| <?xml version="1.0" encoding="utf-8"?> |
| <!-- |
| /* //device/apps/common/AndroidManifest.xml |
| ** |
| ** Copyright 2006, The Android Open Source Project |
| ** |
| ** Licensed under the Apache License, Version 2.0 (the "License"); |
| ** you may not use this file except in compliance with the License. |
| ** You may obtain a copy of the License at |
| ** |
| ** http://www.apache.org/licenses/LICENSE-2.0 |
| ** |
| ** Unless required by applicable law or agreed to in writing, software |
| ** distributed under the License is distributed on an "AS IS" BASIS, |
| ** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| ** See the License for the specific language governing permissions and |
| ** limitations under the License. |
| */ |
| --> |
| <manifest xmlns:android="http://schemas.android.com/apk/res/android" |
| package="android" coreApp="true" android:sharedUserId="android.uid.system" |
| android:sharedUserLabel="@string/android_system_label"> |
| |
| <!-- ================================================ --> |
| <!-- Special broadcasts that only the system can send --> |
| <!-- ================================================ --> |
| <eat-comment /> |
| |
| <protected-broadcast android:name="android.intent.action.SCREEN_OFF" /> |
| <protected-broadcast android:name="android.intent.action.SCREEN_ON" /> |
| <protected-broadcast android:name="android.intent.action.USER_PRESENT" /> |
| <protected-broadcast android:name="android.intent.action.TIME_SET" /> |
| <protected-broadcast android:name="android.intent.action.TIME_TICK" /> |
| <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" /> |
| <protected-broadcast android:name="android.intent.action.DATE_CHANGED" /> |
| <protected-broadcast android:name="android.intent.action.PRE_BOOT_COMPLETED" /> |
| <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" /> |
| <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" /> |
| <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" /> |
| <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" /> |
| <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" /> |
| <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" /> |
| <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED_INTERNAL" /> |
| <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" /> |
| <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" /> |
| <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_LOADED" /> |
| <protected-broadcast android:name="android.intent.action.PACKAGE_ENABLE_ROLLBACK" /> |
| <protected-broadcast android:name="android.intent.action.CANCEL_ENABLE_ROLLBACK" /> |
| <protected-broadcast android:name="android.intent.action.ROLLBACK_COMMITTED" /> |
| <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" /> |
| <protected-broadcast android:name="android.intent.action.PACKAGE_UNSTOPPED" /> |
| <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" /> |
| <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" /> |
| <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_INTEGRITY_VERIFICATION" /> |
| <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" /> |
| <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" /> |
| <protected-broadcast android:name="android.intent.action.PACKAGES_SUSPENDED" /> |
| <protected-broadcast android:name="android.intent.action.PACKAGES_UNSUSPENDED" /> |
| <protected-broadcast android:name="android.intent.action.PACKAGES_SUSPENSION_CHANGED" /> |
| <protected-broadcast android:name="android.intent.action.PACKAGE_UNSUSPENDED_MANUALLY" /> |
| <protected-broadcast android:name="android.intent.action.DISTRACTING_PACKAGES_CHANGED" /> |
| <protected-broadcast android:name="android.intent.action.ACTION_PREFERRED_ACTIVITY_CHANGED" /> |
| <protected-broadcast android:name="android.intent.action.UID_REMOVED" /> |
| <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" /> |
| <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" /> |
| <protected-broadcast android:name="android.intent.action.SPLIT_CONFIGURATION_CHANGED" /> |
| <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" /> |
| <protected-broadcast android:name="android.intent.action.APPLICATION_LOCALE_CHANGED" /> |
| <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" /> |
| <protected-broadcast android:name="android.intent.action.BATTERY_LEVEL_CHANGED" /> |
| <protected-broadcast android:name="android.intent.action.BATTERY_LOW" /> |
| <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" /> |
| <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" /> |
| <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" /> |
| <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" /> |
| <protected-broadcast android:name="android.intent.action.CHARGING" /> |
| <protected-broadcast android:name="android.intent.action.DISCHARGING" /> |
| <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" /> |
| <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" /> |
| <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" /> |
| <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" /> |
| <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" /> |
| <protected-broadcast android:name="android.intent.action.REBOOT" /> |
| <protected-broadcast android:name="android.intent.action.DOCK_EVENT" /> |
| <protected-broadcast android:name="android.intent.action.THERMAL_EVENT" /> |
| <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" /> |
| <protected-broadcast android:name="android.intent.action.USER_ADDED" /> |
| <protected-broadcast android:name="android.intent.action.USER_REMOVED" /> |
| <protected-broadcast android:name="android.intent.action.USER_STARTING" /> |
| <protected-broadcast android:name="android.intent.action.USER_STARTED" /> |
| <protected-broadcast android:name="android.intent.action.USER_STOPPING" /> |
| <protected-broadcast android:name="android.intent.action.USER_STOPPED" /> |
| <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" /> |
| <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" /> |
| <protected-broadcast android:name="android.intent.action.USER_SWITCHED" /> |
| <protected-broadcast android:name="android.intent.action.USER_INITIALIZE" /> |
| <protected-broadcast android:name="android.intent.action.INTENT_FILTER_NEEDS_VERIFICATION" /> |
| <protected-broadcast android:name="android.intent.action.DOMAINS_NEED_VERIFICATION" /> |
| <protected-broadcast android:name="android.intent.action.OVERLAY_ADDED" /> |
| <protected-broadcast android:name="android.intent.action.OVERLAY_CHANGED" /> |
| <protected-broadcast android:name="android.intent.action.OVERLAY_REMOVED" /> |
| <protected-broadcast android:name="android.intent.action.OVERLAY_PRIORITY_CHANGED" /> |
| <protected-broadcast android:name="android.intent.action.MY_PACKAGE_SUSPENDED" /> |
| <protected-broadcast android:name="android.intent.action.MY_PACKAGE_UNSUSPENDED" /> |
| <protected-broadcast android:name="android.intent.action.UNARCHIVE_PACKAGE" /> |
| |
| <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED" /> |
| <protected-broadcast android:name="android.os.action.DEVICE_IDLE_MODE_CHANGED" /> |
| <protected-broadcast android:name="android.os.action.POWER_SAVE_WHITELIST_CHANGED" /> |
| <protected-broadcast android:name="android.os.action.POWER_SAVE_TEMP_WHITELIST_CHANGED" /> |
| <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED_INTERNAL" /> |
| <protected-broadcast android:name="android.os.action.LOW_POWER_STANDBY_ENABLED_CHANGED" /> |
| <protected-broadcast android:name="android.os.action.LOW_POWER_STANDBY_POLICY_CHANGED" /> |
| <protected-broadcast android:name="android.os.action.LOW_POWER_STANDBY_PORTS_CHANGED" /> |
| <protected-broadcast android:name="android.os.action.ENHANCED_DISCHARGE_PREDICTION_CHANGED" /> |
| |
| <!-- @deprecated This is rarely used and will be phased out soon. --> |
| <protected-broadcast android:name="android.os.action.SCREEN_BRIGHTNESS_BOOST_CHANGED" /> |
| |
| <protected-broadcast android:name="android.app.action.CLOSE_NOTIFICATION_HANDLER_PANEL" /> |
| |
| <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" /> |
| <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" /> |
| <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE_PRIORITIZED" /> |
| <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE_PRIORITIZED" /> |
| <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" /> |
| <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" /> |
| <protected-broadcast android:name="android.app.action.NEXT_ALARM_CLOCK_CHANGED" /> |
| |
| <protected-broadcast android:name="android.app.action.USER_ADDED" /> |
| <protected-broadcast android:name="android.app.action.USER_REMOVED" /> |
| <protected-broadcast android:name="android.app.action.USER_STARTED" /> |
| <protected-broadcast android:name="android.app.action.USER_STOPPED" /> |
| <protected-broadcast android:name="android.app.action.USER_SWITCHED" /> |
| |
| <protected-broadcast android:name="android.app.action.BUGREPORT_SHARING_DECLINED" /> |
| <protected-broadcast android:name="android.app.action.BUGREPORT_FAILED" /> |
| <protected-broadcast android:name="android.app.action.BUGREPORT_SHARE" /> |
| <protected-broadcast android:name="android.app.action.SHOW_DEVICE_MONITORING_DIALOG" /> |
| <protected-broadcast android:name="android.intent.action.PENDING_INCIDENT_REPORTS_CHANGED" /> |
| <protected-broadcast android:name="android.intent.action.INCIDENT_REPORT_READY" /> |
| |
| <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" /> |
| <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" /> |
| <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" /> |
| <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" /> |
| <protected-broadcast android:name="android.appwidget.action.APPWIDGET_HOST_RESTORED" /> |
| <protected-broadcast android:name="android.appwidget.action.APPWIDGET_RESTORED" /> |
| <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLE_AND_UPDATE" /> |
| |
| <protected-broadcast android:name="android.os.action.SETTING_RESTORED" /> |
| |
| <protected-broadcast android:name="android.app.backup.intent.CLEAR" /> |
| <protected-broadcast android:name="android.app.backup.intent.INIT" /> |
| |
| <protected-broadcast android:name="android.bluetooth.intent.DISCOVERABLE_TIMEOUT" /> |
| <protected-broadcast android:name="android.bluetooth.action.AUTO_ON_STATE_CHANGED" /> |
| <protected-broadcast android:name="android.bluetooth.action.CONNECTION_STATE_CHANGED" /> |
| <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" /> |
| <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" /> |
| <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" /> |
| <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" /> |
| <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" /> |
| <protected-broadcast android:name="android.bluetooth.adapter.action.BLUETOOTH_ADDRESS_CHANGED" /> |
| <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" /> |
| <protected-broadcast android:name="android.bluetooth.device.action.UUID" /> |
| <protected-broadcast android:name="android.bluetooth.device.action.MAS_INSTANCE" /> |
| <protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" /> |
| <protected-broadcast android:name="android.bluetooth.device.action.FOUND" /> |
| <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" /> |
| <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" /> |
| <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" /> |
| <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" /> |
| <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" /> |
| <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" /> |
| <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" /> |
| <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" /> |
| <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" /> |
| <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" /> |
| <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" /> |
| <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" /> |
| <protected-broadcast android:name="android.bluetooth.device.action.KEY_MISSING" /> |
| <protected-broadcast android:name="android.bluetooth.device.action.ENCRYPTION_CHANGE" /> |
| <protected-broadcast android:name="android.bluetooth.device.action.SDP_RECORD" /> |
| <protected-broadcast android:name="android.bluetooth.device.action.BATTERY_LEVEL_CHANGED" /> |
| <protected-broadcast android:name="android.bluetooth.device.action.REMOTE_ISSUE_OCCURRED" /> |
| <protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" /> |
| <protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" /> |
| <protected-broadcast |
| android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" /> |
| <protected-broadcast |
| android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" /> |
| <protected-broadcast |
| android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" /> |
| <protected-broadcast |
| android:name="android.bluetooth.headset.action.HF_INDICATORS_VALUE_CHANGED" /> |
| <protected-broadcast |
| android:name="android.bluetooth.headset.profile.action.ACTIVE_DEVICE_CHANGED" /> |
| <protected-broadcast |
| android:name="android.bluetooth.headsetclient.profile.action.CONNECTION_STATE_CHANGED" /> |
| <protected-broadcast |
| android:name="android.bluetooth.headsetclient.profile.action.AUDIO_STATE_CHANGED" /> |
| <protected-broadcast |
| android:name="android.bluetooth.headsetclient.profile.action.AG_EVENT" /> |
| <protected-broadcast |
| android:name="android.bluetooth.headsetclient.profile.action.AG_CALL_CHANGED" /> |
| <protected-broadcast |
| android:name="android.bluetooth.headsetclient.profile.action.RESULT" /> |
| <protected-broadcast |
| android:name="android.bluetooth.headsetclient.profile.action.LAST_VTAG" /> |
| <protected-broadcast |
| android:name="android.bluetooth.headsetclient.profile.action.NETWORK_SERVICE_STATE_CHANGED" /> |
| <protected-broadcast |
| android:name="android.bluetooth.hearingaid.profile.action.CONNECTION_STATE_CHANGED" /> |
| <protected-broadcast |
| android:name="android.bluetooth.hearingaid.profile.action.PLAYING_STATE_CHANGED" /> |
| <protected-broadcast |
| android:name="android.bluetooth.hearingaid.profile.action.ACTIVE_DEVICE_CHANGED" /> |
| <protected-broadcast android:name="android.bluetooth.action.CSIS_CONNECTION_STATE_CHANGED" /> |
| <protected-broadcast android:name="android.bluetooth.action.CSIS_DEVICE_AVAILABLE" /> |
| <protected-broadcast android:name="android.bluetooth.action.CSIS_SET_MEMBER_AVAILABLE" /> |
| <protected-broadcast |
| android:name="android.bluetooth.volume-control.profile.action.CONNECTION_STATE_CHANGED" /> |
| <protected-broadcast |
| android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" /> |
| <protected-broadcast |
| android:name="android.bluetooth.a2dp.profile.action.ACTIVE_DEVICE_CHANGED" /> |
| <protected-broadcast |
| android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" /> |
| <protected-broadcast |
| android:name="android.bluetooth.a2dp.profile.action.CODEC_CONFIG_CHANGED" /> |
| <protected-broadcast |
| android:name="android.bluetooth.a2dp-sink.profile.action.CONNECTION_STATE_CHANGED" /> |
| <protected-broadcast |
| android:name="android.bluetooth.a2dp-sink.profile.action.PLAYING_STATE_CHANGED" /> |
| <protected-broadcast |
| android:name="android.bluetooth.a2dp-sink.profile.action.AUDIO_CONFIG_CHANGED" /> |
| <protected-broadcast |
| android:name="android.bluetooth.avrcp-controller.profile.action.BROWSE_CONNECTION_STATE_CHANGED" /> |
| <protected-broadcast |
| android:name="android.bluetooth.avrcp-controller.profile.action.CONNECTION_STATE_CHANGED" /> |
| <protected-broadcast |
| android:name="android.bluetooth.avrcp-controller.profile.action.FOLDER_LIST" /> |
| <protected-broadcast |
| android:name="android.bluetooth.avrcp-controller.profile.action.PLAYER_SETTING" /> |
| <protected-broadcast |
| android:name="android.bluetooth.avrcp-controller.profile.action.TRACK_EVENT" /> |
| <protected-broadcast |
| android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" /> |
| <protected-broadcast |
| android:name="android.bluetooth.input.profile.action.IDLE_TIME_CHANGED" /> |
| <protected-broadcast |
| android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" /> |
| <protected-broadcast |
| android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" /> |
| <protected-broadcast |
| android:name="android.bluetooth.hiddevice.profile.action.CONNECTION_STATE_CHANGED" /> |
| <protected-broadcast |
| android:name="android.bluetooth.map.profile.action.CONNECTION_STATE_CHANGED" /> |
| <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.CONNECTION_STATE_CHANGED" /> |
| <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_RECEIVED" /> |
| <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_SENT_SUCCESSFULLY" /> |
| <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_DELIVERED_SUCCESSFULLY" /> |
| <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_READ_STATUS_CHANGED" /> |
| <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_DELETED_STATUS_CHANGED" /> |
| <protected-broadcast |
| android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_SENT" /> |
| <protected-broadcast |
| android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_DELIVERY" /> |
| <protected-broadcast |
| android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" /> |
| <protected-broadcast android:name="android.bluetooth.action.HAP_CONNECTION_STATE_CHANGED" /> |
| <protected-broadcast android:name="android.bluetooth.action.HAP_DEVICE_AVAILABLE" /> |
| <protected-broadcast android:name="android.bluetooth.action.LE_AUDIO_CONNECTION_STATE_CHANGED" /> |
| <protected-broadcast android:name="android.bluetooth.action.LE_AUDIO_ACTIVE_DEVICE_CHANGED" /> |
| <protected-broadcast android:name="android.bluetooth.action.LE_AUDIO_CONF_CHANGED" /> |
| <protected-broadcast android:name="android.bluetooth.action.LE_AUDIO_GROUP_NODE_STATUS_CHANGED" /> |
| <protected-broadcast android:name="android.bluetooth.action.LE_AUDIO_GROUP_STATUS_CHANGED" /> |
| <protected-broadcast |
| android:name="android.bluetooth.action.TETHERING_STATE_CHANGED" /> |
| <protected-broadcast android:name="android.bluetooth.pbap.profile.action.CONNECTION_STATE_CHANGED" /> |
| <protected-broadcast android:name="android.bluetooth.pbapclient.profile.action.CONNECTION_STATE_CHANGED" /> |
| <protected-broadcast android:name="android.bluetooth.sap.profile.action.CONNECTION_STATE_CHANGED" /> |
| <protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" /> |
| <protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" /> |
| <protected-broadcast android:name="android.btopp.intent.action.LIST" /> |
| <protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" /> |
| <protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" /> |
| <protected-broadcast android:name="android.btopp.intent.action.CONFIRM" /> |
| <protected-broadcast android:name="android.btopp.intent.action.HIDE" /> |
| <protected-broadcast android:name="android.btopp.intent.action.RETRY" /> |
| <protected-broadcast android:name="android.btopp.intent.action.OPEN" /> |
| <protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" /> |
| <protected-broadcast android:name="android.btopp.intent.action.TRANSFER_COMPLETE" /> |
| <protected-broadcast android:name="android.btopp.intent.action.ACCEPT" /> |
| <protected-broadcast android:name="android.btopp.intent.action.DECLINE" /> |
| <protected-broadcast android:name="com.android.bluetooth.gatt.REFRESH_BATCHED_SCAN" /> |
| <protected-broadcast android:name="com.android.bluetooth.pbap.authchall" /> |
| <protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" /> |
| <protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" /> |
| <protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" /> |
| <protected-broadcast android:name="com.android.bluetooth.sap.USER_CONFIRM_TIMEOUT" /> |
| <protected-broadcast android:name="com.android.bluetooth.sap.action.DISCONNECT_ACTION" /> |
| |
| <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" /> |
| |
| <protected-broadcast android:name="android.hardware.hdmi.action.OSD_MESSAGE" /> |
| <protected-broadcast android:name="android.hardware.hdmi.action.ON_ACTIVE_SOURCE_RECOVERED_DISMISS_UI" /> |
| |
| <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" /> |
| <protected-broadcast android:name="android.hardware.usb.action.USB_PORT_CHANGED" /> |
| <protected-broadcast android:name="android.hardware.usb.action.USB_PORT_COMPLIANCE_CHANGED" /> |
| <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" /> |
| <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_DETACHED" /> |
| <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_HANDSHAKE" /> |
| <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" /> |
| <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" /> |
| |
| <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" /> |
| <protected-broadcast android:name="android.media.action.HDMI_AUDIO_PLUG" /> |
| <protected-broadcast android:name="android.media.action.MICROPHONE_MUTE_CHANGED" /> |
| <protected-broadcast android:name="android.media.action.SPEAKERPHONE_STATE_CHANGED" /> |
| |
| <protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" /> |
| <protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" /> |
| <protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" /> |
| <protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" /> |
| <protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" /> |
| <protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" /> |
| <protected-broadcast android:name="android.media.MASTER_MONO_CHANGED_ACTION" /> |
| <protected-broadcast android:name="android.media.MASTER_BALANCE_CHANGED_ACTION" /> |
| <protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" /> |
| <protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" /> |
| <protected-broadcast android:name="com.android.server.audio.action.CHECK_MUSIC_ACTIVE" /> |
| |
| <protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" /> |
| <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" /> |
| <protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" /> |
| <protected-broadcast android:name="android.intent.action.MEDIA_NOFS" /> |
| <protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" /> |
| <protected-broadcast android:name="android.intent.action.MEDIA_SHARED" /> |
| <protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" /> |
| <protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" /> |
| <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" /> |
| <protected-broadcast android:name="android.intent.action.MEDIA_EJECT" /> |
| |
| <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL" /> |
| <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" /> |
| <!-- @deprecated. Only {@link android.net.ConnectivityManager.CONNECTIVITY_ACTION} is sent. --> |
| <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" /> |
| <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" /> |
| <protected-broadcast android:name="android.net.conn.RESTRICT_BACKGROUND_CHANGED" /> |
| <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" /> |
| <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" /> |
| |
| <protected-broadcast android:name="android.net.nsd.STATE_CHANGED" /> |
| |
| <!-- For OMAPI --> |
| <protected-broadcast android:name="android.se.omapi.action.SECURE_ELEMENT_STATE_CHANGED" /> |
| |
| <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" /> |
| <protected-broadcast android:name="android.nfc.action.PREFERRED_PAYMENT_CHANGED" /> |
| <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" /> |
| <protected-broadcast android:name="android.nfc.action.REQUIRE_UNLOCK_FOR_NFC" /> |
| <protected-broadcast android:name="com.android.nfc.action.LLCP_UP" /> |
| <protected-broadcast android:name="com.android.nfc.action.LLCP_DOWN" /> |
| <protected-broadcast android:name="com.android.nfc.cardemulation.action.CLOSE_TAP_DIALOG" /> |
| <protected-broadcast android:name="com.android.nfc.handover.action.ALLOW_CONNECT" /> |
| <protected-broadcast android:name="com.android.nfc.handover.action.DENY_CONNECT" /> |
| <protected-broadcast android:name="com.android.nfc.handover.action.TIMEOUT_CONNECT" /> |
| <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" /> |
| <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" /> |
| <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" /> |
| <!-- For NFC to BT handover --> |
| <protected-broadcast android:name="android.btopp.intent.action.WHITELIST_DEVICE" /> |
| <protected-broadcast android:name="android.btopp.intent.action.STOP_HANDOVER_TRANSFER" /> |
| <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND" /> |
| <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND_MULTIPLE" /> |
| <protected-broadcast android:name="com.android.nfc.handover.action.CANCEL_HANDOVER_TRANSFER" /> |
| |
| <protected-broadcast android:name="android.net.action.CLEAR_DNS_CACHE" /> |
| <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" /> |
| |
| <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" /> |
| |
| <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" /> |
| <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" /> |
| <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" /> |
| |
| <protected-broadcast android:name="com.android.server.stats.action.TRIGGER_COLLECTION" /> |
| |
| <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" /> |
| <protected-broadcast android:name="com.android.server.WifiManager.action.START_PNO" /> |
| <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" /> |
| <protected-broadcast android:name="com.android.server.WifiManager.action.DEVICE_IDLE" /> |
| <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_ACCEPTED" /> |
| <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_DECLINED" /> |
| <protected-broadcast android:name="com.android.internal.action.EUICC_FACTORY_RESET" /> |
| <protected-broadcast |
| android:name="com.android.internal.action.EUICC_REMOVE_INVISIBLE_SUBSCRIPTIONS" /> |
| <protected-broadcast android:name="com.android.server.usb.ACTION_OPEN_IN_APPS" /> |
| <protected-broadcast android:name="com.android.server.am.DELETE_DUMPHEAP" /> |
| <protected-broadcast android:name="com.android.server.net.action.SNOOZE_WARNING" /> |
| <protected-broadcast android:name="com.android.server.net.action.SNOOZE_RAPID" /> |
| <protected-broadcast android:name="com.android.server.wifi.ACTION_SHOW_SET_RANDOMIZATION_DETAILS" /> |
| <protected-broadcast android:name="com.android.server.wifi.action.NetworkSuggestion.USER_ALLOWED_APP" /> |
| <protected-broadcast android:name="com.android.server.wifi.action.NetworkSuggestion.USER_DISALLOWED_APP" /> |
| <protected-broadcast android:name="com.android.server.wifi.action.NetworkSuggestion.USER_DISMISSED" /> |
| <protected-broadcast android:name="com.android.server.wifi.action.CarrierNetwork.USER_ALLOWED_CARRIER" /> |
| <protected-broadcast android:name="com.android.server.wifi.action.CarrierNetwork.USER_DISALLOWED_CARRIER" /> |
| <protected-broadcast android:name="com.android.server.wifi.action.CarrierNetwork.USER_DISMISSED" /> |
| <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.USER_DISMISSED_NOTIFICATION" /> |
| <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.CONNECT_TO_NETWORK" /> |
| <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.PICK_WIFI_NETWORK" /> |
| <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.PICK_NETWORK_AFTER_FAILURE" /> |
| <protected-broadcast android:name="com.android.server.wifi.wakeup.DISMISS_NOTIFICATION" /> |
| <protected-broadcast android:name="com.android.server.wifi.wakeup.OPEN_WIFI_PREFERENCES" /> |
| <protected-broadcast android:name="com.android.server.wifi.wakeup.OPEN_WIFI_SETTINGS" /> |
| <protected-broadcast android:name="com.android.server.wifi.wakeup.TURN_OFF_WIFI_WAKE" /> |
| <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" /> |
| <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" /> |
| <protected-broadcast android:name="android.net.wifi.WIFI_CREDENTIAL_CHANGED" /> |
| <protected-broadcast android:name="android.net.wifi.aware.action.WIFI_AWARE_STATE_CHANGED" /> |
| <protected-broadcast android:name="android.net.wifi.aware.action.WIFI_AWARE_RESOURCE_CHANGED" /> |
| <protected-broadcast android:name="android.net.wifi.rtt.action.WIFI_RTT_STATE_CHANGED" /> |
| <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" /> |
| <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" /> |
| <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" /> |
| <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" /> |
| <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" /> |
| <protected-broadcast android:name="android.net.wifi.action.NETWORK_SETTINGS_RESET" /> |
| <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_DEAUTH_IMMINENT" /> |
| <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_ICON" /> |
| <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_OSU_PROVIDERS_LIST" /> |
| <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_SUBSCRIPTION_REMEDIATION" /> |
| <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_LAUNCH_OSU_VIEW" /> |
| <protected-broadcast android:name="android.net.wifi.action.REFRESH_USER_PROVISIONING" /> |
| <protected-broadcast android:name="android.net.wifi.action.WIFI_NETWORK_SUGGESTION_POST_CONNECTION" /> |
| <protected-broadcast android:name="android.net.wifi.action.WIFI_SCAN_AVAILABILITY_CHANGED" /> |
| <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" /> |
| <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" /> |
| <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" /> |
| <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" /> |
| <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" /> |
| <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" /> |
| <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" /> |
| <protected-broadcast android:name="android.net.wifi.p2p.action.WIFI_P2P_PERSISTENT_GROUPS_CHANGED" /> |
| <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" /> |
| <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" /> |
| <!-- This broadcast is no longer sent in S but it should stay protected to avoid third party |
| apps broadcasting this and confusing old system apps that may not have been updated. --> |
| <protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" /> |
| <protected-broadcast |
| android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" /> |
| <protected-broadcast android:name="android.net.scoring.SCORE_NETWORKS" /> |
| <protected-broadcast android:name="android.net.scoring.SCORER_CHANGED" /> |
| <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" /> |
| <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" /> |
| <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" /> |
| <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" /> |
| <protected-broadcast android:name="android.intent.action.APPLICATION_RESTRICTIONS_CHANGED" /> |
| <protected-broadcast android:name="com.android.server.adb.WIRELESS_DEBUG_PAIRED_DEVICES" /> |
| <protected-broadcast android:name="com.android.server.adb.WIRELESS_DEBUG_PAIRING_RESULT" /> |
| <protected-broadcast android:name="com.android.server.adb.WIRELESS_DEBUG_STATUS" /> |
| |
| <!-- Legacy --> |
| <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" /> |
| <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" /> |
| |
| <protected-broadcast android:name="com.android.server.ACTION_TRIGGER_IDLE" /> |
| |
| <protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" /> |
| |
| <protected-broadcast android:name="android.intent.action.PHONE_STATE" /> |
| |
| <protected-broadcast android:name="android.intent.action.SUB_DEFAULT_CHANGED" /> |
| |
| <protected-broadcast android:name="android.location.PROVIDERS_CHANGED" /> |
| <protected-broadcast android:name="android.location.MODE_CHANGED" /> |
| <protected-broadcast android:name="android.location.action.GNSS_CAPABILITIES_CHANGED" /> |
| |
| <protected-broadcast android:name="android.net.proxy.PAC_REFRESH" /> |
| |
| <protected-broadcast android:name="android.telecom.action.DEFAULT_DIALER_CHANGED" /> |
| <protected-broadcast android:name="android.provider.action.DEFAULT_SMS_PACKAGE_CHANGED" /> |
| <protected-broadcast android:name="android.provider.action.SMS_MMS_DB_CREATED" /> |
| <protected-broadcast android:name="android.provider.action.SMS_MMS_DB_LOST" /> |
| <protected-broadcast android:name="android.intent.action.CONTENT_CHANGED" /> |
| <protected-broadcast android:name="android.provider.Telephony.MMS_DOWNLOADED" /> |
| |
| <protected-broadcast |
| android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" /> |
| |
| <!-- Defined in RestrictionsManager --> |
| <protected-broadcast android:name="android.content.action.PERMISSION_RESPONSE_RECEIVED" /> |
| <protected-broadcast android:name="android.content.action.REQUEST_PERMISSION" /> |
| |
| <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_STARTED" /> |
| <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" /> |
| <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_PROGRESS" /> |
| <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" /> |
| |
| <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_DATA_SUBSCRIPTION_CHANGED" /> |
| <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_VOICE_SUBSCRIPTION_CHANGED" /> |
| |
| <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_DONE" /> |
| <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_FAILED" /> |
| |
| <protected-broadcast android:name="android.internal.policy.action.BURN_IN_PROTECTION" /> |
| <protected-broadcast android:name="android.app.action.SYSTEM_UPDATE_POLICY_CHANGED" /> |
| <protected-broadcast android:name="android.app.action.RESET_PROTECTION_POLICY_CHANGED" /> |
| <protected-broadcast android:name="android.app.action.DEVICE_OWNER_CHANGED" /> |
| <protected-broadcast android:name="android.app.action.MANAGED_USER_CREATED" /> |
| |
| <!-- Added in N --> |
| <protected-broadcast android:name="android.intent.action.ANR" /> |
| <protected-broadcast android:name="android.intent.action.CALL" /> |
| <protected-broadcast android:name="android.intent.action.CALL_PRIVILEGED" /> |
| <protected-broadcast android:name="android.intent.action.DROPBOX_ENTRY_ADDED" /> |
| <protected-broadcast android:name="android.intent.action.INPUT_METHOD_CHANGED" /> |
| <protected-broadcast android:name="android.intent.action.internal_sim_state_changed" /> |
| <protected-broadcast android:name="android.intent.action.LOCKED_BOOT_COMPLETED" /> |
| <protected-broadcast android:name="android.intent.action.PRECISE_CALL_STATE" /> |
| <protected-broadcast android:name="android.intent.action.SUBSCRIPTION_PHONE_STATE" /> |
| <protected-broadcast android:name="android.intent.action.USER_INFO_CHANGED" /> |
| <protected-broadcast android:name="android.intent.action.USER_UNLOCKED" /> |
| <protected-broadcast android:name="android.intent.action.WALLPAPER_CHANGED" /> |
| |
| <protected-broadcast android:name="android.app.action.DEVICE_POLICY_MANAGER_STATE_CHANGED" /> |
| <protected-broadcast android:name="android.app.action.CHOOSE_PRIVATE_KEY_ALIAS" /> |
| <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLED" /> |
| <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLE_REQUESTED" /> |
| <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_ENABLED" /> |
| <protected-broadcast android:name="android.app.action.LOCK_TASK_ENTERING" /> |
| <protected-broadcast android:name="android.app.action.LOCK_TASK_EXITING" /> |
| <protected-broadcast android:name="android.app.action.NOTIFY_PENDING_SYSTEM_UPDATE" /> |
| <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_CHANGED" /> |
| <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_EXPIRING" /> |
| <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_FAILED" /> |
| <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_SUCCEEDED" /> |
| <protected-broadcast android:name="com.android.server.ACTION_EXPIRED_PASSWORD_NOTIFICATION" /> |
| <protected-broadcast android:name="com.android.server.ACTION_PROFILE_OFF_DEADLINE" /> |
| <protected-broadcast android:name="com.android.server.ACTION_TURN_PROFILE_ON_NOTIFICATION" /> |
| |
| <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_ADDED" /> |
| <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNLOCKED" /> |
| <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_REMOVED" /> |
| <protected-broadcast android:name="android.app.action.MANAGED_PROFILE_PROVISIONED" /> |
| |
| <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_STATE_CHANGED" /> |
| <protected-broadcast android:name="com.android.bluetooth.map.USER_CONFIRM_TIMEOUT" /> |
| <protected-broadcast android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_SENT" /> |
| <protected-broadcast android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_DELIVERY" /> |
| <protected-broadcast android:name="android.content.jobscheduler.JOB_DELAY_EXPIRED" /> |
| <protected-broadcast android:name="android.content.syncmanager.SYNC_ALARM" /> |
| <protected-broadcast android:name="android.media.INTERNAL_RINGER_MODE_CHANGED_ACTION" /> |
| <protected-broadcast android:name="android.media.STREAM_DEVICES_CHANGED_ACTION" /> |
| <protected-broadcast android:name="android.media.STREAM_MUTE_CHANGED_ACTION" /> |
| <protected-broadcast android:name="android.net.sip.SIP_SERVICE_UP" /> |
| <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" /> |
| <protected-broadcast android:name="android.os.action.CHARGING" /> |
| <protected-broadcast android:name="android.os.action.DISCHARGING" /> |
| <protected-broadcast android:name="android.search.action.SEARCHABLES_CHANGED" /> |
| <protected-broadcast android:name="android.security.STORAGE_CHANGED" /> |
| <protected-broadcast android:name="android.security.action.TRUST_STORE_CHANGED" /> |
| <protected-broadcast android:name="android.security.action.KEYCHAIN_CHANGED" /> |
| <protected-broadcast android:name="android.security.action.KEY_ACCESS_CHANGED" /> |
| <protected-broadcast android:name="android.telecom.action.NUISANCE_CALL_STATUS_CHANGED" /> |
| <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_REGISTERED" /> |
| <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_UNREGISTERED" /> |
| <protected-broadcast android:name="android.telecom.action.POST_CALL" /> |
| <protected-broadcast android:name="android.telecom.action.SHOW_MISSED_CALLS_NOTIFICATION" /> |
| <protected-broadcast android:name="android.telephony.action.CARRIER_CONFIG_CHANGED" /> |
| <protected-broadcast android:name="android.telephony.action.DEFAULT_SUBSCRIPTION_CHANGED" /> |
| <protected-broadcast android:name="android.telephony.action.DEFAULT_SMS_SUBSCRIPTION_CHANGED" /> |
| <protected-broadcast android:name="android.telephony.action.SECRET_CODE" /> |
| <protected-broadcast android:name="android.telephony.action.SHOW_VOICEMAIL_NOTIFICATION" /> |
| <protected-broadcast android:name="android.telephony.action.SUBSCRIPTION_PLANS_CHANGED" /> |
| |
| <protected-broadcast android:name="com.android.bluetooth.btservice.action.ALARM_WAKEUP" /> |
| <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_POLL" /> |
| <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_UPDATED" /> |
| <protected-broadcast android:name="com.android.server.timedetector.NetworkTimeUpdateService.action.POLL" /> |
| <protected-broadcast android:name="com.android.server.telecom.intent.action.CALLS_ADD_ENTRY" /> |
| <protected-broadcast android:name="com.android.settings.location.MODE_CHANGING" /> |
| <protected-broadcast android:name="com.android.settings.bluetooth.ACTION_DISMISS_PAIRING" /> |
| <protected-broadcast android:name="com.android.settings.network.DELETE_SUBSCRIPTION" /> |
| <protected-broadcast android:name="com.android.settings.network.SWITCH_TO_SUBSCRIPTION" /> |
| <protected-broadcast android:name="com.android.settings.wifi.action.NETWORK_REQUEST" /> |
| |
| <protected-broadcast android:name="android.app.action.KEYGUARD_PRIVATE_NOTIFICATIONS_CHANGED" /> |
| <protected-broadcast android:name="NotificationManagerService.TIMEOUT" /> |
| <protected-broadcast android:name="com.android.server.notification.TimeToLiveHelper" /> |
| <protected-broadcast android:name="NotificationHistoryDatabase.CLEANUP" /> |
| <protected-broadcast android:name="ScheduleConditionProvider.EVALUATE" /> |
| <protected-broadcast android:name="EventConditionProvider.EVALUATE" /> |
| <protected-broadcast android:name="SnoozeHelper.EVALUATE" /> |
| <protected-broadcast android:name="wifi_scan_available" /> |
| |
| <protected-broadcast android:name="action.cne.started" /> |
| <protected-broadcast android:name="android.content.jobscheduler.JOB_DEADLINE_EXPIRED" /> |
| <protected-broadcast android:name="android.intent.action.ACTION_UNSOL_RESPONSE_OEM_HOOK_RAW" /> |
| <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_SUPL" /> |
| <protected-broadcast android:name="android.os.action.LIGHT_DEVICE_IDLE_MODE_CHANGED" /> |
| <protected-broadcast android:name="android.os.storage.action.VOLUME_STATE_CHANGED" /> |
| <protected-broadcast android:name="android.os.storage.action.DISK_SCANNED" /> |
| <protected-broadcast android:name="com.android.server.action.UPDATE_TWILIGHT_STATE" /> |
| <protected-broadcast android:name="com.android.server.action.RESET_TWILIGHT_AUTO" /> |
| <protected-broadcast android:name="com.android.server.device_idle.STEP_IDLE_STATE" /> |
| <protected-broadcast android:name="com.android.server.device_idle.STEP_LIGHT_IDLE_STATE" /> |
| <protected-broadcast android:name="com.android.server.Wifi.action.TOGGLE_PNO" /> |
| <protected-broadcast android:name="intent.action.ACTION_RF_BAND_INFO" /> |
| <protected-broadcast android:name="android.intent.action.MEDIA_RESOURCE_GRANTED" /> |
| <protected-broadcast android:name="android.app.action.NETWORK_LOGS_AVAILABLE" /> |
| <protected-broadcast android:name="android.app.action.SECURITY_LOGS_AVAILABLE" /> |
| <protected-broadcast android:name="android.app.action.COMPLIANCE_ACKNOWLEDGEMENT_REQUIRED" /> |
| |
| <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED" /> |
| <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED_INTERNAL" /> |
| <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_CHANGED" /> |
| <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_ACCESS_GRANTED_CHANGED" /> |
| <protected-broadcast android:name="android.app.action.AUTOMATIC_ZEN_RULE_STATUS_CHANGED" /> |
| <protected-broadcast android:name="android.os.action.ACTION_EFFECTS_SUPPRESSOR_CHANGED" /> |
| <protected-broadcast android:name="android.app.action.NOTIFICATION_CHANNEL_BLOCK_STATE_CHANGED" /> |
| <protected-broadcast android:name="android.app.action.NOTIFICATION_CHANNEL_GROUP_BLOCK_STATE_CHANGED" /> |
| <protected-broadcast android:name="android.app.action.NOTIFICATION_LISTENER_ENABLED_CHANGED" /> |
| <protected-broadcast android:name="android.app.action.APP_BLOCK_STATE_CHANGED" /> |
| |
| <protected-broadcast android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS" /> |
| <protected-broadcast android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS" /> |
| |
| <protected-broadcast android:name="android.intent.action.DYNAMIC_SENSOR_CHANGED" /> |
| |
| <protected-broadcast android:name="android.accounts.LOGIN_ACCOUNTS_CHANGED" /> |
| <protected-broadcast android:name="android.accounts.action.ACCOUNT_REMOVED" /> |
| <protected-broadcast android:name="android.accounts.action.VISIBLE_ACCOUNTS_CHANGED" /> |
| |
| <protected-broadcast android:name="com.android.sync.SYNC_CONN_STATUS_CHANGED" /> |
| |
| <protected-broadcast android:name="android.net.sip.action.SIP_INCOMING_CALL" /> |
| <protected-broadcast android:name="com.android.phone.SIP_ADD_PHONE" /> |
| <protected-broadcast android:name="android.net.sip.action.SIP_REMOVE_PROFILE" /> |
| <protected-broadcast android:name="android.net.sip.action.SIP_SERVICE_UP" /> |
| <protected-broadcast android:name="android.net.sip.action.SIP_CALL_OPTION_CHANGED" /> |
| <protected-broadcast android:name="android.net.sip.action.START_SIP" /> |
| |
| <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_CONNECTED" /> |
| <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_DISCONNECTED" /> |
| |
| <protected-broadcast android:name="android.bluetooth.input.profile.action.HANDSHAKE" /> |
| <protected-broadcast android:name="android.bluetooth.input.profile.action.REPORT" /> |
| |
| <protected-broadcast android:name="android.intent.action.TWILIGHT_CHANGED" /> |
| |
| <protected-broadcast android:name="com.android.server.fingerprint.ACTION_LOCKOUT_RESET" /> |
| <protected-broadcast android:name="android.net.wifi.PASSPOINT_ICON_RECEIVED" /> |
| |
| <protected-broadcast android:name="com.android.server.notification.CountdownConditionProvider" /> |
| <protected-broadcast android:name="android.server.notification.action.ENABLE_NAS" /> |
| <protected-broadcast android:name="android.server.notification.action.DISABLE_NAS" /> |
| <protected-broadcast android:name="android.server.notification.action.LEARNMORE_NAS" /> |
| |
| <protected-broadcast android:name="com.android.internal.location.ALARM_WAKEUP" /> |
| <protected-broadcast android:name="com.android.internal.location.ALARM_TIMEOUT" /> |
| <protected-broadcast android:name="android.intent.action.GLOBAL_BUTTON" /> |
| |
| <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_AVAILABLE" /> |
| <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNAVAILABLE" /> |
| <protected-broadcast android:name="com.android.server.pm.DISABLE_QUIET_MODE_AFTER_UNLOCK" /> |
| |
| <protected-broadcast android:name="android.intent.action.PROFILE_ACCESSIBLE" /> |
| <protected-broadcast android:name="android.intent.action.PROFILE_INACCESSIBLE" /> |
| |
| <protected-broadcast android:name="com.android.server.retaildemo.ACTION_RESET_DEMO" /> |
| |
| <protected-broadcast android:name="android.intent.action.DEVICE_LOCKED_CHANGED" /> |
| |
| <protected-broadcast android:name="com.android.content.pm.action.CAN_INTERACT_ACROSS_PROFILES_CHANGED"/> |
| |
| <!-- Added in O --> |
| <protected-broadcast android:name="android.app.action.APPLICATION_DELEGATION_SCOPES_CHANGED" /> |
| <protected-broadcast android:name="com.android.server.wm.ACTION_REVOKE_SYSTEM_ALERT_WINDOW_PERMISSION" /> |
| <protected-broadcast android:name="android.media.tv.action.PARENTAL_CONTROLS_ENABLED_CHANGED" /> |
| |
| <protected-broadcast android:name="android.content.pm.action.SESSION_COMMITTED" /> |
| <protected-broadcast android:name="android.os.action.USER_RESTRICTIONS_CHANGED" /> |
| <protected-broadcast android:name="android.media.tv.action.PREVIEW_PROGRAM_ADDED_TO_WATCH_NEXT" /> |
| <protected-broadcast android:name="android.media.tv.action.PREVIEW_PROGRAM_BROWSABLE_DISABLED" /> |
| <protected-broadcast android:name="android.media.tv.action.WATCH_NEXT_PROGRAM_BROWSABLE_DISABLED" /> |
| <protected-broadcast android:name="android.media.tv.action.CHANNEL_BROWSABLE_REQUESTED" /> |
| |
| <!-- Made protected in P (was introduced in JB-MR2) --> |
| <protected-broadcast android:name="android.intent.action.GET_RESTRICTION_ENTRIES" /> |
| <protected-broadcast android:name="android.telephony.euicc.action.OTA_STATUS_CHANGED" /> |
| |
| <!-- Added in P --> |
| <protected-broadcast android:name="android.app.action.PROFILE_OWNER_CHANGED" /> |
| <protected-broadcast android:name="android.app.action.TRANSFER_OWNERSHIP_COMPLETE" /> |
| <protected-broadcast android:name="android.app.action.AFFILIATED_PROFILE_TRANSFER_OWNERSHIP_COMPLETE" /> |
| <protected-broadcast android:name="android.app.action.STATSD_STARTED" /> |
| <protected-broadcast android:name="com.android.server.biometrics.fingerprint.ACTION_LOCKOUT_RESET" /> |
| <protected-broadcast android:name="com.android.server.biometrics.face.ACTION_LOCKOUT_RESET" /> |
| |
| <!-- For IdleController --> |
| <protected-broadcast android:name="android.intent.action.DOCK_IDLE" /> |
| <protected-broadcast android:name="android.intent.action.DOCK_ACTIVE" /> |
| |
| <!-- Added in Q --> |
| <protected-broadcast android:name="android.content.pm.action.SESSION_UPDATED" /> |
| <protected-broadcast android:name="android.settings.action.GRAYSCALE_CHANGED" /> |
| |
| <!-- For CarIdlenessTracker --> |
| <protected-broadcast android:name="com.android.server.jobscheduler.GARAGE_MODE_ON" /> |
| <protected-broadcast android:name="com.android.server.jobscheduler.GARAGE_MODE_OFF" /> |
| <protected-broadcast android:name="com.android.server.jobscheduler.FORCE_IDLE" /> |
| <protected-broadcast android:name="com.android.server.jobscheduler.UNFORCE_IDLE" /> |
| |
| <protected-broadcast android:name="android.provider.action.DEFAULT_SMS_PACKAGE_CHANGED_INTERNAL" /> |
| |
| <protected-broadcast android:name="android.intent.action.DEVICE_CUSTOMIZATION_READY" /> |
| |
| <!-- Added in R --> |
| <protected-broadcast android:name="android.app.action.RESET_PROTECTION_POLICY_CHANGED" /> |
| |
| <!-- For tether entitlement recheck--> |
| <protected-broadcast |
| android:name="com.android.server.connectivity.tethering.PROVISIONING_RECHECK_ALARM" /> |
| |
| <!-- Made protected in S (was added in R) --> |
| <protected-broadcast android:name="com.android.internal.intent.action.BUGREPORT_REQUESTED" /> |
| |
| <!-- Added in S --> |
| <protected-broadcast android:name="android.scheduling.action.REBOOT_READY" /> |
| <protected-broadcast android:name="android.app.action.DEVICE_POLICY_CONSTANTS_CHANGED" /> |
| <protected-broadcast android:name="android.app.action.SCHEDULE_EXACT_ALARM_PERMISSION_STATE_CHANGED" /> |
| <protected-broadcast android:name="android.app.action.SHOW_NEW_USER_DISCLAIMER" /> |
| |
| <!-- Moved from packages/services/Telephony in T --> |
| <protected-broadcast android:name="android.telecom.action.CURRENT_TTY_MODE_CHANGED" /> |
| <protected-broadcast android:name="android.intent.action.SERVICE_STATE" /> |
| <protected-broadcast android:name="android.intent.action.RADIO_TECHNOLOGY" /> |
| <protected-broadcast android:name="android.intent.action.EMERGENCY_CALLBACK_MODE_CHANGED" /> |
| <protected-broadcast android:name="android.intent.action.EMERGENCY_CALL_STATE_CHANGED" /> |
| <protected-broadcast android:name="android.intent.action.SIG_STR" /> |
| <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" /> |
| <protected-broadcast android:name="android.intent.action.DATA_STALL_DETECTED" /> |
| <protected-broadcast android:name="android.intent.action.SIM_STATE_CHANGED" /> |
| <protected-broadcast android:name="android.intent.action.USER_ACTIVITY_NOTIFICATION" /> |
| <protected-broadcast android:name="android.telephony.action.SHOW_NOTICE_ECM_BLOCK_OTHERS" /> |
| <protected-broadcast android:name="android.intent.action.ACTION_MDN_STATE_CHANGED" /> |
| <protected-broadcast android:name="android.telephony.action.SERVICE_PROVIDERS_UPDATED" /> |
| <protected-broadcast android:name="android.provider.Telephony.SIM_FULL" /> |
| <protected-broadcast android:name="com.android.internal.telephony.carrier_key_download_alarm" /> |
| <protected-broadcast android:name="com.android.internal.telephony.data-restart-trysetup" /> |
| <protected-broadcast android:name="com.android.internal.telephony.data-stall" /> |
| <protected-broadcast android:name="com.android.internal.telephony.provisioning_apn_alarm" /> |
| <protected-broadcast android:name="android.intent.action.DATA_SMS_RECEIVED" /> |
| <protected-broadcast android:name="android.provider.Telephony.SMS_RECEIVED" /> |
| <protected-broadcast android:name="android.provider.Telephony.SMS_DELIVER" /> |
| <protected-broadcast android:name="android.provider.Telephony.SMS_REJECTED" /> |
| <protected-broadcast android:name="android.provider.Telephony.WAP_PUSH_DELIVER" /> |
| <protected-broadcast android:name="android.provider.Telephony.WAP_PUSH_RECEIVED" /> |
| <protected-broadcast android:name="android.provider.Telephony.SMS_CB_RECEIVED" /> |
| <protected-broadcast android:name="android.provider.action.SMS_EMERGENCY_CB_RECEIVED" /> |
| <protected-broadcast android:name="android.provider.Telephony.SMS_SERVICE_CATEGORY_PROGRAM_DATA_RECEIVED" /> |
| <protected-broadcast android:name="android.provider.Telephony.SECRET_CODE" /> |
| <protected-broadcast android:name="com.android.internal.stk.command" /> |
| <protected-broadcast android:name="com.android.internal.stk.session_end" /> |
| <protected-broadcast android:name="com.android.internal.stk.icc_status_change" /> |
| <protected-broadcast android:name="com.android.internal.stk.alpha_notify" /> |
| <protected-broadcast android:name="com.android.internal.telephony.CARRIER_SIGNAL_REDIRECTED" /> |
| <protected-broadcast android:name="com.android.internal.telephony.CARRIER_SIGNAL_REQUEST_NETWORK_FAILED" /> |
| <protected-broadcast android:name="com.android.internal.telephony.CARRIER_SIGNAL_PCO_VALUE" /> |
| <protected-broadcast android:name="com.android.internal.telephony.CARRIER_SIGNAL_RESET" /> |
| <protected-broadcast android:name="com.android.internal.telephony.CARRIER_SIGNAL_DEFAULT_NETWORK_AVAILABLE" /> |
| <protected-broadcast android:name="com.android.internal.telephony.PROVISION" /> |
| <protected-broadcast android:name="com.android.internal.telephony.ACTION_LINE1_NUMBER_ERROR_DETECTED" /> |
| <protected-broadcast android:name="com.android.internal.provider.action.VOICEMAIL_SMS_RECEIVED" /> |
| <protected-broadcast android:name="com.android.intent.isim_refresh" /> |
| <protected-broadcast android:name="com.android.ims.ACTION_RCS_SERVICE_AVAILABLE" /> |
| <protected-broadcast android:name="com.android.ims.ACTION_RCS_SERVICE_UNAVAILABLE" /> |
| <protected-broadcast android:name="com.android.ims.ACTION_RCS_SERVICE_DIED" /> |
| <protected-broadcast android:name="com.android.ims.ACTION_PRESENCE_CHANGED" /> |
| <protected-broadcast android:name="com.android.ims.ACTION_PUBLISH_STATUS_CHANGED" /> |
| <protected-broadcast android:name="com.android.ims.IMS_SERVICE_UP" /> |
| <protected-broadcast android:name="com.android.ims.IMS_SERVICE_DOWN" /> |
| <protected-broadcast android:name="com.android.ims.IMS_INCOMING_CALL" /> |
| <protected-broadcast android:name="com.android.ims.internal.uce.UCE_SERVICE_UP" /> |
| <protected-broadcast android:name="com.android.ims.internal.uce.UCE_SERVICE_DOWN" /> |
| <protected-broadcast android:name="com.android.imsconnection.DISCONNECTED" /> |
| <protected-broadcast android:name="com.android.intent.action.IMS_FEATURE_CHANGED" /> |
| <protected-broadcast android:name="com.android.intent.action.IMS_CONFIG_CHANGED" /> |
| <protected-broadcast android:name="android.telephony.ims.action.WFC_IMS_REGISTRATION_ERROR" /> |
| <protected-broadcast android:name="com.android.phone.vvm.omtp.sms.REQUEST_SENT" /> |
| <protected-broadcast android:name="com.android.phone.vvm.ACTION_VISUAL_VOICEMAIL_SERVICE_EVENT" /> |
| <protected-broadcast android:name="com.android.internal.telephony.CARRIER_VVM_PACKAGE_INSTALLED" /> |
| <protected-broadcast android:name="com.android.cellbroadcastreceiver.GET_LATEST_CB_AREA_INFO" /> |
| <protected-broadcast android:name="com.android.internal.telephony.ACTION_CARRIER_CERTIFICATE_DOWNLOAD" /> |
| <protected-broadcast android:name="com.android.internal.telephony.action.COUNTRY_OVERRIDE" /> |
| <protected-broadcast android:name="com.android.internal.telephony.OPEN_DEFAULT_SMS_APP" /> |
| <protected-broadcast android:name="com.android.internal.telephony.ACTION_TEST_OVERRIDE_CARRIER_ID" /> |
| <protected-broadcast android:name="android.telephony.action.SIM_CARD_STATE_CHANGED" /> |
| <protected-broadcast android:name="android.telephony.action.SIM_APPLICATION_STATE_CHANGED" /> |
| <protected-broadcast android:name="android.telephony.action.SIM_SLOT_STATUS_CHANGED" /> |
| <protected-broadcast android:name="android.telephony.action.SUBSCRIPTION_CARRIER_IDENTITY_CHANGED" /> |
| <protected-broadcast android:name="android.telephony.action.SUBSCRIPTION_SPECIFIC_CARRIER_IDENTITY_CHANGED" /> |
| <protected-broadcast android:name="android.telephony.action.TOGGLE_PROVISION" /> |
| <protected-broadcast android:name="android.telephony.action.NETWORK_COUNTRY_CHANGED" /> |
| <protected-broadcast android:name="android.telephony.action.PRIMARY_SUBSCRIPTION_LIST_CHANGED" /> |
| <protected-broadcast android:name="android.telephony.action.MULTI_SIM_CONFIG_CHANGED" /> |
| <protected-broadcast android:name="android.telephony.action.CARRIER_SIGNAL_RESET" /> |
| <protected-broadcast android:name="android.telephony.action.CARRIER_SIGNAL_PCO_VALUE" /> |
| <protected-broadcast android:name="android.telephony.action.CARRIER_SIGNAL_DEFAULT_NETWORK_AVAILABLE" /> |
| <protected-broadcast android:name="android.telephony.action.CARRIER_SIGNAL_REDIRECTED" /> |
| <protected-broadcast android:name="android.telephony.action.CARRIER_SIGNAL_REQUEST_NETWORK_FAILED" /> |
| <protected-broadcast android:name="com.android.phone.settings.CARRIER_PROVISIONING" /> |
| <protected-broadcast android:name="com.android.phone.settings.TRIGGER_CARRIER_PROVISIONING" /> |
| <protected-broadcast android:name="com.android.internal.telephony.ACTION_VOWIFI_ENABLED" /> |
| <protected-broadcast android:name="android.telephony.action.ANOMALY_REPORTED" /> |
| <protected-broadcast android:name="android.intent.action.SUBSCRIPTION_INFO_RECORD_ADDED" /> |
| <protected-broadcast android:name="android.intent.action.ACTION_MANAGED_ROAMING_IND" /> |
| <protected-broadcast android:name="android.telephony.ims.action.RCS_SINGLE_REGISTRATION_CAPABILITY_UPDATE" /> |
| |
| <!-- Added in T --> |
| <protected-broadcast android:name="android.safetycenter.action.REFRESH_SAFETY_SOURCES" /> |
| <protected-broadcast android:name="android.safetycenter.action.SAFETY_CENTER_ENABLED_CHANGED" /> |
| <protected-broadcast android:name="android.app.action.DEVICE_POLICY_RESOURCE_UPDATED" /> |
| <protected-broadcast android:name="android.intent.action.SHOW_FOREGROUND_SERVICE_MANAGER" /> |
| <protected-broadcast android:name="android.service.autofill.action.DELAYED_FILL" /> |
| <protected-broadcast android:name="android.app.action.PROVISIONING_COMPLETED" /> |
| <protected-broadcast android:name="android.app.action.LOST_MODE_LOCATION_UPDATE" /> |
| |
| <!-- Added in U --> |
| <protected-broadcast android:name="android.intent.action.PROFILE_ADDED" /> |
| <protected-broadcast android:name="android.intent.action.PROFILE_REMOVED" /> |
| <protected-broadcast android:name="com.android.internal.telephony.cat.SMS_SENT_ACTION" /> |
| <protected-broadcast android:name="com.android.internal.telephony.cat.SMS_DELIVERY_ACTION" /> |
| <protected-broadcast android:name="android.companion.virtual.action.VIRTUAL_DEVICE_REMOVED" /> |
| <protected-broadcast android:name="com.android.internal.intent.action.FLASH_NOTIFICATION_START_PREVIEW" /> |
| <protected-broadcast android:name="com.android.internal.intent.action.FLASH_NOTIFICATION_STOP_PREVIEW" /> |
| <protected-broadcast android:name="android.app.admin.action.DEVICE_FINANCING_STATE_CHANGED" /> |
| <protected-broadcast android:name="android.app.admin.action.DEVICE_POLICY_SET_RESULT" /> |
| <protected-broadcast android:name="android.app.admin.action.DEVICE_POLICY_CHANGED" /> |
| |
| <!-- Added in V --> |
| <protected-broadcast android:name="android.intent.action.PROFILE_AVAILABLE" /> |
| <protected-broadcast android:name="android.intent.action.PROFILE_UNAVAILABLE" /> |
| <protected-broadcast android:name="android.app.action.CONSOLIDATED_NOTIFICATION_POLICY_CHANGED" /> |
| <protected-broadcast android:name="android.intent.action.MAIN_USER_LOCKSCREEN_KNOWLEDGE_FACTOR_CHANGED" /> |
| <protected-broadcast android:name="com.android.uwb.uwbcountrycode.GEOCODE_RETRY" /> |
| <protected-broadcast android:name="android.telephony.action.ACTION_SATELLITE_SUBSCRIBER_ID_LIST_CHANGED" /> |
| |
| <!-- ====================================================================== --> |
| <!-- RUNTIME PERMISSIONS --> |
| <!-- ====================================================================== --> |
| <eat-comment /> |
| |
| <!-- Grouping for platform runtime permissions is not accessible to apps |
| @hide |
| @SystemApi |
| @TestApi |
| --> |
| <permission-group android:name="android.permission-group.UNDEFINED" |
| android:priority="100" /> |
| |
| <!-- ====================================================================== --> |
| <!-- Permissions for accessing user's contacts including personal profile --> |
| <!-- ====================================================================== --> |
| <eat-comment /> |
| |
| <!-- Used for runtime permissions related to contacts and profiles on this |
| device. --> |
| <permission-group android:name="android.permission-group.CONTACTS" |
| android:icon="@drawable/perm_group_contacts" |
| android:label="@string/permgrouplab_contacts" |
| android:description="@string/permgroupdesc_contacts" |
| android:priority="100" /> |
| |
| <!-- Allows an application to read the user's contacts data. |
| <p>Protection level: dangerous |
| --> |
| <permission android:name="android.permission.READ_CONTACTS" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:label="@string/permlab_readContacts" |
| android:description="@string/permdesc_readContacts" |
| android:protectionLevel="dangerous" /> |
| <uses-permission android:name="android.permission.READ_CONTACTS" /> |
| |
| <!-- Allows an application to write the user's contacts data. |
| <p>Protection level: dangerous |
| --> |
| <permission android:name="android.permission.WRITE_CONTACTS" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:label="@string/permlab_writeContacts" |
| android:description="@string/permdesc_writeContacts" |
| android:protectionLevel="dangerous" /> |
| |
| <!-- Allows an app to update the verification status of E2EE contact keys owned by other apps. |
| <p>This permission is only granted to system apps. |
| <p>Protection level: signature|privileged |
| @SystemApi |
| @hide |
| @FlaggedApi("android.provider.user_keys") |
| --> |
| <permission android:name="android.permission.WRITE_VERIFICATION_STATE_E2EE_CONTACT_KEYS" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:label="@string/permlab_writeVerificationStateE2eeContactKeys" |
| android:description="@string/permdesc_writeVerificationStateE2eeContactKeys" |
| android:protectionLevel="signature|privileged" |
| android:featureFlag="android.provider.user_keys" /> |
| |
| <!-- Allows an application to set default account for new contacts. |
| <p> This permission is only granted to system applications fulfilling the Contacts app role. |
| <p>Protection level: internal|role |
| @SystemApi |
| @hide |
| --> |
| <permission android:name="android.permission.SET_DEFAULT_ACCOUNT_FOR_CONTACTS" |
| android:protectionLevel="internal|role" /> |
| |
| <!-- ====================================================================== --> |
| <!-- Permissions for accessing user's calendar --> |
| <!-- ====================================================================== --> |
| <eat-comment /> |
| |
| <!-- Used for runtime permissions related to user's calendar. --> |
| <permission-group android:name="android.permission-group.CALENDAR" |
| android:icon="@drawable/perm_group_calendar" |
| android:label="@string/permgrouplab_calendar" |
| android:description="@string/permgroupdesc_calendar" |
| android:priority="200" /> |
| |
| <!-- Allows an application to read the user's calendar data. |
| <p>Protection level: dangerous |
| --> |
| <permission android:name="android.permission.READ_CALENDAR" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:label="@string/permlab_readCalendar" |
| android:description="@string/permdesc_readCalendar" |
| android:protectionLevel="dangerous" /> |
| |
| <!-- Allows an application to write the user's calendar data. |
| <p>Protection level: dangerous |
| --> |
| <permission android:name="android.permission.WRITE_CALENDAR" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:label="@string/permlab_writeCalendar" |
| android:description="@string/permdesc_writeCalendar" |
| android:protectionLevel="dangerous" /> |
| |
| <!-- ====================================================================== --> |
| <!-- Permissions for accessing and modifying user's SMS messages --> |
| <!-- ====================================================================== --> |
| <eat-comment /> |
| |
| <!-- Allows accessing the messages on ICC |
| @hide Used internally. --> |
| <permission android:name="android.permission.ACCESS_MESSAGES_ON_ICC" |
| android:protectionLevel="signature" /> |
| |
| <!-- Used for runtime permissions related to user's SMS messages. --> |
| <permission-group android:name="android.permission-group.SMS" |
| android:icon="@drawable/perm_group_sms" |
| android:label="@string/permgrouplab_sms" |
| android:description="@string/permgroupdesc_sms" |
| android:priority="300" /> |
| |
| <!-- Allows an application to send SMS messages. |
| <p>Protection level: dangerous |
| |
| <p> This is a hard restricted permission which cannot be held by an app until |
| the installer on record allowlists the permission. For more details see |
| {@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}. |
| --> |
| <permission android:name="android.permission.SEND_SMS" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:label="@string/permlab_sendSms" |
| android:description="@string/permdesc_sendSms" |
| android:permissionFlags="costsMoney|hardRestricted" |
| android:protectionLevel="dangerous" /> |
| |
| <!-- Allows an application to receive SMS messages. |
| <p>Protection level: dangerous |
| |
| <p> This is a hard restricted permission which cannot be held by an app until |
| the installer on record allowlists the permission. For more details see |
| {@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}. |
| --> |
| <permission android:name="android.permission.RECEIVE_SMS" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:label="@string/permlab_receiveSms" |
| android:description="@string/permdesc_receiveSms" |
| android:permissionFlags="hardRestricted" |
| android:protectionLevel="dangerous" /> |
| |
| <!-- Allows an application to read SMS messages. |
| <p>Protection level: dangerous |
| |
| <p> This is a hard restricted permission which cannot be held by an app until |
| the installer on record allowlists the permission. For more details see |
| {@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}. |
| --> |
| <permission android:name="android.permission.READ_SMS" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:label="@string/permlab_readSms" |
| android:description="@string/permdesc_readSms" |
| android:permissionFlags="hardRestricted" |
| android:protectionLevel="dangerous" /> |
| |
| <!-- Allows an application to receive WAP push messages. |
| <p>Protection level: dangerous |
| |
| <p> This is a hard restricted permission which cannot be held by an app until |
| the installer on record allowlists the permission. For more details see |
| {@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}. |
| --> |
| <permission android:name="android.permission.RECEIVE_WAP_PUSH" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:label="@string/permlab_receiveWapPush" |
| android:description="@string/permdesc_receiveWapPush" |
| android:permissionFlags="hardRestricted" |
| android:protectionLevel="dangerous" /> |
| |
| <!-- Allows an application to monitor incoming MMS messages. |
| <p>Protection level: dangerous |
| |
| <p> This is a hard restricted permission which cannot be held by an app until |
| the installer on record allowlists the permission. For more details see |
| {@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}. |
| --> |
| <permission android:name="android.permission.RECEIVE_MMS" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:label="@string/permlab_receiveMms" |
| android:description="@string/permdesc_receiveMms" |
| android:permissionFlags="hardRestricted" |
| android:protectionLevel="dangerous" /> |
| |
| <!-- @SystemApi @TestApi Allows an application to forward cell broadcast messages to the cell |
| broadcast module. This is required in order to bind to the cell broadcast service, and |
| ensures that only the system can forward messages to it. |
| |
| <p>Protection level: signature |
| |
| @hide --> |
| <permission android:name="android.permission.BIND_CELL_BROADCAST_SERVICE" |
| android:label="@string/permlab_bindCellBroadcastService" |
| android:description="@string/permdesc_bindCellBroadcastService" |
| android:protectionLevel="signature" /> |
| |
| <!-- @SystemApi @TestApi Allows an application to read previously received cell broadcast |
| messages and to register a content observer to get notifications when |
| a cell broadcast has been received and added to the database. For |
| emergency alerts, the database is updated immediately after the |
| alert dialog and notification sound/vibration/speech are presented. |
| The "read" column is then updated after the user dismisses the alert. |
| This enables supplementary emergency assistance apps to start loading |
| additional emergency information (if Internet access is available) |
| when the alert is first received, and to delay presenting the info |
| to the user until after the initial alert dialog is dismissed. |
| <p>Protection level: dangerous |
| |
| <p> This is a hard restricted permission which cannot be held by an app until |
| the installer on record allowlists the permission. For more details see |
| {@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}. |
| |
| @hide Pending API council approval --> |
| <permission android:name="android.permission.READ_CELL_BROADCASTS" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:label="@string/permlab_readCellBroadcasts" |
| android:description="@string/permdesc_readCellBroadcasts" |
| android:permissionFlags="hardRestricted" |
| android:protectionLevel="dangerous" /> |
| |
| <!-- @SystemApi @hide Allows an application to communicate over satellite. |
| Only granted if the application is a system app or privileged app. --> |
| <permission android:name="android.permission.SATELLITE_COMMUNICATION" |
| android:protectionLevel="role|signature|privileged" /> |
| |
| <!-- ====================================================================== --> |
| <!-- Permissions for accessing external storage --> |
| <!-- ====================================================================== --> |
| <eat-comment /> |
| |
| <!-- Used for runtime permissions related to the shared external storage. --> |
| <permission-group android:name="android.permission-group.STORAGE" |
| android:icon="@drawable/perm_group_storage" |
| android:label="@string/permgrouplab_storage" |
| android:description="@string/permgroupdesc_storage" |
| android:priority="900" /> |
| |
| <!-- Allows an application to read from external storage. |
| <p class="note"><strong>Note: </strong>Starting in API level 33, this permission has no |
| effect. If your app accesses other apps' media files, request one or more of these permissions |
| instead: <a href="#READ_MEDIA_IMAGES"><code>READ_MEDIA_IMAGES</code></a>, |
| <a href="#READ_MEDIA_VIDEO"><code>READ_MEDIA_VIDEO</code></a>, |
| <a href="#READ_MEDIA_AUDIO"><code>READ_MEDIA_AUDIO</code></a>. Learn more about the |
| <a href="{@docRoot}training/data-storage/shared/media#storage-permission">storage |
| permissions</a> that are associated with media files.</p> |
| |
| <p>This permission is enforced starting in API level 19. Before API level 19, this |
| permission is not enforced and all apps still have access to read from external storage. |
| You can test your app with the permission enforced by enabling <em>Protect USB |
| storage</em> under <b>Developer options</b> in the Settings app on a device running Android |
| 4.1 or higher.</p> |
| <p>Also starting in API level 19, this permission is <em>not</em> required to |
| read or write files in your application-specific directories returned by |
| {@link android.content.Context#getExternalFilesDir} and |
| {@link android.content.Context#getExternalCacheDir}.</p> |
| <p>Starting in API level 29, apps don't need to request this permission to access files in |
| their app-specific directory on external storage, or their own files in the |
| <a href="{@docRoot}reference/android/provider/MediaStore"><code>MediaStore</code></a>. Apps |
| shouldn't request this permission unless they need to access other apps' files in the |
| <code>MediaStore</code>. Read more about these changes in the |
| <a href="{@docRoot}training/data-storage#scoped-storage">scoped storage</a> section of the |
| developer documentation.</p> |
| <p>If <em>both</em> your <a |
| href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code |
| minSdkVersion}</a> and <a |
| href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code |
| targetSdkVersion}</a> values are set to 3 or lower, the system implicitly |
| grants your app this permission. If you don't need this permission, be sure your <a |
| href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code |
| targetSdkVersion}</a> is 4 or higher.</p> |
| |
| <p> This is a soft restricted permission which cannot be held by an app it its |
| full form until the installer on record allowlists the permission. |
| Specifically, if the permission is allowlisted the holder app can access |
| external storage and the visual and aural media collections while if the |
| permission is not allowlisted the holder app can only access to the visual |
| and aural medial collections. Also the permission is immutably restricted |
| meaning that the allowlist state can be specified only at install time and |
| cannot change until the app is installed. For more details see |
| {@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}. |
| <p>Protection level: dangerous --> |
| <permission android:name="android.permission.READ_EXTERNAL_STORAGE" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:label="@string/permlab_sdcardRead" |
| android:description="@string/permdesc_sdcardRead" |
| android:permissionFlags="softRestricted|immutablyRestricted" |
| android:protectionLevel="dangerous" /> |
| |
| <!-- Required to be able to read audio files from shared storage. |
| <p>Protection level: dangerous --> |
| <permission-group android:name="android.permission-group.READ_MEDIA_AURAL" |
| android:icon="@drawable/perm_group_read_media_aural" |
| android:label="@string/permgrouplab_readMediaAural" |
| android:description="@string/permgroupdesc_readMediaAural" |
| android:priority="950" /> |
| |
| <!-- Allows an application to read audio files from external storage. |
| <p>This permission is enforced starting in API level |
| {@link android.os.Build.VERSION_CODES#TIRAMISU}. An app which targets |
| {@link android.os.Build.VERSION_CODES#TIRAMISU} or higher and needs to read audio files from |
| external storage must hold this permission; {@link #READ_EXTERNAL_STORAGE} is not required. |
| For apps with a <a href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code |
| targetSdkVersion}</a> of {@link android.os.Build.VERSION_CODES#S_V2} or lower, the |
| {@link #READ_EXTERNAL_STORAGE} permission is required, instead, to read audio files. |
| <p>Protection level: dangerous --> |
| <permission android:name="android.permission.READ_MEDIA_AUDIO" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:label="@string/permlab_readMediaAudio" |
| android:description="@string/permdesc_readMediaAudio" |
| android:protectionLevel="dangerous" /> |
| |
| <!-- Required to be able to read image and video files from shared storage. |
| <p>Protection level: dangerous --> |
| <permission-group android:name="android.permission-group.READ_MEDIA_VISUAL" |
| android:icon="@drawable/perm_group_read_media_visual" |
| android:label="@string/permgrouplab_readMediaVisual" |
| android:description="@string/permgroupdesc_readMediaVisual" |
| android:priority="1000" /> |
| |
| <!-- Allows an application to read video files from external storage. |
| <p>This permission is enforced starting in API level |
| {@link android.os.Build.VERSION_CODES#TIRAMISU}. An app which targets |
| {@link android.os.Build.VERSION_CODES#TIRAMISU} or higher and needs to read video files from |
| external storage must hold this permission; {@link #READ_EXTERNAL_STORAGE} is not required. |
| For apps with a <a href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code |
| targetSdkVersion}</a> of {@link android.os.Build.VERSION_CODES#S_V2} or lower, the |
| {@link #READ_EXTERNAL_STORAGE} permission is required, instead, to read video files. |
| <p>Protection level: dangerous --> |
| <permission android:name="android.permission.READ_MEDIA_VIDEO" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:label="@string/permlab_readMediaVideo" |
| android:description="@string/permdesc_readMediaVideo" |
| android:protectionLevel="dangerous" /> |
| |
| <!-- Allows an application to read image files from external storage. |
| <p>This permission is enforced starting in API level |
| {@link android.os.Build.VERSION_CODES#TIRAMISU}. An app which targets |
| {@link android.os.Build.VERSION_CODES#TIRAMISU} or higher and needs to read image files from |
| external storage must hold this permission; {@link #READ_EXTERNAL_STORAGE} is not required. |
| For apps with a <a href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code |
| targetSdkVersion}</a> of {@link android.os.Build.VERSION_CODES#S_V2} or lower, the |
| {@link #READ_EXTERNAL_STORAGE} permission is required, instead, to read image files. |
| <p>Protection level: dangerous --> |
| <permission android:name="android.permission.READ_MEDIA_IMAGES" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:label="@string/permlab_readMediaImages" |
| android:description="@string/permdesc_readMediaImages" |
| android:protectionLevel="dangerous" /> |
| |
| <!-- Allows an application to read image or video files from external storage that a user has |
| selected via the permission prompt photo picker. Apps can check this permission to verify that |
| a user has decided to use the photo picker, instead of granting access to |
| {@link #READ_MEDIA_IMAGES} or {@link #READ_MEDIA_VIDEO}. It does not prevent apps from |
| accessing the standard photo picker manually. This permission should be requested alongside |
| {@link #READ_MEDIA_IMAGES} and/or {@link #READ_MEDIA_VIDEO}, depending on which type of media |
| is desired. |
| <p> This permission will be automatically added to an app's manifest if the app requests |
| {@link #READ_MEDIA_IMAGES}, {@link #READ_MEDIA_VIDEO}, or {@link #ACCESS_MEDIA_LOCATION} |
| regardless of target SDK. If an app does not request this permission, then the grant dialog |
| will return `PERMISSION_GRANTED` for {@link #READ_MEDIA_IMAGES} and/or |
| {@link #READ_MEDIA_VIDEO}, but the app will only have access to the media selected by the |
| user. This false grant state will persist until the app goes into the background. |
| <p>Protection level: dangerous --> |
| <permission android:name="android.permission.READ_MEDIA_VISUAL_USER_SELECTED" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:label="@string/permlab_readVisualUserSelect" |
| android:description="@string/permdesc_readVisualUserSelect" |
| android:protectionLevel="dangerous" /> |
| |
| <!-- Allows an application to write to external storage. |
| <p><strong>Note: </strong>If your app targets {@link android.os.Build.VERSION_CODES#R} or |
| higher, this permission has no effect. |
| |
| <p>If your app is on a device that runs API level 19 or higher, you don't need to declare |
| this permission to read and write files in your application-specific directories returned |
| by {@link android.content.Context#getExternalFilesDir} and |
| {@link android.content.Context#getExternalCacheDir}. |
| |
| <p>Learn more about how to |
| <a href="{@docRoot}training/data-storage/shared/media#update-other-apps-files">modify media |
| files</a> that your app doesn't own, and how to |
| <a href="{@docRoot}training/data-storage/shared/documents-files">modify non-media files</a> |
| that your app doesn't own. |
| |
| <p>If your app is a file manager and needs broad access to external storage files, then |
| the system must place your app on an allowlist so that you can successfully request the |
| <a href="#MANAGE_EXTERNAL_STORAGE><code>MANAGE_EXTERNAL_STORAGE</code></a> permission. |
| Learn more about the appropriate use cases for |
| <a href="{@docRoot}training/data-storage/manage-all-files>managing all files on a storage |
| device</a>. |
| |
| <p>If <em>both</em> your <a |
| href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code |
| minSdkVersion}</a> and <a |
| href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code |
| targetSdkVersion}</a> values are set to 3 or lower, the system implicitly |
| grants your app this permission. If you don't need this permission, be sure your <a |
| href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code |
| targetSdkVersion}</a> is 4 or higher. |
| <p>Protection level: dangerous</p> |
| --> |
| <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:label="@string/permlab_sdcardWrite" |
| android:description="@string/permdesc_sdcardWrite" |
| android:permissionFlags="softRestricted|immutablyRestricted" |
| android:protectionLevel="dangerous" /> |
| |
| <!-- Allows an application to access any geographic locations persisted in the |
| user's shared collection. |
| <p>Protection level: dangerous --> |
| <permission android:name="android.permission.ACCESS_MEDIA_LOCATION" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:label="@string/permlab_mediaLocation" |
| android:description="@string/permdesc_mediaLocation" |
| android:protectionLevel="dangerous" /> |
| |
| <!-- @hide @SystemApi @TestApi |
| Allows an application to modify OBB files visible to other apps. --> |
| <permission android:name="android.permission.WRITE_OBB" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- Allows an application a broad access to external storage in scoped storage. |
| Intended to be used by few apps that need to manage files on behalf of the users. |
| <p>Protection level: signature|appop|preinstalled --> |
| <permission android:name="android.permission.MANAGE_EXTERNAL_STORAGE" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:protectionLevel="signature|appop|preinstalled" /> |
| |
| <!-- Allows an application to modify and delete media files on this device or any connected |
| storage device without user confirmation. Applications must already be granted the |
| {@link #READ_EXTERNAL_STORAGE} or {@link #MANAGE_EXTERNAL_STORAGE}} permissions for this |
| permission to take effect. |
| <p>Even if applications are granted this permission, if applications want to modify or |
| delete media files, they also must get the access by calling |
| {@link android.provider.MediaStore#createWriteRequest(ContentResolver, Collection)}, |
| {@link android.provider.MediaStore#createDeleteRequest(ContentResolver, Collection)}, or |
| {@link android.provider.MediaStore#createTrashRequest(ContentResolver, Collection, boolean)}. |
| <p>This permission doesn't give read or write access directly. It only prevents the user |
| confirmation dialog for these requests. |
| <p>If applications are not granted {@link #ACCESS_MEDIA_LOCATION}, the system also pops up |
| the user confirmation dialog for the write request. |
| <p>Protection level: signature|appop|preinstalled --> |
| <permission android:name="android.permission.MANAGE_MEDIA" |
| android:protectionLevel="signature|appop|preinstalled" /> |
| |
| <!-- ====================================================================== --> |
| <!-- Permissions for accessing the device location --> |
| <!-- ====================================================================== --> |
| <eat-comment /> |
| |
| <!-- Used for permissions that allow accessing the device location. --> |
| <permission-group android:name="android.permission-group.LOCATION" |
| android:icon="@drawable/perm_group_location" |
| android:label="@string/permgrouplab_location" |
| android:description="@string/permgroupdesc_location" |
| android:priority="400" /> |
| |
| <!-- Allows an app to access precise location. |
| Alternatively, you might want {@link #ACCESS_COARSE_LOCATION}. |
| <p>Protection level: dangerous |
| --> |
| <permission android:name="android.permission.ACCESS_FINE_LOCATION" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:label="@string/permlab_accessFineLocation" |
| android:description="@string/permdesc_accessFineLocation" |
| android:backgroundPermission="android.permission.ACCESS_BACKGROUND_LOCATION" |
| android:protectionLevel="dangerous|instant" /> |
| |
| <!-- Allows an app to access approximate location. |
| Alternatively, you might want {@link #ACCESS_FINE_LOCATION}. |
| <p>Protection level: dangerous |
| --> |
| <permission android:name="android.permission.ACCESS_COARSE_LOCATION" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:label="@string/permlab_accessCoarseLocation" |
| android:description="@string/permdesc_accessCoarseLocation" |
| android:backgroundPermission="android.permission.ACCESS_BACKGROUND_LOCATION" |
| android:protectionLevel="dangerous|instant" /> |
| |
| <!-- Allows an app to access location in the background. If you're requesting this permission, |
| you must also request either {@link #ACCESS_COARSE_LOCATION} or |
| {@link #ACCESS_FINE_LOCATION}. Requesting this permission by itself doesn't give you |
| location access. |
| <p>Protection level: dangerous |
| |
| <p> This is a hard restricted permission which cannot be held by an app until |
| the installer on record allowlists the permission. For more details see |
| {@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}. |
| --> |
| <permission android:name="android.permission.ACCESS_BACKGROUND_LOCATION" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:label="@string/permlab_accessBackgroundLocation" |
| android:permissionFlags="hardRestricted" |
| android:description="@string/permdesc_accessBackgroundLocation" |
| android:protectionLevel="dangerous|instant" /> |
| |
| <!-- Allows an application (emergency or advanced driver-assistance app) to bypass |
| location settings. |
| <p>Not for use by third-party applications. |
| @SystemApi |
| @hide |
| --> |
| <permission android:name="android.permission.LOCATION_BYPASS" |
| android:protectionLevel="signature|privileged"/> |
| |
| <!-- ====================================================================== --> |
| <!-- Permissions for accessing the call log --> |
| <!-- ====================================================================== --> |
| <eat-comment /> |
| |
| <!-- Used for permissions that are associated telephony features. --> |
| <permission-group android:name="android.permission-group.CALL_LOG" |
| android:icon="@drawable/perm_group_call_log" |
| android:label="@string/permgrouplab_calllog" |
| android:description="@string/permgroupdesc_calllog" |
| android:priority="450" /> |
| |
| <!-- Allows an application to access the IMS call service: making and |
| modifying a call |
| <p>Protection level: signature|privileged |
| @hide |
| --> |
| <permission android:name="android.permission.ACCESS_IMS_CALL_SERVICE" |
| android:label="@string/permlab_accessImsCallService" |
| android:description="@string/permdesc_accessImsCallService" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- @SystemApi @hide Allows an application to perform IMS Single Registration related actions. |
| Only granted if the application is a system app AND is in the Default SMS Role. |
| The permission is revoked when the app is taken out of the Default SMS Role. |
| <p>Protection level: internal|role |
| --> |
| <permission android:name="android.permission.PERFORM_IMS_SINGLE_REGISTRATION" |
| android:protectionLevel="internal|role" /> |
| |
| <!-- Allows an application to read the user's call log. |
| <p class="note"><strong>Note:</strong> If your app uses the |
| {@link #READ_CONTACTS} permission and <em>both</em> your <a |
| href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code |
| minSdkVersion}</a> and <a |
| href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code |
| targetSdkVersion}</a> values are set to 15 or lower, the system implicitly |
| grants your app this permission. If you don't need this permission, be sure your <a |
| href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code |
| targetSdkVersion}</a> is 16 or higher.</p> |
| <p>Protection level: dangerous |
| |
| <p> This is a hard restricted permission which cannot be held by an app until |
| the installer on record allowlists the permission. For more details see |
| {@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}. |
| --> |
| <permission android:name="android.permission.READ_CALL_LOG" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:label="@string/permlab_readCallLog" |
| android:description="@string/permdesc_readCallLog" |
| android:permissionFlags="hardRestricted" |
| android:protectionLevel="dangerous" /> |
| |
| <!-- Allows an application to write and read the user's call log data. |
| <p class="note"><strong>Note:</strong> If your app uses the |
| {@link #WRITE_CONTACTS} permission and <em>both</em> your <a |
| href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code |
| minSdkVersion}</a> and <a |
| href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code |
| targetSdkVersion}</a> values are set to 15 or lower, the system implicitly |
| grants your app this permission. If you don't need this permission, be sure your <a |
| href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code |
| targetSdkVersion}</a> is 16 or higher.</p> |
| <p>Protection level: dangerous |
| |
| <p> This is a hard restricted permission which cannot be held by an app until |
| the installer on record allowlists the permission. For more details see |
| {@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}. |
| --> |
| <permission android:name="android.permission.WRITE_CALL_LOG" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:label="@string/permlab_writeCallLog" |
| android:description="@string/permdesc_writeCallLog" |
| android:permissionFlags="hardRestricted" |
| android:protectionLevel="dangerous" /> |
| |
| <!-- Allows an application to see the number being dialed during an outgoing |
| call with the option to redirect the call to a different number or |
| abort the call altogether. |
| <p>Protection level: dangerous |
| |
| <p> This is a hard restricted permission which cannot be held by an app until |
| the installer on record allowlists the permission. For more details see |
| {@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}. |
| |
| @deprecated Applications should use {@link android.telecom.CallRedirectionService} instead |
| of the {@link android.content.Intent#ACTION_NEW_OUTGOING_CALL} broadcast. |
| --> |
| <permission android:name="android.permission.PROCESS_OUTGOING_CALLS" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:label="@string/permlab_processOutgoingCalls" |
| android:description="@string/permdesc_processOutgoingCalls" |
| android:permissionFlags="hardRestricted" |
| android:protectionLevel="dangerous" /> |
| |
| <!-- ====================================================================== --> |
| <!-- Permissions for accessing the device telephony --> |
| <!-- ====================================================================== --> |
| <eat-comment /> |
| |
| <!-- Used for permissions that are associated telephony features. --> |
| <permission-group android:name="android.permission-group.PHONE" |
| android:icon="@drawable/perm_group_phone_calls" |
| android:label="@string/permgrouplab_phone" |
| android:description="@string/permgroupdesc_phone" |
| android:priority="500" /> |
| |
| <!-- Allows read only access to phone state, including the current cellular network information, |
| the status of any ongoing calls, and a list of any {@link android.telecom.PhoneAccount}s |
| registered on the device. |
| <p class="note"><strong>Note:</strong> If <em>both</em> your <a |
| href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code |
| minSdkVersion}</a> and <a |
| href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code |
| targetSdkVersion}</a> values are set to 3 or lower, the system implicitly |
| grants your app this permission. If you don't need this permission, be sure your <a |
| href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code |
| targetSdkVersion}</a> is 4 or higher. |
| <p>Protection level: dangerous |
| --> |
| <permission android:name="android.permission.READ_PHONE_STATE" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:label="@string/permlab_readPhoneState" |
| android:description="@string/permdesc_readPhoneState" |
| android:protectionLevel="dangerous" /> |
| |
| <!-- Allows read only access to phone state with a non dangerous permission, |
| including the information like cellular network type, software version. --> |
| <permission android:name="android.permission.READ_BASIC_PHONE_STATE" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:label="@string/permlab_readBasicPhoneState" |
| android:description="@string/permdesc_readBasicPhoneState" |
| android:protectionLevel="normal" /> |
| |
| <!-- Allows read access to the device's phone number(s). This is a subset of the capabilities |
| granted by {@link #READ_PHONE_STATE} but is exposed to instant applications. |
| <p>Protection level: dangerous--> |
| <permission android:name="android.permission.READ_PHONE_NUMBERS" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:label="@string/permlab_readPhoneNumbers" |
| android:description="@string/permdesc_readPhoneNumbers" |
| android:protectionLevel="dangerous|instant" /> |
| |
| <!-- Allows an application to initiate a phone call without going through |
| the Dialer user interface for the user to confirm the call. |
| <p class="note"><b>Note:</b> An app holding this permission can also call carrier MMI |
| codes to change settings such as call forwarding or call waiting preferences.</p> |
| <p>Protection level: dangerous</p> |
| --> |
| <permission android:name="android.permission.CALL_PHONE" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:permissionFlags="costsMoney" |
| android:label="@string/permlab_callPhone" |
| android:description="@string/permdesc_callPhone" |
| android:protectionLevel="dangerous" /> |
| |
| <!-- Allows an application to add voicemails into the system. |
| <p>Protection level: dangerous |
| --> |
| <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:label="@string/permlab_addVoicemail" |
| android:description="@string/permdesc_addVoicemail" |
| android:protectionLevel="dangerous" /> |
| |
| <!-- Allows an application to use SIP service. |
| <p>Protection level: dangerous |
| --> |
| <permission android:name="android.permission.USE_SIP" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:description="@string/permdesc_use_sip" |
| android:label="@string/permlab_use_sip" |
| android:protectionLevel="dangerous"/> |
| |
| <!-- Allows the app to answer an incoming phone call. |
| <p>Protection level: dangerous |
| --> |
| <permission android:name="android.permission.ANSWER_PHONE_CALLS" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:label="@string/permlab_answerPhoneCalls" |
| android:description="@string/permdesc_answerPhoneCalls" |
| android:protectionLevel="dangerous|runtime" /> |
| |
| <!-- Allows a calling application which manages its own calls through the self-managed |
| {@link android.telecom.ConnectionService} APIs. See |
| {@link android.telecom.PhoneAccount#CAPABILITY_SELF_MANAGED} for more information on the |
| self-managed ConnectionService APIs. |
| <p>Protection level: normal |
| --> |
| <permission android:name="android.permission.MANAGE_OWN_CALLS" |
| android:label="@string/permlab_manageOwnCalls" |
| android:description="@string/permdesc_manageOwnCalls" |
| android:protectionLevel="normal" /> |
| |
| <!--Allows an app which implements the |
| {@link android.telecom.InCallService InCallService} API to be eligible to be enabled as a |
| calling companion app. This means that the Telecom framework will bind to the app's |
| InCallService implementation when there are calls active. The app can use the InCallService |
| API to view information about calls on the system and control these calls. |
| <p>Protection level: normal |
| --> |
| <permission android:name="android.permission.CALL_COMPANION_APP" |
| android:label="@string/permlab_callCompanionApp" |
| android:description="@string/permdesc_callCompanionApp" |
| android:protectionLevel="normal" /> |
| |
| <!-- Exempt this uid from restrictions to background audio recoding |
| <p>Protection level: signature|privileged |
| @hide |
| @SystemApi |
| --> |
| <permission android:name="android.permission.EXEMPT_FROM_AUDIO_RECORD_RESTRICTIONS" |
| android:label="@string/permlab_exemptFromAudioRecordRestrictions" |
| android:description="@string/permdesc_exemptFromAudioRecordRestrictions" |
| android:protectionLevel="signature|privileged|role" /> |
| |
| <!-- Allows a calling app to continue a call which was started in another app. An example is a |
| video calling app that wants to continue a voice call on the user's mobile network.<p> |
| When the handover of a call from one app to another takes place, there are two devices |
| which are involved in the handover; the initiating and receiving devices. The initiating |
| device is where the request to handover the call was started, and the receiving device is |
| where the handover request is confirmed by the other party.<p> |
| This permission protects access to the |
| {@link android.telecom.TelecomManager#acceptHandover(Uri, int, PhoneAccountHandle)} which |
| the receiving side of the handover uses to accept a handover. |
| <p>Protection level: dangerous |
| --> |
| <permission android:name="android.permission.ACCEPT_HANDOVER" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android.label="@string/permlab_acceptHandover" |
| android:description="@string/permdesc_acceptHandovers" |
| android:protectionLevel="dangerous" /> |
| |
| <!-- ====================================================================== --> |
| <!-- Permissions for accessing the device microphone --> |
| <!-- ====================================================================== --> |
| <eat-comment /> |
| |
| <!-- Used for permissions that are associated with accessing |
| microphone audio from the device. Note that phone calls also capture audio |
| but are in a separate (more visible) permission group. --> |
| <permission-group android:name="android.permission-group.MICROPHONE" |
| android:icon="@drawable/perm_group_microphone" |
| android:label="@string/permgrouplab_microphone" |
| android:description="@string/permgroupdesc_microphone" |
| android:priority="600" /> |
| |
| <!-- Allows an application to record audio. |
| <p>Protection level: dangerous |
| --> |
| <permission android:name="android.permission.RECORD_AUDIO" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:label="@string/permlab_recordAudio" |
| android:description="@string/permdesc_recordAudio" |
| android:backgroundPermission="android.permission.RECORD_BACKGROUND_AUDIO" |
| android:protectionLevel="dangerous|instant" /> |
| |
| <!-- @SystemApi @TestApi Allows an application to record audio while in the background. |
| This permission is not intended to be held by apps. |
| <p>Protection level: internal |
| @hide --> |
| <permission android:name="android.permission.RECORD_BACKGROUND_AUDIO" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:label="@string/permlab_recordBackgroundAudio" |
| android:description="@string/permdesc_recordBackgroundAudio" |
| android:protectionLevel="internal|role" /> |
| |
| <!-- ====================================================================== --> |
| <!-- Permissions for activity recognition --> |
| <!-- ====================================================================== --> |
| <eat-comment /> |
| |
| <!-- Used for permissions that are associated with activity recognition. --> |
| <permission-group android:name="android.permission-group.ACTIVITY_RECOGNITION" |
| android:icon="@drawable/perm_group_activity_recognition" |
| android:label="@string/permgrouplab_activityRecognition" |
| android:description="@string/permgroupdesc_activityRecognition" |
| android:priority="1000" /> |
| |
| <!-- Allows an application to recognize physical activity. |
| <p>Protection level: dangerous |
| --> |
| <permission android:name="android.permission.ACTIVITY_RECOGNITION" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:label="@string/permlab_activityRecognition" |
| android:description="@string/permdesc_activityRecognition" |
| android:protectionLevel="dangerous|instant" /> |
| |
| <!-- ====================================================================== --> |
| <!-- Permissions for accessing the vendor UCE Service --> |
| <!-- ====================================================================== --> |
| |
| <!-- @hide Allows an application to Access UCE-Presence. |
| <p>Protection level: signature|privileged |
| @deprecated Framework should no longer use this permission to access the vendor UCE service |
| using AIDL, it is instead implemented by RcsCapabilityExchangeImplBase |
| --> |
| <permission android:name="android.permission.ACCESS_UCE_PRESENCE_SERVICE" |
| android:permissionGroup="android.permission-group.PHONE" |
| android:protectionLevel="signature|privileged"/> |
| |
| <!-- @hide Allows an application to Access UCE-OPTIONS. |
| <p>Protection level: signature|privileged |
| @deprecated Framework should no longer use this permission to access the vendor UCE service |
| using AIDL, it is instead implemented by RcsCapabilityExchangeImplBase |
| --> |
| <permission android:name="android.permission.ACCESS_UCE_OPTIONS_SERVICE" |
| android:permissionGroup="android.permission-group.PHONE" |
| android:protectionLevel="signature|privileged"/> |
| |
| |
| |
| <!-- ====================================================================== --> |
| <!-- Permissions for accessing the device camera --> |
| <!-- ====================================================================== --> |
| <eat-comment /> |
| |
| <!-- Used for permissions that are associated with accessing |
| camera or capturing images/video from the device. --> |
| <permission-group android:name="android.permission-group.CAMERA" |
| android:icon="@drawable/perm_group_camera" |
| android:label="@string/permgrouplab_camera" |
| android:description="@string/permgroupdesc_camera" |
| android:priority="700" /> |
| |
| <!-- Required to be able to access the camera device. |
| <p>This will automatically enforce the |
| <a href="{@docRoot}guide/topics/manifest/uses-feature-element.html"> |
| uses-feature</a> manifest element for <em>all</em> camera features. |
| If you do not require all camera features or can properly operate if a camera |
| is not available, then you must modify your manifest as appropriate in order to |
| install on devices that don't support all camera features.</p> |
| <p>Protection level: dangerous |
| --> |
| <permission android:name="android.permission.CAMERA" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:label="@string/permlab_camera" |
| android:description="@string/permdesc_camera" |
| android:backgroundPermission="android.permission.BACKGROUND_CAMERA" |
| android:protectionLevel="dangerous|instant" /> |
| |
| <!-- Required to be able to discover and connect to nearby Bluetooth devices. |
| <p>Protection level: dangerous --> |
| <permission-group android:name="android.permission-group.NEARBY_DEVICES" |
| android:icon="@drawable/perm_group_nearby_devices" |
| android:label="@string/permgrouplab_nearby_devices" |
| android:description="@string/permgroupdesc_nearby_devices" |
| android:priority="750" /> |
| |
| <!-- @SystemApi @TestApi Required to be able to access the camera device in the background. |
| This permission is not intended to be held by apps. |
| <p>Protection level: internal |
| @hide --> |
| <permission android:name="android.permission.BACKGROUND_CAMERA" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:label="@string/permlab_backgroundCamera" |
| android:description="@string/permdesc_backgroundCamera" |
| android:protectionLevel="internal|role" /> |
| |
| <!-- @SystemApi Required in addition to android.permission.CAMERA to be able to access |
| system only camera devices. |
| <p>Protection level: system|signature|role |
| @hide --> |
| <permission android:name="android.permission.SYSTEM_CAMERA" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:label="@string/permlab_systemCamera" |
| android:description="@string/permdesc_systemCamera" |
| android:protectionLevel="system|signature|role" /> |
| |
| <!-- @SystemApi Allows receiving the camera service notifications when a camera is opened |
| (by a certain application package) or closed. |
| @hide --> |
| <permission android:name="android.permission.CAMERA_OPEN_CLOSE_LISTENER" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:label="@string/permlab_cameraOpenCloseListener" |
| android:description="@string/permdesc_cameraOpenCloseListener" |
| android:protectionLevel="signature" /> |
| |
| <!-- @SystemApi Allows camera access by Headless System User 0 when device is running in |
| HSUM Mode. |
| @FlaggedApi("com.android.internal.camera.flags.camera_hsum_permission") |
| @hide --> |
| <permission android:name="android.permission.CAMERA_HEADLESS_SYSTEM_USER" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:label="@string/permlab_cameraHeadlessSystemUser" |
| android:description="@string/permdesc_cameraHeadlessSystemUser" |
| android:protectionLevel="signature" |
| android:featureFlag="com.android.internal.camera.flags.camera_hsum_permission" /> |
| |
| |
| <!-- @SystemApi Allows camera access of allowlisted driver assistance apps |
| to be controlled separately. |
| <p> Not for use by third-party applications. |
| @FlaggedApi("com.android.internal.camera.flags.camera_privacy_allowlist") |
| @hide |
| --> |
| <permission android:name="android.permission.CAMERA_PRIVACY_ALLOWLIST" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- ====================================================================== --> |
| <!-- Permissions for accessing the device sensors --> |
| <!-- ====================================================================== --> |
| <eat-comment /> |
| |
| <!-- Used for permissions that are associated with accessing |
| body or environmental sensors. --> |
| <permission-group android:name="android.permission-group.SENSORS" |
| android:icon="@drawable/perm_group_sensors" |
| android:label="@string/permgrouplab_sensors" |
| android:description="@string/permgroupdesc_sensors" |
| android:priority="800" /> |
| |
| <!-- Allows an app to access sensor data with a sampling rate greater than 200 Hz. |
| <p>Protection level: normal |
| --> |
| <permission android:name="android.permission.HIGH_SAMPLING_RATE_SENSORS" |
| android:permissionGroup="android.permission-group.SENSORS" |
| android:label="@string/permlab_highSamplingRateSensors" |
| android:description="@string/permdesc_highSamplingRateSensors" |
| android:protectionLevel="normal" /> |
| |
| <!-- Allows an application to access data from sensors that the user uses to |
| measure what is happening inside their body, such as heart rate. |
| <p>Protection level: dangerous --> |
| <permission android:name="android.permission.BODY_SENSORS" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:label="@string/permlab_bodySensors" |
| android:description="@string/permdesc_bodySensors" |
| android:backgroundPermission="android.permission.BODY_SENSORS_BACKGROUND" |
| android:protectionLevel="dangerous" /> |
| |
| <!-- Allows an application to access data from sensors that the user uses to measure what is |
| happening inside their body, such as heart rate. If you're requesting this permission, you |
| must also request {@link #BODY_SENSORS}. Requesting this permission by itself doesn't give |
| you Body sensors access. |
| <p>Protection level: dangerous |
| |
| <p> This is a hard restricted permission which cannot be held by an app until |
| the installer on record allowlists the permission. For more details see |
| {@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}. |
| --> |
| <permission android:name="android.permission.BODY_SENSORS_BACKGROUND" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:label="@string/permlab_bodySensors_background" |
| android:description="@string/permdesc_bodySensors_background" |
| android:protectionLevel="dangerous" |
| android:permissionFlags="hardRestricted" /> |
| |
| <!-- Allows an app to use fingerprint hardware. |
| <p>Protection level: normal |
| @deprecated Applications should request {@link |
| android.Manifest.permission#USE_BIOMETRIC} instead |
| --> |
| <permission android:name="android.permission.USE_FINGERPRINT" |
| android:permissionGroup="android.permission-group.SENSORS" |
| android:label="@string/permlab_useFingerprint" |
| android:description="@string/permdesc_useFingerprint" |
| android:protectionLevel="normal" /> |
| |
| <!-- Allows an app to use device supported biometric modalities. |
| <p>Protection level: normal |
| --> |
| <permission android:name="android.permission.USE_BIOMETRIC" |
| android:permissionGroup="android.permission-group.SENSORS" |
| android:label="@string/permlab_useBiometric" |
| android:description="@string/permdesc_useBiometric" |
| android:protectionLevel="normal" /> |
| |
| <!-- ====================================================================== --> |
| <!-- Permissions for posting notifications --> |
| <!-- ====================================================================== --> |
| <eat-comment /> |
| |
| <!-- Used for permissions that are associated with posting notifications |
| --> |
| <permission-group android:name="android.permission-group.NOTIFICATIONS" |
| android:icon="@drawable/ic_notifications_alerted" |
| android:label="@string/permgrouplab_notifications" |
| android:description="@string/permgroupdesc_notifications" |
| android:priority="850" /> |
| |
| <!-- Allows an app to post notifications |
| <p>Protection level: dangerous |
| --> |
| <permission android:name="android.permission.POST_NOTIFICATIONS" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:label="@string/permlab_postNotification" |
| android:description="@string/permdesc_postNotification" |
| android:protectionLevel="dangerous|instant" /> |
| <uses-permission android:name="android.permission.POST_NOTIFICATIONS" /> |
| |
| <!-- ====================================================================== --> |
| <!-- REMOVED PERMISSIONS --> |
| <!-- ====================================================================== --> |
| |
| <!-- @hide We need to keep this around for backwards compatibility --> |
| <permission android:name="android.permission.READ_PROFILE" |
| android:protectionLevel="normal" |
| android:permissionFlags="removed"/> |
| |
| <!-- @hide We need to keep this around for backwards compatibility --> |
| <permission android:name="android.permission.WRITE_PROFILE" |
| android:protectionLevel="normal" |
| android:permissionFlags="removed"/> |
| |
| <!-- @hide We need to keep this around for backwards compatibility --> |
| <permission android:name="android.permission.READ_SOCIAL_STREAM" |
| android:protectionLevel="normal" |
| android:permissionFlags="removed"/> |
| |
| <!-- @hide We need to keep this around for backwards compatibility --> |
| <permission android:name="android.permission.WRITE_SOCIAL_STREAM" |
| android:protectionLevel="normal" |
| android:permissionFlags="removed"/> |
| |
| <!-- @hide We need to keep this around for backwards compatibility --> |
| <permission android:name="android.permission.READ_USER_DICTIONARY" |
| android:protectionLevel="normal" |
| android:permissionFlags="removed"/> |
| |
| <!-- @hide We need to keep this around for backwards compatibility --> |
| <permission android:name="android.permission.WRITE_USER_DICTIONARY" |
| android:protectionLevel="normal" |
| android:permissionFlags="removed"/> |
| |
| <!-- @SystemApi @hide We need to keep this around for backwards compatibility --> |
| <permission android:name="android.permission.WRITE_SMS" |
| android:protectionLevel="normal" |
| android:permissionFlags="removed"/> |
| |
| <!-- @hide We need to keep this around for backwards compatibility --> |
| <permission android:name="com.android.browser.permission.READ_HISTORY_BOOKMARKS" |
| android:protectionLevel="normal" |
| android:permissionFlags="removed"/> |
| |
| <!-- @hide We need to keep this around for backwards compatibility --> |
| <permission android:name="com.android.browser.permission.WRITE_HISTORY_BOOKMARKS" |
| android:protectionLevel="normal" |
| android:permissionFlags="removed"/> |
| |
| <!-- @hide We need to keep this around for backwards compatibility --> |
| <permission android:name="android.permission.AUTHENTICATE_ACCOUNTS" |
| android:protectionLevel="normal" |
| android:permissionFlags="removed"/> |
| |
| <!-- @hide We need to keep this around for backwards compatibility --> |
| <permission android:name="android.permission.MANAGE_ACCOUNTS" |
| android:protectionLevel="normal" |
| android:permissionFlags="removed"/> |
| |
| <!-- @hide We need to keep this around for backwards compatibility --> |
| <permission android:name="android.permission.USE_CREDENTIALS" |
| android:protectionLevel="normal" |
| android:permissionFlags="removed"/> |
| |
| <!-- @hide We need to keep this around for backwards compatibility --> |
| <permission android:name="android.permission.SUBSCRIBED_FEEDS_READ" |
| android:protectionLevel="normal" |
| android:permissionFlags="removed"/> |
| |
| <!-- @hide We need to keep this around for backwards compatibility --> |
| <permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE" |
| android:protectionLevel="normal" |
| android:permissionFlags="removed"/> |
| |
| <!-- @hide We need to keep this around for backwards compatibility --> |
| <permission android:name="android.permission.FLASHLIGHT" |
| android:protectionLevel="normal" |
| android:permissionFlags="removed"/> |
| |
| <!-- ====================================================================== --> |
| <!-- INSTALL PERMISSIONS --> |
| <!-- ====================================================================== --> |
| |
| <!-- ================================== --> |
| <!-- Permissions for accessing messages --> |
| <!-- ================================== --> |
| <eat-comment /> |
| |
| <!-- Allows an application (Phone) to send a request to other applications |
| to handle the respond-via-message action during incoming calls. |
| <p>Not for use by third-party applications. --> |
| <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- @SystemApi Allows an application to send SMS to premium shortcodes without user permission. |
| <p>Not for use by third-party applications. |
| @hide --> |
| <permission android:name="android.permission.SEND_SMS_NO_CONFIRMATION" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- Allows an application to filter carrier specific sms. |
| @hide --> |
| <permission android:name="android.permission.CARRIER_FILTER_SMS" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- @SystemApi Allows an application to receive emergency cell broadcast messages, |
| to record or display them to the user. |
| <p>Not for use by third-party applications. |
| @hide --> |
| <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- @SystemApi Allows an application to monitor incoming Bluetooth MAP messages, to record |
| or perform processing on them. --> |
| <!-- @hide --> |
| <permission android:name="android.permission.RECEIVE_BLUETOOTH_MAP" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- @SystemApi @hide Allows an application to execute contacts directory search. |
| This should only be used by ContactsProvider. |
| <p>Not for use by third-party applications. --> |
| <permission android:name="android.permission.BIND_DIRECTORY_SEARCH" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- @SystemApi @hide Allows an application to modify the cell broadcasts configuration |
| (i.e. enable or disable channels). |
| <p>Not for use by third-party applications. --> |
| <permission android:name="android.permission.MODIFY_CELL_BROADCASTS" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- =============================================================== --> |
| <!-- Permissions for setting the device alarm --> |
| <!-- =============================================================== --> |
| <eat-comment /> |
| |
| <!-- Allows an application to broadcast an Intent to set an alarm for the user. |
| <p>Protection level: normal |
| --> |
| <permission android:name="com.android.alarm.permission.SET_ALARM" |
| android:label="@string/permlab_setAlarm" |
| android:description="@string/permdesc_setAlarm" |
| android:protectionLevel="normal" /> |
| |
| <!-- =============================================================== --> |
| <!-- Permissions for accessing the user voicemail --> |
| <!-- =============================================================== --> |
| <eat-comment /> |
| |
| <!-- Allows an application to modify and remove existing voicemails in the system. |
| <p>Protection level: signature|privileged|role |
| --> |
| <permission android:name="com.android.voicemail.permission.WRITE_VOICEMAIL" |
| android:protectionLevel="signature|privileged|role" /> |
| |
| <!-- Allows an application to read voicemails in the system. |
| <p>Protection level: signature|privileged|role |
| --> |
| <permission android:name="com.android.voicemail.permission.READ_VOICEMAIL" |
| android:protectionLevel="signature|privileged|role" /> |
| |
| <!-- ======================================= --> |
| <!-- Permissions for accessing location info --> |
| <!-- ======================================= --> |
| <eat-comment /> |
| |
| <!-- Allows an application to access extra location provider commands. |
| <p>Protection level: normal |
| --> |
| <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS" |
| android:label="@string/permlab_accessLocationExtraCommands" |
| android:description="@string/permdesc_accessLocationExtraCommands" |
| android:protectionLevel="normal" /> |
| |
| <!-- Allows an application to install a location provider into the Location Manager. |
| <p>Not for use by third-party applications. --> |
| <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- @SystemApi @hide Allows an application to provide location-based time zone suggestions to |
| the system server. This is needed because the system server discovers time zone providers |
| by exposed intent actions and metadata, without it any app could potentially register |
| itself as time zone provider. The system server checks for this permission. |
| <p>Not for use by third-party applications. |
| --> |
| <permission android:name="android.permission.INSTALL_LOCATION_TIME_ZONE_PROVIDER_SERVICE" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- @SystemApi @hide Allows an application to bind to a android.service.TimeZoneProviderService |
| for the purpose of detecting the device's time zone. This prevents arbitrary clients |
| connecting to the time zone provider service. The system server checks that the provider's |
| intent service explicitly sets this permission via the android:permission attribute of the |
| service. |
| This is only expected to be possessed by the system server outside of tests. |
| <p>Not for use by third-party applications. |
| --> |
| <permission android:name="android.permission.BIND_TIME_ZONE_PROVIDER_SERVICE" |
| android:protectionLevel="signature" /> |
| |
| <!-- @SystemApi @hide Allows HDMI-CEC service to access device and configuration files. |
| This should only be used by HDMI-CEC service. |
| --> |
| <permission android:name="android.permission.HDMI_CEC" |
| android:protectionLevel="signature|privileged|vendorPrivileged" /> |
| |
| <!-- Allows an application to use location features in hardware, |
| such as the geofencing api. |
| <p>Not for use by third-party applications. --> |
| <permission android:name="android.permission.LOCATION_HARDWARE" |
| android:protectionLevel="signature|privileged|role" /> |
| <uses-permission android:name="android.permission.LOCATION_HARDWARE"/> |
| |
| <!-- @SystemApi Allows an application to use the Context Hub. |
| <p>Not for use by third-party applications. |
| @hide |
| --> |
| <permission android:name="android.permission.ACCESS_CONTEXT_HUB" |
| android:protectionLevel="signature|privileged" /> |
| <uses-permission android:name="android.permission.ACCESS_CONTEXT_HUB"/> |
| |
| <!-- @SystemApi Allows an application to create mock location providers for testing. |
| <p>Protection level: signature |
| @hide |
| --> |
| <permission android:name="android.permission.ACCESS_MOCK_LOCATION" |
| android:protectionLevel="signature" /> |
| |
| <!-- @hide @SystemApi(client=android.annotation.SystemApi.Client.MODULE_LIBRARIES) |
| Allows automotive applications to control location |
| suspend state for power management use cases. |
| <p>Not for use by third-party applications. |
| --> |
| <permission android:name="android.permission.CONTROL_AUTOMOTIVE_GNSS" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- ======================================= --> |
| <!-- Permissions for accessing networks --> |
| <!-- ======================================= --> |
| <eat-comment /> |
| |
| <!-- Allows applications to open network sockets. |
| <p>Protection level: normal |
| --> |
| <permission android:name="android.permission.INTERNET" |
| android:description="@string/permdesc_createNetworkSockets" |
| android:label="@string/permlab_createNetworkSockets" |
| android:protectionLevel="normal|instant" /> |
| |
| <!-- Allows applications to access information about networks. |
| <p>Protection level: normal |
| --> |
| <permission android:name="android.permission.ACCESS_NETWORK_STATE" |
| android:description="@string/permdesc_accessNetworkState" |
| android:label="@string/permlab_accessNetworkState" |
| android:protectionLevel="normal|instant" /> |
| |
| <!-- Allows applications to access information about Wi-Fi networks. |
| <p>Protection level: normal |
| --> |
| <permission android:name="android.permission.ACCESS_WIFI_STATE" |
| android:description="@string/permdesc_accessWifiState" |
| android:label="@string/permlab_accessWifiState" |
| android:protectionLevel="normal" /> |
| |
| <!-- Allows applications to change Wi-Fi connectivity state. |
| <p>Protection level: normal |
| --> |
| <permission android:name="android.permission.CHANGE_WIFI_STATE" |
| android:description="@string/permdesc_changeWifiState" |
| android:label="@string/permlab_changeWifiState" |
| android:protectionLevel="normal" /> |
| |
| <!-- This permission is used to let OEMs grant their trusted app access to a subset of |
| privileged wifi APIs to improve wifi performance. Allows applications to manage |
| Wi-Fi network selection related features such as enable or disable global auto-join, |
| modify connectivity scan intervals, and approve Wi-Fi Direct connections. |
| <p>Not for use by third-party applications. --> |
| <permission android:name="android.permission.MANAGE_WIFI_NETWORK_SELECTION" |
| android:protectionLevel="signature|privileged|knownSigner" |
| android:knownCerts="@array/wifi_known_signers" /> |
| |
| <!-- Allows applications to get notified when a Wi-Fi interface request cannot |
| be satisfied without tearing down one or more other interfaces, and provide a decision |
| whether to approve the request or reject it. |
| <p>Not for use by third-party applications. --> |
| <permission android:name="android.permission.MANAGE_WIFI_INTERFACES" |
| android:protectionLevel="signature|privileged|knownSigner" |
| android:knownCerts="@array/wifi_known_signers" /> |
| |
| <!-- @SystemApi @hide Allows apps to create and manage IPsec tunnels. |
| <p>Only granted to applications that are currently bound by the |
| system for creating and managing IPsec-based interfaces. |
| --> |
| <permission android:name="android.permission.MANAGE_IPSEC_TUNNELS" |
| android:protectionLevel="signature|appop" /> |
| |
| <!-- @SystemApi @hide Allows apps to create and manage Test Networks. |
| <p>Granted only to shell. CTS tests will use |
| UiAutomation.AdoptShellPermissionIdentity() to gain access. |
| --> |
| <permission android:name="android.permission.MANAGE_TEST_NETWORKS" |
| android:protectionLevel="signature" /> |
| |
| <!-- Allows direct access to the <RemoteAuth>Service interfaces. |
| @hide --> |
| <permission android:name="android.permission.MANAGE_REMOTE_AUTH" |
| android:protectionLevel="signature" /> |
| |
| <!-- Allows direct access to the <RemoteAuth>Service authentication methods. |
| @hide --> |
| <permission android:name="android.permission.USE_REMOTE_AUTH" |
| android:protectionLevel="signature" /> |
| |
| <!-- @SystemApi @hide Allows applications to read Wi-Fi credential. |
| <p>Not for use by third-party applications. --> |
| <permission android:name="android.permission.READ_WIFI_CREDENTIAL" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- @SystemApi @hide Allows applications to change tether state and run |
| tether carrier provisioning. |
| <p>Not for use by third-party applications. --> |
| <permission android:name="android.permission.TETHER_PRIVILEGED" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- @SystemApi @hide Allow system apps to receive broadcast |
| when a wifi network credential is changed. |
| <p>Not for use by third-party applications. --> |
| <permission android:name="android.permission.RECEIVE_WIFI_CREDENTIAL_CHANGE" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- Allows an application to modify any wifi configuration, even if created |
| by another application. Once reconfigured the original creator cannot make any further |
| modifications. |
| <p>Not for use by third-party applications. --> |
| <permission android:name="android.permission.OVERRIDE_WIFI_CONFIG" |
| android:protectionLevel="signature|privileged|knownSigner" |
| android:knownCerts="@array/wifi_known_signers" /> |
| |
| <!-- @deprecated Allows applications to act as network scorers. @hide @SystemApi--> |
| <permission android:name="android.permission.SCORE_NETWORKS" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- @deprecated Allows applications to request network |
| recommendations and scores from the NetworkScoreService. |
| @SystemApi |
| <p>Not for use by third-party applications. @hide --> |
| <permission android:name="android.permission.REQUEST_NETWORK_SCORES" |
| android:protectionLevel="signature|setup" /> |
| |
| <!-- Allows applications to restart the Wi-Fi subsystem. |
| @SystemApi |
| <p>Not for use by third-party applications. @hide --> |
| <permission android:name="android.permission.RESTART_WIFI_SUBSYSTEM" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- @SystemApi @hide Allows applications to toggle airplane mode. |
| <p>Not for use by third-party or privileged applications. |
| --> |
| <permission android:name="android.permission.NETWORK_AIRPLANE_MODE" |
| android:protectionLevel="signature" /> |
| |
| <!-- Allows network stack services (Connectivity and Wifi) to coordinate |
| <p>Not for use by third-party or privileged applications. |
| @SystemApi @TestApi |
| @hide This should only be used by Connectivity and Wifi Services. |
| --> |
| <permission android:name="android.permission.NETWORK_STACK" |
| android:protectionLevel="signature" /> |
| |
| <!-- @SystemApi @hide Allows an application to observe network policy changes. --> |
| <permission android:name="android.permission.OBSERVE_NETWORK_POLICY" |
| android:protectionLevel="signature" /> |
| |
| <!-- @SystemApi @hide Allows applications to register network factory or agent --> |
| <permission android:name="android.permission.NETWORK_FACTORY" |
| android:protectionLevel="signature|role" /> |
| |
| <!-- @SystemApi @hide Allows applications to access network stats provider --> |
| <permission android:name="android.permission.NETWORK_STATS_PROVIDER" |
| android:protectionLevel="signature" /> |
| |
| <!-- Allows Settings and SystemUI to call methods in Networking services |
| <p>Not for use by third-party or privileged applications. |
| @SystemApi @TestApi |
| @hide This should only be used by Settings and SystemUI. |
| --> |
| <permission android:name="android.permission.NETWORK_SETTINGS" |
| android:protectionLevel="signature" /> |
| |
| <!-- Allows holder to request bluetooth/wifi scan bypassing global "use location" setting and |
| location permissions. |
| <p>Not for use by third-party or privileged applications. |
| @SystemApi |
| @hide |
| --> |
| <permission android:name="android.permission.RADIO_SCAN_WITHOUT_LOCATION" |
| android:protectionLevel="signature|companion" /> |
| |
| <!-- Allows SetupWizard to call methods in Networking services |
| <p>Not for use by any other third-party or privileged applications. |
| @SystemApi |
| @hide This should only be used by SetupWizard. |
| --> |
| <permission android:name="android.permission.NETWORK_SETUP_WIZARD" |
| android:protectionLevel="signature|setup" /> |
| |
| <!-- Allows Managed Provisioning to call methods in Networking services |
| <p>Not for use by any other third-party or privileged applications. |
| @SystemApi |
| @hide This should only be used by ManagedProvisioning app. |
| --> |
| <permission android:name="android.permission.NETWORK_MANAGED_PROVISIONING" |
| android:protectionLevel="signature|role" /> |
| |
| <!-- Allows Carrier Provisioning to call methods in Networking services |
| <p>Not for use by any other third-party or privileged applications. |
| @SystemApi |
| @hide This should only be used by CarrierProvisioning. |
| --> |
| <permission android:name="android.permission.NETWORK_CARRIER_PROVISIONING" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- #SystemApi @hide Allows applications to access information about LoWPAN interfaces. |
| <p>Not for use by third-party applications. --> |
| <permission android:name="android.permission.ACCESS_LOWPAN_STATE" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- #SystemApi @hide Allows applications to change LoWPAN connectivity state. |
| <p>Not for use by third-party applications. --> |
| <permission android:name="android.permission.CHANGE_LOWPAN_STATE" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- #SystemApi @hide Allows applications to read LoWPAN credential. |
| <p>Not for use by third-party applications. --> |
| <permission android:name="android.permission.READ_LOWPAN_CREDENTIAL" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- #SystemApi @hide Allows a service to register or unregister |
| new LoWPAN interfaces. |
| <p>Not for use by third-party applications. --> |
| <permission android:name="android.permission.MANAGE_LOWPAN_INTERFACES" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- @SystemApi @hide Allows changing Thread network state and access to Thread network |
| credentials such as Network Key and PSKc. |
| <p>Not for use by third-party applications. |
| @FlaggedApi("com.android.net.thread.platform.flags.thread_enabled_platform") --> |
| <permission android:name="android.permission.THREAD_NETWORK_PRIVILEGED" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- @hide Allows access to Thread network APIs or shell commands ("cmd thread_network") which |
| are only for testing. --> |
| <permission android:name="android.permission.THREAD_NETWORK_TESTING" |
| android:protectionLevel="signature" /> |
| |
| <!-- #SystemApi @hide Allows an app to bypass Private DNS. |
| <p>Not for use by third-party applications. |
| TODO: publish as system API in next API release. --> |
| <permission android:name="android.permission.NETWORK_BYPASS_PRIVATE_DNS" |
| android:protectionLevel="signature" /> |
| |
| <!-- @SystemApi @hide Allows device mobility state to be set so that Wifi scan interval can |
| be increased when the device is stationary in order to save power. |
| <p>Not for use by third-party applications. --> |
| <permission android:name="android.permission.WIFI_SET_DEVICE_MOBILITY_STATE" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- @SystemApi @hide Allows privileged system APK to update Wifi usability stats and score. |
| <p>Not for use by third-party applications. --> |
| <permission android:name="android.permission.WIFI_UPDATE_USABILITY_STATS_SCORE" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- @SystemApi @hide Allows applications to update Wifi/Cellular coex channels to avoid. |
| <p>Not for use by third-party applications. --> |
| <permission android:name="android.permission.WIFI_UPDATE_COEX_UNSAFE_CHANNELS" |
| android:protectionLevel="signature|role" /> |
| |
| <!-- @SystemApi @hide Allows applications to access Wifi/Cellular coex channels being avoided. |
| <p>Not for use by third-party applications. --> |
| <permission android:name="android.permission.WIFI_ACCESS_COEX_UNSAFE_CHANNELS" |
| android:protectionLevel="signature|role" /> |
| |
| <!-- @SystemApi @hide Allows system APK to manage country code. |
| <p>Not for use by third-party applications. --> |
| <permission android:name="android.permission.MANAGE_WIFI_COUNTRY_CODE" |
| android:protectionLevel="signature" /> |
| |
| <!-- @SystemApi @hide Allows an application to manage an automotive device's application network |
| preference as it relates to OEM_PAID and OEM_PRIVATE capable networks. |
| <p>Not for use by third-party or privileged applications. --> |
| <permission android:name="android.permission.CONTROL_OEM_PAID_NETWORK_PREFERENCE" |
| android:protectionLevel="signature" /> |
| |
| <!-- @SystemApi @hide Allows an application to manage ethernet networks. |
| <p>Not for use by third-party or privileged applications. --> |
| <permission android:name="android.permission.MANAGE_ETHERNET_NETWORKS" |
| android:protectionLevel="signature" /> |
| |
| <!-- Allows system apps to call methods to register itself as a mDNS offload engine. |
| <p>Not for use by third-party or privileged applications. |
| @SystemApi |
| @FlaggedApi("android.net.platform.flags.register_nsd_offload_engine") |
| @hide This should only be used by system apps. |
| --> |
| <permission android:name="android.permission.REGISTER_NSD_OFFLOAD_ENGINE" |
| android:protectionLevel="signature" |
| android:featureFlag="android.net.platform.flags.register_nsd_offload_engine" /> |
| |
| <!-- ======================================= --> |
| <!-- Permissions for short range, peripheral networks --> |
| <!-- ======================================= --> |
| <eat-comment /> |
| |
| <!-- Allows applications to connect to paired bluetooth devices. |
| <p>Protection level: normal |
| --> |
| <permission android:name="android.permission.BLUETOOTH" |
| android:description="@string/permdesc_bluetooth" |
| android:label="@string/permlab_bluetooth" |
| android:protectionLevel="normal" /> |
| |
| <!-- Required to be able to discover and pair nearby Bluetooth devices. |
| <p>Protection level: dangerous --> |
| <permission android:name="android.permission.BLUETOOTH_SCAN" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:description="@string/permdesc_bluetooth_scan" |
| android:label="@string/permlab_bluetooth_scan" |
| android:protectionLevel="dangerous" /> |
| |
| <!-- Required to be able to connect to paired Bluetooth devices. |
| <p>Protection level: dangerous --> |
| <permission android:name="android.permission.BLUETOOTH_CONNECT" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:description="@string/permdesc_bluetooth_connect" |
| android:label="@string/permlab_bluetooth_connect" |
| android:protectionLevel="dangerous" /> |
| |
| <!-- Required to be able to advertise to nearby Bluetooth devices. |
| <p>Protection level: dangerous --> |
| <permission android:name="android.permission.BLUETOOTH_ADVERTISE" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:description="@string/permdesc_bluetooth_advertise" |
| android:label="@string/permlab_bluetooth_advertise" |
| android:protectionLevel="dangerous" /> |
| |
| <!-- Required to be able to range to devices using ultra-wideband. |
| <p>Protection level: dangerous --> |
| <permission android:name="android.permission.UWB_RANGING" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:description="@string/permdesc_uwb_ranging" |
| android:label="@string/permlab_uwb_ranging" |
| android:protectionLevel="dangerous" /> |
| |
| <!-- Required to be able to advertise and connect to nearby devices via Wi-Fi. |
| <p>Protection level: dangerous --> |
| <permission android:name="android.permission.NEARBY_WIFI_DEVICES" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:description="@string/permdesc_nearby_wifi_devices" |
| android:label="@string/permlab_nearby_wifi_devices" |
| android:protectionLevel="dangerous" /> |
| |
| <!-- Required to be able to range to devices using generic ranging module. |
| @FlaggedApi("android.permission.flags.ranging_permission_enabled") |
| <p>Protection level: dangerous --> |
| <permission android:name="android.permission.RANGING" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:description="@string/permdesc_ranging" |
| android:label="@string/permlab_ranging" |
| android:protectionLevel="dangerous" |
| android:featureFlag="android.permission.flags.ranging_permission_enabled"/> |
| |
| <!-- @SystemApi @TestApi Allows an application to suspend other apps, which will prevent the |
| user from using them until they are unsuspended. |
| @hide |
| --> |
| <permission android:name="android.permission.SUSPEND_APPS" |
| android:protectionLevel="signature|role|verifier" /> |
| |
| <!-- @SystemApi |
| @hide |
| @FlaggedApi("android.content.pm.quarantined_enabled") |
| Allows an application to quarantine other apps, which will prevent |
| them from running without explicit user action. |
| --> |
| <permission android:name="android.permission.QUARANTINE_APPS" |
| android:protectionLevel="signature|verifier" |
| android:featureFlag="android.content.pm.quarantined_enabled" /> |
| |
| <!-- Allows applications to discover and pair bluetooth devices. |
| <p>Protection level: normal |
| --> |
| <permission android:name="android.permission.BLUETOOTH_ADMIN" |
| android:description="@string/permdesc_bluetoothAdmin" |
| android:label="@string/permlab_bluetoothAdmin" |
| android:protectionLevel="normal" /> |
| |
| <!-- Allows applications to pair bluetooth devices without user interaction, and to |
| allow or disallow phonebook access or message access. |
| <p>Not for use by third-party applications. --> |
| <permission android:name="android.permission.BLUETOOTH_PRIVILEGED" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- @SystemApi Control access to email providers exclusively for Bluetooth |
| @hide |
| --> |
| <permission android:name="android.permission.BLUETOOTH_MAP" |
| android:protectionLevel="signature|role" /> |
| |
| <!-- Allows bluetooth stack to access files |
| This should only be granted to the Bluetooth apk. |
| @hide @SystemApi(client=android.annotation.SystemApi.Client.MODULE_LIBRARIES) |
| --> |
| <permission android:name="android.permission.BLUETOOTH_STACK" |
| android:protectionLevel="signature|role" /> |
| |
| <!-- Allows uhid write access for creating virtual input devices |
| @hide |
| --> |
| <permission android:name="android.permission.VIRTUAL_INPUT_DEVICE" |
| android:protectionLevel="signature" /> |
| |
| <!-- Allows applications to perform I/O operations over NFC. |
| <p>Protection level: normal |
| --> |
| <permission android:name="android.permission.NFC" |
| android:description="@string/permdesc_nfc" |
| android:label="@string/permlab_nfc" |
| android:protectionLevel="normal" /> |
| |
| <!-- Allows applications to receive NFC transaction events. |
| <p>Protection level: normal |
| --> |
| <permission android:name="android.permission.NFC_TRANSACTION_EVENT" |
| android:description="@string/permdesc_nfcTransactionEvent" |
| android:label="@string/permlab_nfcTransactionEvent" |
| android:protectionLevel="normal" /> |
| |
| <!-- Allows applications to receive NFC preferred payment service information. |
| <p>Protection level: normal |
| --> |
| <permission android:name="android.permission.NFC_PREFERRED_PAYMENT_INFO" |
| android:description="@string/permdesc_preferredPaymentInfo" |
| android:label="@string/permlab_preferredPaymentInfo" |
| android:protectionLevel="normal" /> |
| |
| <!-- @SystemApi Allows access to set NFC controller always on states. |
| <p>Protection level: signature|privileged |
| @hide --> |
| <permission android:name="android.permission.NFC_SET_CONTROLLER_ALWAYS_ON" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- @SystemApi Allows an internal user to use privileged SecureElement APIs. |
| Applications holding this permission can access OMAPI reset system API |
| and bypass OMAPI AccessControlEnforcer. |
| <p>Not for use by third-party applications. |
| @hide --> |
| <permission android:name="android.permission.SECURE_ELEMENT_PRIVILEGED_OPERATION" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- @deprecated This permission used to allow too broad access to sensitive methods and all its |
| uses have been replaced by a more appropriate permission. Most uses have been replaced with |
| a NETWORK_STACK or NETWORK_SETTINGS check. Please look up the documentation of the |
| individual functions to figure out what permission now protects the individual function. |
| @SystemApi Allows an internal user to use privileged ConnectivityManager APIs. |
| @hide --> |
| <permission android:name="android.permission.CONNECTIVITY_INTERNAL" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- @SystemApi Allows an internal user to use restricted Networks. |
| @hide --> |
| <permission android:name="android.permission.CONNECTIVITY_USE_RESTRICTED_NETWORKS" |
| android:protectionLevel="signature|privileged" /> |
| <uses-permission android:name="android.permission.CONNECTIVITY_USE_RESTRICTED_NETWORKS"/> |
| |
| <!-- @SystemApi Allows an internal user to set signal strength in NetworkRequest. This kind of |
| request will wake up device when signal strength meets the given value. |
| @hide --> |
| <permission android:name="android.permission.NETWORK_SIGNAL_STRENGTH_WAKEUP" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- @SystemApi Allows a system application to access hardware packet offload capabilities. |
| @hide --> |
| <permission android:name="android.permission.PACKET_KEEPALIVE_OFFLOAD" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- @SystemApi |
| @hide --> |
| <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- @SystemApi Allows access to the loop radio (Android@Home mesh network) device. |
| @hide --> |
| <permission android:name="android.permission.LOOP_RADIO" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- Allows sending and receiving handover transfer status from Wifi and Bluetooth |
| @hide --> |
| <permission android:name="android.permission.NFC_HANDOVER_STATUS" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- @SystemApi Allows internal management of Bluetooth state when on wireless consent mode. |
| <p>Not for use by third-party applications. |
| @hide --> |
| <permission android:name="android.permission.MANAGE_BLUETOOTH_WHEN_WIRELESS_CONSENT_REQUIRED" |
| android:protectionLevel="signature" /> |
| |
| <!-- @hide Allows the device to be reset, clearing all data and enables Test Harness Mode. --> |
| <permission android:name="android.permission.ENABLE_TEST_HARNESS_MODE" |
| android:protectionLevel="signature" /> |
| |
| <!-- @SystemApi Allows access to ultra wideband device. |
| <p>Not for use by third-party applications. |
| @hide --> |
| <permission android:name="android.permission.UWB_PRIVILEGED" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- ================================== --> |
| <!-- Permissions for accessing accounts --> |
| <!-- ================================== --> |
| <eat-comment /> |
| |
| <!-- Allows access to the list of accounts in the Accounts Service. |
| |
| <p class="note"><strong>Note:</strong> Beginning with Android 6.0 (API level |
| 23), if an app shares the signature of the authenticator that manages an |
| account, it does not need <code>"GET_ACCOUNTS"</code> permission to read |
| information about that account. On Android 5.1 and lower, all apps need |
| <code>"GET_ACCOUNTS"</code> permission to read information about any |
| account.</p> |
| |
| <p>Protection level: dangerous |
| --> |
| <permission android:name="android.permission.GET_ACCOUNTS" |
| android:permissionGroup="android.permission-group.UNDEFINED" |
| android:protectionLevel="dangerous" |
| android:description="@string/permdesc_getAccounts" |
| android:label="@string/permlab_getAccounts" /> |
| <uses-permission android:name="android.permission.GET_ACCOUNTS"/> |
| |
| <!-- Allows applications to call into AccountAuthenticators. |
| <p>Not for use by third-party applications. --> |
| <permission android:name="android.permission.ACCOUNT_MANAGER" |
| android:protectionLevel="signature" /> |
| |
| <!-- ================================== --> |
| <!-- Permissions for accessing hardware that may effect battery life--> |
| <!-- ================================== --> |
| <eat-comment /> |
| |
| <!-- Allows applications to enter Wi-Fi Multicast mode. |
| <p>Protection level: normal |
| --> |
| <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE" |
| android:description="@string/permdesc_changeWifiMulticastState" |
| android:label="@string/permlab_changeWifiMulticastState" |
| android:protectionLevel="normal" /> |
| |
| <!-- Allows access to the vibrator. |
| <p>Protection level: normal |
| --> |
| <permission android:name="android.permission.VIBRATE" |
| android:label="@string/permlab_vibrate" |
| android:description="@string/permdesc_vibrate" |
| android:protectionLevel="normal|instant" /> |
| |
| <!-- Allows access to the vibrator always-on settings. |
| <p>Protection level: signature |
| @hide |
| --> |
| <permission android:name="android.permission.VIBRATE_ALWAYS_ON" |
| android:protectionLevel="signature" /> |
| |
| <!-- Allows access to system-only haptic feedback constants. |
| <p>Protection level: signature |
| @hide |
| --> |
| <permission android:name="android.permission.VIBRATE_SYSTEM_CONSTANTS" |
| android:protectionLevel="signature" /> |
| |
| <!-- @SystemApi Allows access to perform vendor effects in the vibrator. |
| <p>Protection level: signature |
| @FlaggedApi("android.os.vibrator.vendor_vibration_effects") |
| @hide |
| --> |
| <permission android:name="android.permission.VIBRATE_VENDOR_EFFECTS" |
| android:protectionLevel="signature|privileged" |
| android:featureFlag="android.os.vibrator.vendor_vibration_effects" /> |
| |
| <!-- @SystemApi Allows access to the vibrator state. |
| <p>Protection level: signature |
| @hide |
| --> |
| <permission android:name="android.permission.ACCESS_VIBRATOR_STATE" |
| android:label="@string/permdesc_vibrator_state" |
| android:description="@string/permdesc_vibrator_state" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen |
| from dimming. |
| <p>Protection level: normal |
| --> |
| <permission android:name="android.permission.WAKE_LOCK" |
| android:label="@string/permlab_wakeLock" |
| android:description="@string/permdesc_wakeLock" |
| android:protectionLevel="normal|instant" /> |
| |
| <!-- Allows using the device's IR transmitter, if available. |
| <p>Protection level: normal |
| --> |
| <permission android:name="android.permission.TRANSMIT_IR" |
| android:label="@string/permlab_transmitIr" |
| android:description="@string/permdesc_transmitIr" |
| android:protectionLevel="normal" /> |
| |
| <!-- Allows an app to turn on the screen on, e.g. with |
| {@link android.os.PowerManager#ACQUIRE_CAUSES_WAKEUP}. |
| <p>Intended to only be used by home automation apps. |
| --> |
| <permission android:name="android.permission.TURN_SCREEN_ON" |
| android:label="@string/permlab_turnScreenOn" |
| android:description="@string/permdesc_turnScreenOn" |
| android:protectionLevel="signature|privileged|appop" /> |
| |
| <!-- ==================================================== --> |
| <!-- Permissions related to changing audio settings --> |
| <!-- ==================================================== --> |
| <eat-comment /> |
| |
| <!-- Allows an application to modify global audio settings. |
| <p>Protection level: normal |
| --> |
| <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS" |
| android:label="@string/permlab_modifyAudioSettings" |
| android:description="@string/permdesc_modifyAudioSettings" |
| android:protectionLevel="normal" /> |
| |
| <!-- ==================================================== --> |
| <!-- Permissions related to screen capture --> |
| <!-- ==================================================== --> |
| <eat-comment /> |
| |
| <!-- Allows an application to capture screen content to perform a screenshot using the intent |
| action {@link android.content.Intent#ACTION_LAUNCH_CAPTURE_CONTENT_ACTIVITY_FOR_NOTE}. |
| <p>Protection level: internal|role |
| <p>Intended for use by ROLE_NOTES only. |
| --> |
| <permission android:name="android.permission.LAUNCH_CAPTURE_CONTENT_ACTIVITY_FOR_NOTE" |
| android:protectionLevel="internal|role" /> |
| |
| <!-- Allows an application to get notified when a screen capture of its windows is attempted. |
| <p>Protection level: normal |
| --> |
| <permission android:name="android.permission.DETECT_SCREEN_CAPTURE" |
| android:label="@string/permlab_detectScreenCapture" |
| android:description="@string/permdesc_detectScreenCapture" |
| android:protectionLevel="normal" /> |
| |
| <!-- Allows an application to get notified when it is being recorded. |
| <p>Protection level: normal |
| @FlaggedApi("com.android.window.flags.screen_recording_callbacks") |
| --> |
| <permission android:name="android.permission.DETECT_SCREEN_RECORDING" |
| android:protectionLevel="normal" |
| android:featureFlag="com.android.window.flags.screen_recording_callbacks" /> |
| |
| <!-- ======================================== --> |
| <!-- Permissions for factory reset protection --> |
| <!-- ======================================== --> |
| <eat-comment /> |
| |
| <!-- @SystemApi Allows an application to set a factory reset protection (FRP) policy. |
| <p>Not for use by third-party applications. |
| @hide |
| --> |
| <permission android:name="android.permission.MANAGE_FACTORY_RESET_PROTECTION" |
| android:protectionLevel="signature|privileged"/> |
| |
| <!-- ======================================== --> |
| <!-- Permissions for lost mode --> |
| <!-- ======================================== --> |
| <eat-comment /> |
| |
| <!-- @SystemApi Allows an application to trigger lost mode on an organization-owned device. |
| <p>Not for use by third-party applications. |
| @hide |
| --> |
| <permission android:name="android.permission.TRIGGER_LOST_MODE" |
| android:protectionLevel="signature|role"/> |
| |
| <!-- ================================== --> |
| <!-- Permissions for accessing hardware --> |
| <!-- ================================== --> |
| <eat-comment /> |
| |
| <!-- @SystemApi Allows an application to manage preferences and permissions for USB devices |
| @hide --> |
| <permission android:name="android.permission.MANAGE_USB" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- @SystemApi Allows an application to manage Android Debug Bridge settings. |
| <p>Not for use by third-party applications. |
| @hide --> |
| <permission android:name="android.permission.MANAGE_DEBUGGING" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- @SystemApi Allows an application to access the MTP USB kernel driver. |
| For use only by the device side MTP implementation. |
| @hide --> |
| <permission android:name="android.permission.ACCESS_MTP" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- @SystemApi Allows access to hardware peripherals. Intended only for hardware testing. |
| <p>Not for use by third-party applications. |
| @hide |
| --> |
| <permission android:name="android.permission.HARDWARE_TEST" |
| android:protectionLevel="signature" /> |
| |
| <!-- @hide Allows an application to manage DynamicSystem image --> |
| <permission android:name="android.permission.MANAGE_DYNAMIC_SYSTEM" |
| android:protectionLevel="signature" /> |
| |
| <!-- @SystemApi Allows an application to install a DynamicSystem image and get status updates. |
| @hide --> |
| <permission android:name="android.permission.INSTALL_DYNAMIC_SYSTEM" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- @SystemApi Allows access to Broadcast Radio |
| @hide This is not a third-party API (intended for system apps).--> |
| <permission android:name="android.permission.ACCESS_BROADCAST_RADIO" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- @deprecated @SystemApi Allows access to FM |
| @hide This is not a third-party API (intended for system apps).--> |
| <permission android:name="android.permission.ACCESS_FM_RADIO" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- Allows access to configure network interfaces, configure/use IPSec, etc. |
| @hide --> |
| <permission android:name="android.permission.NET_ADMIN" |
| android:protectionLevel="signature|role" /> |
| |
| <!-- Allows registration for remote audio playback. @hide --> |
| <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK" |
| android:protectionLevel="signature" /> |
| |
| <!-- Allows TvInputService to access underlying TV input hardware such as |
| built-in tuners and HDMI-in's. |
| <p>This should only be used by OEM's TvInputService's. |
| @hide @SystemApi --> |
| <permission android:name="android.permission.TV_INPUT_HARDWARE" |
| android:protectionLevel="signature|privileged|vendorPrivileged" /> |
| |
| <!-- Allows to capture a frame of TV input hardware such as |
| built-in tuners and HDMI-in's. |
| <p>Not for use by third-party applications. |
| @hide @SystemApi --> |
| <permission android:name="android.permission.CAPTURE_TV_INPUT" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- @hide Allows TvInputService to access DVB device. |
| <p>Not for use by third-party applications. --> |
| <permission android:name="android.permission.DVB_DEVICE" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- @SystemApi Allows reading and enabling/disabling the OEM unlock allowed by carrier state |
| @hide <p>Not for use by third-party applications. --> |
| <permission android:name="android.permission.MANAGE_CARRIER_OEM_UNLOCK_STATE" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- @SystemApi Allows reading and enabling/disabling the OEM unlock allowed by user state |
| @hide <p>Not for use by third-party applications. --> |
| <permission android:name="android.permission.MANAGE_USER_OEM_UNLOCK_STATE" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- @SystemApi Allows reading the OEM unlock state |
| @hide <p>Not for use by third-party applications. --> |
| <permission android:name="android.permission.READ_OEM_UNLOCK_STATE" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- @hide Allows enabling/disabling OEM unlock |
| <p>Not for use by third-party applications. --> |
| <permission android:name="android.permission.OEM_UNLOCK_STATE" |
| android:protectionLevel="signature" /> |
| |
| <!-- @SystemApi Allows configuration of factory reset protection |
| @FlaggedApi("android.security.frp_enforcement") |
| @hide <p>Not for use by third-party applications. --> |
| <permission android:name="android.permission.CONFIGURE_FACTORY_RESET_PROTECTION" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- @SystemApi @hide Allows querying state of PersistentDataBlock |
| <p>Not for use by third-party applications. --> |
| <permission android:name="android.permission.ACCESS_PDB_STATE" |
| android:protectionLevel="signature|role" /> |
| |
| <!-- Allows testing if a passwords is forbidden by the admins. |
| @hide <p>Not for use by third-party applications. --> |
| <permission android:name="android.permission.TEST_BLACKLISTED_PASSWORD" |
| android:protectionLevel="signature" /> |
| |
| <!-- @hide Allows system update service to notify device owner about pending updates. |
| <p>Not for use by third-party applications. --> |
| <permission android:name="android.permission.NOTIFY_PENDING_SYSTEM_UPDATE" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- =========================================== --> |
| <!-- Permissions associated with camera and image capture --> |
| <!-- =========================================== --> |
| <eat-comment /> |
| |
| <!-- @SystemApi Allows disabling the transmit-indicator LED that is normally on when |
| a camera is in use by an application. |
| @hide --> |
| <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- Allows sending the camera service notifications about system-wide events. |
| @hide --> |
| <permission android:name="android.permission.CAMERA_SEND_SYSTEM_EVENTS" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- Allows injecting the external camera to replace the internal camera. |
| @hide --> |
| <permission android:name="android.permission.CAMERA_INJECT_EXTERNAL_CAMERA" |
| android:protectionLevel="signature" /> |
| |
| <!-- =========================================== --> |
| <!-- Permissions associated with telephony state --> |
| <!-- =========================================== --> |
| <eat-comment /> |
| |
| <!-- @SystemApi Allows granting runtime permissions to telephony related components. |
| @hide --> |
| <permission android:name="android.permission.GRANT_RUNTIME_PERMISSIONS_TO_TELEPHONY_DEFAULTS" |
| android:protectionLevel="signature" /> |
| |
| <!-- Allows modification of the telephony state - power on, mmi, etc. |
| Does not include placing calls. |
| <p>Not for use by third-party applications. --> |
| <permission android:name="android.permission.MODIFY_PHONE_STATE" |
| android:protectionLevel="signature|privileged|role" /> |
| |
| <!-- Allows read only access to precise phone state. |
| Allows reading of detailed information about phone state for special-use applications |
| such as dialers, carrier applications, or ims applications. --> |
| <permission android:name="android.permission.READ_PRECISE_PHONE_STATE" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- @SystemApi @TestApi Allows read access to privileged phone state. |
| @hide Used internally. --> |
| <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE" |
| android:protectionLevel="signature|privileged|role" /> |
| |
| <!-- Allows to read device identifiers and use ICC based authentication like EAP-AKA. |
| Often required in authentication to access the carrier's server and manage services |
| of the subscriber. |
| <p>Protection level: signature|appop --> |
| <permission android:name="android.permission.USE_ICC_AUTH_WITH_DEVICE_IDENTIFIER" |
| android:protectionLevel="signature|appop" /> |
| |
| <!-- @SystemApi Allows read access to emergency number information for ongoing calls or SMS |
| sessions. |
| @hide Used internally. --> |
| <permission android:name="android.permission.READ_ACTIVE_EMERGENCY_SESSION" |
| android:protectionLevel="signature" /> |
| |
| <!-- Allows listen permission to always reported system signal strength. |
| @hide Used internally. --> |
| <permission android:name="android.permission.LISTEN_ALWAYS_REPORTED_SIGNAL_STRENGTH" |
| android:protectionLevel="signature|role" /> |
| |
| <!-- @SystemApi Protects the ability to register any PhoneAccount with |
| PhoneAccount#CAPABILITY_SIM_SUBSCRIPTION. This capability indicates that the PhoneAccount |
| corresponds to a device SIM. |
| @hide --> |
| <permission android:name="android.permission.REGISTER_SIM_SUBSCRIPTION" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- @SystemApi Protects the ability to register any PhoneAccount with |
| PhoneAccount#CAPABILITY_CALL_PROVIDER. |
| @hide --> |
| <permission android:name="android.permission.REGISTER_CALL_PROVIDER" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- @SystemApi Protects the ability to register any PhoneAccount with |
| PhoneAccount#CAPABILITY_CONNECTION_MANAGER |
| @hide --> |
| <permission android:name="android.permission.REGISTER_CONNECTION_MANAGER" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- Must be required by a {@link android.telecom.InCallService}, |
| to ensure that only the system can bind to it. |
| <p>Protection level: signature|privileged |
| --> |
| <permission android:name="android.permission.BIND_INCALL_SERVICE" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- Must be required by a {@link android.telecom.CallStreamingService}, |
| to ensure that only the system can bind to it. |
| <p>Protection level: signature |
| @SystemApi @hide--> |
| <permission android:name="android.permission.BIND_CALL_STREAMING_SERVICE" |
| android:protectionLevel="signature" /> |
| |
| <!-- Allows to query ongoing call details and manage ongoing calls |
| <p>Protection level: signature|appop --> |
| <permission android:name="android.permission.MANAGE_ONGOING_CALLS" |
| android:protectionLevel="signature|appop" |
| android:label="@string/permlab_manageOngoingCalls" |
| android:description="@string/permdesc_manageOngoingCalls" /> |
| |
| <!-- Allows the app to request network scans from telephony. |
| <p>Not for use by third-party applications. |
| @SystemApi @hide--> |
| <permission android:name="android.permission.NETWORK_SCAN" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- Must be required by a link {@link android.telephony.VisualVoicemailService} to ensure that |
| only the system can bind to it. |
| <p>Protection level: signature|privileged |
| --> |
| <permission |
| android:name="android.permission.BIND_VISUAL_VOICEMAIL_SERVICE" |
| android:protectionLevel="signature|privileged"/> |
| |
| <!-- Must be required by a {@link android.telecom.CallScreeningService}, |
| to ensure that only the system can bind to it. |
| <p>Protection level: signature|privileged |
| --> |
| <permission android:name="android.permission.BIND_SCREENING_SERVICE" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- Must be required by a {@link android.telecom.PhoneAccountSuggestionService}, |
| to ensure that only the system can bind to it. |
| <p>Protection level: signature |
| @SystemApi |
| @hide |
| --> |
| <permission android:name="android.permission.BIND_PHONE_ACCOUNT_SUGGESTION_SERVICE" |
| android:protectionLevel="signature" /> |
| |
| <!-- Must be required by a {@link android.telecom.CallDiagnosticService}, |
| to ensure that only the system can bind to it. |
| <p>Protection level: signature |
| @SystemApi |
| @hide |
| --> |
| <permission android:name="android.permission.BIND_CALL_DIAGNOSTIC_SERVICE" |
| android:protectionLevel="signature" /> |
| |
| <!-- Must be required by a {@link android.telecom.CallRedirectionService}, |
| to ensure that only the system can bind to it. |
| <p>Protection level: signature|privileged |
| --> |
| <permission android:name="android.permission.BIND_CALL_REDIRECTION_SERVICE" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- Must be required by a {@link android.telecom.ConnectionService}, |
| to ensure that only the system can bind to it. |
| @deprecated {@link android.telecom.ConnectionService}s should require |
| android.permission.BIND_TELECOM_CONNECTION_SERVICE instead. |
| @SystemApi |
| @hide --> |
| <permission android:name="android.permission.BIND_CONNECTION_SERVICE" |
| android:protectionLevel="signature|privileged" /> |
| |
| <!-- Must be required by a {@link android.telecom.ConnectionService}, |
| to ensure that only the system can bind to it. |
| |