From de44d766e48789f2b79292dddc5aa842b17c8c5f Mon Sep 17 00:00:00 2001 From: chungkai Date: Wed, 23 Mar 2022 09:45:37 +0000 Subject: [PATCH] sched: move sysfs to procfs Modify name from sysfs_vendor_sched to proc_vendor_sched Test: without avc denial Bug: 216207007 Signed-off-by: chungkai Change-Id: Ic113b2d8ee1d3ae1ced9985636b17ef1e7657a84 --- private/gmscore_app.te | 2 +- private/permissioncontroller_app.te | 4 ++-- private/priv_app.te | 2 +- whitechapel/vendor/google/bluetooth.te | 4 ++-- whitechapel/vendor/google/bug_map | 2 +- whitechapel/vendor/google/domain.te | 4 ++-- whitechapel/vendor/google/hal_dumpstate_default.te | 2 +- whitechapel/vendor/google/hal_power_default.te | 2 +- whitechapel/vendor/google/hbmsvmanager_app.te | 4 ++-- whitechapel/vendor/google/logger_app.te | 4 ++-- whitechapel/vendor/google/mediaprovider.te | 4 ++-- whitechapel/vendor/google/nfc.te | 4 ++-- whitechapel/vendor/google/platform_app.te | 4 ++-- whitechapel/vendor/google/radio.te | 4 ++-- whitechapel/vendor/google/secure_element.te | 4 ++-- whitechapel/vendor/google/shell.te | 4 ++-- whitechapel/vendor/google/ssr_detector.te | 4 ++-- whitechapel/vendor/google/system_app.te | 4 ++-- whitechapel/vendor/google/untrusted_app_all.te | 4 ++-- 19 files changed, 33 insertions(+), 33 deletions(-) diff --git a/private/gmscore_app.te b/private/gmscore_app.te index 3968de30..e52eb551 100644 --- a/private/gmscore_app.te +++ b/private/gmscore_app.te @@ -1,3 +1,3 @@ # b/177389198 dontaudit gmscore_app adbd_prop:file *; -dontaudit gmscore_app sysfs_vendor_sched:file write; +dontaudit gmscore_app proc_vendor_sched:file write; diff --git a/private/permissioncontroller_app.te b/private/permissioncontroller_app.te index 425ea309..4619571c 100644 --- a/private/permissioncontroller_app.te +++ b/private/permissioncontroller_app.te @@ -1,3 +1,3 @@ -allow permissioncontroller_app sysfs_vendor_sched:dir r_dir_perms; -allow permissioncontroller_app sysfs_vendor_sched:file w_file_perms; +allow permissioncontroller_app proc_vendor_sched:dir r_dir_perms; +allow permissioncontroller_app proc_vendor_sched:file w_file_perms; diff --git a/private/priv_app.te b/private/priv_app.te index de2a4f28..c77a18da 100644 --- a/private/priv_app.te +++ b/private/priv_app.te @@ -17,4 +17,4 @@ dontaudit priv_app ab_update_gki_prop:file { getattr }; dontaudit priv_app ab_update_gki_prop:file { map }; dontaudit priv_app adbd_prop:file { open }; dontaudit priv_app adbd_prop:file { getattr }; -dontaudit priv_app sysfs_vendor_sched:file write; +dontaudit priv_app proc_vendor_sched:file write; diff --git a/whitechapel/vendor/google/bluetooth.te b/whitechapel/vendor/google/bluetooth.te index b246eca1..92737abe 100644 --- a/whitechapel/vendor/google/bluetooth.te +++ b/whitechapel/vendor/google/bluetooth.te @@ -1,3 +1,3 @@ -allow bluetooth sysfs_vendor_sched:dir search; -allow bluetooth sysfs_vendor_sched:file w_file_perms; +allow bluetooth proc_vendor_sched:dir search; +allow bluetooth proc_vendor_sched:file w_file_perms; diff --git a/whitechapel/vendor/google/bug_map b/whitechapel/vendor/google/bug_map index 6799ba21..b7c26b57 100644 --- a/whitechapel/vendor/google/bug_map +++ b/whitechapel/vendor/google/bug_map @@ -1,3 +1,3 @@ -permissioncontroller_app sysfs_vendor_sched file b/190671898 +permissioncontroller_app proc_vendor_sched file b/190671898 vendor_ims_app default_prop file b/194281028 hal_fingerprint_default default_prop property_service b/215640468 diff --git a/whitechapel/vendor/google/domain.te b/whitechapel/vendor/google/domain.te index 3e1cbbb7..fd876e09 100644 --- a/whitechapel/vendor/google/domain.te +++ b/whitechapel/vendor/google/domain.te @@ -1,2 +1,2 @@ -allow {domain -appdomain -rs} sysfs_vendor_sched:dir r_dir_perms; -allow {domain -appdomain -rs} sysfs_vendor_sched:file w_file_perms; +allow {domain -appdomain -rs} proc_vendor_sched:dir r_dir_perms; +allow {domain -appdomain -rs} proc_vendor_sched:file w_file_perms; diff --git a/whitechapel/vendor/google/hal_dumpstate_default.te b/whitechapel/vendor/google/hal_dumpstate_default.te index 612b3c0b..66c51b7c 100644 --- a/whitechapel/vendor/google/hal_dumpstate_default.te +++ b/whitechapel/vendor/google/hal_dumpstate_default.te @@ -96,7 +96,7 @@ binder_call(hal_dumpstate_default, hal_graphics_composer_default); allow hal_dumpstate_default sysfs_display:dir r_dir_perms; allow hal_dumpstate_default sysfs_display:file r_file_perms; -allow hal_dumpstate_default sysfs_vendor_sched:file read; +allow hal_dumpstate_default proc_vendor_sched:file read; allow hal_dumpstate_default proc_vendor_sched:dir r_dir_perms; allow hal_dumpstate_default proc_vendor_sched:file r_file_perms; diff --git a/whitechapel/vendor/google/hal_power_default.te b/whitechapel/vendor/google/hal_power_default.te index 22764a32..19cd0bb4 100644 --- a/whitechapel/vendor/google/hal_power_default.te +++ b/whitechapel/vendor/google/hal_power_default.te @@ -1,7 +1,7 @@ allow hal_power_default sysfs_scsi_devices_0000:file rw_file_perms; allow hal_power_default sysfs_fs_f2fs:dir r_dir_perms; allow hal_power_default sysfs_fs_f2fs:file rw_file_perms; -allow hal_power_default sysfs_vendor_sched:file rw_file_perms; +allow hal_power_default proc_vendor_sched:file rw_file_perms; allow hal_power_default cpuctl_device:file rw_file_perms; allow hal_power_default sysfs_gpu:file rw_file_perms; allow hal_power_default sysfs_devfreq_dir:dir r_dir_perms; diff --git a/whitechapel/vendor/google/hbmsvmanager_app.te b/whitechapel/vendor/google/hbmsvmanager_app.te index 2300a2a8..b7058090 100644 --- a/whitechapel/vendor/google/hbmsvmanager_app.te +++ b/whitechapel/vendor/google/hbmsvmanager_app.te @@ -2,8 +2,8 @@ type hbmsvmanager_app, domain, coredomain; app_domain(hbmsvmanager_app); -allow hbmsvmanager_app sysfs_vendor_sched:dir r_dir_perms; -allow hbmsvmanager_app sysfs_vendor_sched:file w_file_perms; +allow hbmsvmanager_app proc_vendor_sched:dir r_dir_perms; +allow hbmsvmanager_app proc_vendor_sched:file w_file_perms; allow hbmsvmanager_app hal_pixel_display_service:service_manager find; binder_call(hbmsvmanager_app, hal_graphics_composer_default) diff --git a/whitechapel/vendor/google/logger_app.te b/whitechapel/vendor/google/logger_app.te index d091cff0..be15d0e6 100644 --- a/whitechapel/vendor/google/logger_app.te +++ b/whitechapel/vendor/google/logger_app.te @@ -24,6 +24,6 @@ userdebug_or_eng(` set_prop(logger_app, vendor_wifi_sniffer_prop) dontaudit logger_app default_prop:file { read }; - dontaudit logger_app sysfs_vendor_sched:dir search; - dontaudit logger_app sysfs_vendor_sched:file write; + dontaudit logger_app proc_vendor_sched:dir search; + dontaudit logger_app proc_vendor_sched:file write; ') diff --git a/whitechapel/vendor/google/mediaprovider.te b/whitechapel/vendor/google/mediaprovider.te index 835593fc..dc3e1c01 100644 --- a/whitechapel/vendor/google/mediaprovider.te +++ b/whitechapel/vendor/google/mediaprovider.te @@ -1,2 +1,2 @@ -dontaudit mediaprovider sysfs_vendor_sched:dir search; -dontaudit mediaprovider sysfs_vendor_sched:file write; +dontaudit mediaprovider proc_vendor_sched:dir search; +dontaudit mediaprovider proc_vendor_sched:file write; diff --git a/whitechapel/vendor/google/nfc.te b/whitechapel/vendor/google/nfc.te index febd851a..80784434 100644 --- a/whitechapel/vendor/google/nfc.te +++ b/whitechapel/vendor/google/nfc.te @@ -1,2 +1,2 @@ -allow nfc sysfs_vendor_sched:dir r_dir_perms; -allow nfc sysfs_vendor_sched:file w_file_perms; +allow nfc proc_vendor_sched:dir r_dir_perms; +allow nfc proc_vendor_sched:file w_file_perms; diff --git a/whitechapel/vendor/google/platform_app.te b/whitechapel/vendor/google/platform_app.te index 70480beb..49fb531b 100644 --- a/whitechapel/vendor/google/platform_app.te +++ b/whitechapel/vendor/google/platform_app.te @@ -4,8 +4,8 @@ allow platform_app hal_exynos_rild_hwservice:hwservice_manager find; allow platform_app hal_wlc_hwservice:hwservice_manager find; binder_call(platform_app, hal_wlc) -allow platform_app sysfs_vendor_sched:dir r_dir_perms; -allow platform_app sysfs_vendor_sched:file w_file_perms; +allow platform_app proc_vendor_sched:dir r_dir_perms; +allow platform_app proc_vendor_sched:file w_file_perms; allow platform_app nfc_service:service_manager find; allow platform_app uwb_service:service_manager find; diff --git a/whitechapel/vendor/google/radio.te b/whitechapel/vendor/google/radio.te index af56688b..baa356bd 100644 --- a/whitechapel/vendor/google/radio.te +++ b/whitechapel/vendor/google/radio.te @@ -1,6 +1,6 @@ allow radio hal_exynos_rild_hwservice:hwservice_manager find; -allow radio sysfs_vendor_sched:dir r_dir_perms; -allow radio sysfs_vendor_sched:file w_file_perms; +allow radio proc_vendor_sched:dir r_dir_perms; +allow radio proc_vendor_sched:file w_file_perms; # Allow telephony to access file descriptor of the QOS socket # so it can make sure the QOS is meant for the intended addresses diff --git a/whitechapel/vendor/google/secure_element.te b/whitechapel/vendor/google/secure_element.te index 831d360e..cb6c1396 100644 --- a/whitechapel/vendor/google/secure_element.te +++ b/whitechapel/vendor/google/secure_element.te @@ -1,2 +1,2 @@ -allow secure_element sysfs_vendor_sched:dir r_dir_perms; -allow secure_element sysfs_vendor_sched:file w_file_perms; +allow secure_element proc_vendor_sched:dir r_dir_perms; +allow secure_element proc_vendor_sched:file w_file_perms; diff --git a/whitechapel/vendor/google/shell.te b/whitechapel/vendor/google/shell.te index abc2f2cc..f982424d 100644 --- a/whitechapel/vendor/google/shell.te +++ b/whitechapel/vendor/google/shell.te @@ -6,5 +6,5 @@ userdebug_or_eng(` allow shell sysfs_sjtag:file rw_file_perms; ') -dontaudit shell sysfs_vendor_sched:dir search; -dontaudit shell sysfs_vendor_sched:file write; +dontaudit shell proc_vendor_sched:dir search; +dontaudit shell proc_vendor_sched:file write; diff --git a/whitechapel/vendor/google/ssr_detector.te b/whitechapel/vendor/google/ssr_detector.te index 958ed352..934028e1 100644 --- a/whitechapel/vendor/google/ssr_detector.te +++ b/whitechapel/vendor/google/ssr_detector.te @@ -13,8 +13,8 @@ userdebug_or_eng(` allow ssr_detector_app sscoredump_vendor_data_coredump_file:file r_file_perms; allow ssr_detector_app sysfs_sjtag:dir r_dir_perms; allow ssr_detector_app sysfs_sjtag:file rw_file_perms; - allow ssr_detector_app sysfs_vendor_sched:dir search; - allow ssr_detector_app sysfs_vendor_sched:file rw_file_perms; + allow ssr_detector_app proc_vendor_sched:dir search; + allow ssr_detector_app proc_vendor_sched:file rw_file_perms; allow ssr_detector_app cgroup:file write; ') diff --git a/whitechapel/vendor/google/system_app.te b/whitechapel/vendor/google/system_app.te index 07536ccf..8c9d5345 100644 --- a/whitechapel/vendor/google/system_app.te +++ b/whitechapel/vendor/google/system_app.te @@ -1,5 +1,5 @@ -allow system_app sysfs_vendor_sched:dir r_dir_perms; -allow system_app sysfs_vendor_sched:file w_file_perms; +allow system_app proc_vendor_sched:dir r_dir_perms; +allow system_app proc_vendor_sched:file w_file_perms; allow system_app hal_wlc_hwservice:hwservice_manager find; binder_call(system_app, hal_wlc) diff --git a/whitechapel/vendor/google/untrusted_app_all.te b/whitechapel/vendor/google/untrusted_app_all.te index dda81542..642ee175 100644 --- a/whitechapel/vendor/google/untrusted_app_all.te +++ b/whitechapel/vendor/google/untrusted_app_all.te @@ -2,5 +2,5 @@ # for secure video playback allow untrusted_app_all dmabuf_system_secure_heap_device:chr_file r_file_perms; -dontaudit untrusted_app_all sysfs_vendor_sched:dir search; -dontaudit untrusted_app_all sysfs_vendor_sched:file write; +dontaudit untrusted_app_all proc_vendor_sched:dir search; +dontaudit untrusted_app_all proc_vendor_sched:file write;