sched: move sysfs to procfs am: 4fa67857c3

Original change: https://googleplex-android-review.googlesource.com/c/device/google/gs201-sepolicy/+/17346963

Change-Id: Ib855e5bdf15d24defa55f3b548144fd31ed96ecb
This commit is contained in:
chungkai 2022-03-24 18:16:44 +00:00 committed by Automerger Merge Worker
commit 9bff8c59b6
10 changed files with 18 additions and 18 deletions

View file

@ -1,2 +1,2 @@
allow permissioncontroller_app sysfs_vendor_sched:dir r_dir_perms;
allow permissioncontroller_app sysfs_vendor_sched:file w_file_perms;
allow permissioncontroller_app proc_vendor_sched:dir r_dir_perms;
allow permissioncontroller_app proc_vendor_sched:file w_file_perms;

View file

@ -1,2 +1,2 @@
allow bluetooth sysfs_vendor_sched:dir r_dir_perms;
allow bluetooth sysfs_vendor_sched:file w_file_perms;
allow bluetooth proc_vendor_sched:dir r_dir_perms;
allow bluetooth proc_vendor_sched:file w_file_perms;

View file

@ -1,2 +1,2 @@
allow {domain -appdomain -rs} sysfs_vendor_sched:dir r_dir_perms;
allow {domain -appdomain -rs} sysfs_vendor_sched:file w_file_perms;
allow {domain -appdomain -rs} proc_vendor_sched:dir r_dir_perms;
allow {domain -appdomain -rs} proc_vendor_sched:file w_file_perms;

View file

@ -2,7 +2,7 @@ allow hal_power_default sysfs_scsi_devices_0000:file rw_file_perms;
allow hal_power_default sysfs_fs_f2fs:dir r_dir_perms;
allow hal_power_default sysfs_fs_f2fs:file rw_file_perms;
allow hal_power_default sysfs_display:file rw_file_perms;
allow hal_power_default sysfs_vendor_sched:file r_file_perms;
allow hal_power_default proc_vendor_sched:file r_file_perms;
allow hal_power_default sysfs_gpu:file rw_file_perms;
allow hal_power_default sysfs_fabric:file rw_file_perms;
allow hal_power_default sysfs_camera:file rw_file_perms;

View file

@ -2,8 +2,8 @@ type hbmsvmanager_app, domain;
app_domain(hbmsvmanager_app);
allow hbmsvmanager_app sysfs_vendor_sched:dir r_dir_perms;
allow hbmsvmanager_app sysfs_vendor_sched:file w_file_perms;
allow hbmsvmanager_app proc_vendor_sched:dir r_dir_perms;
allow hbmsvmanager_app proc_vendor_sched:file w_file_perms;
allow hbmsvmanager_app hal_pixel_display_service:service_manager find;
binder_call(hbmsvmanager_app, hal_graphics_composer_default)

View file

@ -24,6 +24,6 @@ userdebug_or_eng(`
set_prop(logger_app, vendor_wifi_sniffer_prop)
dontaudit logger_app default_prop:file r_file_perms;
dontaudit logger_app sysfs_vendor_sched:dir search;
dontaudit logger_app sysfs_vendor_sched:file write;
dontaudit logger_app proc_vendor_sched:dir search;
dontaudit logger_app proc_vendor_sched:file write;
')

View file

@ -1,2 +1,2 @@
allow nfc sysfs_vendor_sched:dir r_dir_perms;
allow nfc sysfs_vendor_sched:file w_file_perms;
allow nfc proc_vendor_sched:dir r_dir_perms;
allow nfc proc_vendor_sched:file w_file_perms;

View file

@ -1,8 +1,8 @@
allow platform_app hal_pixel_display_service:service_manager find;
allow platform_app hal_wlc_hwservice:hwservice_manager find;
allow platform_app nfc_service:service_manager find;
allow platform_app sysfs_vendor_sched:dir r_dir_perms;
allow platform_app sysfs_vendor_sched:file w_file_perms;
allow platform_app proc_vendor_sched:dir r_dir_perms;
allow platform_app proc_vendor_sched:file w_file_perms;
# Fingerprint (UDFPS) GHBM/LHBM toggle
get_prop(platform_app, fingerprint_ghbm_prop)

View file

@ -1,2 +1,2 @@
allow radio sysfs_vendor_sched:dir r_dir_perms;
allow radio sysfs_vendor_sched:file w_file_perms;
allow radio proc_vendor_sched:dir r_dir_perms;
allow radio proc_vendor_sched:file w_file_perms;

View file

@ -1 +1 @@
dontaudit untrusted_app_all sysfs_vendor_sched:dir search;
dontaudit untrusted_app_all proc_vendor_sched:dir search;