diff options
author | dcashman <dcashman@google.com> | 2015-01-30 17:17:04 -0800 |
---|---|---|
committer | dcashman <dcashman@google.com> | 2015-02-02 09:25:57 -0800 |
commit | bba18381039dbe45f6acce61d6be1ea7abb2fb06 (patch) | |
tree | 35db860fea1c91ac6f28ccd057d0dd11a8f426f1 /su.te | |
parent | 3c77d4d1c113282315fbccf696298e04f99a20b4 (diff) | |
download | android_external_sepolicy-bba18381039dbe45f6acce61d6be1ea7abb2fb06.tar.gz android_external_sepolicy-bba18381039dbe45f6acce61d6be1ea7abb2fb06.tar.bz2 android_external_sepolicy-bba18381039dbe45f6acce61d6be1ea7abb2fb06.zip |
Allow radio access to drmserver_service.
Address the following denial:
SELinux E avc: denied { find } for service=drm.drmManager scontext=u:r:radio:s0 tcontext=u:object_r:drmserver_service:s0
which occurs when a non-default SMS app sends an MMS. The message would be
stored into system automatically in MMS service (from phone process and phone
UID). The storing of the message involves the creation of
android.drm.DrmManagerClient instance.
Change-Id: Ic4e493f183c9ce7f7ac3f74f6ea062893ea67608
Diffstat (limited to 'su.te')
0 files changed, 0 insertions, 0 deletions