sched: move sysfs to procfs

Modify name from sysfs_vendor_sched to proc_vendor_sched

Test: without avc denial
Bug: 216207007
Signed-off-by: chungkai <chungkai@google.com>
Change-Id: Ic113b2d8ee1d3ae1ced9985636b17ef1e7657a84
diff --git a/private/gmscore_app.te b/private/gmscore_app.te
index 3968de3..e52eb55 100644
--- a/private/gmscore_app.te
+++ b/private/gmscore_app.te
@@ -1,3 +1,3 @@
 # b/177389198
 dontaudit gmscore_app adbd_prop:file *;
-dontaudit gmscore_app sysfs_vendor_sched:file write;
+dontaudit gmscore_app proc_vendor_sched:file write;
diff --git a/private/permissioncontroller_app.te b/private/permissioncontroller_app.te
index 425ea30..4619571 100644
--- a/private/permissioncontroller_app.te
+++ b/private/permissioncontroller_app.te
@@ -1,3 +1,3 @@
-allow permissioncontroller_app sysfs_vendor_sched:dir r_dir_perms;
-allow permissioncontroller_app sysfs_vendor_sched:file w_file_perms;
+allow permissioncontroller_app proc_vendor_sched:dir r_dir_perms;
+allow permissioncontroller_app proc_vendor_sched:file w_file_perms;
 
diff --git a/private/priv_app.te b/private/priv_app.te
index de2a4f2..c77a18d 100644
--- a/private/priv_app.te
+++ b/private/priv_app.te
@@ -17,4 +17,4 @@
 dontaudit priv_app ab_update_gki_prop:file { map };
 dontaudit priv_app adbd_prop:file { open };
 dontaudit priv_app adbd_prop:file { getattr };
-dontaudit priv_app sysfs_vendor_sched:file write;
+dontaudit priv_app proc_vendor_sched:file write;
diff --git a/whitechapel/vendor/google/bluetooth.te b/whitechapel/vendor/google/bluetooth.te
index b246eca..92737ab 100644
--- a/whitechapel/vendor/google/bluetooth.te
+++ b/whitechapel/vendor/google/bluetooth.te
@@ -1,3 +1,3 @@
-allow bluetooth sysfs_vendor_sched:dir search;
-allow bluetooth sysfs_vendor_sched:file w_file_perms;
+allow bluetooth proc_vendor_sched:dir search;
+allow bluetooth proc_vendor_sched:file w_file_perms;
 
diff --git a/whitechapel/vendor/google/bug_map b/whitechapel/vendor/google/bug_map
index 6799ba2..b7c26b5 100644
--- a/whitechapel/vendor/google/bug_map
+++ b/whitechapel/vendor/google/bug_map
@@ -1,3 +1,3 @@
-permissioncontroller_app sysfs_vendor_sched file b/190671898
+permissioncontroller_app proc_vendor_sched file b/190671898
 vendor_ims_app default_prop file b/194281028
 hal_fingerprint_default default_prop property_service b/215640468
diff --git a/whitechapel/vendor/google/domain.te b/whitechapel/vendor/google/domain.te
index 3e1cbbb..fd876e0 100644
--- a/whitechapel/vendor/google/domain.te
+++ b/whitechapel/vendor/google/domain.te
@@ -1,2 +1,2 @@
-allow {domain -appdomain -rs} sysfs_vendor_sched:dir r_dir_perms;
-allow {domain -appdomain -rs} sysfs_vendor_sched:file w_file_perms;
+allow {domain -appdomain -rs} proc_vendor_sched:dir r_dir_perms;
+allow {domain -appdomain -rs} proc_vendor_sched:file w_file_perms;
diff --git a/whitechapel/vendor/google/hal_dumpstate_default.te b/whitechapel/vendor/google/hal_dumpstate_default.te
index 612b3c0..66c51b7 100644
--- a/whitechapel/vendor/google/hal_dumpstate_default.te
+++ b/whitechapel/vendor/google/hal_dumpstate_default.te
@@ -96,7 +96,7 @@
 allow hal_dumpstate_default sysfs_display:dir r_dir_perms;
 allow hal_dumpstate_default sysfs_display:file r_file_perms;
 
-allow hal_dumpstate_default sysfs_vendor_sched:file read;
+allow hal_dumpstate_default proc_vendor_sched:file read;
 allow hal_dumpstate_default proc_vendor_sched:dir r_dir_perms;
 allow hal_dumpstate_default proc_vendor_sched:file r_file_perms;
 
diff --git a/whitechapel/vendor/google/hal_power_default.te b/whitechapel/vendor/google/hal_power_default.te
index 22764a3..19cd0bb 100644
--- a/whitechapel/vendor/google/hal_power_default.te
+++ b/whitechapel/vendor/google/hal_power_default.te
@@ -1,7 +1,7 @@
 allow hal_power_default sysfs_scsi_devices_0000:file rw_file_perms;
 allow hal_power_default sysfs_fs_f2fs:dir r_dir_perms;
 allow hal_power_default sysfs_fs_f2fs:file rw_file_perms;
-allow hal_power_default sysfs_vendor_sched:file rw_file_perms;
+allow hal_power_default proc_vendor_sched:file rw_file_perms;
 allow hal_power_default cpuctl_device:file rw_file_perms;
 allow hal_power_default sysfs_gpu:file rw_file_perms;
 allow hal_power_default sysfs_devfreq_dir:dir r_dir_perms;
diff --git a/whitechapel/vendor/google/hbmsvmanager_app.te b/whitechapel/vendor/google/hbmsvmanager_app.te
index 2300a2a..b705809 100644
--- a/whitechapel/vendor/google/hbmsvmanager_app.te
+++ b/whitechapel/vendor/google/hbmsvmanager_app.te
@@ -2,8 +2,8 @@
 
 app_domain(hbmsvmanager_app);
 
-allow hbmsvmanager_app sysfs_vendor_sched:dir r_dir_perms;
-allow hbmsvmanager_app sysfs_vendor_sched:file w_file_perms;
+allow hbmsvmanager_app proc_vendor_sched:dir r_dir_perms;
+allow hbmsvmanager_app proc_vendor_sched:file w_file_perms;
 
 allow hbmsvmanager_app hal_pixel_display_service:service_manager find;
 binder_call(hbmsvmanager_app, hal_graphics_composer_default)
diff --git a/whitechapel/vendor/google/logger_app.te b/whitechapel/vendor/google/logger_app.te
index d091cff..be15d0e 100644
--- a/whitechapel/vendor/google/logger_app.te
+++ b/whitechapel/vendor/google/logger_app.te
@@ -24,6 +24,6 @@
   set_prop(logger_app, vendor_wifi_sniffer_prop)
 
   dontaudit logger_app default_prop:file { read };
-  dontaudit logger_app sysfs_vendor_sched:dir search;
-  dontaudit logger_app sysfs_vendor_sched:file write;
+  dontaudit logger_app proc_vendor_sched:dir search;
+  dontaudit logger_app proc_vendor_sched:file write;
 ')
diff --git a/whitechapel/vendor/google/mediaprovider.te b/whitechapel/vendor/google/mediaprovider.te
index 835593f..dc3e1c0 100644
--- a/whitechapel/vendor/google/mediaprovider.te
+++ b/whitechapel/vendor/google/mediaprovider.te
@@ -1,2 +1,2 @@
-dontaudit mediaprovider sysfs_vendor_sched:dir search;
-dontaudit mediaprovider sysfs_vendor_sched:file write;
+dontaudit mediaprovider proc_vendor_sched:dir search;
+dontaudit mediaprovider proc_vendor_sched:file write;
diff --git a/whitechapel/vendor/google/nfc.te b/whitechapel/vendor/google/nfc.te
index febd851..8078443 100644
--- a/whitechapel/vendor/google/nfc.te
+++ b/whitechapel/vendor/google/nfc.te
@@ -1,2 +1,2 @@
-allow nfc sysfs_vendor_sched:dir r_dir_perms;
-allow nfc sysfs_vendor_sched:file w_file_perms;
+allow nfc proc_vendor_sched:dir r_dir_perms;
+allow nfc proc_vendor_sched:file w_file_perms;
diff --git a/whitechapel/vendor/google/platform_app.te b/whitechapel/vendor/google/platform_app.te
index 70480be..49fb531 100644
--- a/whitechapel/vendor/google/platform_app.te
+++ b/whitechapel/vendor/google/platform_app.te
@@ -4,8 +4,8 @@
 allow platform_app hal_wlc_hwservice:hwservice_manager find;
 binder_call(platform_app, hal_wlc)
 
-allow platform_app sysfs_vendor_sched:dir r_dir_perms;
-allow platform_app sysfs_vendor_sched:file w_file_perms;
+allow platform_app proc_vendor_sched:dir r_dir_perms;
+allow platform_app proc_vendor_sched:file w_file_perms;
 
 allow platform_app nfc_service:service_manager find;
 allow platform_app uwb_service:service_manager find;
diff --git a/whitechapel/vendor/google/radio.te b/whitechapel/vendor/google/radio.te
index af56688..baa356b 100644
--- a/whitechapel/vendor/google/radio.te
+++ b/whitechapel/vendor/google/radio.te
@@ -1,6 +1,6 @@
 allow radio hal_exynos_rild_hwservice:hwservice_manager find;
-allow radio sysfs_vendor_sched:dir r_dir_perms;
-allow radio sysfs_vendor_sched:file w_file_perms;
+allow radio proc_vendor_sched:dir r_dir_perms;
+allow radio proc_vendor_sched:file w_file_perms;
 
 # Allow telephony to access file descriptor of the QOS socket
 # so it can make sure the QOS is meant for the intended addresses
diff --git a/whitechapel/vendor/google/secure_element.te b/whitechapel/vendor/google/secure_element.te
index 831d360..cb6c139 100644
--- a/whitechapel/vendor/google/secure_element.te
+++ b/whitechapel/vendor/google/secure_element.te
@@ -1,2 +1,2 @@
-allow secure_element sysfs_vendor_sched:dir r_dir_perms;
-allow secure_element sysfs_vendor_sched:file w_file_perms;
+allow secure_element proc_vendor_sched:dir r_dir_perms;
+allow secure_element proc_vendor_sched:file w_file_perms;
diff --git a/whitechapel/vendor/google/shell.te b/whitechapel/vendor/google/shell.te
index abc2f2c..f982424 100644
--- a/whitechapel/vendor/google/shell.te
+++ b/whitechapel/vendor/google/shell.te
@@ -6,5 +6,5 @@
   allow shell sysfs_sjtag:file rw_file_perms;
 ')
 
-dontaudit shell sysfs_vendor_sched:dir search;
-dontaudit shell sysfs_vendor_sched:file write;
+dontaudit shell proc_vendor_sched:dir search;
+dontaudit shell proc_vendor_sched:file write;
diff --git a/whitechapel/vendor/google/ssr_detector.te b/whitechapel/vendor/google/ssr_detector.te
index 958ed35..934028e 100644
--- a/whitechapel/vendor/google/ssr_detector.te
+++ b/whitechapel/vendor/google/ssr_detector.te
@@ -13,8 +13,8 @@
   allow ssr_detector_app sscoredump_vendor_data_coredump_file:file r_file_perms;
   allow ssr_detector_app sysfs_sjtag:dir r_dir_perms;
   allow ssr_detector_app sysfs_sjtag:file rw_file_perms;
-  allow ssr_detector_app sysfs_vendor_sched:dir search;
-  allow ssr_detector_app sysfs_vendor_sched:file rw_file_perms;
+  allow ssr_detector_app proc_vendor_sched:dir search;
+  allow ssr_detector_app proc_vendor_sched:file rw_file_perms;
   allow ssr_detector_app cgroup:file write;
 ')
 
diff --git a/whitechapel/vendor/google/system_app.te b/whitechapel/vendor/google/system_app.te
index 07536cc..8c9d534 100644
--- a/whitechapel/vendor/google/system_app.te
+++ b/whitechapel/vendor/google/system_app.te
@@ -1,5 +1,5 @@
-allow system_app sysfs_vendor_sched:dir r_dir_perms;
-allow system_app sysfs_vendor_sched:file w_file_perms;
+allow system_app proc_vendor_sched:dir r_dir_perms;
+allow system_app proc_vendor_sched:file w_file_perms;
 
 allow system_app hal_wlc_hwservice:hwservice_manager find;
 binder_call(system_app, hal_wlc)
diff --git a/whitechapel/vendor/google/untrusted_app_all.te b/whitechapel/vendor/google/untrusted_app_all.te
index dda8154..642ee17 100644
--- a/whitechapel/vendor/google/untrusted_app_all.te
+++ b/whitechapel/vendor/google/untrusted_app_all.te
@@ -2,5 +2,5 @@
 # for secure video playback
 allow untrusted_app_all dmabuf_system_secure_heap_device:chr_file r_file_perms;
 
-dontaudit untrusted_app_all sysfs_vendor_sched:dir search;
-dontaudit untrusted_app_all sysfs_vendor_sched:file write;
+dontaudit untrusted_app_all proc_vendor_sched:dir search;
+dontaudit untrusted_app_all proc_vendor_sched:file write;