subsystem_ramdump: add perms to access debug_prop

avc: denied { set } for property=debug.ssrdump.subsys pid=534 uid=0 gid=0 scontext=u:r:subsystem_ramdump:s0 tcontext=u:object_r:debug_prop:s0 tclass=property_service
avc: denied { write } for pid=534 comm="subsystem_ramdu" name="property_service" dev="tmpfs" ino=14093 scontext=u:r:subsystem_ramdump:s0 tcontext=u:object_r:property_socket:s0 tclass=sock_file
avc: denied { connectto } for pid=534 comm="subsystem_ramdu" path="/dev/socket/property_service" scontext=u:r:subsystem_ramdump:s0 tcontext=u:r:init:s0 tclass=unix_stream_socket

Bug: 29750774

Change-Id: I5e7b9a5811ed08611bdaf9a0920468a9d8430adf
diff --git a/sepolicy/property.te b/sepolicy/property.te
index 07eb613..612b860 100644
--- a/sepolicy/property.te
+++ b/sepolicy/property.te
@@ -3,3 +3,4 @@
 type wc_prop, property_type;
 type hw_sku_prop, property_type;
 type mid_prop, property_type;
+type ssr_prop, property_type;
diff --git a/sepolicy/property_contexts b/sepolicy/property_contexts
index 1e58787..77515e1 100644
--- a/sepolicy/property_contexts
+++ b/sepolicy/property_contexts
@@ -7,3 +7,4 @@
 rcs.publish.status         u:object_r:radio_prop:s0
 ro.boot.hardware.sku       u:object_r:hw_sku_prop:s0
 ro.boot.mid                u:object_r:mid_prop:s0
+debug.ssrdump              u:object_r:ssr_prop:s0
diff --git a/sepolicy/subsystem_ramdump.te b/sepolicy/subsystem_ramdump.te
index 539707d..ba983c9 100644
--- a/sepolicy/subsystem_ramdump.te
+++ b/sepolicy/subsystem_ramdump.te
@@ -11,4 +11,6 @@
 
   allow subsystem_ramdump ramdump_data_file:dir rw_dir_perms;
   allow subsystem_ramdump ramdump_data_file:file create_file_perms;
+
+  set_prop(subsystem_ramdump, ssr_prop)
 ')