sched: move sysfs to procfs

Modify name from sysfs_vendor_sched to proc_vendor_sched

Test: without avc denial
Bug: 216207007
Signed-off-by: chungkai <chungkai@google.com>
Change-Id: I96dc6eb76dd533ff6fd54c27be7e4bc32bf5dbc7
This commit is contained in:
chungkai 2022-03-23 08:18:08 +00:00 committed by Chung-Kai (Michael) Mei
parent e0b06b9cbd
commit 4fa67857c3
10 changed files with 18 additions and 18 deletions

View file

@ -1,2 +1,2 @@
allow permissioncontroller_app sysfs_vendor_sched:dir r_dir_perms;
allow permissioncontroller_app sysfs_vendor_sched:file w_file_perms;
allow permissioncontroller_app proc_vendor_sched:dir r_dir_perms;
allow permissioncontroller_app proc_vendor_sched:file w_file_perms;

View file

@ -1,2 +1,2 @@
allow bluetooth sysfs_vendor_sched:dir r_dir_perms;
allow bluetooth sysfs_vendor_sched:file w_file_perms;
allow bluetooth proc_vendor_sched:dir r_dir_perms;
allow bluetooth proc_vendor_sched:file w_file_perms;

View file

@ -1,2 +1,2 @@
allow {domain -appdomain -rs} sysfs_vendor_sched:dir r_dir_perms;
allow {domain -appdomain -rs} sysfs_vendor_sched:file w_file_perms;
allow {domain -appdomain -rs} proc_vendor_sched:dir r_dir_perms;
allow {domain -appdomain -rs} proc_vendor_sched:file w_file_perms;

View file

@ -2,7 +2,7 @@ allow hal_power_default sysfs_scsi_devices_0000:file rw_file_perms;
allow hal_power_default sysfs_fs_f2fs:dir r_dir_perms;
allow hal_power_default sysfs_fs_f2fs:file rw_file_perms;
allow hal_power_default sysfs_display:file rw_file_perms;
allow hal_power_default sysfs_vendor_sched:file r_file_perms;
allow hal_power_default proc_vendor_sched:file r_file_perms;
allow hal_power_default sysfs_gpu:file rw_file_perms;
allow hal_power_default sysfs_fabric:file rw_file_perms;
allow hal_power_default sysfs_camera:file rw_file_perms;

View file

@ -2,8 +2,8 @@ type hbmsvmanager_app, domain;
app_domain(hbmsvmanager_app);
allow hbmsvmanager_app sysfs_vendor_sched:dir r_dir_perms;
allow hbmsvmanager_app sysfs_vendor_sched:file w_file_perms;
allow hbmsvmanager_app proc_vendor_sched:dir r_dir_perms;
allow hbmsvmanager_app proc_vendor_sched:file w_file_perms;
allow hbmsvmanager_app hal_pixel_display_service:service_manager find;
binder_call(hbmsvmanager_app, hal_graphics_composer_default)

View file

@ -24,6 +24,6 @@ userdebug_or_eng(`
set_prop(logger_app, vendor_wifi_sniffer_prop)
dontaudit logger_app default_prop:file r_file_perms;
dontaudit logger_app sysfs_vendor_sched:dir search;
dontaudit logger_app sysfs_vendor_sched:file write;
dontaudit logger_app proc_vendor_sched:dir search;
dontaudit logger_app proc_vendor_sched:file write;
')

View file

@ -1,2 +1,2 @@
allow nfc sysfs_vendor_sched:dir r_dir_perms;
allow nfc sysfs_vendor_sched:file w_file_perms;
allow nfc proc_vendor_sched:dir r_dir_perms;
allow nfc proc_vendor_sched:file w_file_perms;

View file

@ -1,8 +1,8 @@
allow platform_app hal_pixel_display_service:service_manager find;
allow platform_app hal_wlc_hwservice:hwservice_manager find;
allow platform_app nfc_service:service_manager find;
allow platform_app sysfs_vendor_sched:dir r_dir_perms;
allow platform_app sysfs_vendor_sched:file w_file_perms;
allow platform_app proc_vendor_sched:dir r_dir_perms;
allow platform_app proc_vendor_sched:file w_file_perms;
# Fingerprint (UDFPS) GHBM/LHBM toggle
get_prop(platform_app, fingerprint_ghbm_prop)

View file

@ -1,2 +1,2 @@
allow radio sysfs_vendor_sched:dir r_dir_perms;
allow radio sysfs_vendor_sched:file w_file_perms;
allow radio proc_vendor_sched:dir r_dir_perms;
allow radio proc_vendor_sched:file w_file_perms;

View file

@ -1 +1 @@
dontaudit untrusted_app_all sysfs_vendor_sched:dir search;
dontaudit untrusted_app_all proc_vendor_sched:dir search;