sched: move sysfs to procfs
Modify name from sysfs_vendor_sched to proc_vendor_sched Test: without avc denial Bug: 216207007 Signed-off-by: chungkai <chungkai@google.com> Change-Id: Ic113b2d8ee1d3ae1ced9985636b17ef1e7657a84
This commit is contained in:
parent
572a8a3372
commit
de44d766e4
19 changed files with 33 additions and 33 deletions
|
@ -1,3 +1,3 @@
|
|||
# b/177389198
|
||||
dontaudit gmscore_app adbd_prop:file *;
|
||||
dontaudit gmscore_app sysfs_vendor_sched:file write;
|
||||
dontaudit gmscore_app proc_vendor_sched:file write;
|
||||
|
|
|
@ -1,3 +1,3 @@
|
|||
allow permissioncontroller_app sysfs_vendor_sched:dir r_dir_perms;
|
||||
allow permissioncontroller_app sysfs_vendor_sched:file w_file_perms;
|
||||
allow permissioncontroller_app proc_vendor_sched:dir r_dir_perms;
|
||||
allow permissioncontroller_app proc_vendor_sched:file w_file_perms;
|
||||
|
||||
|
|
|
@ -17,4 +17,4 @@ dontaudit priv_app ab_update_gki_prop:file { getattr };
|
|||
dontaudit priv_app ab_update_gki_prop:file { map };
|
||||
dontaudit priv_app adbd_prop:file { open };
|
||||
dontaudit priv_app adbd_prop:file { getattr };
|
||||
dontaudit priv_app sysfs_vendor_sched:file write;
|
||||
dontaudit priv_app proc_vendor_sched:file write;
|
||||
|
|
4
whitechapel/vendor/google/bluetooth.te
vendored
4
whitechapel/vendor/google/bluetooth.te
vendored
|
@ -1,3 +1,3 @@
|
|||
allow bluetooth sysfs_vendor_sched:dir search;
|
||||
allow bluetooth sysfs_vendor_sched:file w_file_perms;
|
||||
allow bluetooth proc_vendor_sched:dir search;
|
||||
allow bluetooth proc_vendor_sched:file w_file_perms;
|
||||
|
||||
|
|
2
whitechapel/vendor/google/bug_map
vendored
2
whitechapel/vendor/google/bug_map
vendored
|
@ -1,3 +1,3 @@
|
|||
permissioncontroller_app sysfs_vendor_sched file b/190671898
|
||||
permissioncontroller_app proc_vendor_sched file b/190671898
|
||||
vendor_ims_app default_prop file b/194281028
|
||||
hal_fingerprint_default default_prop property_service b/215640468
|
||||
|
|
4
whitechapel/vendor/google/domain.te
vendored
4
whitechapel/vendor/google/domain.te
vendored
|
@ -1,2 +1,2 @@
|
|||
allow {domain -appdomain -rs} sysfs_vendor_sched:dir r_dir_perms;
|
||||
allow {domain -appdomain -rs} sysfs_vendor_sched:file w_file_perms;
|
||||
allow {domain -appdomain -rs} proc_vendor_sched:dir r_dir_perms;
|
||||
allow {domain -appdomain -rs} proc_vendor_sched:file w_file_perms;
|
||||
|
|
|
@ -96,7 +96,7 @@ binder_call(hal_dumpstate_default, hal_graphics_composer_default);
|
|||
allow hal_dumpstate_default sysfs_display:dir r_dir_perms;
|
||||
allow hal_dumpstate_default sysfs_display:file r_file_perms;
|
||||
|
||||
allow hal_dumpstate_default sysfs_vendor_sched:file read;
|
||||
allow hal_dumpstate_default proc_vendor_sched:file read;
|
||||
allow hal_dumpstate_default proc_vendor_sched:dir r_dir_perms;
|
||||
allow hal_dumpstate_default proc_vendor_sched:file r_file_perms;
|
||||
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
allow hal_power_default sysfs_scsi_devices_0000:file rw_file_perms;
|
||||
allow hal_power_default sysfs_fs_f2fs:dir r_dir_perms;
|
||||
allow hal_power_default sysfs_fs_f2fs:file rw_file_perms;
|
||||
allow hal_power_default sysfs_vendor_sched:file rw_file_perms;
|
||||
allow hal_power_default proc_vendor_sched:file rw_file_perms;
|
||||
allow hal_power_default cpuctl_device:file rw_file_perms;
|
||||
allow hal_power_default sysfs_gpu:file rw_file_perms;
|
||||
allow hal_power_default sysfs_devfreq_dir:dir r_dir_perms;
|
||||
|
|
|
@ -2,8 +2,8 @@ type hbmsvmanager_app, domain, coredomain;
|
|||
|
||||
app_domain(hbmsvmanager_app);
|
||||
|
||||
allow hbmsvmanager_app sysfs_vendor_sched:dir r_dir_perms;
|
||||
allow hbmsvmanager_app sysfs_vendor_sched:file w_file_perms;
|
||||
allow hbmsvmanager_app proc_vendor_sched:dir r_dir_perms;
|
||||
allow hbmsvmanager_app proc_vendor_sched:file w_file_perms;
|
||||
|
||||
allow hbmsvmanager_app hal_pixel_display_service:service_manager find;
|
||||
binder_call(hbmsvmanager_app, hal_graphics_composer_default)
|
||||
|
|
4
whitechapel/vendor/google/logger_app.te
vendored
4
whitechapel/vendor/google/logger_app.te
vendored
|
@ -24,6 +24,6 @@ userdebug_or_eng(`
|
|||
set_prop(logger_app, vendor_wifi_sniffer_prop)
|
||||
|
||||
dontaudit logger_app default_prop:file { read };
|
||||
dontaudit logger_app sysfs_vendor_sched:dir search;
|
||||
dontaudit logger_app sysfs_vendor_sched:file write;
|
||||
dontaudit logger_app proc_vendor_sched:dir search;
|
||||
dontaudit logger_app proc_vendor_sched:file write;
|
||||
')
|
||||
|
|
4
whitechapel/vendor/google/mediaprovider.te
vendored
4
whitechapel/vendor/google/mediaprovider.te
vendored
|
@ -1,2 +1,2 @@
|
|||
dontaudit mediaprovider sysfs_vendor_sched:dir search;
|
||||
dontaudit mediaprovider sysfs_vendor_sched:file write;
|
||||
dontaudit mediaprovider proc_vendor_sched:dir search;
|
||||
dontaudit mediaprovider proc_vendor_sched:file write;
|
||||
|
|
4
whitechapel/vendor/google/nfc.te
vendored
4
whitechapel/vendor/google/nfc.te
vendored
|
@ -1,2 +1,2 @@
|
|||
allow nfc sysfs_vendor_sched:dir r_dir_perms;
|
||||
allow nfc sysfs_vendor_sched:file w_file_perms;
|
||||
allow nfc proc_vendor_sched:dir r_dir_perms;
|
||||
allow nfc proc_vendor_sched:file w_file_perms;
|
||||
|
|
4
whitechapel/vendor/google/platform_app.te
vendored
4
whitechapel/vendor/google/platform_app.te
vendored
|
@ -4,8 +4,8 @@ allow platform_app hal_exynos_rild_hwservice:hwservice_manager find;
|
|||
allow platform_app hal_wlc_hwservice:hwservice_manager find;
|
||||
binder_call(platform_app, hal_wlc)
|
||||
|
||||
allow platform_app sysfs_vendor_sched:dir r_dir_perms;
|
||||
allow platform_app sysfs_vendor_sched:file w_file_perms;
|
||||
allow platform_app proc_vendor_sched:dir r_dir_perms;
|
||||
allow platform_app proc_vendor_sched:file w_file_perms;
|
||||
|
||||
allow platform_app nfc_service:service_manager find;
|
||||
allow platform_app uwb_service:service_manager find;
|
||||
|
|
4
whitechapel/vendor/google/radio.te
vendored
4
whitechapel/vendor/google/radio.te
vendored
|
@ -1,6 +1,6 @@
|
|||
allow radio hal_exynos_rild_hwservice:hwservice_manager find;
|
||||
allow radio sysfs_vendor_sched:dir r_dir_perms;
|
||||
allow radio sysfs_vendor_sched:file w_file_perms;
|
||||
allow radio proc_vendor_sched:dir r_dir_perms;
|
||||
allow radio proc_vendor_sched:file w_file_perms;
|
||||
|
||||
# Allow telephony to access file descriptor of the QOS socket
|
||||
# so it can make sure the QOS is meant for the intended addresses
|
||||
|
|
4
whitechapel/vendor/google/secure_element.te
vendored
4
whitechapel/vendor/google/secure_element.te
vendored
|
@ -1,2 +1,2 @@
|
|||
allow secure_element sysfs_vendor_sched:dir r_dir_perms;
|
||||
allow secure_element sysfs_vendor_sched:file w_file_perms;
|
||||
allow secure_element proc_vendor_sched:dir r_dir_perms;
|
||||
allow secure_element proc_vendor_sched:file w_file_perms;
|
||||
|
|
4
whitechapel/vendor/google/shell.te
vendored
4
whitechapel/vendor/google/shell.te
vendored
|
@ -6,5 +6,5 @@ userdebug_or_eng(`
|
|||
allow shell sysfs_sjtag:file rw_file_perms;
|
||||
')
|
||||
|
||||
dontaudit shell sysfs_vendor_sched:dir search;
|
||||
dontaudit shell sysfs_vendor_sched:file write;
|
||||
dontaudit shell proc_vendor_sched:dir search;
|
||||
dontaudit shell proc_vendor_sched:file write;
|
||||
|
|
4
whitechapel/vendor/google/ssr_detector.te
vendored
4
whitechapel/vendor/google/ssr_detector.te
vendored
|
@ -13,8 +13,8 @@ userdebug_or_eng(`
|
|||
allow ssr_detector_app sscoredump_vendor_data_coredump_file:file r_file_perms;
|
||||
allow ssr_detector_app sysfs_sjtag:dir r_dir_perms;
|
||||
allow ssr_detector_app sysfs_sjtag:file rw_file_perms;
|
||||
allow ssr_detector_app sysfs_vendor_sched:dir search;
|
||||
allow ssr_detector_app sysfs_vendor_sched:file rw_file_perms;
|
||||
allow ssr_detector_app proc_vendor_sched:dir search;
|
||||
allow ssr_detector_app proc_vendor_sched:file rw_file_perms;
|
||||
allow ssr_detector_app cgroup:file write;
|
||||
')
|
||||
|
||||
|
|
4
whitechapel/vendor/google/system_app.te
vendored
4
whitechapel/vendor/google/system_app.te
vendored
|
@ -1,5 +1,5 @@
|
|||
allow system_app sysfs_vendor_sched:dir r_dir_perms;
|
||||
allow system_app sysfs_vendor_sched:file w_file_perms;
|
||||
allow system_app proc_vendor_sched:dir r_dir_perms;
|
||||
allow system_app proc_vendor_sched:file w_file_perms;
|
||||
|
||||
allow system_app hal_wlc_hwservice:hwservice_manager find;
|
||||
binder_call(system_app, hal_wlc)
|
||||
|
|
|
@ -2,5 +2,5 @@
|
|||
# for secure video playback
|
||||
allow untrusted_app_all dmabuf_system_secure_heap_device:chr_file r_file_perms;
|
||||
|
||||
dontaudit untrusted_app_all sysfs_vendor_sched:dir search;
|
||||
dontaudit untrusted_app_all sysfs_vendor_sched:file write;
|
||||
dontaudit untrusted_app_all proc_vendor_sched:dir search;
|
||||
dontaudit untrusted_app_all proc_vendor_sched:file write;
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue