blob: 2bd3de0ff1f9f8b90f87eb6de1e69c6feab07305 [file] [log] [blame]
Remi NGUYEN VANded23152018-12-07 16:52:24 +09001<?xml version="1.0" encoding="utf-8"?>
2<!--
3/*
Remi NGUYEN VAN0a4df5a2019-03-08 17:20:49 +09004 * Copyright (C) 2019 The Android Open Source Project
Remi NGUYEN VANded23152018-12-07 16:52:24 +09005 *
6 * Licensed under the Apache License, Version 2.0 (the "License");
7 * you may not use this file except in compliance with the License.
8 * You may obtain a copy of the License at
9 *
10 * http://www.apache.org/licenses/LICENSE-2.0
11 *
12 * Unless required by applicable law or agreed to in writing, software
13 * distributed under the License is distributed on an "AS IS" BASIS,
14 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15 * See the License for the specific language governing permissions and
16 * limitations under the License.
17 */
18-->
19<manifest xmlns:android="http://schemas.android.com/apk/res/android"
Jeff Hamiltonff88ac22019-03-29 13:41:27 -040020 package="com.android.networkstack"
21 android:sharedUserId="android.uid.networkstack"
Dennis Shen40a71f02022-06-09 18:42:47 +000022 android:versionCode="330400000"
23 android:versionName="330400000"
Remi NGUYEN VAN02011ee2021-08-24 17:50:14 +090024 coreApp="true"
Jeff Hamiltonff88ac22019-03-29 13:41:27 -040025>
Motomu Utsumi9108bc52022-04-25 08:15:52 +000026 <!--- Defines the MAINLINE_NETWORK_STACK permission used by the networkstack process. -->
Motomu Utsumi2f41e462022-04-20 06:59:38 +000027 <permission android:name="android.permission.MAINLINE_NETWORK_STACK"
28 android:protectionLevel="signature"/>
Remi NGUYEN VAN6fb83552019-04-01 10:56:05 +090029 <!-- Permissions must be defined here, and not in the base manifest, as the network stack
30 running in the system server process does not need any permission, and having privileged
31 permissions added would cause crashes on startup unless they are also added to the
Hongguang Chenebb78392020-07-28 15:34:05 -070032 privileged permissions allowlist for that package. -->
Remi NGUYEN VAN08e96902019-03-29 15:33:07 +090033 <uses-permission android:name="android.permission.INTERNET" />
lucaslin9b4dfab2019-12-17 23:06:12 +080034 <uses-permission android:name="android.permission.ACCESS_FINE_LOCATION" />
Remi NGUYEN VAN08e96902019-03-29 15:33:07 +090035 <uses-permission android:name="android.permission.ACCESS_COARSE_LOCATION" />
36 <uses-permission android:name="android.permission.ACCESS_NETWORK_STATE" />
37 <uses-permission android:name="android.permission.ACCESS_WIFI_STATE" />
38 <uses-permission android:name="android.permission.CONNECTIVITY_INTERNAL" />
39 <!-- Send latency broadcast as current user -->
40 <uses-permission android:name="android.permission.INTERACT_ACROSS_USERS" />
41 <uses-permission android:name="android.permission.WAKE_LOCK" />
42 <uses-permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE" />
Chiachang Wang8dea27b2019-04-01 09:56:05 +080043 <uses-permission android:name="android.permission.READ_DEVICE_CONFIG" />
Remi NGUYEN VANd65832e2019-01-30 21:45:56 +090044 <!-- Signature permission defined in NetworkStackStub -->
45 <uses-permission android:name="android.permission.MAINLINE_NETWORK_STACK" />
Remi NGUYEN VAN860ea3c2019-05-16 18:02:11 +090046 <application
47 android:extractNativeLibs="false"
Remi NGUYEN VAN8402c202019-10-03 17:27:18 +090048 android:persistent="true"
49 android:process="com.android.networkstack.process">
Remi NGUYEN VANf3088e92019-08-21 18:18:01 +090050 <service android:name="com.android.server.NetworkStackService"
Ashwini Oruganti2b0d8042020-05-19 18:21:58 -070051 android:exported="true"
Remi NGUYEN VANf3088e92019-08-21 18:18:01 +090052 android:permission="android.permission.MAINLINE_NETWORK_STACK">
Remi NGUYEN VANded23152018-12-07 16:52:24 +090053 <intent-filter>
54 <action android:name="android.net.INetworkStackConnector"/>
55 </intent-filter>
56 </service>
Remi NGUYEN VAN9e6aeea2020-07-06 09:29:06 +090057 <!-- Test instrumentation service, only usable on debuggable builds.
58 The service is protected by NETWORK_SETTINGS permissions as there is no better
59 networking-related permission that exists on Q, is sufficiently protected (signature),
60 and can be obtained via shell permissions. -->
61 <service android:name="com.android.server.TestNetworkStackService"
62 android:permission="android.permission.NETWORK_SETTINGS"
63 android:exported="true">
64 <intent-filter>
65 <action android:name="android.net.INetworkStackConnector.Test"/>
66 </intent-filter>
67 </service>
Paul Huac95b9f2019-05-24 18:28:23 -070068 <service android:name="com.android.server.connectivity.ipmemorystore.RegularMaintenanceJobService"
69 android:permission="android.permission.BIND_JOB_SERVICE" >
70 </service>
Remi NGUYEN VANded23152018-12-07 16:52:24 +090071 </application>
Remi NGUYEN VANd1c539e2019-03-20 17:29:10 +090072</manifest>