aboutsummaryrefslogtreecommitdiffstats
path: root/radio.te
diff options
context:
space:
mode:
authordcashman <dcashman@google.com>2015-01-30 17:17:04 -0800
committerdcashman <dcashman@google.com>2015-02-02 09:25:57 -0800
commitbba18381039dbe45f6acce61d6be1ea7abb2fb06 (patch)
tree35db860fea1c91ac6f28ccd057d0dd11a8f426f1 /radio.te
parent3c77d4d1c113282315fbccf696298e04f99a20b4 (diff)
downloadandroid_external_sepolicy-bba18381039dbe45f6acce61d6be1ea7abb2fb06.tar.gz
android_external_sepolicy-bba18381039dbe45f6acce61d6be1ea7abb2fb06.tar.bz2
android_external_sepolicy-bba18381039dbe45f6acce61d6be1ea7abb2fb06.zip
Allow radio access to drmserver_service.
Address the following denial: SELinux E avc: denied { find } for service=drm.drmManager scontext=u:r:radio:s0 tcontext=u:object_r:drmserver_service:s0 which occurs when a non-default SMS app sends an MMS. The message would be stored into system automatically in MMS service (from phone process and phone UID). The storing of the message involves the creation of android.drm.DrmManagerClient instance. Change-Id: Ic4e493f183c9ce7f7ac3f74f6ea062893ea67608
Diffstat (limited to 'radio.te')
-rw-r--r--radio.te1
1 files changed, 1 insertions, 0 deletions
diff --git a/radio.te b/radio.te
index a21fd89..03d1580 100644
--- a/radio.te
+++ b/radio.te
@@ -31,6 +31,7 @@ auditallow radio system_radio_prop:property_service set;
# ctl interface
allow radio ctl_rildaemon_prop:property_service set;
+allow radio drmserver_service:service_manager find;
allow radio mediaserver_service:service_manager find;
allow radio radio_service:service_manager { add find };
allow radio surfaceflinger_service:service_manager find;