• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1# bluetooth app
2
3typeattribute bluetooth coredomain, mlstrustedsubject;
4
5app_domain(bluetooth)
6net_domain(bluetooth)
7
8# Socket creation under /data/misc/bluedroid.
9type_transition bluetooth bluetooth_data_file:sock_file bluetooth_socket;
10
11# Allow access to net_admin ioctls
12allowxperm bluetooth self:udp_socket ioctl priv_sock_ioctls;
13
14wakelock_use(bluetooth);
15
16# Data file accesses.
17allow bluetooth bluetooth_data_file:dir create_dir_perms;
18allow bluetooth bluetooth_data_file:notdevfile_class_set create_file_perms;
19allow bluetooth bluetooth_logs_data_file:dir rw_dir_perms;
20allow bluetooth bluetooth_logs_data_file:file create_file_perms;
21
22# Socket creation under /data/misc/bluedroid.
23allow bluetooth bluetooth_socket:sock_file create_file_perms;
24
25allow bluetooth self:global_capability_class_set net_admin;
26allow bluetooth self:global_capability2_class_set wake_alarm;
27
28# tethering
29allow bluetooth self:packet_socket create_socket_perms_no_ioctl;
30allow bluetooth self:global_capability_class_set { net_admin net_raw net_bind_service };
31allow bluetooth self:tun_socket create_socket_perms_no_ioctl;
32allow bluetooth tun_device:chr_file rw_file_perms;
33allowxperm bluetooth tun_device:chr_file ioctl { TUNGETIFF TUNSETIFF };
34allow bluetooth efs_file:dir search;
35
36# allow Bluetooth to access uhid device for HID profile
37allow bluetooth uhid_device:chr_file rw_file_perms;
38
39# proc access.
40allow bluetooth proc_bluetooth_writable:file rw_file_perms;
41
42# Allow write access to bluetooth specific properties
43set_prop(bluetooth, binder_cache_bluetooth_server_prop);
44neverallow { domain -bluetooth -init }
45    binder_cache_bluetooth_server_prop:property_service set;
46set_prop(bluetooth, bluetooth_a2dp_offload_prop)
47set_prop(bluetooth, bluetooth_audio_hal_prop)
48set_prop(bluetooth, bluetooth_prop)
49set_prop(bluetooth, exported_bluetooth_prop)
50set_prop(bluetooth, pan_result_prop)
51
52allow bluetooth audioserver_service:service_manager find;
53allow bluetooth bluetooth_service:service_manager find;
54allow bluetooth drmserver_service:service_manager find;
55allow bluetooth mediaserver_service:service_manager find;
56allow bluetooth radio_service:service_manager find;
57allow bluetooth app_api_service:service_manager find;
58allow bluetooth system_api_service:service_manager find;
59allow bluetooth network_stack_service:service_manager find;
60allow bluetooth system_suspend_control_service:service_manager find;
61
62# already open bugreport file descriptors may be shared with
63# the bluetooth process, from a file in
64# /data/data/com.android.shell/files/bugreports/bugreport-*.
65allow bluetooth shell_data_file:file read;
66
67# Bluetooth audio needs RT scheduling to meet deadlines, allow sys_nice
68allow bluetooth self:global_capability_class_set sys_nice;
69
70hal_client_domain(bluetooth, hal_bluetooth)
71hal_client_domain(bluetooth, hal_telephony)
72
73# Bluetooth A2DP offload requires binding with audio HAL
74hal_client_domain(bluetooth, hal_audio)
75
76read_runtime_log_tags(bluetooth)
77
78###
79### Neverallow rules
80###
81### These are things that the bluetooth app should NEVER be able to do
82###
83
84# Superuser capabilities.
85# Bluetooth requires net_{admin,raw,bind_service} and wake_alarm and block_suspend and sys_nice.
86neverallow bluetooth self:global_capability_class_set ~{ net_admin net_raw net_bind_service sys_nice};
87neverallow bluetooth self:global_capability2_class_set ~{ wake_alarm block_suspend };
88