Revert "Add DeviceConfig permissions to CTS tests."

Revert submission 20961419-deviceconfig-restrict

Reason for revert: CTS breakage

Reverted changes: /q/submissionid:20961419-deviceconfig-restrict

Change-Id: I8bfe65c800bc1b818d13baf32c99b139f4219597
diff --git a/common/device-side/bedstead/nene/common/src/main/java/com/android/bedstead/nene/permissions/CommonPermissions.java b/common/device-side/bedstead/nene/common/src/main/java/com/android/bedstead/nene/permissions/CommonPermissions.java
index 621f332..c785568 100644
--- a/common/device-side/bedstead/nene/common/src/main/java/com/android/bedstead/nene/permissions/CommonPermissions.java
+++ b/common/device-side/bedstead/nene/common/src/main/java/com/android/bedstead/nene/permissions/CommonPermissions.java
@@ -765,9 +765,8 @@
     public static final String CHANGE_CONFIGURATION = "android.permission.CHANGE_CONFIGURATION";
     /** See {@code Manifest#WRITE_GSERVICES} */
     public static final String WRITE_GSERVICES = "android.permission.WRITE_GSERVICES";
-    /** See {@code Manifest#ALLOWLISTED_WRITE_DEVICE_CONFIG} */
-    public static final String ALLOWLISTED_WRITE_DEVICE_CONFIG =
-            "android.permission.ALLOWLISTED_WRITE_DEVICE_CONFIG";
+    /** See {@code Manifest#WRITE_DEVICE_CONFIG} */
+    public static final String WRITE_DEVICE_CONFIG = "android.permission.WRITE_DEVICE_CONFIG";
     /** See {@code Manifest#READ_DEVICE_CONFIG} */
     public static final String READ_DEVICE_CONFIG = "android.permission.READ_DEVICE_CONFIG";
     /** See {@code Manifest#READ_APP_SPECIFIC_LOCALES} */
@@ -1990,4 +1989,4 @@
     public static final String MANAGE_DEVICE_POLICY_ACROSS_USERS = "android.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS";
     /** See {@link Manifest#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL} */
     public static final String MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL = "android.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL";
-}
+}
\ No newline at end of file
diff --git a/common/device-side/bedstead/nene/src/main/java/com/android/bedstead/nene/flags/Flags.java b/common/device-side/bedstead/nene/src/main/java/com/android/bedstead/nene/flags/Flags.java
index 983b8ec..1682e1c6 100644
--- a/common/device-side/bedstead/nene/src/main/java/com/android/bedstead/nene/flags/Flags.java
+++ b/common/device-side/bedstead/nene/src/main/java/com/android/bedstead/nene/flags/Flags.java
@@ -16,8 +16,8 @@
 
 package com.android.bedstead.nene.flags;
 
-import static com.android.bedstead.nene.permissions.CommonPermissions.ALLOWLISTED_WRITE_DEVICE_CONFIG;
 import static com.android.bedstead.nene.permissions.CommonPermissions.READ_DEVICE_CONFIG;
+import static com.android.bedstead.nene.permissions.CommonPermissions.WRITE_DEVICE_CONFIG;
 
 import android.provider.DeviceConfig;
 
@@ -79,8 +79,7 @@
      * replaced by a bulk update.
      */
     public void set(String namespace, String key, @Nullable String value) {
-        try (PermissionContext p = TestApis.permissions()
-            .withPermission(ALLOWLISTED_WRITE_DEVICE_CONFIG)) {
+        try (PermissionContext p = TestApis.permissions().withPermission(WRITE_DEVICE_CONFIG)) {
             DeviceConfig.setProperty(namespace, key, value, /* makeDefault= */ false);
         }
     }
diff --git a/common/device-side/bedstead/nene/src/test/java/com/android/bedstead/nene/flags/FlagsTest.java b/common/device-side/bedstead/nene/src/test/java/com/android/bedstead/nene/flags/FlagsTest.java
index f72bf44..859c83a 100644
--- a/common/device-side/bedstead/nene/src/test/java/com/android/bedstead/nene/flags/FlagsTest.java
+++ b/common/device-side/bedstead/nene/src/test/java/com/android/bedstead/nene/flags/FlagsTest.java
@@ -16,7 +16,7 @@
 
 package com.android.bedstead.nene.flags;
 
-import static android.Manifest.permission.ALLOWLISTED_WRITE_DEVICE_CONFIG;
+import static android.Manifest.permission.WRITE_DEVICE_CONFIG;
 
 import static com.android.bedstead.nene.flags.CommonFlags.DevicePolicyManager.DISABLE_RESOURCES_UPDATABILITY_FLAG;
 import static com.android.bedstead.nene.flags.CommonFlags.NAMESPACE_DEVICE_POLICY_MANAGER;
@@ -61,7 +61,7 @@
     }
 
     @Test
-    @EnsureHasPermission(ALLOWLISTED_WRITE_DEVICE_CONFIG)
+    @EnsureHasPermission(WRITE_DEVICE_CONFIG)
     public void setFlagSyncEnabledFalse_bulkFlagUpdateDoesNotChangeValues() throws Exception {
         TestApis.flags().setFlagSyncEnabled(false);
         TestApis.flags().set(NAMESPACE, KEY, VALUE);
@@ -74,7 +74,7 @@
     }
 
     @Test
-    @EnsureHasPermission(ALLOWLISTED_WRITE_DEVICE_CONFIG)
+    @EnsureHasPermission(WRITE_DEVICE_CONFIG)
     public void setFlagSyncEnabledTrue_bulkFlagUpdateDoesChangeValues() throws Exception {
         TestApis.flags().setFlagSyncEnabled(true);
         TestApis.flags().set(NAMESPACE, KEY, VALUE);
diff --git a/common/device-side/bedstead/remoteframeworkclasses/src/processor/res/apis/test-current.txt b/common/device-side/bedstead/remoteframeworkclasses/src/processor/res/apis/test-current.txt
index 80566de..31efed8 100644
--- a/common/device-side/bedstead/remoteframeworkclasses/src/processor/res/apis/test-current.txt
+++ b/common/device-side/bedstead/remoteframeworkclasses/src/processor/res/apis/test-current.txt
@@ -38,7 +38,6 @@
     field public static final String OVERRIDE_DISPLAY_MODE_REQUESTS = "android.permission.OVERRIDE_DISPLAY_MODE_REQUESTS";
     field public static final String QUERY_AUDIO_STATE = "android.permission.QUERY_AUDIO_STATE";
     field public static final String READ_CELL_BROADCASTS = "android.permission.READ_CELL_BROADCASTS";
-    field public static final String READ_WRITE_SYNC_DISABLED_MODE_CONFIG = "android.permission.READ_WRITE_SYNC_DISABLED_MODE_CONFIG";
     field public static final String READ_PRIVILEGED_PHONE_STATE = "android.permission.READ_PRIVILEGED_PHONE_STATE";
     field public static final String RECORD_BACKGROUND_AUDIO = "android.permission.RECORD_BACKGROUND_AUDIO";
     field public static final String REMAP_MODIFIER_KEYS = "android.permission.REMAP_MODIFIER_KEYS";
diff --git a/common/device-side/util-axt/src/com/android/compatibility/common/util/DeviceConfigStateManager.java b/common/device-side/util-axt/src/com/android/compatibility/common/util/DeviceConfigStateManager.java
index 9711fd7..859290e 100644
--- a/common/device-side/util-axt/src/com/android/compatibility/common/util/DeviceConfigStateManager.java
+++ b/common/device-side/util-axt/src/com/android/compatibility/common/util/DeviceConfigStateManager.java
@@ -60,8 +60,7 @@
     public void set(@Nullable String value) {
         debug("set", "new value is %s", value);
         runWithShellPermissionIdentity(() -> setWithPermissionsGranted(value),
-                "android.permission.READ_DEVICE_CONFIG",
-                "android.permission.ALLOWLISTED_WRITE_DEVICE_CONFIG");
+                "android.permission.READ_DEVICE_CONFIG", "android.permission.WRITE_DEVICE_CONFIG");
     }
 
     private void setWithPermissionsGranted(@Nullable String value) {
diff --git a/tests/rollback/src/com/android/cts/rollback/RollbackManagerTest.java b/tests/rollback/src/com/android/cts/rollback/RollbackManagerTest.java
index 1c82af4..05c4ca7 100644
--- a/tests/rollback/src/com/android/cts/rollback/RollbackManagerTest.java
+++ b/tests/rollback/src/com/android/cts/rollback/RollbackManagerTest.java
@@ -75,7 +75,7 @@
                     Manifest.permission.MANAGE_ROLLBACKS,
                     Manifest.permission.TEST_MANAGE_ROLLBACKS,
                     Manifest.permission.READ_DEVICE_CONFIG,
-                    Manifest.permission.ALLOWLISTED_WRITE_DEVICE_CONFIG,
+                    Manifest.permission.WRITE_DEVICE_CONFIG,
                     Manifest.permission.FORCE_STOP_PACKAGES,
                     Manifest.permission.SET_TIME);
 
diff --git a/tests/tests/content/src/android/content/pm/cts/PackageManagerShellCommandIncrementalTest.java b/tests/tests/content/src/android/content/pm/cts/PackageManagerShellCommandIncrementalTest.java
index e1a19c2..2ac3d78 100644
--- a/tests/tests/content/src/android/content/pm/cts/PackageManagerShellCommandIncrementalTest.java
+++ b/tests/tests/content/src/android/content/pm/cts/PackageManagerShellCommandIncrementalTest.java
@@ -16,7 +16,7 @@
 
 package android.content.pm.cts;
 
-import static android.Manifest.permission.ALLOWLISTED_WRITE_DEVICE_CONFIG;
+import static android.Manifest.permission.WRITE_DEVICE_CONFIG;
 
 import static org.junit.Assert.assertEquals;
 import static org.junit.Assert.assertFalse;
@@ -1348,7 +1348,7 @@
     }
 
     static void setDeviceProperty(String name, String value) {
-        getUiAutomation().adoptShellPermissionIdentity(ALLOWLISTED_WRITE_DEVICE_CONFIG);
+        getUiAutomation().adoptShellPermissionIdentity(WRITE_DEVICE_CONFIG);
         try {
             DeviceConfig.setProperty(DeviceConfig.NAMESPACE_PACKAGE_MANAGER_SERVICE, name, value,
                     false);
diff --git a/tests/tests/deviceconfig/src/android/deviceconfig/cts/DeviceConfigApiPermissionTests.java b/tests/tests/deviceconfig/src/android/deviceconfig/cts/DeviceConfigApiPermissionTests.java
index e3e1c94..bc1bc8c 100644
--- a/tests/tests/deviceconfig/src/android/deviceconfig/cts/DeviceConfigApiPermissionTests.java
+++ b/tests/tests/deviceconfig/src/android/deviceconfig/cts/DeviceConfigApiPermissionTests.java
@@ -45,8 +45,8 @@
     private static final String KEY2 = "key2";
     private static final String VALUE = "value";
 
-    private static final String ALLOWLISTED_WRITE_DEVICE_CONFIG_PERMISSION =
-            "android.permission.ALLOWLISTED_WRITE_DEVICE_CONFIG";
+    private static final String WRITE_DEVICE_CONFIG_PERMISSION =
+            "android.permission.WRITE_DEVICE_CONFIG";
 
     private static final String READ_DEVICE_CONFIG_PERMISSION =
             "android.permission.READ_DEVICE_CONFIG";
@@ -67,8 +67,8 @@
                 .dropShellPermissionIdentity();
     }
     /**
-     * Checks that when application does not have READ_DEVICE_CONFIG or
-     * ALLOWLISTED_WRITE_DEVICE_CONFIG permissions it cannot access any of DeviceConfig API methods
+     * Checks that when application does not have READ_DEVICE_CONFIG or WRITE_DEVICE_CONFIG
+     * permissions it cannot access any of DeviceConfig API methods
      * @throws Exception
      */
     @Test
@@ -91,8 +91,8 @@
     }
 
     /**
-     * Checks that when application has only ALLOWLISTED_WRITE_DEVICE_CONFIG permission
-     * it can access only setProperty() methods
+     * Checks that when application has only WRITE_DEVICE_CONFIG permission it can access only
+     * setProperty() methods
      * @throws Exception
      */
     @Test
@@ -100,7 +100,7 @@
 
         StringBuilder violations = new StringBuilder();
         InstrumentationRegistry.getInstrumentation().getUiAutomation()
-                .adoptShellPermissionIdentity(ALLOWLISTED_WRITE_DEVICE_CONFIG_PERMISSION);
+                .adoptShellPermissionIdentity(WRITE_DEVICE_CONFIG_PERMISSION);
 
         // setters with write permission
         trySetPropertyWithWritePermission(violations);
@@ -145,8 +145,8 @@
     }
 
     /**
-     * Checks that when application has both READ_DEVICE_CONFIG and ALLOWLISTED_WRITE_DEVICE_CONFIG
-     * permissions it can access all methods
+     * Checks that when application has both READ_DEVICE_CONFIG and WRITE_DEVICE_CONFIG permissions
+     * it can access all methods
      * @throws Exception
      */
     @Test
@@ -155,7 +155,7 @@
 
         InstrumentationRegistry.getInstrumentation().getUiAutomation()
                 .adoptShellPermissionIdentity(
-                        ALLOWLISTED_WRITE_DEVICE_CONFIG_PERMISSION,
+                        WRITE_DEVICE_CONFIG_PERMISSION,
                         READ_DEVICE_CONFIG_PERMISSION);
 
         // setters with write permission
@@ -190,7 +190,7 @@
         try {
             DeviceConfig.setProperty(PUBLIC_NAMESPACE, KEY, VALUE, /*makeDefault=*/ false);
             violations.append("DeviceConfig.setProperty() for public namespaces must not be "
-                    + "accessible without ALLOWLISTED_WRITE_DEVICE_CONFIG permission\n");
+                    + "accessible without WRITE_DEVICE_CONFIG permission\n");
         } catch (SecurityException e) {
         }
 
@@ -199,7 +199,7 @@
                     new Properties.Builder(PUBLIC_NAMESPACE).setString(KEY2, VALUE).build();
             DeviceConfig.setProperties(properties);
             violations.append("DeviceConfig.setProperties() for public namespaces must not be "
-                    + " accessible without ALLOWLISTED_WRITE_DEVICE_CONFIG permission\n");
+                    + " accessible without WRITE_DEVICE_CONFIG permission\n");
         } catch (DeviceConfig.BadConfigException e) {
             addExceptionToViolations(violations, "DeviceConfig.setProperties() should not throw "
                     + "BadConfigException without a known bad configuration", e);
@@ -207,13 +207,13 @@
         }
 
         InstrumentationRegistry.getInstrumentation().getUiAutomation()
-                .adoptShellPermissionIdentity(ALLOWLISTED_WRITE_DEVICE_CONFIG_PERMISSION);
+                .adoptShellPermissionIdentity(WRITE_DEVICE_CONFIG_PERMISSION);
 
         try {
             DeviceConfig.setProperty(PUBLIC_NAMESPACE, KEY, VALUE, /*makeDefault=*/ false);
         } catch (SecurityException e) {
             addExceptionToViolations(violations, "DeviceConfig.setProperty() must be accessible "
-                    + "with ALLOWLISTED_WRITE_DEVICE permission", e);
+                    + "with WRITE_DEVICE_CONFIG permission", e);
         }
 
         try {
@@ -225,7 +225,7 @@
                     + "BadConfigException without a known bad configuration", e);
         } catch (SecurityException e) {
             addExceptionToViolations(violations, "DeviceConfig.setProperties() must be accessible "
-                    + "with ALLOWLISTED_WRITE_DEVICE permission", e);
+                    + "with WRITE_DEVICE_CONFIG permission", e);
         }
 
         try {
@@ -271,7 +271,7 @@
         try {
             DeviceConfig.setProperty(NAMESPACE, KEY, VALUE, /*makeDefault=*/ false);
             violations.append("DeviceConfig.setProperty() must not be accessible without "
-                    + "ALLOWLISTED_WRITE_DEVICE_CONFIG permission.\n");
+                    + "WRITE_DEVICE_CONFIG permission.\n");
         } catch (SecurityException e) {
         }
     }
@@ -282,7 +282,7 @@
                     new Properties.Builder(NAMESPACE2).setString(KEY2, VALUE).build();
             DeviceConfig.setProperties(properties);
             violations.append("DeviceConfig.setProperties() must not be accessible without "
-                    + "ALLOWLISTED_WRITE_DEVICE_CONFIG permission.\n");
+                    + "WRITE_DEVICE_CONFIG permission.\n");
         } catch (DeviceConfig.BadConfigException e) {
             addExceptionToViolations(violations, "DeviceConfig.setProperties() should not throw "
                     + "BadConfigException without a known bad configuration.", e);
@@ -294,7 +294,7 @@
         try {
             DeviceConfig.deleteProperty(NAMESPACE, KEY);
             violations.append("DeviceConfig.deleteProperty() must not be accessible without "
-                    + "WRITE_DEVICE_CONFIG_ALLOWLIST permission.\n");
+                    + "WRITE_DEVICE_CONFIG permission.\n");
         } catch (SecurityException e) {
         }
     }
@@ -322,7 +322,7 @@
             DeviceConfig.setProperty(NAMESPACE, KEY, VALUE, /*makeDefault=*/ false);
         } catch (SecurityException e) {
             addExceptionToViolations(violations, "DeviceConfig.setProperty() must be accessible "
-                    + "with ALLOWLISTED_WRITE_DEVICE_CONFIG permission", e);
+                    + "with WRITE_DEVICE_CONFIG permission", e);
         }
     }
 
@@ -336,7 +336,7 @@
                     + " without a known bad configuration.");
         } catch (SecurityException e) {
             addExceptionToViolations(violations, "DeviceConfig.setProperties() must be accessible "
-                    + "with ALLOWLISTED_WRITE_DEVICE_CONFIG permission", e);
+                    + "with WRITE DEVICE_CONFIG permission", e);
         }
     }
 
diff --git a/tests/tests/deviceconfig/src/android/deviceconfig/cts/DeviceConfigApiTests.java b/tests/tests/deviceconfig/src/android/deviceconfig/cts/DeviceConfigApiTests.java
index f4cc27f..081f06b 100644
--- a/tests/tests/deviceconfig/src/android/deviceconfig/cts/DeviceConfigApiTests.java
+++ b/tests/tests/deviceconfig/src/android/deviceconfig/cts/DeviceConfigApiTests.java
@@ -92,15 +92,12 @@
     private final Object mLock = new Object();
 
 
-    private static final String ALLOWLISTED_WRITE_DEVICE_CONFIG_PERMISSION =
-            "android.permission.ALLOWLISTED_WRITE_DEVICE_CONFIG";
+    private static final String WRITE_DEVICE_CONFIG_PERMISSION =
+            "android.permission.WRITE_DEVICE_CONFIG";
 
     private static final String READ_DEVICE_CONFIG_PERMISSION =
             "android.permission.READ_DEVICE_CONFIG";
 
-    private static final String READ_WRITE_SYNC_DISABLED_MODE_CONFIG_PERMISSION =
-            "android.permission.READ_WRITE_SYNC_DISABLED_MODE_CONFIG";
-
     private static final String MONITOR_DEVICE_CONFIG_ACCESS =
             "android.permission.MONITOR_DEVICE_CONFIG_ACCESS";
 
@@ -123,8 +120,8 @@
         }
 
         InstrumentationRegistry.getInstrumentation().getUiAutomation().adoptShellPermissionIdentity(
-                ALLOWLISTED_WRITE_DEVICE_CONFIG_PERMISSION, READ_DEVICE_CONFIG_PERMISSION,
-                MONITOR_DEVICE_CONFIG_ACCESS, READ_WRITE_SYNC_DISABLED_MODE_CONFIG_PERMISSION);
+                WRITE_DEVICE_CONFIG_PERMISSION, READ_DEVICE_CONFIG_PERMISSION,
+                MONITOR_DEVICE_CONFIG_ACCESS);
     }
 
     @Before
@@ -1402,4 +1399,4 @@
             }
         }
     }
-}
+}
\ No newline at end of file
diff --git a/tests/tests/permission/src/android/permission/cts/BaseNotificationListenerCheckTest.java b/tests/tests/permission/src/android/permission/cts/BaseNotificationListenerCheckTest.java
index 59683d4..1a2f59c 100644
--- a/tests/tests/permission/src/android/permission/cts/BaseNotificationListenerCheckTest.java
+++ b/tests/tests/permission/src/android/permission/cts/BaseNotificationListenerCheckTest.java
@@ -16,7 +16,7 @@
 
 package android.permission.cts;
 
-import static android.Manifest.permission.ALLOWLISTED_WRITE_DEVICE_CONFIG;
+import static android.Manifest.permission.WRITE_DEVICE_CONFIG;
 import static android.os.Process.myUserHandle;
 import static android.permission.cts.TestUtils.eventually;
 
@@ -164,7 +164,7 @@
             if (!valueWasSet) {
                 throw new  IllegalStateException("Could not set " + propertyName + " to " + value);
             }
-        }, ALLOWLISTED_WRITE_DEVICE_CONFIG);
+        }, WRITE_DEVICE_CONFIG);
     }
 
     /**
diff --git a/tests/tests/permission/src/android/permission/cts/LocationAccessCheckTest.java b/tests/tests/permission/src/android/permission/cts/LocationAccessCheckTest.java
index 580938f..65c7dab 100644
--- a/tests/tests/permission/src/android/permission/cts/LocationAccessCheckTest.java
+++ b/tests/tests/permission/src/android/permission/cts/LocationAccessCheckTest.java
@@ -18,7 +18,7 @@
 
 import static android.Manifest.permission.ACCESS_BACKGROUND_LOCATION;
 import static android.Manifest.permission.ACCESS_FINE_LOCATION;
-import static android.Manifest.permission.ALLOWLISTED_WRITE_DEVICE_CONFIG;
+import static android.Manifest.permission.WRITE_DEVICE_CONFIG;
 import static android.app.AppOpsManager.OPSTR_FINE_LOCATION;
 import static android.app.AppOpsManager.OP_FLAGS_ALL_TRUSTED;
 import static android.content.Context.BIND_AUTO_CREATE;
@@ -437,7 +437,7 @@
             if (!valueWasSet) {
                 throw new IllegalStateException("Could not set " + propertyName + " to " + value);
             }
-        }, ALLOWLISTED_WRITE_DEVICE_CONFIG);
+        }, WRITE_DEVICE_CONFIG);
     }
 
 
diff --git a/tests/tests/permission2/res/raw/android_manifest.xml b/tests/tests/permission2/res/raw/android_manifest.xml
index f63d328..32294ca 100644
--- a/tests/tests/permission2/res/raw/android_manifest.xml
+++ b/tests/tests/permission2/res/raw/android_manifest.xml
@@ -4107,16 +4107,6 @@
     <permission android:name="android.permission.WRITE_DEVICE_CONFIG"
         android:protectionLevel="signature|verifier|configurator"/>
 
-    <!-- @SystemApi @TestApi @hide Allows an application to modify only allowlisted settings.
-    <p>Not for use by third-party applications. -->
-    <permission android:name="android.permission.ALLOWLISTED_WRITE_DEVICE_CONFIG"
-        android:protectionLevel="signature|verifier|configurator"/>
-
-    <!-- @SystemApi @TestApi @hide Allows an application to read/write sync disabled mode config.
-    <p>Not for use by third-party applications. -->
-    <permission android:name="android.permission.READ_WRITE_SYNC_DISABLED_MODE_CONFIG"
-        android:protectionLevel="signature|verifier|configurator"/>
-
     <!-- @SystemApi @hide Allows an application to read config settings.
     <p>Not for use by third-party applications. -->
     <permission android:name="android.permission.READ_DEVICE_CONFIG"
diff --git a/tests/tests/provider/src/android/provider/cts/settings/Settings_ConfigTest.java b/tests/tests/provider/src/android/provider/cts/settings/Settings_ConfigTest.java
index d0a1b2b..1d3418f 100644
--- a/tests/tests/provider/src/android/provider/cts/settings/Settings_ConfigTest.java
+++ b/tests/tests/provider/src/android/provider/cts/settings/Settings_ConfigTest.java
@@ -91,8 +91,8 @@
     private final Object mLock = new Object();
 
 
-    private static final String ALLOWLISTED_WRITE_DEVICE_CONFIG_PERMISSION =
-            "android.permission.ALLOWLISTED_WRITE_DEVICE_CONFIG";
+    private static final String WRITE_DEVICE_CONFIG_PERMISSION =
+            "android.permission.WRITE_DEVICE_CONFIG";
 
     private static final String READ_DEVICE_CONFIG_PERMISSION =
             "android.permission.READ_DEVICE_CONFIG";
@@ -100,9 +100,6 @@
     private static final String MONITOR_DEVICE_CONFIG_ACCESS =
             "android.permission.MONITOR_DEVICE_CONFIG_ACCESS";
 
-    private static final String READ_WRITE_SYNC_DISABLED_MODE_CONFIG =
-            "android.permission.READ_WRITE_SYNC_DISABLED_MODE_CONFIG";
-
     private static ContentResolver sContentResolver;
     private static Context sContext;
 
@@ -112,8 +109,8 @@
     @Before
     public void setUpContext() throws Exception {
         InstrumentationRegistry.getInstrumentation().getUiAutomation().adoptShellPermissionIdentity(
-                ALLOWLISTED_WRITE_DEVICE_CONFIG_PERMISSION, READ_DEVICE_CONFIG_PERMISSION,
-                MONITOR_DEVICE_CONFIG_ACCESS, READ_WRITE_SYNC_DISABLED_MODE_CONFIG);
+                WRITE_DEVICE_CONFIG_PERMISSION, READ_DEVICE_CONFIG_PERMISSION,
+                MONITOR_DEVICE_CONFIG_ACCESS);
         sContext = InstrumentationRegistry.getContext();
         sContentResolver = sContext.getContentResolver();
     }
diff --git a/tests/tests/virtualdevice/src/android/virtualdevice/cts/StreamedAppClipboardTest.java b/tests/tests/virtualdevice/src/android/virtualdevice/cts/StreamedAppClipboardTest.java
index 500d9fd..5b784fa 100644
--- a/tests/tests/virtualdevice/src/android/virtualdevice/cts/StreamedAppClipboardTest.java
+++ b/tests/tests/virtualdevice/src/android/virtualdevice/cts/StreamedAppClipboardTest.java
@@ -18,11 +18,11 @@
 
 import static android.Manifest.permission.ACTIVITY_EMBEDDING;
 import static android.Manifest.permission.ADD_TRUSTED_DISPLAY;
-import static android.Manifest.permission.ALLOWLISTED_WRITE_DEVICE_CONFIG;
 import static android.Manifest.permission.CREATE_VIRTUAL_DEVICE;
 import static android.Manifest.permission.READ_CLIPBOARD_IN_BACKGROUND;
 import static android.Manifest.permission.READ_DEVICE_CONFIG;
 import static android.Manifest.permission.WAKE_LOCK;
+import static android.Manifest.permission.WRITE_DEVICE_CONFIG;
 import static android.Manifest.permission.WRITE_SECURE_SETTINGS;
 import static android.companion.virtual.VirtualDeviceManager.DEVICE_ID_DEFAULT;
 import static android.content.pm.PackageManager.FEATURE_FREEFORM_WINDOW_MANAGEMENT;
@@ -133,7 +133,7 @@
             CREATE_VIRTUAL_DEVICE,
             READ_CLIPBOARD_IN_BACKGROUND,
             READ_DEVICE_CONFIG,
-            ALLOWLISTED_WRITE_DEVICE_CONFIG,
+            WRITE_DEVICE_CONFIG,
             WRITE_SECURE_SETTINGS,
             WAKE_LOCK);