sched: move sysfs to procfs

Modify name from sysfs_vendor_sched to proc_vendor_sched

Test: without avc denial
Bug: 216207007
Signed-off-by: chungkai <chungkai@google.com>
Change-Id: Ic113b2d8ee1d3ae1ced9985636b17ef1e7657a84
This commit is contained in:
chungkai 2022-03-23 09:45:37 +00:00 committed by Chung-Kai (Michael) Mei
parent 572a8a3372
commit de44d766e4
19 changed files with 33 additions and 33 deletions

View file

@ -1,3 +1,3 @@
# b/177389198
dontaudit gmscore_app adbd_prop:file *;
dontaudit gmscore_app sysfs_vendor_sched:file write;
dontaudit gmscore_app proc_vendor_sched:file write;

View file

@ -1,3 +1,3 @@
allow permissioncontroller_app sysfs_vendor_sched:dir r_dir_perms;
allow permissioncontroller_app sysfs_vendor_sched:file w_file_perms;
allow permissioncontroller_app proc_vendor_sched:dir r_dir_perms;
allow permissioncontroller_app proc_vendor_sched:file w_file_perms;

View file

@ -17,4 +17,4 @@ dontaudit priv_app ab_update_gki_prop:file { getattr };
dontaudit priv_app ab_update_gki_prop:file { map };
dontaudit priv_app adbd_prop:file { open };
dontaudit priv_app adbd_prop:file { getattr };
dontaudit priv_app sysfs_vendor_sched:file write;
dontaudit priv_app proc_vendor_sched:file write;

View file

@ -1,3 +1,3 @@
allow bluetooth sysfs_vendor_sched:dir search;
allow bluetooth sysfs_vendor_sched:file w_file_perms;
allow bluetooth proc_vendor_sched:dir search;
allow bluetooth proc_vendor_sched:file w_file_perms;

View file

@ -1,3 +1,3 @@
permissioncontroller_app sysfs_vendor_sched file b/190671898
permissioncontroller_app proc_vendor_sched file b/190671898
vendor_ims_app default_prop file b/194281028
hal_fingerprint_default default_prop property_service b/215640468

View file

@ -1,2 +1,2 @@
allow {domain -appdomain -rs} sysfs_vendor_sched:dir r_dir_perms;
allow {domain -appdomain -rs} sysfs_vendor_sched:file w_file_perms;
allow {domain -appdomain -rs} proc_vendor_sched:dir r_dir_perms;
allow {domain -appdomain -rs} proc_vendor_sched:file w_file_perms;

View file

@ -96,7 +96,7 @@ binder_call(hal_dumpstate_default, hal_graphics_composer_default);
allow hal_dumpstate_default sysfs_display:dir r_dir_perms;
allow hal_dumpstate_default sysfs_display:file r_file_perms;
allow hal_dumpstate_default sysfs_vendor_sched:file read;
allow hal_dumpstate_default proc_vendor_sched:file read;
allow hal_dumpstate_default proc_vendor_sched:dir r_dir_perms;
allow hal_dumpstate_default proc_vendor_sched:file r_file_perms;

View file

@ -1,7 +1,7 @@
allow hal_power_default sysfs_scsi_devices_0000:file rw_file_perms;
allow hal_power_default sysfs_fs_f2fs:dir r_dir_perms;
allow hal_power_default sysfs_fs_f2fs:file rw_file_perms;
allow hal_power_default sysfs_vendor_sched:file rw_file_perms;
allow hal_power_default proc_vendor_sched:file rw_file_perms;
allow hal_power_default cpuctl_device:file rw_file_perms;
allow hal_power_default sysfs_gpu:file rw_file_perms;
allow hal_power_default sysfs_devfreq_dir:dir r_dir_perms;

View file

@ -2,8 +2,8 @@ type hbmsvmanager_app, domain, coredomain;
app_domain(hbmsvmanager_app);
allow hbmsvmanager_app sysfs_vendor_sched:dir r_dir_perms;
allow hbmsvmanager_app sysfs_vendor_sched:file w_file_perms;
allow hbmsvmanager_app proc_vendor_sched:dir r_dir_perms;
allow hbmsvmanager_app proc_vendor_sched:file w_file_perms;
allow hbmsvmanager_app hal_pixel_display_service:service_manager find;
binder_call(hbmsvmanager_app, hal_graphics_composer_default)

View file

@ -24,6 +24,6 @@ userdebug_or_eng(`
set_prop(logger_app, vendor_wifi_sniffer_prop)
dontaudit logger_app default_prop:file { read };
dontaudit logger_app sysfs_vendor_sched:dir search;
dontaudit logger_app sysfs_vendor_sched:file write;
dontaudit logger_app proc_vendor_sched:dir search;
dontaudit logger_app proc_vendor_sched:file write;
')

View file

@ -1,2 +1,2 @@
dontaudit mediaprovider sysfs_vendor_sched:dir search;
dontaudit mediaprovider sysfs_vendor_sched:file write;
dontaudit mediaprovider proc_vendor_sched:dir search;
dontaudit mediaprovider proc_vendor_sched:file write;

View file

@ -1,2 +1,2 @@
allow nfc sysfs_vendor_sched:dir r_dir_perms;
allow nfc sysfs_vendor_sched:file w_file_perms;
allow nfc proc_vendor_sched:dir r_dir_perms;
allow nfc proc_vendor_sched:file w_file_perms;

View file

@ -4,8 +4,8 @@ allow platform_app hal_exynos_rild_hwservice:hwservice_manager find;
allow platform_app hal_wlc_hwservice:hwservice_manager find;
binder_call(platform_app, hal_wlc)
allow platform_app sysfs_vendor_sched:dir r_dir_perms;
allow platform_app sysfs_vendor_sched:file w_file_perms;
allow platform_app proc_vendor_sched:dir r_dir_perms;
allow platform_app proc_vendor_sched:file w_file_perms;
allow platform_app nfc_service:service_manager find;
allow platform_app uwb_service:service_manager find;

View file

@ -1,6 +1,6 @@
allow radio hal_exynos_rild_hwservice:hwservice_manager find;
allow radio sysfs_vendor_sched:dir r_dir_perms;
allow radio sysfs_vendor_sched:file w_file_perms;
allow radio proc_vendor_sched:dir r_dir_perms;
allow radio proc_vendor_sched:file w_file_perms;
# Allow telephony to access file descriptor of the QOS socket
# so it can make sure the QOS is meant for the intended addresses

View file

@ -1,2 +1,2 @@
allow secure_element sysfs_vendor_sched:dir r_dir_perms;
allow secure_element sysfs_vendor_sched:file w_file_perms;
allow secure_element proc_vendor_sched:dir r_dir_perms;
allow secure_element proc_vendor_sched:file w_file_perms;

View file

@ -6,5 +6,5 @@ userdebug_or_eng(`
allow shell sysfs_sjtag:file rw_file_perms;
')
dontaudit shell sysfs_vendor_sched:dir search;
dontaudit shell sysfs_vendor_sched:file write;
dontaudit shell proc_vendor_sched:dir search;
dontaudit shell proc_vendor_sched:file write;

View file

@ -13,8 +13,8 @@ userdebug_or_eng(`
allow ssr_detector_app sscoredump_vendor_data_coredump_file:file r_file_perms;
allow ssr_detector_app sysfs_sjtag:dir r_dir_perms;
allow ssr_detector_app sysfs_sjtag:file rw_file_perms;
allow ssr_detector_app sysfs_vendor_sched:dir search;
allow ssr_detector_app sysfs_vendor_sched:file rw_file_perms;
allow ssr_detector_app proc_vendor_sched:dir search;
allow ssr_detector_app proc_vendor_sched:file rw_file_perms;
allow ssr_detector_app cgroup:file write;
')

View file

@ -1,5 +1,5 @@
allow system_app sysfs_vendor_sched:dir r_dir_perms;
allow system_app sysfs_vendor_sched:file w_file_perms;
allow system_app proc_vendor_sched:dir r_dir_perms;
allow system_app proc_vendor_sched:file w_file_perms;
allow system_app hal_wlc_hwservice:hwservice_manager find;
binder_call(system_app, hal_wlc)

View file

@ -2,5 +2,5 @@
# for secure video playback
allow untrusted_app_all dmabuf_system_secure_heap_device:chr_file r_file_perms;
dontaudit untrusted_app_all sysfs_vendor_sched:dir search;
dontaudit untrusted_app_all sysfs_vendor_sched:file write;
dontaudit untrusted_app_all proc_vendor_sched:dir search;
dontaudit untrusted_app_all proc_vendor_sched:file write;