1# bluetooth app 2 3typeattribute bluetooth coredomain, mlstrustedsubject; 4 5app_domain(bluetooth) 6net_domain(bluetooth) 7 8# Socket creation under /data/misc/bluedroid. 9type_transition bluetooth bluetooth_data_file:sock_file bluetooth_socket; 10 11# Allow access to net_admin ioctls 12allowxperm bluetooth self:udp_socket ioctl priv_sock_ioctls; 13 14wakelock_use(bluetooth); 15 16# Data file accesses. 17allow bluetooth bluetooth_data_file:dir create_dir_perms; 18allow bluetooth bluetooth_data_file:notdevfile_class_set create_file_perms; 19allow bluetooth bluetooth_logs_data_file:dir rw_dir_perms; 20allow bluetooth bluetooth_logs_data_file:file create_file_perms; 21 22# Socket creation under /data/misc/bluedroid. 23allow bluetooth bluetooth_socket:sock_file create_file_perms; 24 25allow bluetooth self:global_capability_class_set net_admin; 26allow bluetooth self:global_capability2_class_set wake_alarm; 27 28# tethering 29allow bluetooth self:packet_socket create_socket_perms_no_ioctl; 30allow bluetooth self:global_capability_class_set { net_admin net_raw net_bind_service }; 31allow bluetooth self:tun_socket create_socket_perms_no_ioctl; 32allow bluetooth tun_device:chr_file rw_file_perms; 33allowxperm bluetooth tun_device:chr_file ioctl { TUNGETIFF TUNSETIFF }; 34allow bluetooth efs_file:dir search; 35 36# allow Bluetooth to access uhid device for HID profile 37allow bluetooth uhid_device:chr_file rw_file_perms; 38 39# proc access. 40allow bluetooth proc_bluetooth_writable:file rw_file_perms; 41 42# Allow write access to bluetooth specific properties 43set_prop(bluetooth, binder_cache_bluetooth_server_prop); 44neverallow { domain -bluetooth -init } 45 binder_cache_bluetooth_server_prop:property_service set; 46set_prop(bluetooth, bluetooth_a2dp_offload_prop) 47set_prop(bluetooth, bluetooth_audio_hal_prop) 48set_prop(bluetooth, bluetooth_prop) 49set_prop(bluetooth, exported_bluetooth_prop) 50set_prop(bluetooth, pan_result_prop) 51 52allow bluetooth audioserver_service:service_manager find; 53allow bluetooth bluetooth_service:service_manager find; 54allow bluetooth drmserver_service:service_manager find; 55allow bluetooth mediaserver_service:service_manager find; 56allow bluetooth radio_service:service_manager find; 57allow bluetooth app_api_service:service_manager find; 58allow bluetooth system_api_service:service_manager find; 59allow bluetooth network_stack_service:service_manager find; 60allow bluetooth system_suspend_control_service:service_manager find; 61 62# already open bugreport file descriptors may be shared with 63# the bluetooth process, from a file in 64# /data/data/com.android.shell/files/bugreports/bugreport-*. 65allow bluetooth shell_data_file:file read; 66 67# Bluetooth audio needs RT scheduling to meet deadlines, allow sys_nice 68allow bluetooth self:global_capability_class_set sys_nice; 69 70hal_client_domain(bluetooth, hal_bluetooth) 71hal_client_domain(bluetooth, hal_telephony) 72 73# Bluetooth A2DP offload requires binding with audio HAL 74hal_client_domain(bluetooth, hal_audio) 75 76read_runtime_log_tags(bluetooth) 77 78### 79### Neverallow rules 80### 81### These are things that the bluetooth app should NEVER be able to do 82### 83 84# Superuser capabilities. 85# Bluetooth requires net_{admin,raw,bind_service} and wake_alarm and block_suspend and sys_nice. 86neverallow bluetooth self:global_capability_class_set ~{ net_admin net_raw net_bind_service sys_nice}; 87neverallow bluetooth self:global_capability2_class_set ~{ wake_alarm block_suspend }; 88