Commit 3fddaa03 authored by José Henrique's avatar José Henrique
Browse files

bonito: Regenerate

parent cef7e9ea
......@@ -163,17 +163,6 @@ android_app_import {
product_specific: true,
}
android_app_import {
name: "VZWAPNLib",
owner: "google",
apk: "proprietary/product/app/VZWAPNLib/VZWAPNLib.apk",
presigned: true,
dex_preopt: {
enabled: false,
},
product_specific: true,
}
android_app_import {
name: "com.qualcomm.qti.services.secureui",
owner: "google",
......@@ -185,42 +174,6 @@ android_app_import {
product_specific: true,
}
android_app_import {
name: "AmbientSensePrebuilt",
owner: "google",
apk: "proprietary/product/priv-app/AmbientSensePrebuilt/AmbientSensePrebuilt.apk",
presigned: true,
dex_preopt: {
enabled: false,
},
privileged: true,
product_specific: true,
}
android_app_import {
name: "AppDirectedSMSService",
owner: "google",
apk: "proprietary/product/priv-app/AppDirectedSMSService/AppDirectedSMSService.apk",
presigned: true,
dex_preopt: {
enabled: false,
},
privileged: true,
product_specific: true,
}
android_app_import {
name: "CarrierServices",
owner: "google",
apk: "proprietary/product/priv-app/CarrierServices/CarrierServices.apk",
presigned: true,
dex_preopt: {
enabled: false,
},
privileged: true,
product_specific: true,
}
android_app_import {
name: "CarrierSettings",
owner: "google",
......@@ -233,66 +186,6 @@ android_app_import {
product_specific: true,
}
android_app_import {
name: "CarrierWifi",
owner: "google",
apk: "proprietary/product/priv-app/CarrierWifi/CarrierWifi.apk",
presigned: true,
dex_preopt: {
enabled: false,
},
privileged: true,
product_specific: true,
}
android_app_import {
name: "ConnMO",
owner: "google",
apk: "proprietary/product/priv-app/ConnMO/ConnMO.apk",
certificate: "platform",
dex_preopt: {
enabled: false,
},
privileged: true,
product_specific: true,
}
android_app_import {
name: "DCMO",
owner: "google",
apk: "proprietary/product/priv-app/DCMO/DCMO.apk",
certificate: "platform",
dex_preopt: {
enabled: false,
},
privileged: true,
product_specific: true,
}
android_app_import {
name: "DMService",
owner: "google",
apk: "proprietary/product/priv-app/DMService/DMService.apk",
certificate: "platform",
dex_preopt: {
enabled: false,
},
privileged: true,
product_specific: true,
}
android_app_import {
name: "DevicePersonalizationPrebuiltPixel3",
owner: "google",
apk: "proprietary/product/priv-app/DevicePersonalizationPrebuiltPixel3/DevicePersonalizationPrebuiltPixel3.apk",
presigned: true,
dex_preopt: {
enabled: false,
},
privileged: true,
product_specific: true,
}
android_app_import {
name: "DiagMon",
owner: "google",
......@@ -365,30 +258,6 @@ android_app_import {
product_specific: true,
}
android_app_import {
name: "MyVerizonServices",
owner: "google",
apk: "proprietary/product/priv-app/MyVerizonServices/MyVerizonServices.apk",
presigned: true,
dex_preopt: {
enabled: false,
},
privileged: true,
product_specific: true,
}
android_app_import {
name: "OBDM_Permissions",
owner: "google",
apk: "proprietary/product/priv-app/OBDM_Permissions/OBDM_Permissions.apk",
presigned: true,
dex_preopt: {
enabled: false,
},
privileged: true,
product_specific: true,
}
android_app_import {
name: "OemDmTrigger",
owner: "google",
......@@ -401,90 +270,6 @@ android_app_import {
product_specific: true,
}
android_app_import {
name: "SprintDM",
owner: "google",
apk: "proprietary/product/priv-app/SprintDM/SprintDM.apk",
certificate: "platform",
dex_preopt: {
enabled: false,
},
privileged: true,
product_specific: true,
}
android_app_import {
name: "SprintHM",
owner: "google",
apk: "proprietary/product/priv-app/SprintHM/SprintHM.apk",
certificate: "platform",
dex_preopt: {
enabled: false,
},
privileged: true,
product_specific: true,
}
android_app_import {
name: "TetheringEntitlement",
owner: "google",
apk: "proprietary/product/priv-app/TetheringEntitlement/TetheringEntitlement.apk",
certificate: "platform",
dex_preopt: {
enabled: false,
},
privileged: true,
product_specific: true,
}
android_app_import {
name: "USCCDM",
owner: "google",
apk: "proprietary/product/priv-app/USCCDM/USCCDM.apk",
certificate: "platform",
dex_preopt: {
enabled: false,
},
privileged: true,
product_specific: true,
}
android_app_import {
name: "WfcActivation",
owner: "google",
apk: "proprietary/product/priv-app/WfcActivation/WfcActivation.apk",
presigned: true,
dex_preopt: {
enabled: false,
},
privileged: true,
product_specific: true,
}
android_app_import {
name: "obdm_stub",
owner: "google",
apk: "proprietary/product/priv-app/obdm_stub/obdm_stub.apk",
presigned: true,
dex_preopt: {
enabled: false,
},
privileged: true,
product_specific: true,
}
android_app_import {
name: "CarrierSetup",
owner: "google",
apk: "proprietary/system_ext/priv-app/CarrierSetup/CarrierSetup.apk",
presigned: true,
dex_preopt: {
enabled: false,
},
privileged: true,
system_ext_specific: true,
}
android_app_import {
name: "LLKAgent",
owner: "google",
......@@ -497,30 +282,6 @@ android_app_import {
system_ext_specific: true,
}
android_app_import {
name: "RilConfigService",
owner: "google",
apk: "proprietary/system_ext/priv-app/RilConfigService/RilConfigService.apk",
certificate: "platform",
dex_preopt: {
enabled: false,
},
privileged: true,
system_ext_specific: true,
}
android_app_import {
name: "grilservice",
owner: "google",
apk: "proprietary/system_ext/priv-app/grilservice/grilservice.apk",
certificate: "platform",
dex_preopt: {
enabled: false,
},
privileged: true,
system_ext_specific: true,
}
dex_import {
name: "QtiTelephonyServicelibrary",
owner: "google",
......
......@@ -15,7 +15,6 @@ PRODUCT_COPY_FILES += \
vendor/google/bonito/proprietary/etc/permissions/com.qualcomm.qcrilmsgtunnel.xml:$(TARGET_COPY_OUT_SYSTEM)/etc/permissions/com.qualcomm.qcrilmsgtunnel.xml \
vendor/google/bonito/proprietary/etc/permissions/com.qualcomm.qti.imscmservice.xml:$(TARGET_COPY_OUT_SYSTEM)/etc/permissions/com.qualcomm.qti.imscmservice.xml \
vendor/google/bonito/proprietary/etc/permissions/com.quicinc.cne.CNEService.xml:$(TARGET_COPY_OUT_SYSTEM)/etc/permissions/com.quicinc.cne.CNEService.xml \
vendor/google/bonito/proprietary/etc/permissions/privapp-permissions-google.xml:$(TARGET_COPY_OUT_SYSTEM)/etc/permissions/privapp-permissions-google.xml \
vendor/google/bonito/proprietary/etc/permissions/qcrilhook.xml:$(TARGET_COPY_OUT_SYSTEM)/etc/permissions/qcrilhook.xml \
vendor/google/bonito/proprietary/etc/permissions/telephonyservice.xml:$(TARGET_COPY_OUT_SYSTEM)/etc/permissions/telephonyservice.xml \
vendor/google/bonito/proprietary/etc/permissions/uimremoteclient.xml:$(TARGET_COPY_OUT_SYSTEM)/etc/permissions/uimremoteclient.xml \
......@@ -164,7 +163,6 @@ PRODUCT_COPY_FILES += \
vendor/google/bonito/proprietary/product/etc/CarrierSettings/vodafone_tr.pb:$(TARGET_COPY_OUT_PRODUCT)/etc/CarrierSettings/vodafone_tr.pb \
vendor/google/bonito/proprietary/product/etc/CarrierSettings/windtre_it.pb:$(TARGET_COPY_OUT_PRODUCT)/etc/CarrierSettings/windtre_it.pb \
vendor/google/bonito/proprietary/product/etc/CarrierSettings/xfinity_us.pb:$(TARGET_COPY_OUT_PRODUCT)/etc/CarrierSettings/xfinity_us.pb \
vendor/google/bonito/proprietary/product/etc/ambient/matcher_tah.leveldb:$(TARGET_COPY_OUT_PRODUCT)/etc/ambient/matcher_tah.leveldb \
vendor/google/bonito/proprietary/product/etc/felica/common.cfg:$(TARGET_COPY_OUT_PRODUCT)/etc/felica/common.cfg \
vendor/google/bonito/proprietary/product/etc/felica/mfm.cfg:$(TARGET_COPY_OUT_PRODUCT)/etc/felica/mfm.cfg \
vendor/google/bonito/proprietary/product/etc/felica/mfs.cfg:$(TARGET_COPY_OUT_PRODUCT)/etc/felica/mfs.cfg \
......@@ -172,26 +170,19 @@ PRODUCT_COPY_FILES += \
vendor/google/bonito/proprietary/product/etc/firmware/music_detector.sound_model:$(TARGET_COPY_OUT_PRODUCT)/etc/firmware/music_detector.sound_model \
vendor/google/bonito/proprietary/product/etc/permissions/com.android.omadm.service.xml:$(TARGET_COPY_OUT_PRODUCT)/etc/permissions/com.android.omadm.service.xml \
vendor/google/bonito/proprietary/product/etc/permissions/com.android.sdm.plugins.connmo.xml:$(TARGET_COPY_OUT_PRODUCT)/etc/permissions/com.android.sdm.plugins.connmo.xml \
vendor/google/bonito/proprietary/product/etc/permissions/com.android.sdm.plugins.dcmo.xml:$(TARGET_COPY_OUT_PRODUCT)/etc/permissions/com.android.sdm.plugins.dcmo.xml \
vendor/google/bonito/proprietary/product/etc/permissions/com.android.sdm.plugins.diagmon.xml:$(TARGET_COPY_OUT_PRODUCT)/etc/permissions/com.android.sdm.plugins.diagmon.xml \
vendor/google/bonito/proprietary/product/etc/permissions/com.android.sdm.plugins.sprintdm.xml:$(TARGET_COPY_OUT_PRODUCT)/etc/permissions/com.android.sdm.plugins.sprintdm.xml \
vendor/google/bonito/proprietary/product/etc/permissions/com.android.sdm.plugins.usccdm.xml:$(TARGET_COPY_OUT_PRODUCT)/etc/permissions/com.android.sdm.plugins.usccdm.xml \
vendor/google/bonito/proprietary/product/etc/permissions/com.customermobile.preload.vzw.xml:$(TARGET_COPY_OUT_PRODUCT)/etc/permissions/com.customermobile.preload.vzw.xml \
vendor/google/bonito/proprietary/product/etc/permissions/com.google.android.hardwareinfo.xml:$(TARGET_COPY_OUT_PRODUCT)/etc/permissions/com.google.android.hardwareinfo.xml \
vendor/google/bonito/proprietary/product/etc/permissions/com.google.omadm.trigger.xml:$(TARGET_COPY_OUT_PRODUCT)/etc/permissions/com.google.omadm.trigger.xml \
vendor/google/bonito/proprietary/product/etc/permissions/com.verizon.apn.xml:$(TARGET_COPY_OUT_PRODUCT)/etc/permissions/com.verizon.apn.xml \
vendor/google/bonito/proprietary/product/etc/permissions/com.verizon.services.xml:$(TARGET_COPY_OUT_PRODUCT)/etc/permissions/com.verizon.services.xml \
vendor/google/bonito/proprietary/product/etc/permissions/features-verizon.xml:$(TARGET_COPY_OUT_PRODUCT)/etc/permissions/features-verizon.xml \
vendor/google/bonito/proprietary/product/etc/permissions/obdm_permissions.xml:$(TARGET_COPY_OUT_PRODUCT)/etc/permissions/obdm_permissions.xml \
vendor/google/bonito/proprietary/product/etc/permissions/privapp-permissions-google-p.xml:$(TARGET_COPY_OUT_PRODUCT)/etc/permissions/privapp-permissions-google-p.xml \
vendor/google/bonito/proprietary/product/etc/permissions/split-permissions-google.xml:$(TARGET_COPY_OUT_PRODUCT)/etc/permissions/split-permissions-google.xml \
vendor/google/bonito/proprietary/product/etc/permissions/vzw_mvs_permissions.xml:$(TARGET_COPY_OUT_PRODUCT)/etc/permissions/vzw_mvs_permissions.xml \
vendor/google/bonito/proprietary/product/etc/res/images/charger/battery_fail.png:$(TARGET_COPY_OUT_PRODUCT)/etc/res/images/charger/battery_fail.png \
vendor/google/bonito/proprietary/product/etc/res/images/charger/battery_scale.png:$(TARGET_COPY_OUT_PRODUCT)/etc/res/images/charger/battery_scale.png \
vendor/google/bonito/proprietary/product/etc/res/images/charger/main_font.png:$(TARGET_COPY_OUT_PRODUCT)/etc/res/images/charger/main_font.png \
vendor/google/bonito/proprietary/product/etc/res/values/charger/animation.txt:$(TARGET_COPY_OUT_PRODUCT)/etc/res/values/charger/animation.txt \
vendor/google/bonito/proprietary/product/etc/sysconfig/google_build.xml:$(TARGET_COPY_OUT_PRODUCT)/etc/sysconfig/google_build.xml \
vendor/google/bonito/proprietary/product/etc/sysconfig/nexus.xml:$(TARGET_COPY_OUT_PRODUCT)/etc/sysconfig/nexus.xml \
vendor/google/bonito/proprietary/product/etc/sysconfig/pixel_2019_midyear_exclusive.xml:$(TARGET_COPY_OUT_PRODUCT)/etc/sysconfig/pixel_2019_midyear_exclusive.xml \
vendor/google/bonito/proprietary/product/etc/sysconfig/pixel_experience_2017.xml:$(TARGET_COPY_OUT_PRODUCT)/etc/sysconfig/pixel_experience_2017.xml \
vendor/google/bonito/proprietary/product/etc/sysconfig/pixel_experience_2018.xml:$(TARGET_COPY_OUT_PRODUCT)/etc/sysconfig/pixel_experience_2018.xml \
......@@ -203,12 +194,9 @@ PRODUCT_COPY_FILES += \
vendor/google/bonito/proprietary/product/lib64/libsecureuisvc_jni.so:$(TARGET_COPY_OUT_PRODUCT)/lib64/libsecureuisvc_jni.so \
vendor/google/bonito/proprietary/product/priv-app/EuiccSupportPixel/esim-full-v0.img:$(TARGET_COPY_OUT_PRODUCT)/priv-app/EuiccSupportPixel/esim-full-v0.img \
vendor/google/bonito/proprietary/product/priv-app/EuiccSupportPixel/esim-v1.img:$(TARGET_COPY_OUT_PRODUCT)/priv-app/EuiccSupportPixel/esim-v1.img \
vendor/google/bonito/proprietary/product/priv-app/MyVerizonServices/lib/arm64/libakuaf.so:$(TARGET_COPY_OUT_PRODUCT)/priv-app/MyVerizonServices/lib/arm64/libakuaf.so \
vendor/google/bonito/proprietary/product/priv-app/MyVerizonServices/lib/arm64/libmotricity.so:$(TARGET_COPY_OUT_PRODUCT)/priv-app/MyVerizonServices/lib/arm64/libmotricity.so \
vendor/google/bonito/proprietary/system_ext/etc/permissions/com.android.hotwordenrollment.common.util.xml:$(TARGET_COPY_OUT_SYSTEM_EXT)/etc/permissions/com.android.hotwordenrollment.common.util.xml \
vendor/google/bonito/proprietary/system_ext/etc/permissions/com.android.omadm.radioconfig.xml:$(TARGET_COPY_OUT_SYSTEM_EXT)/etc/permissions/com.android.omadm.radioconfig.xml \
vendor/google/bonito/proprietary/system_ext/etc/permissions/com.verizon.llkagent.xml:$(TARGET_COPY_OUT_SYSTEM_EXT)/etc/permissions/com.verizon.llkagent.xml \
vendor/google/bonito/proprietary/system_ext/etc/permissions/privapp-permissions-google-se.xml:$(TARGET_COPY_OUT_SYSTEM_EXT)/etc/permissions/privapp-permissions-google-se.xml \
vendor/google/bonito/proprietary/system_ext/lib/com.qualcomm.qti.ant@1.0.so:$(TARGET_COPY_OUT_SYSTEM_EXT)/lib/com.qualcomm.qti.ant@1.0.so \
vendor/google/bonito/proprietary/system_ext/lib/com.qualcomm.qti.bluetooth_audio@1.0.so:$(TARGET_COPY_OUT_SYSTEM_EXT)/lib/com.qualcomm.qti.bluetooth_audio@1.0.so \
vendor/google/bonito/proprietary/system_ext/lib/com.qualcomm.qti.imscmservice@1.0.so:$(TARGET_COPY_OUT_SYSTEM_EXT)/lib/com.qualcomm.qti.imscmservice@1.0.so \
......@@ -336,36 +324,16 @@ PRODUCT_PACKAGES += \
MobileFeliCaWebPlugin \
MobileFeliCaWebPluginBoot \
SSRestartDetector \
VZWAPNLib \
com.qualcomm.qti.services.secureui \
AmbientSensePrebuilt \
AppDirectedSMSService \
CarrierServices \
CarrierSettings \
CarrierWifi \
ConnMO \
DCMO \
DMService \
DevicePersonalizationPrebuiltPixel3 \
DiagMon \
EuiccGoogle \
EuiccSupportPixel \
HardwareInfo \
HotwordEnrollmentOKGoogleRT5514 \
HotwordEnrollmentXGoogleRT5514 \
MyVerizonServices \
OBDM_Permissions \
OemDmTrigger \
SprintDM \
SprintHM \
TetheringEntitlement \
USCCDM \
WfcActivation \
obdm_stub \
CarrierSetup \
LLKAgent \
RilConfigService \
grilservice \
QtiTelephonyServicelibrary \
qcrilhook \
uimremoteclientlibrary \
......
<?xml version="1.0" encoding="utf-8"?>
<!--
~ Copyright (C) 2017 The Android Open Source Project
~
~ Licensed under the Apache License, Version 2.0 (the "License");
~ you may not use this file except in compliance with the License.
~ You may obtain a copy of the License at
~
~ http://www.apache.org/licenses/LICENSE-2.0
~
~ Unless required by applicable law or agreed to in writing, software
~ distributed under the License is distributed on an "AS IS" BASIS,
~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
~ See the License for the specific language governing permissions and
~ limitations under the License
-->
<!--
This XML file declares which signature|privileged permissions should be granted to privileged
applications in /system on GMS or Google-branded devices.
It allows additional grants on top of privapp-permissions-platform.xml
-->
<permissions>
<privapp-permissions package="com.google.android.ext.services">
<permission name="android.permission.MONITOR_DEFAULT_SMS_PACKAGE" />
<permission name="android.permission.PROVIDE_RESOLVER_RANKER_SERVICE" />
<permission name="android.permission.REQUEST_NOTIFICATION_ASSISTANT_SERVICE" />
<permission name="android.permission.INTERACT_ACROSS_USERS" />
</privapp-permissions>
<privapp-permissions package="com.google.android.permissioncontroller">
<permission name="android.permission.MANAGE_USERS"/>
<permission name="android.permission.OBSERVE_GRANT_REVOKE_PERMISSIONS"/>
<permission name="android.permission.GET_APP_OPS_STATS"/>
<permission name="android.permission.UPDATE_APP_OPS_STATS"/>
<permission name="android.permission.REQUEST_INCIDENT_REPORT_APPROVAL"/>
<permission name="android.permission.APPROVE_INCIDENT_REPORTS"/>
<permission name="android.permission.READ_PRIVILEGED_PHONE_STATE" />
<permission name="android.permission.SUBSTITUTE_NOTIFICATION_APP_NAME" />
<permission name="android.permission.PACKAGE_USAGE_STATS" />
<permission name="android.permission.CHANGE_COMPONENT_ENABLED_STATE" />
<permission name="android.permission.MODIFY_AUDIO_ROUTING" />
<!-- for permission 2 hub debugging only -->
<permission name="android.permission.GET_ACCOUNTS_PRIVILEGED" />
</privapp-permissions>
<privapp-permissions package="com.google.android.packageinstaller">
<permission name="android.permission.DELETE_PACKAGES"/>
<permission name="android.permission.INSTALL_PACKAGES"/>
<permission name="android.permission.USE_RESERVED_DISK"/>
<permission name="android.permission.MANAGE_USERS"/>
<permission name="android.permission.UPDATE_APP_OPS_STATS"/>
<permission name="android.permission.SUBSTITUTE_NOTIFICATION_APP_NAME"/>
<permission name="android.permission.PACKAGE_USAGE_STATS"/>
</privapp-permissions>
<privapp-permissions package="com.google.android.networkstack">
<permission name="android.permission.ACCESS_NETWORK_CONDITIONS"/>
<permission name="android.permission.CONNECTIVITY_INTERNAL"/>
<permission name="android.permission.CONNECTIVITY_USE_RESTRICTED_NETWORKS"/>
<permission name="android.permission.CONTROL_VPN"/>
<permission name="android.permission.INTERACT_ACROSS_USERS"/>
<permission name="android.permission.LOCAL_MAC_ADDRESS"/>
<permission name="android.permission.MANAGE_SUBSCRIPTION_PLANS"/>
<permission name="android.permission.MANAGE_USB"/>
<permission name="android.permission.PACKET_KEEPALIVE_OFFLOAD"/>
<permission name="android.permission.READ_NETWORK_USAGE_HISTORY"/>
<permission name="android.permission.READ_PRECISE_PHONE_STATE"/>
<permission name="android.permission.READ_PRIVILEGED_PHONE_STATE"/>
<permission name="android.permission.READ_WIFI_CREDENTIAL"/>
<permission name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE"/>
<permission name="android.permission.TETHER_PRIVILEGED"/>
<permission name="android.permission.WRITE_SECURE_SETTINGS"/>
</privapp-permissions>
<privapp-permissions package="com.google.android.tag">
<permission name="android.permission.WRITE_SECURE_SETTINGS"/>
</privapp-permissions>
<privapp-permissions package="com.google.android.documentsui">
<permission name="android.permission.CHANGE_OVERLAY_PACKAGES"/>
<permission name="android.permission.INTERACT_ACROSS_USERS"/>
<permission name="android.permission.MODIFY_QUIET_MODE"/>
<!-- Permissions required for reading and logging compat changes -->
<permission name="android.permission.LOG_COMPAT_CHANGE"/>
<permission name="android.permission.READ_COMPAT_CHANGE_CONFIG"/>
</privapp-permissions>
<privapp-permissions package="com.google.android.providers.media.module">
<permission name="android.permission.INTERACT_ACROSS_USERS"/>
<permission name="android.permission.MANAGE_USERS"/>
<permission name="android.permission.USE_RESERVED_DISK"/>
<permission name="android.permission.WRITE_MEDIA_STORAGE"/>
<permission name="android.permission.WATCH_APPOPS"/>
<permission name="android.permission.UPDATE_APP_OPS_STATS"/>
<permission name="android.permission.UPDATE_DEVICE_STATS"/>
<!-- Permissions required for reading and logging compat changes -->
<permission name="android.permission.LOG_COMPAT_CHANGE" />
<permission name="android.permission.READ_COMPAT_CHANGE_CONFIG" />
<permission name="android.permission.REGISTER_STATS_PULL_ATOM" />
</privapp-permissions>
<privapp-permissions package="com.google.android.networkstack.tethering">
<permission name="android.permission.BLUETOOTH_PRIVILEGED" />
<permission name="android.permission.MANAGE_USB"/>
<permission name="android.permission.MODIFY_PHONE_STATE"/>
<permission name="android.permission.READ_NETWORK_USAGE_HISTORY"/>
<permission name="android.permission.TETHER_PRIVILEGED"/>
<permission name="android.permission.UPDATE_APP_OPS_STATS"/>
<permission name="android.permission.UPDATE_DEVICE_STATS"/>
</privapp-permissions>
<privapp-permissions package="com.google.android.cellbroadcastreceiver">
<permission name="android.permission.INTERACT_ACROSS_USERS"/>
<permission name="android.permission.MANAGE_USERS"/>
<permission name="android.permission.MODIFY_PHONE_STATE"/>
<permission name="android.permission.READ_PRIVILEGED_PHONE_STATE"/>
<permission name="android.permission.RECEIVE_EMERGENCY_BROADCAST"/>
<permission name="android.permission.START_ACTIVITIES_FROM_BACKGROUND"/>
<permission name="android.permission.STATUS_BAR" />
</privapp-permissions>
<privapp-permissions package="com.google.android.cellbroadcastservice">
<permission name="android.permission.MODIFY_PHONE_STATE"/>
<permission name="android.permission.READ_PRIVILEGED_PHONE_STATE"/>
<permission name="android.permission.RECEIVE_EMERGENCY_BROADCAST"/>
</privapp-permissions>
</permissions>
<?xml version="1.0" encoding="utf-8" ?>
<permissions>
<privapp-permissions package="com.android.sdm.plugins.dcmo">
<permission name="android.permission.MODIFY_PHONE_STATE"/>
<permission name="android.permission.READ_PRIVILEGED_PHONE_STATE"/>
</privapp-permissions>
</permissions>
<?xml version="1.0" encoding="utf-8"?>
<permissions>
<privapp-permissions package="com.android.sdm.plugins.sprintdm">
<permission name="android.permission.CHANGE_CONFIGURATION"/>
<permission name="android.permission.CONNECTIVITY_INTERNAL"/>
<permission name="android.permission.MASTER_CLEAR"/>
<permission name="android.permission.MODIFY_PHONE_STATE"/>
<permission name="android.permission.READ_PRIVILEGED_PHONE_STATE"/>
<permission name="android.permission.SHUTDOWN"/>
<permission name="android.permission.WRITE_APN_SETTINGS"/>
<permission name="android.permission.WRITE_SECURE_SETTINGS"/>
</privapp-permissions>
</permissions>
<?xml version="1.0" encoding="utf-8" ?>
<permissions>
<privapp-permissions package="com.android.sdm.plugins.usccdm">
<permission name="android.permission.MODIFY_PHONE_STATE"/>
<permission name="android.permission.READ_PRIVILEGED_PHONE_STATE"/>
</privapp-permissions>
</permissions>
<?xml version="1.0" encoding="utf-8" ?>
<!--
/******************************************************************************
* Copyright (C) 2016 Verizon Wireless
* All Rights Reserved. Verizon Wireless Proprietary and Confidential.
* *****************************************************************************
*/
-->
<permissions>
<permission name="com.qualcomm.permission.QCOM_DIAG">
<group gid="diag"/>
</permission>
<permission name="com.qualcomm.permission.QCOM_RADIO">
<group gid="radio"/>
</permission>
<permission name="com.qualcomm.permission.QCOM_AUDIO">
<group gid="audio"/>
</permission>
<privapp-permissions package="com.verizon.obdm">
<permission name="android.permission.READ_PRIVILEGED_PHONE_STATE"/>
</privapp-permissions>
</permissions>
<?xml version="1.0" encoding="utf-8"?>
<!-- Copyright (C) 2014 The Android Open Source Project
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
-->
<!-- These are configurations that should exist on Google's own Nexus and GPe devices. -->
<config>
<feature name="com.google.android.feature.GOOGLE_BUILD" />
<!-- This should be added to all Nexus and GPe devices -->
<feature name="com.google.android.feature.GOOGLE_EXPERIENCE" />
<!-- This should declare the version of Exchange that ships -->
<feature name="com.google.android.feature.EXCHANGE_6_2" />
</config>
<?xml version="1.0" encoding="utf-8"?>
<!-- These are configurations that should exist on Google's 2016 and newer Nexus devices. -->
<config>
<!-- This is meant to be the canonical feature identifying 2016 and newer Nexus devices. -->
<feature name="com.google.android.feature.PIXEL_EXPERIENCE" />
<!-- The feature identifying devices which are able to use the Turbo app -->
<feature name="com.google.android.feature.TURBO_PRELOAD" />
<!-- The feature identifying devices which are able to use the Android Wellbeing app. -->
<feature name="com.google.android.feature.WELLBEING" />
<!-- The feature identifying devices which are able to use the device-to-device migration
over cable provided by the Pixelmigrate app. -->
<feature name="com.google.android.feature.D2D_CABLE_MIGRATION_FEATURE" />
<!-- Enable Zero Touch Provisioning support for 2016 and newer Nexus devices. -->
<feature name="com.google.android.feature.ZERO_TOUCH" />
<!-- Allow WfcActivation app scheduled jobs to run when app in background. -->
<allow-in-power-save-except-idle package="com.google.android.wfcactivation" />
<!-- Allow ssr detector service in background -->
<allow-in-power-save package="com.google.SSRestartDetector" />
<!-- Allow connectivitymonitor service in background -->
<allow-in-power-save package="com.google.android.connectivitymonitor" />
<!-- Allow connectivitythermalpowermanager service in background -->
<allow-in-power-save package="com.google.android.connectivitythermalpowermanager" />
<!-- Allow ramdump uploader service in background -->
<allow-in-power-save package="com.android.ramdump" />
<!-- Whitelist log pkg so JobIntentService can work. b/71630894 -->
<allow-in-power-save-except-idle package="com.google.android.apps.carrier.log" />
<!-- Whitelist so headless app JobIntentService can work. b/73250911 -->
<allow-in-power-save-except-idle package="com.google.android.carrier" />