:name="com.android.server.backup.FullBackupJob"
2672 android:exported="true"
2673 android:permission="android.permission.BIND_JOB_SERVICE" >
2676 <service android:name="com.android.server.backup.KeyValueBackupJob"
2677 android:permission="android.permission.BIND_JOB_SERVICE" >
2681 android:name="com.android.server.pm.BackgroundDexOptService"
2682 android:exported="true"
2683 android:permission="android.permission.BIND_JOB_SERVICE">