mirror of
https://github.com/Evolution-X-Devices/device_google_gs201
synced 2026-01-28 13:35:33 +00:00
sched: move sysfs to procfs
Modify name from sysfs_vendor_sched to proc_vendor_sched Test: without avc denial Bug: 216207007 Signed-off-by: chungkai <chungkai@google.com> Change-Id: I96dc6eb76dd533ff6fd54c27be7e4bc32bf5dbc7
This commit is contained in:
committed by
Chung-Kai (Michael) Mei
parent
e0b06b9cbd
commit
4fa67857c3
@@ -1,2 +1,2 @@
|
||||
allow permissioncontroller_app sysfs_vendor_sched:dir r_dir_perms;
|
||||
allow permissioncontroller_app sysfs_vendor_sched:file w_file_perms;
|
||||
allow permissioncontroller_app proc_vendor_sched:dir r_dir_perms;
|
||||
allow permissioncontroller_app proc_vendor_sched:file w_file_perms;
|
||||
|
||||
@@ -1,2 +1,2 @@
|
||||
allow bluetooth sysfs_vendor_sched:dir r_dir_perms;
|
||||
allow bluetooth sysfs_vendor_sched:file w_file_perms;
|
||||
allow bluetooth proc_vendor_sched:dir r_dir_perms;
|
||||
allow bluetooth proc_vendor_sched:file w_file_perms;
|
||||
@@ -1,2 +1,2 @@
|
||||
allow {domain -appdomain -rs} sysfs_vendor_sched:dir r_dir_perms;
|
||||
allow {domain -appdomain -rs} sysfs_vendor_sched:file w_file_perms;
|
||||
allow {domain -appdomain -rs} proc_vendor_sched:dir r_dir_perms;
|
||||
allow {domain -appdomain -rs} proc_vendor_sched:file w_file_perms;
|
||||
|
||||
@@ -2,7 +2,7 @@ allow hal_power_default sysfs_scsi_devices_0000:file rw_file_perms;
|
||||
allow hal_power_default sysfs_fs_f2fs:dir r_dir_perms;
|
||||
allow hal_power_default sysfs_fs_f2fs:file rw_file_perms;
|
||||
allow hal_power_default sysfs_display:file rw_file_perms;
|
||||
allow hal_power_default sysfs_vendor_sched:file r_file_perms;
|
||||
allow hal_power_default proc_vendor_sched:file r_file_perms;
|
||||
allow hal_power_default sysfs_gpu:file rw_file_perms;
|
||||
allow hal_power_default sysfs_fabric:file rw_file_perms;
|
||||
allow hal_power_default sysfs_camera:file rw_file_perms;
|
||||
|
||||
@@ -2,8 +2,8 @@ type hbmsvmanager_app, domain;
|
||||
|
||||
app_domain(hbmsvmanager_app);
|
||||
|
||||
allow hbmsvmanager_app sysfs_vendor_sched:dir r_dir_perms;
|
||||
allow hbmsvmanager_app sysfs_vendor_sched:file w_file_perms;
|
||||
allow hbmsvmanager_app proc_vendor_sched:dir r_dir_perms;
|
||||
allow hbmsvmanager_app proc_vendor_sched:file w_file_perms;
|
||||
|
||||
allow hbmsvmanager_app hal_pixel_display_service:service_manager find;
|
||||
binder_call(hbmsvmanager_app, hal_graphics_composer_default)
|
||||
|
||||
@@ -24,6 +24,6 @@ userdebug_or_eng(`
|
||||
set_prop(logger_app, vendor_wifi_sniffer_prop)
|
||||
|
||||
dontaudit logger_app default_prop:file r_file_perms;
|
||||
dontaudit logger_app sysfs_vendor_sched:dir search;
|
||||
dontaudit logger_app sysfs_vendor_sched:file write;
|
||||
dontaudit logger_app proc_vendor_sched:dir search;
|
||||
dontaudit logger_app proc_vendor_sched:file write;
|
||||
')
|
||||
|
||||
@@ -1,2 +1,2 @@
|
||||
allow nfc sysfs_vendor_sched:dir r_dir_perms;
|
||||
allow nfc sysfs_vendor_sched:file w_file_perms;
|
||||
allow nfc proc_vendor_sched:dir r_dir_perms;
|
||||
allow nfc proc_vendor_sched:file w_file_perms;
|
||||
|
||||
@@ -1,8 +1,8 @@
|
||||
allow platform_app hal_pixel_display_service:service_manager find;
|
||||
allow platform_app hal_wlc_hwservice:hwservice_manager find;
|
||||
allow platform_app nfc_service:service_manager find;
|
||||
allow platform_app sysfs_vendor_sched:dir r_dir_perms;
|
||||
allow platform_app sysfs_vendor_sched:file w_file_perms;
|
||||
allow platform_app proc_vendor_sched:dir r_dir_perms;
|
||||
allow platform_app proc_vendor_sched:file w_file_perms;
|
||||
|
||||
# Fingerprint (UDFPS) GHBM/LHBM toggle
|
||||
get_prop(platform_app, fingerprint_ghbm_prop)
|
||||
|
||||
@@ -1,2 +1,2 @@
|
||||
allow radio sysfs_vendor_sched:dir r_dir_perms;
|
||||
allow radio sysfs_vendor_sched:file w_file_perms;
|
||||
allow radio proc_vendor_sched:dir r_dir_perms;
|
||||
allow radio proc_vendor_sched:file w_file_perms;
|
||||
@@ -1 +1 @@
|
||||
dontaudit untrusted_app_all sysfs_vendor_sched:dir search;
|
||||
dontaudit untrusted_app_all proc_vendor_sched:dir search;
|
||||
|
||||
Reference in New Issue
Block a user