diff --git a/private/permissioncontroller_app.te b/private/permissioncontroller_app.te index 6a4b6fd4..c5feec95 100644 --- a/private/permissioncontroller_app.te +++ b/private/permissioncontroller_app.te @@ -1,2 +1,2 @@ -allow permissioncontroller_app sysfs_vendor_sched:dir r_dir_perms; -allow permissioncontroller_app sysfs_vendor_sched:file w_file_perms; +allow permissioncontroller_app proc_vendor_sched:dir r_dir_perms; +allow permissioncontroller_app proc_vendor_sched:file w_file_perms; diff --git a/whitechapel_pro/bluetooth.te b/whitechapel_pro/bluetooth.te index b3b17416..9d909045 100644 --- a/whitechapel_pro/bluetooth.te +++ b/whitechapel_pro/bluetooth.te @@ -1,2 +1,2 @@ -allow bluetooth sysfs_vendor_sched:dir r_dir_perms; -allow bluetooth sysfs_vendor_sched:file w_file_perms; \ No newline at end of file +allow bluetooth proc_vendor_sched:dir r_dir_perms; +allow bluetooth proc_vendor_sched:file w_file_perms; \ No newline at end of file diff --git a/whitechapel_pro/domain.te b/whitechapel_pro/domain.te index 3e1cbbb7..fd876e09 100644 --- a/whitechapel_pro/domain.te +++ b/whitechapel_pro/domain.te @@ -1,2 +1,2 @@ -allow {domain -appdomain -rs} sysfs_vendor_sched:dir r_dir_perms; -allow {domain -appdomain -rs} sysfs_vendor_sched:file w_file_perms; +allow {domain -appdomain -rs} proc_vendor_sched:dir r_dir_perms; +allow {domain -appdomain -rs} proc_vendor_sched:file w_file_perms; diff --git a/whitechapel_pro/hal_power_default.te b/whitechapel_pro/hal_power_default.te index eaaf8009..076de46b 100644 --- a/whitechapel_pro/hal_power_default.te +++ b/whitechapel_pro/hal_power_default.te @@ -2,7 +2,7 @@ allow hal_power_default sysfs_scsi_devices_0000:file rw_file_perms; allow hal_power_default sysfs_fs_f2fs:dir r_dir_perms; allow hal_power_default sysfs_fs_f2fs:file rw_file_perms; allow hal_power_default sysfs_display:file rw_file_perms; -allow hal_power_default sysfs_vendor_sched:file r_file_perms; +allow hal_power_default proc_vendor_sched:file r_file_perms; allow hal_power_default sysfs_gpu:file rw_file_perms; allow hal_power_default sysfs_fabric:file rw_file_perms; allow hal_power_default sysfs_camera:file rw_file_perms; diff --git a/whitechapel_pro/hbmsvmanager_app.te b/whitechapel_pro/hbmsvmanager_app.te index b8f6a6be..3ed4f823 100644 --- a/whitechapel_pro/hbmsvmanager_app.te +++ b/whitechapel_pro/hbmsvmanager_app.te @@ -2,8 +2,8 @@ type hbmsvmanager_app, domain; app_domain(hbmsvmanager_app); -allow hbmsvmanager_app sysfs_vendor_sched:dir r_dir_perms; -allow hbmsvmanager_app sysfs_vendor_sched:file w_file_perms; +allow hbmsvmanager_app proc_vendor_sched:dir r_dir_perms; +allow hbmsvmanager_app proc_vendor_sched:file w_file_perms; allow hbmsvmanager_app hal_pixel_display_service:service_manager find; binder_call(hbmsvmanager_app, hal_graphics_composer_default) diff --git a/whitechapel_pro/logger_app.te b/whitechapel_pro/logger_app.te index cae88332..9809f309 100644 --- a/whitechapel_pro/logger_app.te +++ b/whitechapel_pro/logger_app.te @@ -24,6 +24,6 @@ userdebug_or_eng(` set_prop(logger_app, vendor_wifi_sniffer_prop) dontaudit logger_app default_prop:file r_file_perms; - dontaudit logger_app sysfs_vendor_sched:dir search; - dontaudit logger_app sysfs_vendor_sched:file write; + dontaudit logger_app proc_vendor_sched:dir search; + dontaudit logger_app proc_vendor_sched:file write; ') diff --git a/whitechapel_pro/nfc.te b/whitechapel_pro/nfc.te index febd851a..80784434 100644 --- a/whitechapel_pro/nfc.te +++ b/whitechapel_pro/nfc.te @@ -1,2 +1,2 @@ -allow nfc sysfs_vendor_sched:dir r_dir_perms; -allow nfc sysfs_vendor_sched:file w_file_perms; +allow nfc proc_vendor_sched:dir r_dir_perms; +allow nfc proc_vendor_sched:file w_file_perms; diff --git a/whitechapel_pro/platform_app.te b/whitechapel_pro/platform_app.te index 7b16577d..356167ab 100644 --- a/whitechapel_pro/platform_app.te +++ b/whitechapel_pro/platform_app.te @@ -1,8 +1,8 @@ allow platform_app hal_pixel_display_service:service_manager find; allow platform_app hal_wlc_hwservice:hwservice_manager find; allow platform_app nfc_service:service_manager find; -allow platform_app sysfs_vendor_sched:dir r_dir_perms; -allow platform_app sysfs_vendor_sched:file w_file_perms; +allow platform_app proc_vendor_sched:dir r_dir_perms; +allow platform_app proc_vendor_sched:file w_file_perms; # Fingerprint (UDFPS) GHBM/LHBM toggle get_prop(platform_app, fingerprint_ghbm_prop) diff --git a/whitechapel_pro/radio.te b/whitechapel_pro/radio.te index 09b4c7e4..8cb144d9 100644 --- a/whitechapel_pro/radio.te +++ b/whitechapel_pro/radio.te @@ -1,2 +1,2 @@ -allow radio sysfs_vendor_sched:dir r_dir_perms; -allow radio sysfs_vendor_sched:file w_file_perms; \ No newline at end of file +allow radio proc_vendor_sched:dir r_dir_perms; +allow radio proc_vendor_sched:file w_file_perms; \ No newline at end of file diff --git a/whitechapel_pro/untrusted_app_all.te b/whitechapel_pro/untrusted_app_all.te index 47d4d1bd..ec95276c 100644 --- a/whitechapel_pro/untrusted_app_all.te +++ b/whitechapel_pro/untrusted_app_all.te @@ -1 +1 @@ -dontaudit untrusted_app_all sysfs_vendor_sched:dir search; +dontaudit untrusted_app_all proc_vendor_sched:dir search;